Nutanix NCS-Core Nutanix Certified Services Core Infrastructure Professional v6.8 Exam Practice Test

Page: 1 / 14
Total 302 questions
Question 1

A consultant is preparing to add new nodes into an existing cluster. The current cluster AOS version is 5.8. The new expansion node is currently running AOS 5.9 code. The cluster must continue to run at its current AOS version.

Which method can be used to successfully add the node?



Answer : B

When adding a new node with a higher AOS version (5.9) into an existing cluster running an older version (5.8), the recommended method is to use Prism Element to expand the cluster and select the re-image option. This process involves re-imaging the new node to the AOS version currently running in the cluster (5.8), ensuring compatibility and stability across the cluster without requiring an overall upgrade to a newer version. This approach maintains the cluster's operational integrity while integrating the new hardware. Reference: Nutanix Bible, NCS-Core 6.8 official training materials, and Nutanix support documentation on cluster expansion.


Question 2

An administrator needs to expand a cluster based on AHV and running on Nutanix G5 hardware with a new Nutanix G7 system. The cluster is running AOS 5.10 but the operation fails when expanding the cluster. AOS is running on the new system. There are no issues discovering the node.

Why is the operation failing?



Question 3

What must be set to enable node discovery when using Foundation VM?



Answer : B

For enabling node discovery when using the Foundation VM, the network adapter of the Foundation VM must be set to a Bridged Adapter. This configuration allows the VM to appear as a separate device on the same physical network as the host machine, making it possible for the Foundation VM to communicate directly with the nodes that are also connected to the same network. This is essential for node discovery and subsequent imaging operations performed by the Foundation tool. Reference: Nutanix Foundation Guide, Nutanix Networking Best Practices.


Question 4
Question 5

As a consultant concludes the project for deploying a new cluster, the customer expresses plans to repeat the process in-house for one of the company's dark site locations.

What three items can the consultant deliver in closing to help ensure customer's success in deploying and supporting Nutanix clusters?



Answer : B

As the consultant concludes the project, to assist the customer with repeating the deployment process at a dark site, the best items to deliver would be:

A trial license activation code for Prism Starter, which will allow the customer to begin using the Nutanix cluster immediately without initial extra costs.

Creating an account for access to the Nutanix Support Portal, ensuring the customer can access support and documentation as needed for troubleshooting and learning.

A guide for dark site deployments using Nutanix standards, which will provide step-by-step instructions tailored to the specific challenges of deploying in a location with no direct internet connectivity. These resources are critical for enabling the customer to independently deploy and manage Nutanix clusters under the unique constraints of a dark site. Reference: Nutanix Deployment Guide, Nutanix Support Portal Documentation.


Question 6

An administrator is using Nutanix Move to migrate a Windows VM from ESXi to AHV. Automated guest preparation is failing with an error:

Account has UAC enabled error

The administrator is using the local built-in administrator account for the Windows VM Admin approval mode must remain enabled.

What should the administrator do to continue with the migration with Nutanix Move?



Question 7

A consultant creates three storage containers (container-1, container-2, container-3). The customer requires that only container-1, which will be utilized as an NFS datastore, be presented to external hosts.

However, users are able to mount all three containers.

What is causing this problem?



Answer : D

The issue where users can mount all three storage containers despite the intention to restrict access to just container-1 typically stems from a Global whitelist entry. A global whitelist allows all entities to access all containers unless more specific restrictions are applied at the container level. To correct this, specific whitelist entries need to be configured for each container to define and restrict access appropriately. Reference: Nutanix NCS-Core 6.8 training resources, the Nutanix Bible, and Nutanix technical documentation on storage container management.


Page:    1 / 14   
Total 302 questions