Nutanix Certified Services Core Infrastructure Professional v6.8 NCS-Core Exam Questions

Page: 1 / 14
Total 302 questions
Question 1

Which subnet is reserved for internal connectivity within a Nutanix Cluster?



Answer : A

Within a Nutanix cluster, the subnet 192.168.5.0/24 is typically reserved for internal connectivity. This subnet is used for the internal communication between Nutanix Controller VMs (CVMs) and other cluster components. It ensures isolated and efficient network traffic management that is crucial for cluster operations.


Nutanix Network Configuration Guide: Nutanix Networking Guide

Nutanix Best Practices for Network Configuration: Nutanix Community

Question 2

A consultant is deploying a Nutanix cluster at a customer location. The consultant will be deploying the latest AOS along with the latest Nutanix hardware.

Which three references should the consultant review prior to this installation? (Choose three.)



Answer : A, B, C

When deploying the latest AOS along with the latest Nutanix hardware, it is essential for the consultant to review multiple sources of information to ensure a successful installation. Release Notes provide details about new features, improvements, and known issues in the latest version of AOS. Software Product Interoperability outlines compatibility between different software versions, ensuring that the AOS and any integrated applications or environments will function correctly. Field & Security Advisories inform about potential security issues and recommended practices to avoid common pitfalls or security risks.


Nutanix Bible: Documentation and Release Information

Nutanix University: Installation and Security Best Practices

Question 3

A customer needs a 20-node cluster built. The consultant only has a 16-port flat network switch, and the customer is using VLAN tagging for the hosts and CVMs.

How should the consultant create the cluster?



Answer : B

Given the constraint of a 16-port switch for a 20-node cluster, the consultant cannot physically connect all nodes to the network simultaneously. VLAN tagging allows multiple virtual networks to be carried over the same physical network. However, the challenge here is not about VLANs but the physical limitation of ports. The practical approach would be to manually create the cluster, potentially in stages, as the full network capacity required for all nodes is not available. Reference:

Nutanix University - NCS-Core 6.8 Learning Path

The Nutanix Bible, Networking chapter (https://www.nutanixbible.com/)


Question 4

A consultant deployed a Nutanix Files cluster using separate networks for client and storage.

For testing a SMB standard share, a VM has been deployed on storage network. However, the consultant cannot access the share.

What is the cause of the issue?



Answer : B

If a VM deployed on the storage network cannot access a SMB standard share, the likely issue is that:

Clients on the same subnet as the storage network cannot access the shares: This scenario typically occurs due to network segmentation policies or firewall rules that restrict access to the storage network from clients within the same subnet, intended to segregate traffic types for security and performance reasons.


Nutanix Bible (https://www.nutanixbible.com), specifically sections on network segmentation and Nutanix Files configurations.

Nutanix Technical Documentation on Nutanix Files, which covers network configuration and troubleshooting issues related to file access.

Question 5

A consultant is showing the Prism Element Web Console to a customer and wants to check that cluster health is OK. During validation, the Health menu raises critical alerts about components using default passwords.

The cluster is based on ESXi as hypervisor, where Prism Central and Nutanix Files are deployed. Passwords have already been changed for a few components, but some of them have been left by default.

How can the consultant check and handle that situation?



Answer : C

To address critical alerts about components using default passwords in the Prism Element Web Console:

C . Check NCC results and review the associated KB: The Nutanix Cluster Check (NCC) tool can identify security vulnerabilities, including default password usage. Reviewing the results and associated knowledge base articles provides specific guidance on changing these passwords to secure the environment.


Nutanix Bible (https://www.nutanixbible.com), specifically sections on cluster health checks and security practices.

Nutanix University: NCS-Core 6.8 Training (https://university.nutanix.com), which includes instruction on using NCC for cluster validation and security enhancements.

Question 6

An administrator needs to deploy an application with a large amount of data connected via Nutanix Volumes.

Which two actions should the administrator take when designing the Volume Group? (Choose two.)



Answer : B, D


Question 7

An administrator configure Active Directory (AD) authentication for their Nutanix environment. When login in using an AD user account, the login process takes more than one minute to complete. No delay occurs when logging a local account.

What should the administrator confirm to resolve this issue?



Page:    1 / 14   
Total 302 questions