ExamGecko
Home / Nutanix / NCS-Core / List of questions
Ask Question

Nutanix NCS-Core Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

An administrator is migrating 5MB shares from a third-party platform to Nutanix Files with the following characteristics:

* Shares contain user profile directories

* DFS-N will be used

How should the administrator create target shares for this migration?

Create multiple general purpose shares and distribute migrated data as evenly as possible.
Create multiple general purpose shares and distribute migrated data as evenly as possible.
Create multiple distributed shares and distribute migrated data as evenly as possible.
Create multiple distributed shares and distribute migrated data as evenly as possible.
Create standard shares with multiple top-level directories and distribute migrated data.
Create standard shares with multiple top-level directories and distribute migrated data.
Create distributed shares with multiple top-level directories and distribute migrated data.
Create distributed shares with multiple top-level directories and distribute migrated data.
Suggested answer: D
Explanation:

Ref: https://portal.nutanix.com/page/documents/details/?targetId=Files-v3_6:Files-v3_6

asked 23/09/2024
Ciaran Cullimore
48 questions

Question 62

Report Export Collapse

An administrator manages the following two Nutanix AOS 5.15 cluster environment:

* Corp-cluster-01

* Corp-cluster-02

The VM images must be available only on Corp-cluster-01, but cannot be checked out to cluster Corp-cluster-02. The images also cannot be checked out to any other clusters that are registered with Prism Central in the future.

Which two configuration settings must the administrator choose when creating the image placement policy that satisfies the stated requirements? (Choose two.)

Create an image placement policy that identifies cluster Corp-cluster-01 as the target cluster
Create an image placement policy that identifies cluster Corp-cluster-01 as the target cluster
Set the policy enforcement to Soft.
Set the policy enforcement to Soft.
Set the policy enforcement to Hard.
Set the policy enforcement to Hard.
Create an image placement policy that identifies cluster Corp-cluster-02 as the target cluster.
Create an image placement policy that identifies cluster Corp-cluster-02 as the target cluster.
Suggested answer: A, C
Explanation:

Ref: https://next.nutanix.com/community-blog-40/nutanix-just-made-ahv-image-management-painless-33144

asked 23/09/2024
Umaish Nair
39 questions

Question 63

Report Export Collapse

A customer has a Nutanix cluster with 10Gb connectivity via switch fabric extenders. The administrator receives NCC health check errors of latency greater than 200ms.

Which action should the administrator take to resolve the NCC errors?

Replace the switch fabric extenders with 10G line rate switches
Replace the switch fabric extenders with 10G line rate switches
Upgrade NCC and increase the CVM memory by 4Gb
Upgrade NCC and increase the CVM memory by 4Gb
Add 2 additional 10G uplinks from the switch fabric extenders per node
Add 2 additional 10G uplinks from the switch fabric extenders per node
Upgrade NCC and increase the vCPU of the CVM
Upgrade NCC and increase the vCPU of the CVM
Suggested answer: A
Explanation:

Ref: https://portal.nutanix.com/page/documents/details?targetId=System-Specs-G6-Single-Node:set-block-connect-c.html

asked 23/09/2024
Charles Manser
53 questions

Question 64

Report Export Collapse

For several days, an administrator notices the following alerts:

* CVM NIC Speed Low Warning Alerts

* Warning Alerts of CVM NIC not performing at optimal speed

* CVM is disconnected from the network Critical Alert

* Network Visualization page shows excessive dropped packets on CVM/Host

Which steps should be taken to determine which problem should be addressed first?

* Access the Hardware Page to verify resources are available * Analyze ail CVM Speed Alerts in the Alerts/Events page * Analyze output for the network and interface properties and connectivity issues
* Access the Hardware Page to verify resources are available * Analyze ail CVM Speed Alerts in the Alerts/Events page * Analyze output for the network and interface properties and connectivity issues
* Verify Host/CVM connectivity on the Network Visualization page * Use to verify the bridge and bond configuration * Review alerts/events page for the CVM disconnected error
* Verify Host/CVM connectivity on the Network Visualization page * Use to verify the bridge and bond configuration * Review alerts/events page for the CVM disconnected error
* Review Alerts page for NIC speed alerts and alert timing * Analyze the genesis.out log file for process failures * Assess the NIC properties in the Network Visualization > Host Properties page
* Review Alerts page for NIC speed alerts and alert timing * Analyze the genesis.out log file for process failures * Assess the NIC properties in the Network Visualization > Host Properties page
* Restart networking services on the CVM * Determine the current configuration of the affected CVM via output * Access the Alerts/Events page for the CVM network connection failures
* Restart networking services on the CVM * Determine the current configuration of the affected CVM via output * Access the Alerts/Events page for the CVM network connection failures
Suggested answer: B
Explanation:

Ref: https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000CuaDCAS

asked 23/09/2024
FB Kalaidji
43 questions

Question 65

Report Export Collapse

Refer to the exhibit.

Nutanix NCS-Core image Question 65 82035 09232024013105000000

An administrator configures Active Directory authentication as shown in the exhibit. Upon finishing setup, users are not able to log in.

What configuration change should be made to fix this issue?

Change leaps to https
Change leaps to https
Change the Directory URL to use an IP rather than a name
Change the Directory URL to use an IP rather than a name
Change the plct from 389 to 636 D Change the Domain to use an IP rather than a name
Change the plct from 389 to 636 D Change the Domain to use an IP rather than a name
Suggested answer: C
Explanation:

Ref: https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v510:mul-security-authentication-pc-t.html

asked 23/09/2024
Simone Mento
35 questions

Question 66

Report Export Collapse

In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.

The current schedule configuration is as follows:

* Repeat every 6 hours

* Local Retention Policy 1

* Remote Retention Policy 8

* Starting time 12 am

At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.

Which strategy should the administrator use to meet these requirements?

From the Remote site, activate the Protection Domain, then re-protect the entity.
From the Remote site, activate the Protection Domain, then re-protect the entity.
From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot
From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot
From the local site, retrieve the correct remote snapshot, then restore the VM locally.
From the local site, retrieve the correct remote snapshot, then restore the VM locally.
From the local site, restore the VM from the local snapshot by selecting the correct snapshot.
From the local site, restore the VM from the local snapshot by selecting the correct snapshot.
Suggested answer: C
asked 23/09/2024
James Davis
46 questions

Question 67

Report Export Collapse

A customer with a four-node RF2 cluster is adding application VMs to their system. After adding these VMs, the Prism dashboard shows 81% storage utilization.

What is the consequence of running the cluster at 81% storage utilization?

The customer has the ability to add more VMs up to the 100% storage utilization.
The customer has the ability to add more VMs up to the 100% storage utilization.
There is available capacity in the storage fabric and the cluster is resilient.
There is available capacity in the storage fabric and the cluster is resilient.
Node failure is imminent due to storage utilization.
Node failure is imminent due to storage utilization.
The cluster is not resilient in the storage fabric
The cluster is not resilient in the storage fabric
Suggested answer: D
Explanation:

https://next.nutanix.com/how-it-works-22/recommended-maximum-storage-utilization-37234

asked 23/09/2024
Robert Endicott
47 questions

Question 68

Report Export Collapse

A company needs to replicate their VMs to a remote site and must have an RPO of less than 1 hour.

When creating a protection domain, what should an administrator do to meet this requirement?

Enable Async Replication with an RPO of 60 minutes
Enable Async Replication with an RPO of 60 minutes
Enable Near-Sync Replication with an RPO of 15 minutes
Enable Near-Sync Replication with an RPO of 15 minutes
Enable Entity Sync on the designated VMs
Enable Entity Sync on the designated VMs
Enable Availability Zones and send the VM to multiple targets
Enable Availability Zones and send the VM to multiple targets
Suggested answer: A
Explanation:

Ref: https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v5_10:sto-pd-guidelines-r.html

asked 23/09/2024
- Paulo Fonseca
45 questions

Question 69

Report Export Collapse

A customer needs a DR solution designed around the following requirements:

* There are 8 ms of latency between Sites A and B

* The administrator needs the shortest RPO/RTO possible

* Application consistent snapshots are required

* Use of Nutanix VSS

Which Data Protection Method should be used?

Async
Async
Metro Availability
Metro Availability
Near Sync
Near Sync
Cloud Connect
Cloud Connect
Suggested answer: C
Explanation:

Ref: https://portal.nutanix.com/page/documents/details?targetId=Prism-Element-Data-Protection-Guide-v5_18:wc-dr-application-consistent-snapshots-wc-r.html

asked 23/09/2024
Azahar Basri
29 questions

Question 70

Report Export Collapse

An administrator needs to replace the self-signed certificate on a cluster. Which two requirements must be met as part of the process? (Choose two.)

The cluster administrator must restart the interface gateway.
The cluster administrator must restart the interface gateway.
The signed, intermediate and root certificates are chained.
The signed, intermediate and root certificates are chained.
The existing certificate must be deleted prior to replacement.
The existing certificate must be deleted prior to replacement.
The imported files for the custom certificate must be PEM encoded.
The imported files for the custom certificate must be PEM encoded.
Suggested answer: B, D
Explanation:

Ref: https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v55:mul-security-ssl-certificate-pc-t.html

asked 23/09/2024
Jordi Nogues
40 questions
Total 302 questions
Go to page: of 31
Search

Related questions