Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

NCS-Core Nutanix Certified Services Core Infrastructure Professional (NCS-Core 6.8) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Nutanix NCS-Core Nutanix Certified Services Core Infrastructure Professional (NCS-Core 6.8) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 5
Total 309 questions

While creating an image placement policy on the organizations AOS 5.15-based Nutanix cluster, the administrator wants to ensure there are no restrictions on using the selected images on clusters outside of the identified set.

What type of Policy Enforcement must the administrator choose?

A.

Soft

B.

Internal

C.

Hard

D.

External

After deploying an AHV cluster connected to Cisco Nexus 9k switches, unexpected network behavior is observed. The consultant needs to rule out physical network mis-cabling without returning to the datacenter.

Which command from the host should the consultant run?

A.

show lldp neighbors

B.

show cdp neighbors

C.

show interfaces

D.

lldpctl

An administrator needs to make sure an RF3 cluster can survive a failure of two complete racks without negatively affecting performance. The current cluster configuration consists of the following:

• 30 All Flash Nodes: distributed 10 nodes per rack across three 42U racks

• Each node is configured with 20TB usable storage all flash (Cluster Total 600TB Usable)

• Current cluster utilization is 500TB storage

• Storage containers have Erasure Coding enabled

Which configuration changes should be made to make sure the cluster meets the requirements?

A.

Expand the cluster to 50 nodes distributed evenly across 5 racks

B.

Expand the cluster to 48 nodes distributed evenly across 6 racks

C.

Expand the cluster to 60 nodes distributed evenly across 6 racks

D.

Expand the cluster to 40 nodes distributed evenly across 5 racks

In a Nutanix cluster, a Protection Domain contains 50 entities that are replicated to a remote Single Node Replication Target.

The current schedule configuration is as follows:

• Repeat every 6 hours

• Local Retention Policy 1

• Remote Retention Policy 8

• Starting time 12 am

At 8 am on Monday, the administrator discovers that a protected VM is corrupted. The latest good state was Sunday 2 pm. The administrator needs to maintain current protection.

Which strategy should the administrator use to meet these requirements?

A.

From the Remote site, activate the Protection Domain, then re-protect the entity.

B.

From the Remote site, restore the VM from the local snapshot by selecting the correct snapshot

C.

From the local site, retrieve the correct remote snapshot, then restore the VM locally.

D.

From the local site, restore the VM from the local snapshot by selecting the correct snapshot.

What is the minimum number of nodes required for a Nutanix Cluster to support Replication Factor 3 (RF3) on a storage container?

A.

3

B.

4

C.

5

D.

6

After installation, network ports are properly configured with the default active-backup bonding. One 10GbE port goes to switch 1, and another 10GbE port goes to switch 2.

A consultant tests failover by manually disconnecting one of the cables and notices it is taking too much time to failover, which is causing excessive packet loss.

What should be enabled to resolve this issue?

A.

Jumbo frames

B.

PAGP

C.

LACP on switch

D.

Spanning-tree PortFast

An administrator is deploying an application using Nutanix Volumes. After configuring the volume group and connecting the guest's iSCSI initiator to the volume group, they begin performance testing.

The administrator learns that performance on the virtual disk attached to the iSCSI initiator is far less than that of a virtual disk connected directly to the VM.

Which situation is causing this condition?

A.

The VM's iSCSI traffic is being routed to the data services IP subnet

B.

The performance test is generating small block random 10.

C.

The duster data services IP address is a bottleneck, shared with other iSCSI traffic

D.

Data Locality ensures that VM attached disks are always faster than iSCSI volumes.

An administrator recently added VLAN 205 CRM in Prism Element. The workloads attached to the associated NICs are unable to establish network connectivity.

Which Layer 2 protocol allows the administrator to troubleshoot this issue from Prism Element?

A.

HDLC

B.

SUP

C.

LACP

D.

LLDP

During a pre-engagement call, a customer explains that network cables are missing from the boxes. The consultant examines the bill of materials more closely to verify the quantity and type required by the hardware. The rack is already equipped with one OOBM Ethernet switch and two 10GbE SFP+ ToR switches.

Which cables should the consultant recommend to the customer for implementing in this scenario?

A.

Six Ethernet Cat7 cables

B.

Six DAC 10GbE cables and 3 Ethernet cables

C.

Six lOGbE cables

D.

Three DAC 10GbE cables and 3 Ethernet cables

An administrator needs to maximize storage potential in a six-node cluster. The container is configured with the following:

    Post-process compression

    Capacity deduplication

What should the administrator configure to increase space savings?

A.

Erasure coding

B.

Inline compression

C.

Reserve capacity

D.

Cache dedupe

According to Nutanix best practices, which interface configuration should be used when setting up the default bond?

A.

One 10G uplink only

B.

10G uplinks only or 25G uplinks only

C.

One 10G uplink paired with one 25G uplink

D.

One 1G uplink paired with one 10G uplink

A consultant is using a customer’s switch for installation. Although the 10GbE ports for each of the hosts are connected to the switch, the nodes fail to be discovered.

What is causing the issue?

A.

IPv6 is not enabled on the switch.

B.

IPMI port is not plugged in.

C.

Foundation VM is running on a Windows host.

D.

10GbE ports are configured with the incorrect duplex setting.

A customer buys ultimate licensing and wants to use the built-in Nutanix software encryption on their new AHV cluster. The customer needs to create three storage containers and asks the consultant to complete the process as fast as possible.

In which order should the cluster be deployed?

A.

Create Cluster -> Install License Key -> Encrypt Cluster -> Create Storage Containers

B.

Create Cluster -> Install License Key -> Create Storage Containers -> Encrypt Cluster

C.

Create Cluster -> Encrypt Cluster -> Install License Key -> Create Storage Containers

D.

Create Cluster -> Create Storage Containers -> Encrypt Cluster -> Install License Key

A systems administrator configures a protection domain replication between two Nutanix clusters. After the first successful replication , the administrator tests DR by clicking activate on the remote cluster.

While VMs are active on the remote cluster, the protection domain is marked as active on both clusters.

What steps are required to return both clusters to their original state?

A.

1. On the remote site, deactivate the Protection Domain using ncli

2. On the primary site, select the Protection Domain and dick migrate

B.

1. On the remote site, promote the Protection Domain

2. On the primary site, change the Protection Domain state from Decoupled to Disabled

3 Enable the original primary site as remote site

C.

1. On the prima7 site, suspend replications

2. On the remote site, deactivate the Protection Domain using ncli

3. On the remote site, migrate the protection domain back to the primary site

D.

1 On the remote site, restore the snapshots from the Protection Domain

2. On the remote site, select the Protection Domain and migrate to the primary site

An administrator finds that home shares cannot be configured in a new Files 3.5 deployment. Why is this happening?

A.

NFS default access is set to Read Only.

B.

Multi-protocol access is not configured.

C.

Access Based Enumeration is not enabled.

D.

The system is deployed as a single FSVM.

An administrator receives reports about a Nutanix environment. The investigation finds the following;

• VMs are experiencing very high latency

• Each node is equipped with a single SSD, utilized at 95%

• Each node is equipped with three HDDs, utilized at 40%

Why are the guest VMs experiencing high latency?

A.

CVMs are overwhelmed by disk balancing operations.

B.

All VM write operations are going to HDD.

C.

All VM read operations are coming from HDD.

D.

VMs are unable to perform write operations.

An administrator migrates a VM onto a new Nutanix cluster. After the migration, the administrator observes the following conditions:

• Cluster memory utilization: 64%

• Cluster CPU utilization: 19%

• Cluster storage utilization: 32%

• Average VM CPU utilization: 25%

• Average VM CPU ready%: 24%

• Average VM memory utilization: 60%

Which two changes should the administrator make to improve VM performance? (Choose two.)

A.

Add more memory to the VMs.

B.

Reduce the number of vCPUs assigned to VMs.

C.

Replace high core count CPUs with high clock rate CPUs. (also can be but is physical invas)

D.

Reduce the number of VMs on the hosts.

A VM is exhibiting one or more of the following baseline values based on the past 30 days:

• CPU usage < 20%

• CPU ready time < 5%

• Memory usage < 50% (moderately) or < 20% (severely)

• Memory swap rate = 0 Kbps

Which type of VM is being described?

A.

Constrained VM

B.

Inactive VM

C.

Bully VM

D.

Over-Provisioned VM

A consultant is planning an installation and needs to collect configuration items to be used during the install. The data needed from the customer are IP addresses, Gateway, DNS servers, and NTP Servers.

Which Cluster Deployment document must be completed with the customer?

A.

Project Plan

B.

Operations Guide

C.

Questionnaire

D.

Technical Checklist

The following alert appears on the file server alerts tab in the file server dashboard:

Which two events can generate this alert? (choose two)

A.

A three-node duster hosting the file server is undergoing AOS upgrade.

B.

A node failed in a three-node cluster.

C.

A Nutanix file with four hie server VMs is deployed on a three-node duster.

D.

A node is set to the maintenance mode in a three node cluster.

Page: 4 / 5
Total 309 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved