Nutanix NCS-CORE Exam
Nutanix Certified Services Core Infrastructure Professional (Page 5 )

Updated On: 26-Jan-2026

A consultant is onsite and needs to start their Foundation Virtual Machine (FVM) to image Nutanix hardware. The FVM fails to boot. The consultant decides to use a different Foundation method.

Assuming the nodes will discover, which Foundation type or configuration option should the consultant select?

  1. Foundation VM
  2. Use IPMI IPs
  3. Use IPMI MACs
  4. Foundation Applet

Answer(s): D



Refer to the exhibit.



An administrator creates a security policy that isolates their financial application from accessing the Internet When viewing the policy in Prism Central, several connections from the application are outbound to the Internet.

What is causing this issue with the policy?

  1. The 0.0.0.0 address was not specified in the outbound rule.
  2. The blockedconnections are illustrated for information only.
  3. The Activate box was not checked in the rule, so it is not enforcing.
  4. The policy has been left in monitor mode instead of enforcing mode.

Answer(s): D

Explanation:

https://portal.nutanix.com/page/documents/details?targetId=Prism-Central- Guide-Prism-v510:mul-security-policy-management-pc-c.html



HOTSPOT
A system administrator needs to shut down an AHV node in a Nutanix cluster without causing service disruption. The administrator checks data resiliency and verifies that the cluster can tolerate a node down.

Which three steps should the administrator perform next? (Choose three.)

  1. Please refer to Explanation below for the answer.

Answer(s): A

Explanation:



1 allow vms2 sd CVM3 sd node



A consultant creates a four-node AHV cluster with two 1GbE (eth0, etc1) and two 10GbE (eth2, eth3) NICs per node. The 1GbE NICs will not be placed into service, but the customer wants the network to be preconfigured for their eventual use.

The consultant removes the 1GbE NIC from the default bond and creates a second bridge(br1), but is unable to add the 1GbE NIC using the below command:

manage_ovs ­bridge_name br1 ­interfaces 1g ­bond_name br1-up update_uplinks

Which parameter is missing from this command?

  1. --bond_duplex full
  2. --require_link=false
  3. --interfaces eth0
  4. --bridge_duplex full

Answer(s): C



An administrator learns that some security settings in a cluster have been changed. The environment is out ofcompliance with required policies.

Which function should be used to revert any settings that have changed from the defaults and prevent further violations?

  1. Cluster Lockdown with strong password enforcement
  2. Advanced Intrusion Detection Environment (AIDE)
  3. Security Configuration Management Automation (SCMA)
  4. Defense Information Systems Agency STIG enforcement

Answer(s): C

Explanation:

http://myvirtualcloud.net/nutanix-scma-the-security-feature-that-could- save-your-organization/



Viewing page 5 of 40
Viewing questions 21 - 25 out of 302 questions



Post your Comments and Discuss Nutanix NCS-CORE exam prep with other Community members:

Join the NCS-CORE Discussion