NCS-Core Exam Questions

Total 150 Questions

Last Updated Exam : 16-Dec-2024

An administrator manages the following two Nutanix AOS 5.15 cluster environment:

• Corp-cluster-01
• Corp-cluster-02

The VM images must be available only on Corp-cluster-01, but cannot be checked out to cluster Corp-cluster-02. The images also cannot be checked out to any other clusters that are registered with Prism Central in the future. Which two configuration settings must the administrator choose when creating the image placement policy that satisfies the stated requirements? (Choose two.)


A. Create an image placement policy that identifies cluster Corp-cluster-01 as the target cluster


B. Set the policy enforcement to Soft.


C. Set the policy enforcement to Hard.


D. Create an image placement policy that identifies cluster Corp-cluster-02 as the target cluster.





A.
  Create an image placement policy that identifies cluster Corp-cluster-01 as the target cluster


C.
  Set the policy enforcement to Hard.


Explanation:

Ref: https://next.nutanix.com/community-blog-40/nutanix-just-made-ahv-image-management-painless-33144

A customer wants to validate the Microsoft SQL workload performance for a CRM application before migration to the new Nutanix cluster. Which activity must the consultant add as part of the test plan to fulfill this requirement?


A. X-Ray with OLAP Workload.


B. Run perfmon on guest VM.


C. X-Ray with OLTP Workload.


D. Run perfmon on all CVMs.





C.
  X-Ray with OLTP Workload.


Explanation:

To validate the performance of a Microsoft SQL workload for a CRM application, using X-Ray with an OLTP (Online Transaction Processing) Workload is most suitable. OLTP workloads simulate typical transactional database operations which are representative of CRM application usage, providing accurate insights into expected performance on the Nutanix platform.

References:

• Nutanix Bible (https://www.nutanixbible.com), specifically the sections on performance testing tools and methodologies.

• Nutanix University: NCS-Core 6.8 Training (https://university.nutanix.com), detailing how to use X-Ray for specific application testing.

A consultant is planning an installation and needs to collect configuration items to be used during the install. The data needed from the customer are IP addresses, Gateway, DNS servers, and NTP Servers. Which Cluster Deployment document must be completed with the customer?


A. Project Plan


B. Operations Guide


C. Questionnaire


D. Technical Checklist





D.
  Technical Checklist


Explanation:

The document that needs to be completed with the customer to collect configuration items such as IP addresses, Gateway, DNS servers, and NTP Servers is the Technical Checklist. This checklist is designed to ensure all necessary technical information is gathered prior to the installation, enabling a smooth and efficient setup process.

References:

Nutanix Cluster Deployment Guide, Pre-installation Planning Documentation.

An administrator is responsible for the following Nutanix Enterprise Cloud environment:
• A central datacenter with a 20-node cluster with 1.5PB of storage
• Five remote sites each with a 4-node cluster with 200TB storage
The remote sites are connected to the datacenter via 1GB links with an average latency of 6 ms RTT. What is the minimum RPO the administrator can achieve for this environment?


A. 0 minutes


B. 15 minutes


C. 1 hour


D. 6 hours





B.
  15 minutes


Explanation:

Ref: https://support-portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v5_10:wc-prote ction-domain-wc-c.html

An administrator finds that home shares cannot be configured in a new Files 3.5 deployment. Why is this happening?


A. NFS default access is set to Read Only.


B. Multi-protocol access is not configured.


C. Access Based Enumeration is not enabled.


D. The system is deployed as a single FSVM.





D.
  The system is deployed as a single FSVM.


An administrator needs to replace the self-signed certificate on a cluster. Which two requirements must be met as part of the process? (Choose two.)


A. The cluster administrator must restart the interface gateway.


B. The signed, intermediate and root certificates are chained.


C. The existing certificate must be deleted prior to replacement.


D. The imported files for the custom certificate must be PEM encoded.





B.
  The signed, intermediate and root certificates are chained.


D.
  The imported files for the custom certificate must be PEM encoded.


Explanation:

Ref: https://portal.nutanix.com/page/documents/details?targetId=Prism-Central-Guide-Prism-v55:mul-security-ssl-certifi cate-pc-t.html

Where can the Foundation version included with an AOS bundle be found?


A. AOS Release Notes


B. Upgrade Paths menu


C. Compatibility and Interoperability Matrix


D. Field Installation Guide





A.
  AOS Release Notes


Explanation:

The Foundation version included with an AOS bundle can be found in the AOS Release Notes. These release notes typically provide detailed information about all components and versions included in the bundle, ensuring that users are aware of compatibility and new features.

References:

• Nutanix Bible (https://www.nutanixbible.com), where reference to locating AOS bundle details is mentioned.

• Nutanix University: NCS-Core 6.8 Training (https://university.nutanix.com), providing instructions on how to access and interpret AOS release notes.

A customer with a four-node RF2 cluster is adding application VMs to their system. After adding these VMs, the Prism dashboard shows 81% storage utilization. What is the consequence of running the cluster at 81% storage utilization?


A. The customer has the ability to add more VMs up to the 100% storage utilization.


B. There is available capacity in the storage fabric and the cluster is resilient.


C. Node failure is imminent due to storage utilization.


D. The cluster is not resilient in the storage fabric





D.
  The cluster is not resilient in the storage fabric


Explanation:

https://next.nutanix.com/how-it-works-22/recommended-maximum-storage-utilization-3723 4

A consultant notes that a customer environment requires Nutanix storage containers to be mounted on non-Nutanix hosts for manual data migration workflows. What configuration should the consultant validate to ensure setup was performed properly?


A. Prism Element • Settings - Filesystem Whitelist


B. Prism Element - Settings - Cluster Details


C. Prism Central - Settings - Cluster Details


D. Prism Central - Settings - Filesystem Whitelist





A.
  Prism Element • Settings - Filesystem Whitelist


Explanation:

For ensuring that Nutanix storage containers can be mounted on non-Nutanix hosts for data migration workflows, the consultant should validate the configuration under: A. Prism Element - Settings - Filesystem Whitelist. This setting allows specific non-Nutanix hosts to access the Nutanix storage containers, which is essential for environments where data must be accessible to systems outside the Nutanix cluster. By whitelisting the IP addresses or hostnames of these external systems, they are granted the necessary permissions to mount and interact with the Nutanix file systems.

References:

Nutanix Prism Element User Guide, Nutanix Storage and Filesystem Configuration Best Practices.

An organization is running a Nutanix Cluster based on AOS 5.10.x and VMware vSphere 6.7. Currently, the CVM network is segmented and Storage only nodes not present. A new security project based on NSX is coming. VMware Distributed Virtual Switches are required. The administrator needs to prepare the environment for the new project. Which step should the administrator use to initiate the project?


A. Enable Nutanix Flow at the Prism Central Level


B. Manually disable CVM network Segmentation


C. Convert storage only nodes into vSphere nodes


D. Enable Jumbo Frames to accommodate network frames





B.
  Manually disable CVM network Segmentation


Explanation:

In preparing for the VMware NSX security project, the administrator should consider the network infrastructure and how the NSX will interact with the existing Nutanix environment. VMware NSX requires the use of VMware Distributed Virtual Switches. In the given scenario, where the CVM (Controller Virtual Machine) network is segmented and storage-only nodes are not present, the key step is to ensure that the network settings are compatible with NSX. Disabling the CVM network segmentation allows for a unified network that supports the requirements of NSX for network virtualization and security, making it the crucial first step before any further NSX-specific configurations are applied.

References:

Nutanix Bible, Nutanix Community discussions, VMware NSX documentation.