Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

NCA-6.5 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

NCA-6.5 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Nutanix Certified Associate (NCA) v6.5 exam
  • Last Update: Apr 23, 2024
  • Questions and Answers: 133
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

NCA-6.5 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

NCA-6.5 Practice Exam Questions with Answers Nutanix Certified Associate (NCA) v6.5 exam Certification

Question # 6

An administrator needs to upgrade AOS for an air gapped cluster by using Prism Element.

Which two actions allow the administrator to perform the upgrade? Choose Two

A.

Extract the AOS binaries to the CVM

B.

Manually Upload Binaries to a local http server

C.

Manually Upload AOS binaries and metadata

D.

Use the LCM dark site Option Providing AOS Binaries

Full Access
Question # 7

Which feature in Pulse helps secure a customer's private information?

A.

Security Central

B.

Cluster Lockdown

C.

Data-at-rest Encryption

D.

Data Obfuscation

Full Access
Question # 8

What is the maximum jumbo frame MTU supported by host network interfaces and Guest VMs?

A.

1500 bytes

B.

2048 bytes

C.

9000 bytes

D.

4096 bytes

Full Access
Question # 9

On which Prism Element dashboard can an administrator identify that a node is in maintenance mode prior to an LCM upgrade?

A.

Settings

B.

Hardware

C.

Alerts

D.

Analysis

Full Access
Question # 10

Refer to the exhibit.

NCA-6.5 question answer

An administrator has configured Prism Central to email daily digests of alerts on a cluster. After a week, the administrator notices that digests are not being received.

What is the most likely cause of the issue?

A.

The recipient address is no" registered with Nutanix.

B.

Nutanix support is not enabled as a recipient.

C.

The tunnel connection has not been enabled.

D.

The SMTP server is not configured properly.

Full Access
Question # 11

An administrator needs to create a new chart to analyze GPU usage.

Which entity should be added to the chart?

A.

Cluster

B.

Virtual Machine

C.

GPU

D.

Host

Full Access
Question # 12

What is Hyperconverged Infrastructure (HO)?

A.

Consist of separate servers, storage networks and storage arrays.

B.

Consist of a combination of separate servers, storage and networks.

C.

A combination of servers and storage into a distributed infrastructure platform.

D.

A combination of servers and storage into a non-distributed infrastructure platform.

Full Access
Question # 13

Which Nutanix storage service can store Petabytes of unstructured data and supports S3 APIs?

A.

DSF

B.

Files

C.

Volumes

D.

Objects

Full Access
Question # 14

Refer to the exhibit.

NCA-6.5 question answer

A team member has built a CentOS VM image for use as a template. An administrator deploys a new VM using the CentOS image as the 05 drive. No other drives are presented to the VM.

Following the deployment, the administrator attempts to boot the VM, but is unsuccessful.

What could be causing this issue?

A.

The VMS Boot Priority must reference disk first before CD-ROW

B.

The VM's Disk (scsi.O) setting must be set to make this disk bootable

C.

No Volume Groups have been created for the VM

D.

The CentOS VM image was built with UEF:

Full Access
Question # 15

An Administrator wants to copy some virtual machine disk files to ADSF from an external VMware ESXI Host.

Which two action should the administrator take to complete this task? choose two

A.

Enable CHAP on Volume Group

B.

Mount container as NFS on External host

C.

Configure Whitelist on container

D.

Configure Volume Group

Full Access
Question # 16

A company's security team has requested that all IT resources be hardened.

What should an administrator do to increase the security of the Nutanix environment?

A.

Enable Cluster Lockdown

B.

Enable Prism Central KMS

C.

Enable Flow

D.

Enable STIG

Full Access
Question # 17

When should Pulse be disabled?

A.

When the cluster is connected to the Internet with less than 1GbE.

B.

When the cluster is deployed in 3 dark-site.

C.

Before any cluster maintenance activities requiring node reboots.

D.

Only under the guidance of Nutanix Support.

Full Access
Question # 18

What is the biggest benefit of the Redfish Protocol and LCM?

A.

HBA and NIC card update twice as quickly

B.

AOS and AHV update twice as quickly

C.

BMC and BIOS update twice as quickly

D.

SSD and HDD update twice as quickly

Full Access
Question # 19

An administrator has received the following critical alert:

Node 192.168.148.172 is marked to be detached from metadata The administrator has opened a case with Nutanix and the support engineer has requested more information about the error. Which two actions should the administrator take in the Health Check dashboard to collect the requested information? (Choose two.)

A.

Create an Entity chart

B.

Open a remote support tunnel.

C.

Run the Log Collector

D.

Run the Nutanix Cluster Check

Full Access
Question # 20

Which cluster configuration is LCM unable to perform firmware upgrades against?

A.

Five-node

B.

Three-node

C.

Two - node

D.

Single—node

Full Access
Question # 21

What is Nutanix's scale-out storage technology that makes its hyperconverged platform possible?

A.

Distributed File Services

B.

Distributed Storage Fabric

C.

HDD/SDD Storage Tiers

D.

Hot swappable NVMe/SSD

Full Access
Question # 22

Where can an administrator find information about the Cluster Runway?

A.

Prism Element Home Page

B.

Prism Element Analysis

C.

Prism Central Main Dashboard

D.

Prism Central Analysis

Full Access
Question # 23

Which VM-level feature ensures continuous availability of data?

A.

Replication Factor

B.

Data Locality

C.

Data Protection

D.

Deduplication

Full Access
Question # 24

Which Prism Central feature can map images to target clusters using categories?

A.

Image Replication Policies

B.

Image Placement Policies

C.

Protection Domain Policies

D.

Storage Policies

Full Access
Question # 25

An application owner had reported that an AHV-based critical application VM is performing very slowly. After initial diagnostics, it has been observed that the CPU utilization is significantly higher than normal.

What two actions should the administrator take on this VM without shutting it down? (Choose two.)

A.

Increase number of vCPU in Prism Element

B.

Configure additional cores in acli

C.

Ensure CPU hot-add is supported by the Guest

D.

Use PrismElement to increase the number of cores

Full Access
Question # 26

An administrator needs to migrate a running VM's vDisks to another container without downtime.

Which tool should the administrator use to satisfy this task?

A.

aCLI

B.

Prism Element

C.

nCLI

D.

Prism Central

Full Access
Question # 27

Which Nutanix data efficiency mechanism replaces a traditional Replication Factor for suitable data?

A.

Compression

B.

Deduplication

C.

Erasure Coding

D.

Intelligent Cloning

Full Access
Question # 28

Which storage protocol is used to attach a container to an ESXi host?

A.

CIFS

B.

FCoE

C.

SMB

D.

NFS

Full Access
Question # 29

Refer to the exhibit.

NCA-6.5 question answer

What is true about the network uplink ports?

A.

One is connected at 1GbE and the other is 10GbE.

B.

They are configured in Active-Backup mode.

C.

All are connected, but only two are carrying traffic.

D.

They are configured in Active-Active mode.

Full Access
Question # 30

What is the effect of enabling Flash Mode?

A.

Sets the storage tier preference to HDD

B.

Sets the storage tier preference to SSD

C.

Sets the metadata tier preference to HDD

D.

Sets the metadata tier preference to SSD

Full Access
Question # 31

Which feature or configuration is best for securing network traffic between the management and storage replication environments?

A.

Use of Firewall Rules

B.

Network Segmentation

C.

VM Anti-Affinity Rules

D.

Different Storage Containers

Full Access
Question # 32

Which NIC-teaming configuration balances network traffic based on source/destination IP addresses and TCP/UDP ports?

A.

Active-Active with MAC Pinning

B.

Active-Active with LACP

C.

Active-Backup

D.

Active-Passive

Full Access
Question # 33

A New Project is Being rolled out to an AHV Cluter being monitored by prism Central , The Application team indicated that the application managed by the project is very memory intensive . The administrator wants to be notified about any memory constraints should they occour.

How would an administrator most effectively achieve this task?

A.

Create a new metric chart for the cluster and analyse hypervisor Memory Usage

B.

Search for the VM , then in the details page , go to metrics an select CPU usage.

C.

Create a Report to tracking the memory Usage

D.

Create a new alert policy for the memory Usage and set to critical after 80%.

Full Access
Question # 34

An administrator has defined a security policy that needs to be applied to dozens of VMs. What is the most efficient way the administrator can perform this?

A.

Within the policy, select all the VMs it should be applied to.

B.

Apply a category to the VMs. and associate the category with the policy.

C.

Apply the same label to all the VMs, then bind the policy to the label.

D.

Use a script to apply the policy to the defined VMs.

Full Access
Question # 35

An administrator notices that a VM is slow and unresponsive. The administrator wants to compare performance to other VMs on cluster.

Which chart type is best suited to display multiple VM performance metrics for diagnosis?

A.

Dashboard Chart

B.

Entity Chart

C.

Analysis Chart

D.

Metric Chart

Full Access
Question # 36

What data is stored as a file on storage devices owned by a CVM?

A.

Storage Pool

B.

vDisk

C.

Extent Group

D.

Container

Full Access
Question # 37

How is Prism Central deployed?

A.

As a SaaS offering

B.

As a Karbon container

C.

As a native cluster service

D.

As a virtual machine

Full Access
Question # 38

Which option allows administrators to specify groups of VMs and assign them to a destination for Disaster Recovery using Leap?

A.

Security Policies

B.

Protection Policies

C.

Recovery Plans

D.

Availability Zones

Full Access
Question # 39

Which feature enables Image Placement Policies to be mapped to target clusters?

A.

YAML

B.

Labels

C.

JSON

D.

Categories

Full Access