ExamGecko
Home Home / Nutanix / NCA-6.5

Nutanix NCA-6.5 Practice Test - Questions Answers, Page 4

Question list
Search
Search

An administrator has defined a security policy that needs to be applied to dozens of VMs. What is the most efficient way the administrator can perform this?

A.
Within the policy, select all the VMs it should be applied to.
A.
Within the policy, select all the VMs it should be applied to.
Answers
B.
Apply a category to the VMs. and associate the category with the policy.
B.
Apply a category to the VMs. and associate the category with the policy.
Answers
C.
Apply the same label to all the VMs, then bind the policy to the label.
C.
Apply the same label to all the VMs, then bind the policy to the label.
Answers
D.
Use a script to apply the policy to the defined VMs.
D.
Use a script to apply the policy to the defined VMs.
Answers
Suggested answer: C

Explanation:

Labels allow administrators to group related objects, such as VMs, and then apply policies to those labels, rather than having to manually apply the policy to each individual VM. This is the most efficient way for an administrator to apply a security policy to dozens of VMs.

Reference: https://portal.nutanix.com/page/documents/details?targetId=Platform-Administrator-Guide-v5_7:pag-sec-category-label-c.html

An administrator manages a memory-sensitive application that consists of multiple VMs. The administrator needs to understand if workloads, historically, have been evenly distributed across these VMs.

What should the administrator do?

A.
Create an Alert Policy with VM as entity type and memory usage as a metric.
A.
Create an Alert Policy with VM as entity type and memory usage as a metric.
Answers
B.
Run cluster efficiency summary report selecting all the VMs that constitute the applications.
B.
Run cluster efficiency summary report selecting all the VMs that constitute the applications.
Answers
C.
Add Memory usage chart to Analysis dashboard for each required VM.
C.
Add Memory usage chart to Analysis dashboard for each required VM.
Answers
D.
Filter VMs list by using Memory Usage.
D.
Filter VMs list by using Memory Usage.
Answers
Suggested answer: D

From Prism Central, how can an administrator access a cluster?

A.
Use the VM Summary view.
A.
Use the VM Summary view.
Answers
B.
Use the cluster quick access from the main dashboard widget.
B.
Use the cluster quick access from the main dashboard widget.
Answers
C.
Use the cluster quick access from the Settings page.
C.
Use the cluster quick access from the Settings page.
Answers
D.
Use the Cluster Summary view.
D.
Use the Cluster Summary view.
Answers
Suggested answer: B

Explanation:

From Prism Central's main dashboard page, an administrator can access any cluster by clicking the cluster quick access link. This will open the cluster summary page, which contains detailed information about the cluster, including the nodes, virtual machines, and applications running on the cluster. Reference: https://portal.nutanix.com/page/documents/details?targetId=Platform- Administrator-Guide-v5_7:pag-prism-central-cluster-access-c.html

Which type of network supports automatically assigning IP addresses to VMs?

A.
Floating IP Network
A.
Floating IP Network
Answers
B.
Management traffic network
B.
Management traffic network
Answers
C.
Virtual Network with IPAM
C.
Virtual Network with IPAM
Answers
D.
Virtual Private Cloud Networks
D.
Virtual Private Cloud Networks
Answers
Suggested answer: C

Explanation:

A virtual network with IPAM (IP Address Management) supports automatically assigning IP addresses to VMs. This eliminates the need for manual configuration of IP addresses for each VM, and makes it easy to manage and track IP address usage.

Reference: https://portal.nutanix.com/page/documents/details?targetId=Platform-Administrator-Guide-v5_7:pag-network-ipam-c.html

Where can an administrator configure role-based access control (RBAC)?

A.
Self-Service Restore
A.
Self-Service Restore
Answers
B.
Prism Element
B.
Prism Element
Answers
C.
Foundation
C.
Foundation
Answers
D.
Prism Central
D.
Prism Central
Answers
Suggested answer: D

Explanation:

Role-based access control (RBAC) allows administrators to configure access control for different users and groups in the Nutanix cluster. This feature is available through Prism Central, where administrators can configure roles and permissions for different users and groups.

Reference: https://portal.nutanix.com/page/documents/details?targetId=Platform-Administrator-Guide-v5_7:pag-user-role-c.html

What is Nutanix's scale-out storage technology that makes its hyperconverged platform possible?

A.
Distributed File Services
A.
Distributed File Services
Answers
B.
Distributed Storage Fabric
B.
Distributed Storage Fabric
Answers
C.
HDD/SDD Storage Tiers
C.
HDD/SDD Storage Tiers
Answers
D.
Hot swappable NVMe/SSD
D.
Hot swappable NVMe/SSD
Answers
Suggested answer: B

Explanation:

Nutanix's scale-out storage technology, the Distributed Storage Fabric, makes its hyperconverged platform possible. It provides a single, unified layer of storage to multiple nodes in a cluster, allowing data to be stored, accessed, and processed in a distributed, fault-tolerant manner.

Reference: https://www.nutanix.com/what-is-nutanix/distributed-storage-fabric/

How would an administrator upgrade the LCM framework to the latest version?

A.
Run LCM pre-checks
A.
Run LCM pre-checks
Answers
B.
Settings/Upgrade Software
B.
Settings/Upgrade Software
Answers
C.
Run LCM inventory
C.
Run LCM inventory
Answers
D.
Run an NCC health check
D.
Run an NCC health check
Answers
Suggested answer: B

Explanation:

To upgrade the LCM framework to the latest version, the administrator must go to the Settings page of the Prism Central UI, and then select the Upgrade Software option. This will show the available versions of the LCM framework, and allow the administrator to select the desired version and upgrade. Reference: https://portal.nutanix.com/page/documents/details?targetId=Platform- Administrator-Guide-v5_7:pag-lcm-upgrade-c.html

A single host in a four-node AHV-based cluster experiences a complete network failure.

If more than enough resources exist in the cluster to tolerate a node failure, what happens to the user VMs running on that host?

A.
VMs remain down until network connectivity is restored.
A.
VMs remain down until network connectivity is restored.
Answers
B.
VMs stay up, but are unreachable until connectivity is restored.
B.
VMs stay up, but are unreachable until connectivity is restored.
Answers
C.
VMs automatically restart on the three remaining hosts.
C.
VMs automatically restart on the three remaining hosts.
Answers
D.
VMs are live-migrated to the three remaining hosts.
D.
VMs are live-migrated to the three remaining hosts.
Answers
Suggested answer: B

Explanation:

In the case of a single host in a four-node AHV-based cluster experiencing a complete network failure, the user VMs running on that host will stay up, but will be unreachable until connectivity is restored. This is because if more than enough resources exist in the cluster to tolerate a node failure, the VMs will continue to run, but will be unable to communicate with other nodes in the cluster due to the network failure. This is stated in the official Nutanix Certified Associate (NCA) v6.5 study guide on page 49, under the heading "Virtual Machine Availability in the Event of Node Failure".

A SQL Server cluster has been deployed on an AHV cluster. To ensure maximum uptime, the administrator wants the SQL Server VMs running on different hosts while leveraging High Availability in case of host failure.

Which configuration would meet these requirements?

A.
Configure one VM as an Agent VM
A.
Configure one VM as an Agent VM
Answers
B.
Disable Host affinity rules in the cluster
B.
Disable Host affinity rules in the cluster
Answers
C.
Create an anti-affinity rule via CLI.
C.
Create an anti-affinity rule via CLI.
Answers
D.
Disable VM live migration from selected VMs.
D.
Disable VM live migration from selected VMs.
Answers
Suggested answer: C

Explanation:

Anti-affinity rules are used to ensure that virtual machines are not running on the same physical host. This can be useful in situations where the administrator wants to ensure that virtual machines are running on different hosts for high availability and to minimize the impact of a host failure. By creating an anti-affinity rule via CLI, the administrator can ensure that the SQL Server VMs are running on different hosts while still leveraging high availability in case of host failure. Reference:

https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v5_11:wcaffinity-anti-affinity-rules_wc-affinity-anti-affinity-rules.html

In an AHV five-node cluster, an SSD fails within a node that has two SSDs and four HDDs installed.

What will happen to the cluster environment?

A.
Host goes down and VMs will be powered on elsewhere.
A.
Host goes down and VMs will be powered on elsewhere.
Answers
B.
Cluster goes in read-only mode.
B.
Cluster goes in read-only mode.
Answers
C.
VMs will be live migrated to other hosts until metadata rebuild is finished.
C.
VMs will be live migrated to other hosts until metadata rebuild is finished.
Answers
D.
CVM on the impacted node reboots.
D.
CVM on the impacted node reboots.
Answers
Suggested answer: D

Explanation:

When an SSD fails within a node, the CVM on that node will reboot to maintain the health of the cluster. The CVM is responsible for managing the storage and virtualization components of the cluster, and a reboot is necessary to ensure that the cluster continues to function properly. The VMs running on that host will not be affected and continue to run, but the CVM will be unavailable for a short period of time until the reboot is completed. The Cluster continues to operate in a healthy state and doesn't go in read-only mode or cause any host to go down. Reference:

https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v5_11:wcmonitoring-cluster-health_wc-monitoring-cluster-health.html

Total 134 questions
Go to page: of 14