Discount Offer
Go Back on NCS-Core Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

NCS-Core Practice Test


Page 16 out of 61 Pages

A consultant is preparing to foundation over a customer network that has the following criteria:

* VLAN segmented network
* VLAN tags on the nodes must be imaged prior to starting the foundation process.

For each node, the consultant has done the following:

* Connected to the Network Crash Cart of the Node
* Logged in using “root” credentials

What should the consultant do next?


A. 1. CD to /root/nutanix-network-crashcart/
2. Start Network Utility tool by running: ./network_configuration
3. Change Values


B. 1. CD to /home/data/nutanix/nutanix-network-crashcart/
2. Start Network Utility tool by running: ./network_configuration
3. Change Values


C. 1. Log into CVM using nutanix@192.168.5.254
2. CD to /root/Nutanix-network-crashcart/
3. Start Network Utility tool by running: ./network_configuration
4. Change Values


D. 1. Log into CVM using nutanix@192.168.5.254
2. CD to /home/data/nutanix/nutanix-network-crashcart/
3. Start Network Utility tool by running: ./network_configuration
4. Change Values





A.
  1. CD to /root/nutanix-network-crashcart/
2. Start Network Utility tool by running: ./network_configuration
3. Change Values

During Foundation, all nodes are imaged successfully. The cluster creation step fails. The consultant troubleshoots the issue and verifies that all Hosts and CVMs are up and running and responding to network pings. Which method should the consultant select to create the cluster?


A. Log into one of the hosts and run the cluster create command.


B. Image the Bare Metal nodes.


C. Log into one of the CVMs and run the cluster create command.


D. Factory reset the nodes and re-start the Foundation process.





C.
  Log into one of the CVMs and run the cluster create command.

Explanation: After confirming that all nodes (Hosts and CVMs) are operational and network accessible, the next step in troubleshooting a failed cluster creation process is to use one of the CVMs to manually initiate the cluster creation. This is done using the command cluster create from a CVM, which allows you to establish the cluster management and data services provided by Nutanix. This approach is recommended when the Foundation process has successfully imaged the nodes but the automatic cluster creation has failed.

A consultant is showing the Prism Element Web Console to a customer and wants to check that cluster health is OK. During validation, the Health menu raises critical alerts about components using default passwords.
The cluster is based on ESXi as hypervisor, where Prism Central and Nutanix Files are deployed. Passwords have already been changed for a few components, but some of them have been left by default.
How can the consultant check and handle that situation?


A. Activate Cluster lockdown in Prism Element.


B. Check accounts and passwords in Local User Management in the vCenter.


C. Check NCC results and review the associated KB.


D. Deploy and connect the cluster to Prism Security Central.





C.
  Check NCC results and review the associated KB.

A consultant is working to setup the network before starting the Foundation process. How should the consultant complete this task?


A. Using the shared IPMI port, ensure that the connected switch can auto-negotiate to 1 Gbps.


B. Disable IPv6 on the network to which the nodes are connected to ensure that IPv6 unicast is blocked.


C. Ensure the IPMI of the nodes are reachable using pre-configured IPMI IPv6 addresses.


D. On Nutanix NX Series, connect the IPMI port and any one of the data ports to the switch.





D.
  On Nutanix NX Series, connect the IPMI port and any one of the data ports to the switch.

A consultant creates three storage containers (container-1, container-2, container-3). The customer requires that only container-1, which will be utilized as an NFS datastore, be presented to external hosts. However, users are able to mount all three containers. What is causing this problem?


A. Compression was turned on for all containers.


B. A Container-level whitelist entry was configured.


C. Deduplication was turned on for all containers.


D. A Global whitelist entry was configured.





D.
  A Global whitelist entry was configured.


Page 16 out of 61 Pages
Previous