Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

NCS-Core Exam Dumps - Nutanix NCS Professional Questions and Answers

Question # 34

A consultant asks a customer to verify the ToR Switch data port configuration was done according to Nutanix best practices. The switch configuration must simplify future deployments and expansions.

Which two configuration actions will satisfy this requirement? (Choose two.)

Options:

A.

Disable multicast and broadcast flood optimizations.

B.

Configure the CVM and hypervisor host VLAN as the native.

C.

Use a tagged VLAN for the CVM and hypervisor hosts.

D.

Configure the connected switch ports as access.

Buy Now
Question # 35

How should a consultant verify that a Nutanix cluster can tolerate a single-node failure?

Options:

A.

[root@cvm~]# ncli cluster get-domain-fault-tolerance-status

type=node

B.

nutanix@cvm~$ ncli cluster get-domain-fault-tolerance-status

type=node

C.

[root@avh~]# ncli cluster fault-tolerance-status type=node

D.

nutanix@cvm~$ ncli cluster status type=node

Buy Now
Question # 36

A consultant runs the Foundation Applet and discovers all the nodes. The consultant wants to use the latest version of Foundation for imaging for support purposes and to cover the latest hardware and software hypervisor support.

What should the consultant do to upgrade Foundation on a node?

Options:

A.

Use crash cart and manually upgrade Foundation files on one node.

B.

Use latest version of Foundation to reimage all the nodes.

C.

Use the Foundation VM to upgrade Foundation on all nodes.

D.

Use the Foundation Applet to upgrade Foundation on a single node.

Buy Now
Question # 37

A consultant is viewing an ESXi host via console without external network connectivity.

Which two IP addresses can be used to connect to the CVM (Choose two.)

Options:

A.

192.168.5.253

B.

192.168.5.2

C.

192.168.5.254

D.

192.168.5.1

Buy Now
Question # 38

A consultant is planning an installation and needs to collect configuration items to be used during the install. The data needed from the customer are IP addresses, Gateway, DNS servers, and NTP Servers.

Which Cluster Deployment document must be completed with the customer?

Options:

A.

Project Plan

B.

Operations Guide

C.

Questionnaire

D.

Technical Checklist

Buy Now
Question # 39

The following alert appears on the file server alerts tab in the file server dashboard:

Which two events can generate this alert? (choose two)

Options:

A.

A three-node duster hosting the file server is undergoing AOS upgrade.

B.

A node failed in a three-node cluster.

C.

A Nutanix file with four hie server VMs is deployed on a three-node duster.

D.

A node is set to the maintenance mode in a three node cluster.

Buy Now
Question # 40

The following critical Availability Alert displays in prism Central:

The protection Policy PP-BCA-1HR includes a business critical application with a 1-hour snapshot frequency.

What is causing this issue?

Options:

A.

There is a scheduled outage for the Availability Zone referenced in Protection Policy PP-BCA-1HR.

B.

Workloads included in PP-BCA-1HR are no longer within their intended RPO.

C.

Prism Central in the Availability Zone for PP-BCA-1HR is unavailable.

D.

NearSync replication between the Availability Zones has fallen out of scope.

Buy Now
Question # 41

During Foundation, all nodes are imaged successfully. The cluster creation step fails. The consultant troubleshoots the issue and verifies that all Hosts and CVMs are up and running and responding to network pings.

Which method should the consultant select to create the cluster?

Options:

A.

Log into one of the hosts and run the cluster create command.

B.

Image the Bare Metal nodes.

C.

Log into one of the CVMs and run the cluster create command.

D.

Factory reset the nodes and re-start the Foundation process.

Buy Now
Question # 42

An administrator of a Nutanix Enterprise Cloud has microsegmentation enabled and a firewall VM installed. The security team notifies the administrator that one of the VMs hosted in the environment has been exhibiting suspect network activity. The administrator wants to isolate the VM from the production network, but must still be able to access it to perform diagnostics.

What should the administrator do to meet the requirement?

Options:

A.

Disable the vNIC on the affected VM

B.

Quarantine the VM using the Forensic Method

C.

Create a firewall rule that blocks VM traffic but permits diagnostic access

D.

Create a security policy with a service chain directing that VMs traffic to the firewall VM

Buy Now
Question # 43

An administrator is deploying a three-tier application on a Nutanix Enterprise Cloud consisting of web, application, and database VMs. Traffic between the servers must be limited to specific services/ports. There is an application layer firewall VM deployed on one host in the cluster.

In which way should the administrator meet this requirement?

Options:

A.

Create a network for each type of VM, and use policy-based routing to control the traffic flow

B.

Configure a security policy and service chain redirecting the server traffic through the firewall

C.

Separate the web. application and database VMs on to dedicated VLANs

D.

Categorize the VMs in Prism Central and utilize Flow to set a security policy

Buy Now
Exam Code: NCS-Core
Exam Name: Nutanix Certified Services Core Infrastructure Professional (NCS-Core 6.8)
Last Update: Feb 23, 2025
Questions: 309
NCS-Core pdf

NCS-Core PDF

$25.5  $84.99
NCS-Core Engine

NCS-Core Testing Engine

$28.5  $94.99
NCS-Core PDF + Engine

NCS-Core PDF + Testing Engine

$40.5  $134.99