Massive Halloween Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

NCS-Core Questions and Answers

Question # 4

An administrator of a Nutanix Enterprise Cloud has microsegmentation enabled and a firewall VM installed. The security team notifies the administrator that one of the VMs hosted in the environment has been exhibiting suspect network activity. The administrator wants to isolate the VM from the production network, but must still be able to access it to perform diagnostics.

What should the administrator do to meet the requirement?

A.

Disable the vNIC on the affected VM

B.

Quarantine the VM using the Forensic Method

C.

Create a firewall rule that blocks VM traffic but permits diagnostic access

D.

Create asecurity policy with a service chain directing that VMs traffic to the firewall VM

Full Access
Question # 5

An administrator deploys Exchange on a Nutanix cluster. The administrator creates two containers with RF2 configuration:

• One container for Exchange

• One container for the other VMs

The Exchange VM isexperiencing I/O performance issues.

Which changes to Storage Optimization should be used on the Exchange container to enhance I/O performance?

A.

No data reduction

B.

Post process Deduplication only

C.

Inline compression and EC-X

D.

Inline compression andDeduplication

Full Access
Question # 6

An administrator deletes a large amount of data from a Volume Group presented to a Linux VM. The administrator notices that the deleted data has not been reclaimed as usable storage.

Whataction should be taken to reclaim the storage capacity?

A.

Shrink the Volume Group that is associated with the Linux VM

B.

Unmount the Volume Group and then Remount the Volume Group

C.

Enable the unman operation on the Linux VM

D.

Run Defrag on the Linux VM

Full Access
Question # 7

During the Foundation imaging process, nodes are successfully imaged, but the cluster creation fails.

Which log should the consultant review to determine the cause?

A.

service.log

B.

foundation.out

C.

first_boot.log

D.

genesis.out

Full Access
Question # 8

A consultant needs to review a customer’s switch port configuration to identify any issues. Other customer requirements are as follows:

* Leverage LACP

* Native VLAN will not be used

* Use Multiple Upstream switches

* Use VLANs 20-25 and 30

* LACP Fallback has been Enabled

* vPC or MLAG has been configured

What must be included in a configuration in order to meet these requirements?

A.

Native VLAN set to default

Ports trucked to allow all necessary VLANs

B.

Native VLAN set to default

Ports in access mode to allow all necessary VLANs

C.

Native VLAN set to 30

Ports Trunked to allow all necessary VLANs

D.

Native VLAN set to 30

Ports in access mode to allow all necessary VLANs

Full Access
Question # 9

Refer to the exhibit.

A Microsoft SQL 2016 deployment is shown in the exhibit. The administrator receives user reports that database queries take too long to return.

Which optimization should be made to this configuration to improve performance?

A.

Combine both of the OS and SQL Binaries disks

B.

Add a second SCSI controller for the Database.

C.

TempDB, andLogs disk Separate the Database. TempDB, and Logs onto their own disks

D.

Configure the VM to use a PCI disk controller

Full Access
Question # 10

A consultant is imaging a Nutanix cluster with VMware ESXi. Foundation returns an error that the media is not a supported ISO. The consultant checks the whitelist file in Foundation and confirms that the version of the ISO is not listed.

Which three actions should the consultant take to resolve this issue? (Choose three.)

A.

Replace and save whitelist file in Foundation

B.

Obtain the MD5 checksum of the ISO and confirm MD5 checksum of ISO is listed.

C.

Download the iso_whitelist.json from the Support portal.

D.

Edit the whitelist file in Foundation.

E.

Restart the imaging process in Foundation.

Full Access
Question # 11

Refer to the exhibit.

After performing ESXi to AHV conversion on a cluster, the alerts shown in the exhibit display on Prism. What should the administrator do to resolve this issue efficiently?

A.

Remove the VMs. create a new Protection Domain, and add VMs to it

B.

Remove VMs from the Protection Domain and add them back in.

C.

Delete the Protection Domain, create a new Protection Domain, and add the VMs to it

D.

Create a new Protection Domain and add the VMs to rt.

Full Access
Question # 12

An administrator is deploying Nutanix Files 3.5 and needs to configure the sizing of the FSVMs for an increased number of concurrent SMB connections over the default 750.

What should the administrator do?

A.

Deploy the Files VMs.power down the three FSVMs. change the CPU and RAM via Prism, and then power the three FSVMs back up

B.

During installation, click Customize on the File Server Installation screen, change the number of connections, and finish the installation

C.

Complete the default installation change the CPU and RAM m Prism, and then log into the File Server dashboard and change the Filer Server Properties

D.

During installation, input the correct number of connections in the File Server Installation screen and complete the installation

Full Access
Question # 13

An administrator needs to install prism central for their 2550 multi-cluster environment.

How should they deploy the application?

A.

Deploy a large 3-VM Prism Central instance

B.

Deploy a large 1-VM Prism Centralinstance.

C.

Deploy a small 3-VM Prism Central instance.

D.

Deploy a small 1-VM Prism Central instance.

Full Access
Question # 14

A consultant is performing a Nutanix Cluster installation on Dell XC Core hardware. The consultant decides to use Foundation Portable for Mac to perform the installation. When the consultant arrives onsite, Foundation Portable is unable to locate the new nodes.

Which log should the consultant check to troubleshoot this issue?

A.

/home/nutanix/foundation/log

B.

~/data/logs/foundation.out

C.

foundation.app/contents/resouces/log

D.

~/data/logs/foundation

Full Access
Question # 15

An administrator needs to maximize storage potential in a six-node cluster. The container is configured with the following:

  • Post-process compression
  • Capacity deduplication

What should the administrator configure to increase space savings?

A.

Erasure coding

B.

Inline compression

C.

Reserve capacity

D.

Cache dedupe

Full Access
Question # 16

A consultant notices while assigning VLAN tags to hosts and CVMs in a running cluster, that Prism Element displays alerts indicating a node is down.

What should the consultant do to prevent these alerts?

A.

Restart the Nutanix cluster.

B.

Only change the Controller Virtual Machine VLANs.

C.

Only change the hypervisor VLANs.

D.

Stop the Nutanix cluster before changing VLANs.

Full Access
Question # 17

An administrator is configuring an All Flash cluster to support the following workloads:

• Full clone virtual desktops

• Hadoop

• Write heavy databases

Whichthree correct configuration options should the administrator use to meet the item requirements? (Choose three.)

For each procedure, indicate whether it is a correct or incorrect procedure that must be configured to meet the item requirements using the drop-down option.

Full Access
Question # 18

After deploying an AHV cluster connected to Cisco Nexus 9k switches, unexpected network behavior is observed. The consultant needs to rule out physical network mis-cabling without returning to the datacenter.

Which command from the host should the consultant run?

A.

show lldp neighbors

B.

show cdp neighbors

C.

show interfaces

D.

lldpctl

Full Access
Question # 19

A consultant is using a customer’s switch for installation. Although the 10GbE ports for each of the hosts are connected to the switch, the nodes fail to be discovered.

What is causing the issue?

A.

IPv6 is not enabled on the switch.

B.

IPMI port is not plugged in.

C.

Foundation VM is running on a Windows host.

D.

10GbE ports are configured with the incorrect duplex setting.

Full Access
Question # 20

What is the minimum number of nodes required for a Nutanix Cluster to support Replication Factor 3 (RF3) on a storage container?

A.

3

B.

4

C.

5

D.

6

Full Access
Question # 21

A consultant creates a Windows VM after installing a new Nutanix cluster running AHV. The consultant has statically assigned an IP address to the VM but it is unable to communicate on the network.

Which action should the consultant take to resolve this issue?

A.

Confirm that IPv6 is enabled on the guest VM.

B.

Confirm that the VM vNIC is tied to the correct VLAN in Prism Element.

C.

Mount and install the Nutanix Guest Tools.

D.

Set a Group Policy to make sure the Windows Firewall is disabled.

Full Access
Question # 22

A company needs to replicate their VMs to a remote site and must have an RPO of less than 1 hour.

When creating a protection domain, what should an administrator do to meet this requirement?

A.

Enable Async Replication with an RPO of 60 minutes

B.

Enable Near-Sync Replication with an RPO of 15 minutes

C.

Enable Entity Sync on the designated VMs

D.

Enable Availability Zones and send the VM to multiple targets

Full Access
Question # 23

Which two components must be identified to validate that software compatibility requirements are met for Nutanix Cluster Installation? (Choose two.)

A.

Guest OS

B.

AOS

C.

Firmware

D.

Hypervisor

Full Access
Question # 24

A system administrator needs to shut down an AHV node in a Nutanix cluster without causing service disruption. The administrator checks data resiliency and verifies that the cluster can tolerate a node down.

Which three steps should the administrator perform next? (Choose three.)

Full Access
Question # 25

An administrator configures authentication in Prism Central (PC) for the NTNX-Admins group. Users report that they are unable to log in. The administrator confirms that the Active Directory (AD) settings in PC are correct.

Which condition could result in this behavior?

A.

A role mapping needs to be associated with the AD group.

B.

The users must be added to the Domain Admins AD group.

C.

The Local authentication type must also be selected in PC.

D.

A client chap certificate must also be added in PC.

Full Access
Question # 26

Refer to the exhibit.

A Nutanix host is connected as shown in the exhibit with br0-up set to active/backup. Physical Switch 1 experiences a power outage causing br0-up to failover to using eth2. The CVM and host become inaccessible. User VMs restart on other hosts in the cluster, which causes a disruption to those VMs.

Which configuration issue likely caused this outage?

A.

Bridge br0-up should be configured to use balance-tcp rather than active/backup.

B.

The CVM should have eth1 connected to the OVS.

C.

The upstream port for eth2 is missing a VLAN.

D.

The user VMs only have one NIC

Full Access
Question # 27

Refer to the exhibit.

A system administrator is using Range-Autofill tool to assign IP addresses to setup a multi-block cluster based on the following configuration:

Which additional changes must be made during the Foundation process to configure the cluster correctly?

A.

Change host names

B.

Reorder block serial

C.

Change IP address

D.

Reorder blocks

Full Access
Question # 28

An administrator receives an error indicating that the CVMs in the cluster are not syncing to any NTP servers. An investigation of the issue finds:

• The NTP servers are configured in Prism

• The time on all CVMs is the same

• Both the CVMs and AHV hosts are configured for the UTC time zone

Which two steps can be taken to troubleshoot this issue? (Choose two.)

A.

Confirm that the NTP servers are reachable from the CVMs.

B.

Restart genesis on all CVMs.

C.

On a CVM. run the command a Hash ntpq -pn.

D.

Restart the chronosservice on all CVMs.

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 27 Oct 2021