Nutanix NCS-Core Practice Test - Questions Answers, Page 4
List of questions
Question 31

While creating an image placement policy on the organizations AOS 5.15-based Nutanix cluster, the administrator wants to ensure there are no restrictions on using the selected images on clusters outside of the identified set.
What type of Policy Enforcement must the administrator choose?
Question 32

An alert about RX errors on eth2 on a node is reported in the cluster. The administrator logs in to the CVM in question, checks the ping_* files in the data/logs/syststats folder, and notices intermittent ping loss.
The node in question has the following network configuration:
Which action should be used to troubleshoot without disrupting the VMs running on this node?
Given the reported RX errors on eth2 and the intermittent ping loss as observed from the CVM logs, the best initial troubleshooting step that avoids VM disruption is to inspect the switch port for errors. Option C, 'Check the port on the switch side for any errors,' is the most direct and non-invasive approach to determining if the issue lies with the network infrastructure rather than the server hardware itself or the configuration.
This action helps identify whether the problem is related to the physical connection (e.g., port issues, switch configuration errors) without altering the current active network setup on the Nutanix node. If errors are found on the switch port, adjustments or repairs can be made accordingly, potentially resolving the RX errors without impacting the running VMs.
Reference: This recommendation follows Nutanix's best practices for network troubleshooting, focusing first on external network components before altering host configurations.
Question 33

An administrator protected a DB VM running on a Nutanix cluster with NearSync Replication, which schedules to repeat every 15 minutes to a second site. The daily change rate is low. During nightly backups, the replication window is missed due to write volume.
Which two options describe the expected behavior? (Choose two.)
When a NearSync Replication window is missed due to high write volume during nightly backups, the expected behavior of the system is to adjust the replication schedule temporarily and continuously attempt to return to the configured NearSync schedule. The correct answers are:
Option B, 'Protection Domain transitions back to the hourly schedule.' If the NearSync cannot maintain the 15-minute schedule due to excessive write volume, it may temporarily fall back to a less frequent schedule, such as hourly, to stabilize.
Option D, 'The system continuously tries to get to the NearSync schedule.' NearSync is designed to handle transient high-load situations by trying to catch up and revert to the pre-set NearSync schedule as conditions allow.
Reference: These behaviors are outlined in the Nutanix documentation for NearSync, which describes how the system manages periods of high I/O and missed replication windows.
Question 34

An administrator is deploying a three-tier application on a Nutanix Enterprise Cloud consisting of web, application, and database VMs. Traffic between the servers must be limited to specific services/ports. There is an application layer firewall VM deployed on one host in the cluster.
In which way should the administrator meet this requirement?
For a multi-tier application where traffic must be limited to specific services and ports across web, application, and database VMs, the optimal approach is to use microsegmentation features provided by Nutanix. Option D, 'Categorize the VMs in Prism Central and utilize Flow to set a security policy,' is the correct choice.
Nutanix Flow allows for detailed security policies that control VM-to-VM traffic within the same cluster, effectively managing access and communication based on specified criteria like VM category, service, or application type. This solution enables precise control over traffic flows, enhancing security without requiring additional physical or virtual network segmentation.
Reference: Nutanix Flow capabilities are detailed in Nutanix Prism Central's documentation, which explains how to implement microsegmentation and security policies for application-specific traffic management.
Question 35

Refer to the exhibit.
An administrator has an existing cluster and needs to improve performance using AHV Turbo. Which two items are required to achieve even greater performance? (Choose two.)
To maximize the performance benefits of AHV Turbo, which is designed to optimize network and storage I/O operations for VMs, certain VM configurations are advantageous. The correct answers are:
Option A, 'Workloads are multi-threaded.' Multi-threaded applications can better utilize the improvements in I/O processing efficiency provided by AHV Turbo, leading to better overall performance.
Option D, 'VMs have more than one vCPU.' This configuration allows VMs to handle multiple processes or threads simultaneously, which is particularly beneficial when combined with AHV Turbo's enhanced I/O operations.
Reference: The benefits of configuring VMs with multiple vCPUs and supporting multi-threaded applications are discussed in Nutanix's documentation on AHV and performance optimization, where AHV Turbo is highlighted for its ability to accelerate VM operations in a Nutanix environment.
Question 36

An administrator is performing a set of routine checks and notes that Prism Central is running with 4 vCPUs and 21 GB RAM. The organizations environment is based on two Nutanix clusters with 170 VMs plus a Legacy vSphere infrastructure. No manual changes have been done on Prism Central VM.
Which configuration justifies the current Prism Central configuration?
Question 37

An administrator finds that home shares cannot be configured in a new Files 3.5 deployment. Why is this happening?
Question 38

Refer to the exhibit.
A Microsoft SQL 2016 deployment is shown in the exhibit. The administrator receives user reports that database queries take too long to return.
Which optimization should be made to this configuration to improve performance?
Question 39

An administrator of a Nutanix Enterprise Cloud has microsegmentation enabled and a firewall VM installed. The security team notifies the administrator that one of the VMs hosted in the environment has been exhibiting suspect network activity. The administrator wants to isolate the VM from the production network, but must still be able to access it to perform diagnostics.
What should the administrator do to meet the requirement?
Ref https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000LIelCAG
Question 40

An administrator migrates a VM onto a new Nutanix cluster. After the migration, the administrator observes the following conditions:
* Cluster memory utilization: 64%
* Cluster CPU utilization: 19%
* Cluster storage utilization: 32%
* Average VM CPU utilization: 25%
* Average VM CPU ready%: 24%
* Average VM memory utilization: 60%
Which two changes should the administrator make to improve VM performance? (Choose two.)
ref http://www.joshodgers.com/tag/cpu-ready/
Question