Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

NCA-6.5 Exam Dumps - Nutanix Certified Associate (NCA) v6.5 exam

Go to page:
Question # 25

How long does a Nutanix cluster’s Recycle Bin retain deleted vDisk and configuration data files?

A.

6 Hours

B.

12 Hours

C.

24 Hours

D.

48 Hours

Full Access
Question # 26

Which IP address can be used to directly access Prism Element?

A.

Foundation VM IP address

B.

IP address of any CVM in the cluster

C.

IP address of any Prism Central VM

D.

AHV host br0 IP address

Full Access
Question # 27

What requirement needs to be considered before configuring Replication Factor of 1 (RF1)?

A.

Application resiliency

B.

Hypervisor

C.

RAID configuration

D.

Node count

Full Access
Question # 28

An administrator has recently expanded the Nutanix cluster and noticed that NCC health checks and alerts for newly-added nodes are not being received via email.

What should administrator do to resolve this issue?

A.

Add CVM IP in SMTP Relay

B.

Configure SMTP

C.

Reboot Nutanix cluster

D.

Run NCC Health Check

Full Access
Question # 29

Which Nutanix data efficiency mechanism replaces a traditional Replication Factor for suitable data?

A.

Compression

B.

Deduplication

C.

Erasure Coding

D.

Intelligent Cloning

Full Access
Question # 30

What is the biggest benefit of the Redfish Protocol and LCM?

A.

HBA and NIC card update twice as quickly

B.

AOS and AHV update twice as quickly

C.

BMC and BIOS update twice as quickly

D.

SSD and HDD update twice as quickly

Full Access
Question # 31

What is the minimum cluster size for Redundancy Factor 3?

A.

3 nodes

B.

4 nodes

C.

5 nodes

D.

6 nodes

Full Access
Question # 32

An Administrator Wants a VM to Communicate with two Separate VLANs.

What steps should the administrator complete?

A.

Add a single NIC to the VM and Configure it for both VLANs

B.

Add two NICs to the VM and Configure one for each VLAN

C.

Turn on IPAM for autoconfiguration of VLANs

D.

Configure a security Policy to assign VLANs to the VM

Full Access
Go to page: