ExamGecko
Home Home / Nutanix / NCS-Core

Nutanix NCS-Core Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











While creating an image placement policy on the organizations AOS 5.15-based Nutanix cluster, the administrator wants to ensure there are no restrictions on using the selected images on clusters outside of the identified set.

What type of Policy Enforcement must the administrator choose?

A.
Soft
A.
Soft
Answers
B.
Internal
B.
Internal
Answers
C.
Hard
C.
Hard
Answers
D.
External
D.
External
Answers
Suggested answer: A

Explanation:

An alert about RX errors on eth2 on a node is reported in the cluster. The administrator logs in to the CVM in question, checks the ping_* files in the data/logs/syststats folder, and notices intermittent ping loss.

The node in question has the following network configuration:

Which action should be used to troubleshoot without disrupting the VMs running on this node?

A.
Replace the cable from eth2 to the switch
A.
Replace the cable from eth2 to the switch
Answers
B.
Remove eth3 from br0-up and monitor for new alerts
B.
Remove eth3 from br0-up and monitor for new alerts
Answers
C.
Check the port on the switch side for any errors
C.
Check the port on the switch side for any errors
Answers
D.
Enable balance-s1b on br0-up and monitor if a problem persists
D.
Enable balance-s1b on br0-up and monitor if a problem persists
Answers
Suggested answer: C

Explanation:

Given the reported RX errors on eth2 and the intermittent ping loss as observed from the CVM logs, the best initial troubleshooting step that avoids VM disruption is to inspect the switch port for errors. Option C, 'Check the port on the switch side for any errors,' is the most direct and non-invasive approach to determining if the issue lies with the network infrastructure rather than the server hardware itself or the configuration.

This action helps identify whether the problem is related to the physical connection (e.g., port issues, switch configuration errors) without altering the current active network setup on the Nutanix node. If errors are found on the switch port, adjustments or repairs can be made accordingly, potentially resolving the RX errors without impacting the running VMs.

Reference: This recommendation follows Nutanix's best practices for network troubleshooting, focusing first on external network components before altering host configurations.

An administrator protected a DB VM running on a Nutanix cluster with NearSync Replication, which schedules to repeat every 15 minutes to a second site. The daily change rate is low. During nightly backups, the replication window is missed due to write volume.

Which two options describe the expected behavior? (Choose two.)

A.
NearSync stops working and fails over to the remote site.
A.
NearSync stops working and fails over to the remote site.
Answers
B.
Protection Domain transitions back to the hourly schedule.
B.
Protection Domain transitions back to the hourly schedule.
Answers
C.
The Administrator needs to re-enable it manually.
C.
The Administrator needs to re-enable it manually.
Answers
D.
The system continuously tries to get to the NearSync schedule.
D.
The system continuously tries to get to the NearSync schedule.
Answers
Suggested answer: B, D

Explanation:

When a NearSync Replication window is missed due to high write volume during nightly backups, the expected behavior of the system is to adjust the replication schedule temporarily and continuously attempt to return to the configured NearSync schedule. The correct answers are:

Option B, 'Protection Domain transitions back to the hourly schedule.' If the NearSync cannot maintain the 15-minute schedule due to excessive write volume, it may temporarily fall back to a less frequent schedule, such as hourly, to stabilize.

Option D, 'The system continuously tries to get to the NearSync schedule.' NearSync is designed to handle transient high-load situations by trying to catch up and revert to the pre-set NearSync schedule as conditions allow.

Reference: These behaviors are outlined in the Nutanix documentation for NearSync, which describes how the system manages periods of high I/O and missed replication windows.

An administrator is deploying a three-tier application on a Nutanix Enterprise Cloud consisting of web, application, and database VMs. Traffic between the servers must be limited to specific services/ports. There is an application layer firewall VM deployed on one host in the cluster.

In which way should the administrator meet this requirement?

A.
Create a network for each type of VM, and use policy-based routing to control the traffic flow
A.
Create a network for each type of VM, and use policy-based routing to control the traffic flow
Answers
B.
Configure a security policy and service chain redirecting the server traffic through the firewall
B.
Configure a security policy and service chain redirecting the server traffic through the firewall
Answers
C.
Separate the web. application and database VMs on to dedicated VLANs
C.
Separate the web. application and database VMs on to dedicated VLANs
Answers
D.
Categorize the VMs in Prism Central and utilize Flow to set a security policy
D.
Categorize the VMs in Prism Central and utilize Flow to set a security policy
Answers
Suggested answer: D

Explanation:

For a multi-tier application where traffic must be limited to specific services and ports across web, application, and database VMs, the optimal approach is to use microsegmentation features provided by Nutanix. Option D, 'Categorize the VMs in Prism Central and utilize Flow to set a security policy,' is the correct choice.

Nutanix Flow allows for detailed security policies that control VM-to-VM traffic within the same cluster, effectively managing access and communication based on specified criteria like VM category, service, or application type. This solution enables precise control over traffic flows, enhancing security without requiring additional physical or virtual network segmentation.

Reference: Nutanix Flow capabilities are detailed in Nutanix Prism Central's documentation, which explains how to implement microsegmentation and security policies for application-specific traffic management.

Refer to the exhibit.

An administrator has an existing cluster and needs to improve performance using AHV Turbo. Which two items are required to achieve even greater performance? (Choose two.)

A.
Workloads are multi-threaded.
A.
Workloads are multi-threaded.
Answers
B.
VMs have one vCPU configured.
B.
VMs have one vCPU configured.
Answers
C.
VMs have multi-queue disabled.
C.
VMs have multi-queue disabled.
Answers
D.
VMs have more than one vCPU.
D.
VMs have more than one vCPU.
Answers
Suggested answer: A, D

Explanation:

To maximize the performance benefits of AHV Turbo, which is designed to optimize network and storage I/O operations for VMs, certain VM configurations are advantageous. The correct answers are:

Option A, 'Workloads are multi-threaded.' Multi-threaded applications can better utilize the improvements in I/O processing efficiency provided by AHV Turbo, leading to better overall performance.

Option D, 'VMs have more than one vCPU.' This configuration allows VMs to handle multiple processes or threads simultaneously, which is particularly beneficial when combined with AHV Turbo's enhanced I/O operations.

Reference: The benefits of configuring VMs with multiple vCPUs and supporting multi-threaded applications are discussed in Nutanix's documentation on AHV and performance optimization, where AHV Turbo is highlighted for its ability to accelerate VM operations in a Nutanix environment.

An administrator is performing a set of routine checks and notes that Prism Central is running with 4 vCPUs and 21 GB RAM. The organizations environment is based on two Nutanix clusters with 170 VMs plus a Legacy vSphere infrastructure. No manual changes have been done on Prism Central VM.

Which configuration justifies the current Prism Central configuration?

A.
Nutanix Move is running on Prism Central to import VMs from the Legacy Cluster.
A.
Nutanix Move is running on Prism Central to import VMs from the Legacy Cluster.
Answers
B.
Prism Central was installed for Large Deployment environments.
B.
Prism Central was installed for Large Deployment environments.
Answers
C.
Prism Central is running on the legacy duster and requires more RAM.
C.
Prism Central is running on the legacy duster and requires more RAM.
Answers
D.
Nutanix Leap and Nutanix Flow have been enabled on Prism Central
D.
Nutanix Leap and Nutanix Flow have been enabled on Prism Central
Answers
Suggested answer: D

An administrator finds that home shares cannot be configured in a new Files 3.5 deployment. Why is this happening?

A.
NFS default access is set to Read Only.
A.
NFS default access is set to Read Only.
Answers
B.
Multi-protocol access is not configured.
B.
Multi-protocol access is not configured.
Answers
C.
Access Based Enumeration is not enabled.
C.
Access Based Enumeration is not enabled.
Answers
D.
The system is deployed as a single FSVM.
D.
The system is deployed as a single FSVM.
Answers
Suggested answer: D

Refer to the exhibit.

A Microsoft SQL 2016 deployment is shown in the exhibit. The administrator receives user reports that database queries take too long to return.

Which optimization should be made to this configuration to improve performance?

A.
Combine both of the OS and SQL Binaries disks
A.
Combine both of the OS and SQL Binaries disks
Answers
B.
Add a second SCSI controller for the Database.
B.
Add a second SCSI controller for the Database.
Answers
C.
TempDB, and Logs disk Separate the Database. TempDB, and Logs onto their own disks
C.
TempDB, and Logs disk Separate the Database. TempDB, and Logs onto their own disks
Answers
D.
Configure the VM to use a PCI disk controller
D.
Configure the VM to use a PCI disk controller
Answers
Suggested answer: C

An administrator of a Nutanix Enterprise Cloud has microsegmentation enabled and a firewall VM installed. The security team notifies the administrator that one of the VMs hosted in the environment has been exhibiting suspect network activity. The administrator wants to isolate the VM from the production network, but must still be able to access it to perform diagnostics.

What should the administrator do to meet the requirement?

A.
Disable the vNIC on the affected VM
A.
Disable the vNIC on the affected VM
Answers
B.
Quarantine the VM using the Forensic Method
B.
Quarantine the VM using the Forensic Method
Answers
C.
Create a firewall rule that blocks VM traffic but permits diagnostic access
C.
Create a firewall rule that blocks VM traffic but permits diagnostic access
Answers
D.
Create a security policy with a service chain directing that VMs traffic to the firewall VM
D.
Create a security policy with a service chain directing that VMs traffic to the firewall VM
Answers
Suggested answer: B

Explanation:

Ref https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000LIelCAG

An administrator migrates a VM onto a new Nutanix cluster. After the migration, the administrator observes the following conditions:

* Cluster memory utilization: 64%

* Cluster CPU utilization: 19%

* Cluster storage utilization: 32%

* Average VM CPU utilization: 25%

* Average VM CPU ready%: 24%

* Average VM memory utilization: 60%

Which two changes should the administrator make to improve VM performance? (Choose two.)

A.
Add more memory to the VMs.
A.
Add more memory to the VMs.
Answers
B.
Reduce the number of vCPUs assigned to VMs.
B.
Reduce the number of vCPUs assigned to VMs.
Answers
C.
Replace high core count CPUs with high clock rate CPUs. (also can be but is physical invas)
C.
Replace high core count CPUs with high clock rate CPUs. (also can be but is physical invas)
Answers
D.
Reduce the number of VMs on the hosts.
D.
Reduce the number of VMs on the hosts.
Answers
Suggested answer: B, D

Explanation:

ref http://www.joshodgers.com/tag/cpu-ready/

Total 302 questions
Go to page: of 31