Nutanix NCS-Core Practice Questions

302 Questions ...

Updated On : 24-Feb-2025




Prepare with our NCS-Core practice questions and boost your chances of passing the exam effortlessly. Featuring Nutanix exam-like questions, they cover all critical topics and provide detailed explanations to enhance your understanding. Prepare smarter, not harder, and achieve your Nutanix NCS-Core certification goals effortlessly!

Page 11 out of 51 Pages ... Showing Questions in Random order from Exam

A CEO asks the IT administrator to provide a list of required resources to protect current workloads and the two new SQL servers from a disaster. The Nutanix environment is managed by Prism Central. Which option explains how to meet the CEO's request?


A. In Capacity Runway, select Optimize Resources and select all VMs that must be protected.


B. Create a new project and assign the VMs to it to get compute and storage requirements


C. Create a new scenario based on a new cluster based on a VM Profile and select Recommend.


D. Create a new Recovery policy by selecting the VM that needs to be protected and get hardware requirements.





D.
  Create a new Recovery policy by selecting the VM that needs to be protected and get hardware requirements.

Explanation: In a Nutanix environment managed by Prism Central, protecting workloads and SQL servers from a disaster involves creating a recovery policy. A recovery policy in Nutanix is a set of rules that define how data is protected and recovered in the event of a disaster1.
Creating a new recovery policy involves selecting the virtual machines (VMs) that need to be protected and specifying the hardware requirements for the recovery environment1.
This includes the compute and storage resources needed to run the protected VMs in the recovery site1.
Once the recovery policy is created, Nutanix’s built-in data protection and disaster recovery capabilities can ensure that the protected VMs can be quickly and efficiently recovered in the event of a disaster2. This includes capabilities such as efficient snapshot, cloning, and replication capabilities to provide a higher level of protection at a lower cost2.
Therefore, to meet the CEO’s request, the IT administrator should create a new Recovery policy by selecting the VM that needs to be protected and get hardware requirements.

A consultant runs the Foundation Applet and discovers all the nodes. The consultant wants to use the latest version of Foundation for imaging for support purposes and to cover the latest hardware and software hypervisor support. What should the consultant do to upgrade Foundation on a node?


A. Use crash cart and manually upgrade Foundation files on one node.


B. Use latest version of Foundation to reimage all the nodes.


C. Use the Foundation VM to upgrade Foundation on all nodes.


D. Use the Foundation Applet to upgrade Foundation on a single node.





C.
  Use the Foundation VM to upgrade Foundation on all nodes.

Explanation:
To ensure that the Foundation Applet is up-to-date across all nodes, the best approach is to use the Foundation VM. The Foundation VM allows consultants to manage and upgrade Foundation on all nodes centrally. This method avoids the necessity of manual upgrades on each node individually, thus ensuring a more efficient and error-free process, aligning with Nutanix's best practices for scalability and management of infrastructure.
References:
The Nutanix Bible, the Nutanix University's NCS-Core 6.8 materials, and official Nutanix documentation on the Foundation VM.
To ensure the latest version of Foundation is used for imaging to support the latest hardware and software hypervisor configurations, the consultant should utilize the Foundation VM. This tool allows for upgrading the Foundation on all nodes simultaneously, ensuring consistency across the cluster. It streamlines the process by leveraging the existing Foundation infrastructure rather than requiring manual updates via a crash cart or the limited capabilities of the Foundation Applet for single node upgrades.

After imaging the nodes and creating the cluster successfully, the consultant connects the cluster to the customer network. When logging into Prism, the events dashboard is full of errors. What is causing the issue?


A. The cluster was not stopped prior to connecting to the customer network.


B. The Cluster Virtual IP Address (VIP) was not set up during the process.


C. Foundation did not create the cluster successfully.


D. The consultant did not run Nutanix Cluster Check (NCC)





B.
  The Cluster Virtual IP Address (VIP) was not set up during the process.

Explanation: After creating a cluster and connecting it to the customer's network, if the events dashboard in Prism is full of errors, a likely cause could be that the Cluster Virtual IP Address (VIP) was not properly set up. The VIP is crucial for accessing the Nutanix Prism interface and for the proper functioning of the cluster's management operations.

Microsegmentation was recently enabled in a Nutanix environment. The administrator wants to leverage Prism Central to create a policy that will block all traffic, regardless of direction, between two groups of VMs identified by their category. Which policy should be used to meet this requirement?


A. A Quarantine Policy


B. An Isolation Environment Policy


C. An Application Security Policy


D. A Whitehst-Based Policy





B.
  An Isolation Environment Policy

Refer to the exhibit.


A. Active link is disconnected. Passive link takes over.


B. Passive link is disconnected. Active link takes over.


C. Active link takes over. HA Failover takes place.


D. Passive link takes over. HA Failover takes place.





A.
  Active link is disconnected. Passive link takes over.

Explanation: In the scenario described, the configuration shown in the exhibit indicates that there is an "active-backup" bond mode. If a shut command is executed on the switchport that connects the node to the 5k1 switch (assuming it's the active link), the passive link should take over. This response ensures no loss of connectivity as the passive link becomes active in the absence of the primary (active) link.

A consultant creates three storage containers (container-1, container-2, container-3). The customer requires that only container-1, which will be utilized as an NFS datastore, be presented to external hosts. However, users are able to mount all three containers. What is causing this problem?


A. Compression was turned on for all containers.


B. A Container-level whitelist entry was configured.


C. Deduplication was turned on for all containers.


D. A Global whitelist entry was configured.





D.
  A Global whitelist entry was configured.


Page 11 out of 51 Pages
Previous