March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NCS-Core Exam Dumps - Nutanix Certified Services Core Infrastructure Professional

Question # 4

An administrator needs to install prism central for their 2550 multi-cluster environment.

How should they deploy the application?

A.

Deploy a large 3-VM Prism Central instance

B.

Deploy a large 1-VM Prism Centralinstance.

C.

Deploy a small 3-VM Prism Central instance.

D.

Deploy a small 1-VM Prism Central instance.

Full Access
Question # 5

An administrator is updating disk firmware using LCM and receives the following message:

“there have been 10 or more cluster services restarts within 15 minutes in the Controller VM”

The message appears as each drive is upgraded.

What is the reason this message isbeing generated?

A.

A node has been rebalanced

B.

A drive has been reformatted

C.

A node has been rebooted

D.

A drive has been ejected

Full Access
Question # 6

An administrator needs to forecast infrastructure requirements for a new program and its associated applications. Prior to the projected start of the new program, all existing applications will be decommissioned.

How should the administrator perform this task?

A.

Check the Disregard Existing Workloads radio button in the Runway scenario.

B.

Check the Disregard Existing Nodes radio button in the Runway scenario.

C.

Add up the recovered workloads and manually remove from the Runway configuration.

D.

Power down the workloads during a maintenance window and run the Capacity Runway.

Full Access
Question # 7

During the Foundation imaging process, nodes are successfully imaged, but the cluster creation fails.

Which log should the consultant review to determine the cause?

A.

service.log

B.

foundation.out

C.

first_boot.log

D.

genesis.out

Full Access
Question # 8

A customer has NearSync configured. When the administrator tries to restore a snapshot from 3 minutes ago, it is not available. The snapshots are happening at15-minute intervals instead of at the 5-minute configured interval. When the protection domain was initially set up, the snapshots were happening at the expected 5-minute interval.

What should the customer do to enable the snapshots to happen at the expected interval?

A.

Utilize Metro Availability to meet this requirement

B.

Change the protection domain to use Async DR

C.

Fix a connectivity issue because the protection domain reverted to Async

D.

Configure the protection domain to take snapshots on15-minute intervals

Full Access
Question # 9

Refer to the exhibit.

A consultant is deploying a cluster using the customer-provided IP addressing information.

Which option in Foundation must be configured to ensure connectivity during the deployment?

A.

Link Aggregation

B.

Range Autofill

C.

Network Segmentation

D.

Multi-homing

Full Access
Question # 10

An administrator recently added in 3 nodes to an existing 5 node cluster. While 1 node came with its own block, theother 2 nodes where added to an existing share. After adding the nodes, the administrator sees that the hardware tab displays the correct number of nodes, but incorrect position in the diagram tab.

What should the administrator do to resolve the issue?

A.

Check the factory_config.json for all 3 nodes

B.

SSH into CVM and perform genesis restart on each CVM

C.

SSH into the CVMs and run genesis acropolis stop; cluster start

D.

Check the factory_config. json for the two single nodes.

Full Access
Question # 11

An administrator is configuring software only. Data-at-Rest Encryption on their Nutanix cluster. They are planning to deploy a third-party key management server (KMS).

Where should this server be hosted?

A.

As a single VM on the Nutanix cluster

B.

On hardware external to the Nutanix duster

C.

As a clustered VM setup on the Nutanix cluster

D.

As a single VM deployed on the host that contains the Prism leader CVM

Full Access
Question # 12

A consultant has deployed a new Nutanix AHV cluster with Foundation. The customer requests separating the management and production traffic in the CVM.

Which feature should the consultant configure?

A.

Micro-segmentation

B.

Multi-homing

C.

Network Segmentation

D.

VLAN Tagging

Full Access
Question # 13

During the Knowledge Transfer, the customer askes where to find the details about their Nutanix environment, such as IP addresses, storage containers, and configuration.

Where can the consultant find this information?

A.

Support Portal

B.

As-Built Guide

C.

Test Plan

D.

Tech Checklist

Full Access
Question # 14

In a 20-node ESXi deployment, the customer needs additional resiliency to survive the loss of two nodes concurrently.

Which configuration should the consultant use to ensure that the appropriate resources are available?

A.

Storage reservation for 10%; HA admission control for 10%, cluster RF3

B.

Storage reservation for 5%; HA admission control for 5%, cluster RF2

C.

Storage reservation for 5%; HA admission control for 5%, cluster RF3

D.

Storage reservation for 10%; HA admission control for 10%, cluster RF2

Full Access
Question # 15

An administrator has a custom backup application that requires a 2TB disk and runs in Windows. Throughput is considerably lower than expected.

The application was installed on a VM with the following configuration:

• Four vCPUs with one core/vCPU

• 4GB of Memory

• One 50GB vDisk for the Windows installation

• One 2TB vDisk for the application

What is the recommended configuration change to improve throughput?

A.

Increase the number of cores per vCPU

B.

Increase the vCPUs assigned to the VM

C.

Span the 2TB disk across four vDisks

D.

Add 4GB of memory to the VM

Full Access
Question # 16

After deploying an AHV cluster connected to Cisco Nexus 9k switches, unexpected network behavior is observed. The consultant needs to rule out physical network mis-cabling without returning to the datacenter.

Which command from the host should the consultant run?

A.

show lldp neighbors

B.

show cdp neighbors

C.

show interfaces

D.

lldpctl

Full Access
Question # 17

An administrator learns that some security settings in a cluster have been changed. The environment is out ofcompliance with required policies.

Which function should be used to revert any settings that have changed from the defaults and prevent further violations?

A.

Cluster Lockdown with strong password enforcement

B.

Advanced Intrusion Detection Environment (AIDE)

C.

Security Configuration Management Automation (SCMA)

D.

Defense Information Systems Agency STIG enforcement

Full Access
Question # 18

An administrator needs to create and start five new VMs for a Data Analytics Project (OLAP). The VM Profile is as follows:

• vCPU:4

• vRAM: 64 GB

• vDisk: 1.5 TB

Each of the four nodes of the Nutanix cluster has the following:

• 24 vCPU. 20% overall usage

• 192 GB RAM, 60% overall usage

• 2xl920GBSSD

• 4x 2 TB HDD

At cluster level, there is a single RF2 container that is 30% utilized and has an extent store capacity of 13.5 TB.

Which component requires administrator attention?

A.

Physical RAM, because it is not enough to power on all of the new VMs.

B.

Physical Cores, because they are not enough to power on all of the new VMs.

C.

Storage, because the capacity is not enough to create VMs.

D.

Flash Tier because it is not enough to accommodate the workloads.

Full Access
Question # 19

A consultant is onsite and needs to start their Foundation Virtual Machine (FVM) to image Nutanix hardware. The FVM fails to boot. The consultant decides to use a different Foundation method.

Assuming the nodes will discover, which Foundation type or configuration option should the consultant select?

A.

Foundation VM

B.

Use IPMI IPs

C.

Use IPMI MACs

D.

Foundation Applet

Full Access
Question # 20

A guest VM is reported to have poor storage performance. It has an I/O profile of 80%read. 20% write, and the HDDs form more than 50% of the read source.

What should an administrator do to resolve this issue?

A.

Increase SSD capacity

B.

Increase the OPLOG

C.

Increase the write cache

D.

Use HDDs with higher RPM

Full Access
Question # 21

Refer to the exhibit.

An administrator notices a critical alert on the Metro Availability Protection Domain What is causing this alert?

A.

Metro Availability Protection domain is active on the remote site.

B.

VMware Site Recovery Manager is handling a failover event

C.

Metro Availability did not fail over and caused an outage.

D.

vSphere moved VMs to the remote container, and the VMs must be moved back.

Full Access
Question # 22

A consultant creates three storage containers (container-1, container-2, container-3). The customer requires that only container-1, which will be utilized as an NFS datastore, be presented to external hosts.

However, users are able to mount all three containers.

What is causing this problem?

A.

Compression was turned on for all containers.

B.

A Container-level whitelist entry was configured.

C.

Deduplication was turned on for all containers.

D.

A Global whitelist entry was configured.

Full Access
Question # 23

A customer has a four-node cluster and is using Volume Groups toprovide storage services to a SQL cluster.

In the event of a CVM failure in the cluster, what is the expected IO path of the volume group’s iSCSI targets?

A.

vDisk directed at failure CVM are redirected to Data Services IP until CVM is reconnected

B.

vDisk directed to CVM that failed to disconnect and will not reconnect without manual intervention

C.

vDisk directed to failed CVM are redirected to another CVM and automatically reconnect

D.

vDisk directed at failed CVM will disconnect and reconnect when thefailed CVM comes back online

Full Access
Question # 24

An administrator is deploying an application using Nutanix Volumes. After configuring the volume group and connecting the guest's iSCSI initiator to the volume group, they begin performance testing.

The administrator learns that performance on the virtual disk attached to the iSCSI initiator is far less than that of a virtual disk connected directly to the VM.

Which situation is causing this condition?

A.

The VM's iSCSI traffic is being routed to the data services IP subnet

B.

The performance test is generating small block random 10.

C.

The duster data services IP address is a bottleneck, shared with other iSCSI traffic

D.

Data Locality ensures that VM attached disks are always faster than iSCSI volumes.

Full Access
Question # 25

An administrator of a Nutanix Enterprise Cloud has microsegmentation enabled and a firewall VM installed. The security team notifies the administrator that one of the VMs hosted in the environment has been exhibiting suspect network activity. The administrator wants to isolate the VM from the production network, but must still be able to access it to perform diagnostics.

What should the administrator do to meet the requirement?

A.

Disable the vNIC on the affected VM

B.

Quarantine the VM using the Forensic Method

C.

Create a firewall rule that blocks VM traffic but permits diagnostic access

D.

Create asecurity policy with a service chain directing that VMs traffic to the firewall VM

Full Access
Question # 26

A VM does not have enough resources for the demand,which leads to performance bottlenecks. The VM is exhibiting one or more of following baseline values, based on the past 30 days:

• CPU usage > 90% (moderate), 95% (high)

• CPU ready time > 5%, 10%

• Memory usage > 90%, 95%

• Memory swap rate > 0Kbps (no moderate value)

Which type of VM is being described?

A.

Constrained VM

B.

Bully VM

C.

Inactive VM

D.

Over-provisioned VM

Full Access
Question # 27

A systems administrator configures a protection domain replication between two Nutanix clusters. After the first successful replication , the administrator tests DR by clicking activate on the remote cluster.

While VMs are active on the remote cluster, the protection domain is marked as active on both clusters.

What steps are required to return both clusters to their original state?

A.

1. On the remote site, deactivate the Protection Domain using ncli

2. On the primary site, select theProtection Domain and dick migrate

B.

1. On the remote site, promote the Protection Domain

2. On the primary site, change the Protection Domain state from Decoupled to Disabled

3 Enable the original primary site as remote site

C.

1. On the prima7 site,suspend replications

2. On the remote site, deactivate the Protection Domain using ncli

3. On the remote site, migrate the protection domain back to the primary site

D.

1 On the remote site, restore the snapshots from the Protection Domain

2. On the remote site, select the Protection Domain and migrate to the primary site

Full Access
Question # 28

An administrator has two clusters: Site A and Site B.

Async DR is configured between the clusters as follows:

• Site A is the Primary Site

• Site B is the Secondary inactive Site, no VMs running

• Site A is fully in Production

• Site B used as Backup/Disaster Recovery

The customer wants to perform a planned failover between the sites.

How should the administrator accomplish this?

A.

Click Activate on the Secondary site within the Data Protection Dashboard

B.

Click Activate on the Secondary site and run deactive NCLI command on Primary site

C.

Choose Migrate on the Secondary site within the Data Protection Dashboard

D.

Choose Migrate on the Primary sitewithin the Data Protection Dashboard

Full Access