Nutanix NCP-DB Practice Questions

146 Questions ...

Updated On : 24-Feb-2025




Prepare with our NCP-DB practice questions and boost your chances of passing the exam effortlessly. Featuring Nutanix exam-like questions, they cover all critical topics and provide detailed explanations to enhance your understanding. Prepare smarter, not harder, and achieve your Nutanix NCP-DB certification goals effortlessly!

Page 3 out of 25 Pages ... Showing Questions in Random order from Exam

How would an administrator enter the NDB command line to change the static IP address on the NDB VM?


A. era-server


B. era


C. cerebro_cli


D. arithmos cli





C.
  cerebro_cli

Explanation:
To change the static IP address on the NDB VM, an administrator would need to enter the NDB command line using the cerebro_cli command. The cerebro_cli command is used to access the Cerebro service, which is responsible for managing the NDB instance and its components. The cerebro_cli command can be run from the NDB VM or from any other VM that has network connectivity to the NDB VM.
The cerebro_cli command has various subcommands and options to perform different tasks, such as changing the IP address, hostname, password, or certificate of the NDB VM. To change the static IP address, the administrator would need to use the cerebro_cli network update subcommand with the appropriate parameters, such as the new IP address, netmask, gateway, and DNS servers. The cerebro_cli network update subcommand also requires the administrator to provide the current password of the NDB VM for authentication. After changing the IP address, the administrator would need to restart the NDB VM for the changes to take effect.

How does NDB send notifications when alerts are generated?


A. SNMP


B. APIs


C. Pulse


D. Email





D.
  Email

Explanation:
NDB sends notifications when alerts are generated via email. The email notifications can be configured to send to one or more recipients, and can be customized to include the alert severity, category, description, and resolution steps. The email notifications help to inform the database administrator and other stakeholders about the status and issues of the NDB-managed databases and operations.
NDB does not send notifications via SNMP, APIs, or Pulse. SNMP is a protocol for collecting and organizing information about managed devices on a network. APIs are interfaces for communicating and exchanging data between different applications or systems. Pulse is a feature of the Nutanix cluster that collects and sends diagnostic and usage data to Nutanix for analysis and support.

Which two profiles are required to provision a new Oracle database through Era? (Choose two.)


A. Memory


B. Compute


C. Network


D. Storage





B.
  Compute

D.
  Storage

Explanation:
In the Nutanix Database Automation (NCP-DB) framework, provisioning a new Oracle database through Era requires the configuration of both a Compute and a Storage profile1. The Compute profile is used to define the resources allocated to the database, such as CPU and memory, while the Storage profile is used to specify the storage configuration for the database. These profiles are essential in ensuring that the database is provisioned with the necessary resources and storage configurations for optimal performance23.

An administrator is tasked with providing a Jr DBA with access to NBD with limited capabilities.
This user should only be able to:
• Provision Databases
• Provision Database Servers
• Create Ones
• Refresh Clones
• Patch Database Servers
How can the administrator complete this task?


A. Clone the Database Admin role, and add the desired privileges.


B. Create a role with only those privileges, assign the role to the Jr DBA user.


C. Create a user for the Jr DBA, and assign only those privileges.


D. Clone the Database Admin role, and remove all but the desired privileges.





B.
  Create a role with only those privileges, assign the role to the Jr DBA user.

Explanation:
The correct answer is B because it allows the administrator to create a custom role with the specific privileges that the Jr DBA user needs, and then assign that role to the user. This way, the administrator can control the access level of the Jr DBA user without affecting the existing roles or users in NDB. Option A is incorrect because it involves cloning the Database Admin role, which has more privileges than the Jr DBA user requires, and then adding more privileges, which is unnecessary and redundant. Option C is incorrect because it involves creating a user for the Jr DBA, but not assigning a role to the user, which means the user will not have any privileges in NDB. Option D is incorrect because it involves cloning the Database Admin role, which has more privileges than the Jr DBA user requires, and then removing some of the privileges, which is inefficient and risky.

When an Oracle database is upgraded using Era, what is the type of upgrade category?


A. In-place upgrade


B. Out-of-place upgrade


C. Disruptive upg raze


D. Non-disruptive upgrade





A.
  In-place upgrade

Explanation:
When an Oracle database is upgraded using Era, the type of upgrade category is an “In-place upgrade”. This method involves upgrading the database software within the same Oracle home as the existing database. The AutoUpgrade utility is used to automate the upgrade process, both before starting upgrades, during upgrade deployments, and during post-upgrade checks and configuration migration1. This method is preferred due to its simplicity and efficiency1.

Which two encryption methods can be used when configuring an SMTP server? (Choose two.)


A. TLS


B. SSL


C. S/MIME


D. IPsec





A.
  TLS

B.
  SSL

Explanation:
NDB supports SMTP server configuration for sending email notifications and alerts. SMTP server configuration requires specifying the SMTP server address, port, username, password, and encryption method. The encryption method determines how the email messages are secured during transmission. NDB supports two encryption methods for SMTP server configuration: TLS and SSL.
TLS (Transport Layer Security) is a protocol that encrypts and authenticates data between the email client and the SMTP server. TLS can operate in two modes: explicit and implicit. In explicit mode, the email client and the SMTP server negotiate the encryption method and parameters after establishing a plain text connection. This mode typically uses port 587. In implicit mode, the email client and the SMTP server assume that the connection is encrypted from the start, without any negotiation. This mode typically uses port 465.
SSL (Secure Sockets Layer) is a predecessor of TLS that also encrypts and authenticates data between the email client and the SMTP server. SSL operates in implicit mode only, and uses port 465 by default. SSL is less secure than TLS, but it is still widely used and supported by many email providers.
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard that encrypts and signs email messages at the application layer, rather than the transport layer. S/MIME requires the use of digital certificates and public key cryptography to ensure the confidentiality and integrity of email messages. S/MIME is not a valid encryption method for SMTP server configuration, as it does not affect the connection between the email client and the SMTP server.
IPsec (Internet Protocol Security) is a suite of protocols that secures IP packets at the network layer, rather than the application or transport layer. IPsec can encrypt and authenticate data between any two IP endpoints, such as routers, firewalls, or hosts. IPsec is not a valid encryption method for SMTP server configuration, as it does not apply to the specific protocol or port used by SMTP.


Page 3 out of 25 Pages
Previous