ExamGecko
Home Home / Nutanix / NCS-Core

Nutanix NCS-Core Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











A consultant is not able to run the As-Built Tool for a technical reason.

What action should the consultant take to gather information and provide customer documentation?

A.
Manually create documentation using As-Built document template.
A.
Manually create documentation using As-Built document template.
Answers
B.
Use RVTools for vSphere and Hyper-V deployments.
B.
Use RVTools for vSphere and Hyper-V deployments.
Answers
C.
Create a support case on behalf of a customer.
C.
Create a support case on behalf of a customer.
Answers
D.
Access portal.nutanix.com, search Software Documentation.
D.
Access portal.nutanix.com, search Software Documentation.
Answers
Suggested answer: A

Explanation:

If the As-Built Tool cannot be run due to technical reasons, the next best action for the consultant is to manually create documentation using an As-Built document template. This approach ensures that documentation is still provided to the customer detailing the setup, configuration, and operational state of their environment, which is crucial for ongoing management and future audits. This method is proactive and ensures customer needs are met despite technical setbacks.

Reference: Nutanix Technical Documentation Guidelines, Best Practices in Nutanix System Documentation.

A customer has requested that a consultant create a Disaster Recovery Test for their new Nutanix environments.

What should the consultant include in a custom plan to validate VM availability across the network?

A.
Assign backup policies to source VMs.
A.
Assign backup policies to source VMs.
Answers
B.
Verify VMs received correct IP address after failover.
B.
Verify VMs received correct IP address after failover.
Answers
C.
Ensure NTP configuration active.
C.
Ensure NTP configuration active.
Answers
D.
Sign into VM console using local credentials.
D.
Sign into VM console using local credentials.
Answers
Suggested answer: B

Explanation:

For creating a Disaster Recovery Test plan for Nutanix environments, verifying that VMs receive the correct IP address after a failover is critical to validate VM availability across the network. This check is essential to ensure that network configurations and DHCP/Static IP settings are correctly applied post-failover, enabling proper network communications and access to services hosted on the VMs. Ensuring correct IP addressing is fundamental to the successful operation of DR strategies in virtualized environments.

Reference: Nutanix Disaster Recovery Best Practices, Nutanix Network Configuration for DR environments.

During an AHV upgrade, a database VM automatically migrated to another host. A customer is concerned about potential storage performance impact.

Which statement addresses the customer's concern?

A.
Shadow clones mitigate the need for data locality.
A.
Shadow clones mitigate the need for data locality.
Answers
B.
Data locality is not required on all flash nodes.
B.
Data locality is not required on all flash nodes.
Answers
C.
Mirroring the database on two VMs eliminates the need for data locality.
C.
Mirroring the database on two VMs eliminates the need for data locality.
Answers
D.
AHV's built in scheduler automatically restores data locality.
D.
AHV's built in scheduler automatically restores data locality.
Answers
Suggested answer: D

Explanation:

Addressing the customer's concern regarding the potential storage performance impact after a VM migration, it's important to note that Nutanix AHV includes intelligent scheduling mechanisms. AHV's built-in scheduler automatically works to restore data locality after VM migrations. Data locality refers to the placement of data close to the VM consuming it, which optimizes read and write operations by reducing latency. After migration, the scheduler actively moves data to ensure it is close to its consuming VM, thereby minimizing any adverse impacts on storage performance.

Nutanix AHV Administration Guide: Nutanix Documentation

Nutanix Data Locality Explanation and Benefits: Nutanix Portal

Which two components are required to validate and Foundation a cluster with ESXi as the hypervisor? (Choose two.)

A.
ISO image for ESXi
A.
ISO image for ESXi
Answers
B.
iso_whitelist.json
B.
iso_whitelist.json
Answers
C.
Phoenix Installation Tool
C.
Phoenix Installation Tool
Answers
D.
Latest NCC LCM Bundle
D.
Latest NCC LCM Bundle
Answers
Suggested answer: A, B

Explanation:

To foundation a cluster using ESXi as the hypervisor, the necessary components include:

ISO image for ESXi: This is required to install ESXi on the nodes within the cluster.

iso_whitelist.json: This file is crucial for the Foundation process as it lists the supported ISO images and their checksums to ensure the integrity and compatibility of the hypervisor ISO being used.

Nutanix Bible (https://www.nutanixbible.com), specifically sections discussing hypervisor installation and compatibility.

Nutanix University: NCS-Core 6.8 Training (https://university.nutanix.com), covering Foundation processes and required files.

A consultant is completing final network failover testing on a recently deployed AHV cluster.

The cluster consists of the following:

* Three nodes

* Two uplinks connected to two switches

* Supported SFPs

The consultant removed one SFP+ out of each node. Two of the nodes (Hostl I Host2) failed over to the backup NIC correctly without any interruption but have lost communication with the third node (Host 3) hypervisor/CVM. Inserting the original SFP+ back into the problematic node allowed the network to be connected and the two healthy nodes could communicate successfully again.

manage_ovs showjnterfaces output

manage_ovs showjinterfaces output:

name mode link speed

cthO 10000 True 10000

ethl 10000 False None

eth2 10000 True 10000

eth3 10000 False None

manage_ovs show.uplinks output:

Bridge: brO

Bond: brO-up

bond_mode: active-backup

interfaces: ethl ethO

lacp: off

lacp-fa I 1 back: false

lacp_speed: slow

What should the consultant validate first?

A.
Validate NIC card on node is seated properly.
A.
Validate NIC card on node is seated properly.
Answers
B.
Validate that the correct interfaces are included in the bridge.
B.
Validate that the correct interfaces are included in the bridge.
Answers
C.
Validate the customer has configured all their switch ports identically.
C.
Validate the customer has configured all their switch ports identically.
Answers
D.
Validate the SFP+ is fully plugged into the node and switch.
D.
Validate the SFP+ is fully plugged into the node and switch.
Answers
Suggested answer: D

Explanation:

Given the symptoms where two nodes correctly failover but lose communication with the third node after an SFP+ is removed, the first action should be to:

Validate the SFP+ is fully plugged into the node and switch: This is critical because a loose or partially connected SFP+ can cause intermittent network issues, which seems to be the problem based on the scenario described.

Nutanix Bible (https://www.nutanixbible.com), particularly the network troubleshooting sections.

Nutanix Field Installation Guide, which provides detailed steps on how to ensure hardware components like SFPs are correctly installed.

After finishing customer education during a new cluster deployment, the consultant wants to make sure all in-scope tasks have been completed.

Which document can the consultant use to verify all tasks have been closed out?

A.
As-Built Guide
A.
As-Built Guide
Answers
B.
Deployment Questionnaire
B.
Deployment Questionnaire
Answers
C.
Deployment Guide
C.
Deployment Guide
Answers
D.
Deployment Checklist
D.
Deployment Checklist
Answers
Suggested answer: D

Explanation:

To verify that all in-scope tasks for a new cluster deployment have been completed, the consultant should refer to the:

Deployment Checklist: This document typically lists all tasks required for a successful deployment, making it a suitable tool for ensuring that nothing has been overlooked.

Nutanix Bible (https://www.nutanixbible.com), where the importance of deployment documentation is discussed.

Nutanix Deployment Guide, which includes detailed checklists for ensuring thorough project completion.

A consultant deployed a Nutanix Files cluster using separate networks for client and storage.

For testing a SMB standard share, a VM has been deployed on storage network. However, the consultant cannot access the share.

What is the cause of the issue?

A.
The CVM network segmentation is configured.
A.
The CVM network segmentation is configured.
Answers
B.
Clients on the same subnet as the storage network cannot access the shares.
B.
Clients on the same subnet as the storage network cannot access the shares.
Answers
C.
An iSCSI Data Services IP is not configured for the cluster.
C.
An iSCSI Data Services IP is not configured for the cluster.
Answers
D.
Clients on the same subnet as the storage network can only access the distributed shares.
D.
Clients on the same subnet as the storage network can only access the distributed shares.
Answers
Suggested answer: B

Explanation:

If a VM deployed on the storage network cannot access a SMB standard share, the likely issue is that:

Clients on the same subnet as the storage network cannot access the shares: This scenario typically occurs due to network segmentation policies or firewall rules that restrict access to the storage network from clients within the same subnet, intended to segregate traffic types for security and performance reasons.

Nutanix Bible (https://www.nutanixbible.com), specifically sections on network segmentation and Nutanix Files configurations.

Nutanix Technical Documentation on Nutanix Files, which covers network configuration and troubleshooting issues related to file access.

When utilizing the Nutanix cluster As Built Document generator, which two configuration elements should a consultant provide when running the run_as_built.exe command? (Choose two.)

A.
Data Services IP
A.
Data Services IP
Answers
B.
Cluster IP
B.
Cluster IP
Answers
C.
Remote Site IP
C.
Remote Site IP
Answers
D.
Customer Name
D.
Customer Name
Answers
Suggested answer: B, D

Explanation:

When using the Nutanix cluster As Built Document generator, the necessary configuration elements to provide when running the run_as_built.exe command include the Cluster IP (B) and the Customer Name (D). The Cluster IP is required to properly identify and communicate with the cluster to gather configuration and operational data. The Customer Name is typically used to personalize the documentation, making it specific to the client's deployment, which is useful for record-keeping and future reference purposes.

Reference: Nutanix As Built Documentation generator usage guidelines, Nutanix Best Practices for Documentation.

As a consultant concludes the project for deploying a new cluster, the customer expresses plans to repeat the process in-house for one of the company's dark site locations.

What three items can the consultant deliver in closing to help ensure customer's success in deploying and supporting Nutanix clusters?

A.
. Creating an account for access to Nutanix Support Portal * External USB drive . Offline NCC bundle
A.
. Creating an account for access to Nutanix Support Portal * External USB drive . Offline NCC bundle
Answers
B.
* A trial license activation code for Prism Starter . Creating an account for access to Nutanix Support Portal . Guide for dark site deployments using Nutanix standards
B.
* A trial license activation code for Prism Starter . Creating an account for access to Nutanix Support Portal . Guide for dark site deployments using Nutanix standards
Answers
C.
. Generating cluster licenses . What are binaries and where can they be downloaded . Creating an account for accessing the Nutanix Support Portal
C.
. Generating cluster licenses . What are binaries and where can they be downloaded . Creating an account for accessing the Nutanix Support Portal
Answers
D.
* External USB drive . Access to Nutanix FTP . Encrypted key required for accessing clusters
D.
* External USB drive . Access to Nutanix FTP . Encrypted key required for accessing clusters
Answers
Suggested answer: B

Explanation:

As the consultant concludes the project, to assist the customer with repeating the deployment process at a dark site, the best items to deliver would be:

A trial license activation code for Prism Starter, which will allow the customer to begin using the Nutanix cluster immediately without initial extra costs.

Creating an account for access to the Nutanix Support Portal, ensuring the customer can access support and documentation as needed for troubleshooting and learning.

A guide for dark site deployments using Nutanix standards, which will provide step-by-step instructions tailored to the specific challenges of deploying in a location with no direct internet connectivity. These resources are critical for enabling the customer to independently deploy and manage Nutanix clusters under the unique constraints of a dark site.

Reference: Nutanix Deployment Guide, Nutanix Support Portal Documentation.

During a pre-engagement call, a customer explains that network cables are missing from the boxes. The consultant examines the bill of materials more closely to verify the quantity and type required by the hardware. The rack is already equipped with one OOBM Ethernet switch and two 10GbE SFP+ ToR switches.

Which cables should the consultant recommend to the customer for implementing in this scenario?

A.
Six Ethernet Cat7 cables
A.
Six Ethernet Cat7 cables
Answers
B.
Six DAC 10GbE cables and 3 Ethernet cables
B.
Six DAC 10GbE cables and 3 Ethernet cables
Answers
C.
Six lOGbE cables
C.
Six lOGbE cables
Answers
D.
Three DAC 10GbE cables and 3 Ethernet cables
D.
Three DAC 10GbE cables and 3 Ethernet cables
Answers
Suggested answer: B

Explanation:

Considering the equipment setup with one Out-of-Band Management (OOBM) Ethernet switch and two 10GbE SFP+ Top of Rack (ToR) switches, the consultant should recommend six DAC (Direct Attach Cable) 10GbE cables and three Ethernet cables. The DAC 10GbE cables are suitable for connecting the nodes to the ToR switches to handle high-speed data transfers, while the Ethernet cables are necessary for connections related to management purposes, such as connecting to the OOBM switch for remote management tasks. This recommendation ensures adequate connectivity for both data and management networks.

Reference: Nutanix Hardware and Installation Guide, Best Practices for Network Cable Management.

Total 302 questions
Go to page: of 31