Month End Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Nutanix NCP-CN - Nutanix Certified Professional - Cloud Native (NCP-CN-6.10)

Page: 1 / 4
Total 108 questions

A Cloud Engineer manages an NKP environment and is preparing a machine image to become an NKP cluster node.

Which statement is regarding the default node preparation process?

A.

Shell scripts are used to harden the OS image for use as an NKP node.

B.

Ansible is used to validate the OS image is capable of running NKP.

C.

Goss is used to make the OS image CAPI compliant for use as an NKP node.

D.

Goss is used to validate the OS image is capable of running NKP.

A Platform Engineer will be deploying an NKP cluster in a dark site with no Internet access. The Cloud Administrator has provided a Linux VM for this purpose, so the engineer needs to prepare this VM to be used as a bastion host. Which two actions should the engineer take to complete this task? (Choose two.)

A.

Install LDAP Server.

B.

Get or create SSH Keys.

C.

Install Docker.

D.

Enable NTP Service.

A Platform Engineer needs to create an NKP cluster on vSphere infrastructure, using the vSphere provisioning method. The cluster needs to have 3 worker node pools:

    First node pool should consist of 6 worker nodes

    Second node pool should consist of 3 worker nodes

    Third node pool should consist of 3 worker nodesAdditionally, the worker nodes in the first node pool should be set to 10 CPUs, the second node pool workers should be set to 8 CPUs, and the third node pool workers should be set to 6 CPUs. What is the proper way to create the NKP cluster using the NKP CLI?

A.

First, execute the nkp create cluster vsphere command, including the following parameters:

--worker-replicas 6

--worker-cpus 10

Then, execute the nkp create nodepool vsphere command, including the following parameters:

--worker-replicas 3

--worker-cpus 8

Then, execute the nkp create nodepool vsphere command, including the following parameters:

--worker-replicas 3

--worker-cpus 6

B.

First, execute the nkp create cluster vsphere command, including the following parameters:

--worker-replicas 6

--worker-cpus 10

Then, execute the nkp create nodepool vsphere command, including the following parameters:

--replicas 3

--cpus 6

C.

When executing the nkp create cluster vsphere command, include the following parameters:

--node-pools 3

--worker-replicas 6,3,3

--worker-cpus 10,8,6

D.

First, execute the nkp create cluster vsphere command, including the following parameters:

--worker-replicas 6

--worker-cpus 10

Then, execute the nkp create nodepools vsphere command, including the following parameters:

--replicas 3,3

--cpus 8,6

A Cloud Engineer is deploying an NKP management cluster and plans to deploy multiple NKP workload clusters from it. The management cluster will be on Nutanix infrastructure, but the NKP workload clusters may be deployed in multiple provisioning environments, such as:

    Nutanix

    AWS

    AzureWhen the engineer deploys an NKP workload cluster in AWS, which two default behaviors will be performed by NKP on this newly-deployed cluster? (Choose two.)

A.

The NKP workload cluster will receive all of the GitOps sources that have been assigned to the NKP workspace.

B.

The NKP workload cluster will receive all of the NKP RBAC policy that has been assigned to this NKP workspace.

C.

The NKP workload cluster will also be assigned to all of the NKP projects that have been created within the NKP workspace.

D.

The NKP workload cluster will be deployed all of the applications that have been enabled on this NKP workspace.

A development Kubernetes cluster deployed with NKP is having performance issues. The Cloud Engineer commented that worker VMs are consuming a lot of CPU and RAM. The Platform Engineer took a look at the CPU and RAM statistics with Grafana and confirmed that the worker VMs are running out of CPU and memory. The Kubernetes cluster has 4 workers with 8 vCPUs and 32 GB RAM. What could the Platform Engineer do?

A.

Call tech support to take a look at the infrastructure and investigate.

B.

Ask developers to lower the number of application replicas.

C.

Add more CPU and memory to workers with nkp scale --cpu 16 --memory 64 --cluster-name ${CLUSTER_NAME}

D.

Add one more worker with nkp scale nodepools ${NODEPOOL_NAME} --replicas=5 --cluster-name=${CLUSTER_NAME} -n ${CLUSTER_WORKSPACE}

A company was using a test application called temp-shop developed in the temp-ecommerce NKP Starter cluster. Now, the cluster has just been taking up valuable resources that could be used for other projects, so the development team has decided to remove it.

Before proceeding, they verified that they had the cluster configuration file temp-ecommerce.conf.

What command should the development team execute to delete the cluster with its nodes and application?

A.

nkp delete cluster --all

B.

nkp delete cluster --application-name=temp-shop --self-managed --kubeconfig=temp-ecommerce.conf

C.

nkp delete cluster --cluster-name=temp-ecommerce --self-managed --kubeconfig=temp-ecommerce.conf

D.

nkp delete cluster --cluster-name=temp-shop --self-managed --kubeconfig=temp-shop.conf

Refer to the exhibits.

A Cloud Administrator had provisioned a Kubernetes cluster named demo that is no longer actively being used. A Quick review from the Systems Engineer confirms that the following VMs are part of the demo Kubernetes cluster

How should the demo cluster be properly deleted?

A.

Run nkp delete cluster -c demo -n kommander-default-workspace

B.

Delete all the VMs and inform of the results.

C.

Run acli vm.delete demo* from a CVM.

D.

Run kubectl config delete-cluster demo -n kommander-default-workspace and delete the VMs.

Which procedure should a Platform Engineer follow for setting up user authentication into an NKP cluster?

A.

Enable Gatekeeper and create a connector to the user base’s identity provider.

B.

Disable native NKP authentication, enable Traefik, and create a connector to the user base’s identity provider.

C.

Create a MetalLB connector to the user base’s identity provider.

D.

Create a Dex connector to the user base’s identity provider.

A development team has decided to implement an efficient logging system and use AWS S3 as storage to manage large volumes of logs in a scalable way.

The team followed these steps:

    Set the WORKSPACE_NAMESPACE variable to the namespace copied in the previous step.

    Created a config that overrode ConfigMap to update the storage configuration.

    Updated the grafana-loki AppDeployment to apply the configuration override.However the implementation failed.What should the team do to be able to manage log storage in AWS?

A.

Configure an IP address corresponding to AWS storage.

B.

Create a secret containing the static AWS S3 credentials.

C.

Create a tenant on AWS.

D.

Configure a new IAM role specifically for NKP.

Refer to Exhibit:

Using an NKP Ultimate license, a Platform Engineer has created a new workspace and needs to create a new Kubernetes cluster within this workspace. However, the engineer discovers that the Create Cluster option is grayed out, as shown in the exhibit. How should the engineer resolve this issue?

A.

Create the cluster only using YAML and not the GUI.

B.

Attach existing clusters instead of creating a new cluster.

C.

Create an Infrastructure provider for the workspace.

D.

Ensure NKP is upgraded to a minimum version of 2.12.