NCS-Core Dumps NCS-Core Braindumps NCS-Core Real Questions NCS-Core Practice Test NCS-Core Actual Questions Nutanix NCS-Core Nutanix Certified Services Core Infrastructure Professional https://killexams.com/pass4sure/exam-detail/NCS-Core Question: 59 An administrator needs to deploy an application with a large amount of data connected via Nutanix Volumes. Which two actions should the administrator take when designing the Volume Group? (Choose two.) A . Use multiple subnets for iSCSI traffic B . Enable RSS (Receive Side Scaling) C . Enable thick provisioning on the Volume Group(s) D . Distribute workload across multiple virtual disks Answer: B,D Question: 60 A customer is running out of storage in an ESXi cluster. The customer wants to add storage without paying for an additional hypervisor license. Which option should the consultant recommend to meet the requirement? A . Convert the cluster to AHV to support storage-only node requirements. B . Select the storage-only checkbox during Foundation and then expand the cluster in Prism. C . Buy a new node to meet the requirements of the storage-only node specifications. D . Edit the factory_config.json file to configure the node as storage-only and then expand the cluster in Prism Answer: C Question: 61 An organization is running a Nutanix Cluster based on AOS 5.10.x and VMware vSphere 6.7. Currently, the CVM network is segmented and Storage only nodes not present. A new security project based on NSX is coming. VMware Distributed Virtual Switches are required. The administrator needs to prepare the environment for the new project. Which step should the administrator use to initiate the project? A . Enable Nutanix Flow at the Prism Central Level B . Manually disable CVM network Segmentation C . Convert storage only nodes into vSphere nodes D . Enable Jumbo Frames to accommodate network frames Answer: D Question: 62 An administrator is configuring software only. Data-at-Rest Encryption on their Nutanix cluster. They are planning to deploy a third-party key management server (KMS). Where should this server be hosted? A . As a single VM on the Nutanix cluster B . On hardware external to the Nutanix duster C . As a clustered VM setup on the Nutanix cluster D . As a single VM deployed on the host that contains the Prism leader CVM Answer: B Question: 63 An administrator needs to create and start five new VMs for a Data Analytics Project (OLAP). The VM Profile is as follows: • vCPU:4 • vRAM: 64 GB • vDisk: 1.5 TB Each of the four nodes of the Nutanix cluster has the following: • 24 vCPU. 20% overall usage • 192 GB RAM, 60% overall usage • 2xl920GBSSD • 4x 2 TB HDD At cluster level, there is a single RF2 container that is 30% utilized and has an extent store capacity of 13.5 TB. Which component requires administrator attention? A . Physical RAM, because it is not enough to power on all of the new VMs. B . Physical Cores, because they are not enough to power on all of the new VMs. C . Storage, because the capacity is not enough to create VMs. D . Flash Tier because it is not enough to accommodate the workloads. Answer: A Question: 64 A VDI environment based on AHV Cluster is not performing well. The current environment is using only one bridge (Bridge0). The administrator needs to verify if nodes are using all network cards associated to Bridge0. Which two menus should be used to check the current configuration? (Choose two.) A . Network Configuration item in Settings menu B . Host view in Network menu C . Host NICs tab in Hardware menu D . I/O Metrics tab in VM menu Answer: B,C Question: 65 A consultant is onsite with a customer running Foundation VM (FVM) and discovers that there is no connectivity between the FVM and their laptop. The consultant verifies the following: * The consultant’s laptop and Nutanix nodes are plugged into a flat switch. * The laptop, switch and nodes are plugged into supported power supplies. * The laptop network adapters and FVM are configured with their corresponding IP addresses. What is the cause for the connectivity failure to the FVM? A . The switch is not plugged into the power supply. B . Desktop Firewall is blocking ping requests. C . Network cables are not connected. D . Laptop WiFi configured to use DHC Answer: B Question: 66 A customer with a four-node RF2 cluster is adding application VMs to their system. After adding these VMs, the Prism dashboard shows 81% storage utilization. What is the consequence of running the cluster at 81% storage utilization? A . The customer has the ability to add more VMs up to the 100% storage utilization. B . There is available capacity in the storage fabric and the cluster is resilient. C . Node failure is imminent due to storage utilization. D . The cluster is not resilient in the storage fabric Answer: D Explanation: https://next.nutanix.com/how-it-works-22/recommended-maximum-storage-utilization-37234 Question: 67 Refer to the exhibit. After performing ESXi to AHV conversion on a cluster, the alerts shown in the exhibit display on Prism . What should the administrator do to resolve this issue efficiently? A . Remove the VMs. create a new Protection Domain, and add VMs to it B . Remove VMs from the Protection Domain and add them back in. C . Delete the Protection Domain, create a new Protection Domain, and add the VMs to it D . Create a new Protection Domain and add the VMs to rt. Answer: B Question: 68 Refer to the exhibit. An administrator notices a critical alert on the Metro Availability Protection Domain What is causing this alert? A . Metro Availability Protection domain is active on the remote site. B . VMware Site Recovery Manager is handling a failover event C . Metro Availability did not fail over and caused an outage. D . vSphere moved VMs to the remote container, and the VMs must be moved back. Answer: A Explanation: Ref: https://www.vvlsystems.com/wp-content/uploads/2016/11/BP-2009_Metro_Availability.pdf Question: 69 A VM does not have enough resources for the demand, which leads to performance bottlenecks. The VM is exhibiting one or more of following baseline values, based on the past 30 days: • CPU usage > 90% (moderate), 95% (high) • CPU ready time > 5%, 10% • Memory usage > 90%, 95% • Memory swap rate > 0Kbps (no moderate value). Which type of VM is being described? A . Constrained VM B . Bully VM C . Inactive VM D . Over-provisioned VM Answer: A Question: 70 An administrator has a custom backup application that requires a 2TB disk and runs in Windows. Throughput is considerably lower than expected. The application was installed on a VM with the following configuration: • Four vCPUs with one core/vCPU • 4GB of Memory • One 50GB vDisk for the Windows installation • One 2TB vDisk for the application What is the recommended configuration change to improve throughput? A . Increase the number of cores per vCPU B . Increase the vCPUs assigned to the VM C . Span the 2TB disk across four vDisks D . Add 4GB of memory to the VM Answer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