Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

NCP-CN Nutanix Certified Professional - Cloud Native (NCP-CN-6.10) Questions and Answers

Questions 4

A company has decided to expand NKP to features that require higher product tiers, like fleet-management and additional infrastructure providers. The company has already obtained the necessary licensing. Which action is required when adding and activating a license from NKP Starter to a higher-tier product?

Options:

A.

Contact Nutanix Support.

B.

Ensure that worker nodes are sized appropriately.

C.

Log out and log back in as a Global License Administrator.

D.

Regenerate the ACME-based certificate for NKP.

Buy Now
Questions 5

A Platform Engineer needs to create an NKP custom image for vSphere.

Which option should the engineer use?

Options:

A.

Konvoy Image Builder

B.

Nutanix Image Builder

C.

Hashicorp Packer

D.

RedHat Satellite

Buy Now
Questions 6

A company recently deployed NKP. A Platform Engineer was asked to attach the existing Amazon EKS. A workspace and project were created accordingly, and resource requirements were met. What does the engineer need to do first to prepare the EKS clusters?

Options:

A.

Configure a ConfigMap according to EKS configuration.

B.

Create a service account with cluster-admin permissions.

C.

Configure HAProxy to get connected to EKS clusters.

D.

Deploy cert-manager in the EKS clusters.

Buy Now
Questions 7

NKP cluster nodes require a disk for some of its deployed components, outside of an application’s persistent volume requirements. What are these components and where are they deployed?

Options:

A.

kubelet and containerd, in /opt/nkp

B.

kubelet and containerd in /var/lib

C.

kubectl and kubelet in /opt/nkp

D.

kubectl and kubelet in /var/nkp

Buy Now
Questions 8

A Kubernetes administrator needs to deploy a new Kubernetes cluster into a new workspace. This cluster requires a predictive analytics solution that detects current and future anomalies. Which option does the administrator need to deploy after the cluster is ready?

Options:

A.

NKP Insights

B.

NCM Intelligent Ops

C.

Nutanix Pulse

D.

NKP AI Navigator

Buy Now
Questions 9

A Platform Engineer is deploying NKP into a highly secure vSphere environment. The NKP cluster will be air-gapped, and must also be FIPS compliant. The OS platform to be used for NKP cluster nodes is RHEL.

What must the engineer do to properly prep an OS image and have it be deployed as a FIPS compliant NKP cluster node?

Options:

A.

Verify the OS itself has been placed in fips mode.

When performing the NKP image build operation, be sure to include the offline fips override.

When performing the NKP cluster deploy operation, be sure to include the FIPS version references for kubernetes and etcd.

B.

Verify the OS itself has been placed in fips mode.

When performing the NKP image build operation, be sure to include the offline fips and fips overrides.

When performing the NKP cluster deploy operation, be sure to include the FIPS version references for kubernetes and etcd.

C.

Verify the OS itself has been placed in fips mode.

When performing the NKP image build operation, be sure to include the offline fips and fips overrides.

When performing the NKP cluster deploy operation, be sure to include the FIPS version references for kubernetes, kubectl and etcd.

D.

Verify the OS itself has been placed in fips mode.

When performing the NKP cluster deploy operation, be sure to include the FIPS version references for kubernetes, kubectl and etcd.

Buy Now
Questions 10

In an effort to control cloud cost consumption, auto-scale is configured to meet demands as needed.

What is the behavior for when nodes are scaled down?

Options:

A.

Node is changed to a status of Hibernate.

B.

Node is CAPI deleted from its infrastructure provider, effectively removing it from its hypervisor.

C.

Node is changed to a status of Power-Off for stand-by.

D.

Node is paused in Kubernetes and the infrastructure continues to consume the resources at the current level.

Buy Now
Questions 11

A company has a new DevOps team that needs to be provided cloud native computing resources. This team will need to have access to multiple NKP clusters for development, testing and validation of an in-house application. However, they also need to be restricted to a specific namespace and a consistent level of access across the clusters within this namespace so that they do not adversely impact the environment of other user groups or the clusters themselves.

As a part of this consideration, the new team also needs to be limited to the amount of storage, CPU and memory they can consume on the clusters. A Platform Engineer has been tasked with providing the appropriate level of access to the team on these multiple NKP clusters.

How should the engineer best accomplish this task?

Options:

A.

1.Create an NKP project and assign the NKP clusters to it.

2.Create quotas for the NKP project.

3.Create an NKP group for the DevOps team.

4.Assign that NKP group the proper RBAC roles within that NKP project.

B.

1.Create an NKP workspace and assign the NKP clusters to it.

2.Create quotas for the NKP workspace.

3.Create an NKP group for the DevOps team.

4.Assign that NKP group the proper RBAC roles within that NKP workspace.

C.

1.Create an NKP group for the DevOps team.

2.Assign that NKP group the proper RBAC roles in the NKP UI.

3.Select the export to yaml option once the RBAC role assignment to that NKP group is complete.

4.Apply the exported manifest to each of the NKP clusters using kubectl.

D.

1.Enable Gatekeeper on the NKP clusters.

2.Create an NKP group for the DevOps team.

3.Assign Gatekeeper quota and authorization policies to that NKP group.

Buy Now
Questions 12

A company has been modernizing on cloud-native platforms for the past few years and has been running some small consumer support utilities on their production NKP cluster. After a thorough testing and QA cycle with simulated workloads on a development cluster, the company is ready to bring their online retail application into the fold. While they have sufficient system resources to scale the NKP cluster properly from a performance standpoint, they also want to ensure they properly scale their monitoring stack’s resource settings to retain a sufficient amount of data to see how overall system resource utilization trends for the NKP cluster over several months’ time with the added workloads. Which NKP Platform Application component should the company be most concerned with adjusting, and how should their Platform Engineer adjust it?

Options:

A.

Adjust the number of replicas for the Fluent Bit deployment, as well as increase the amount of storage available for use by the NKP cluster.

B.

Adjust the number of replicas for the Prometheus deployment, as well as increase the amount of storage available for use by the NKP cluster.

C.

Adjust the resource settings for Fluent Bit by increasing its container resource limits and memory settings, as well as its storage.

D.

Adjust the resource settings for Prometheus by increasing its container resource limits and memory settings, as well as its storage.

Buy Now
Questions 13

A Platform Engineer is deploying an NKP workload cluster using the nkp create cluster vsphere command. The cluster will be utilized by the company’s code-green team and the engineer has already created a code-green NKP workspace on the NKP management cluster.

After issuing the deploy command, the engineer monitored the build using the nkp describe cluster command and confirmed it completed successfully. However, a few hours later, after logging into the NKP UI, the engineer checked the code-green NKP workspace and saw that the NKP workload cluster was not there.

What is the likely reason the NKP workload cluster is not in the code-green NKP workspace?

Options:

A.

The vSphere cluster cannot be displayed in the NKP UI unless its Kubernetes version is within ‘N - 1’ versions of the NKP management cluster’s Kubernetes version.

B.

The vSphere service account credentials had expired prior to the engineer’s attempt to view the cluster in the NKP UI. Once the credentials are refreshed, the vSphere cluster will reappear in the NKP workspace.

C.

The engineer did not supply the --namespace code-green parameter as part of the nkp create cluster vsphere command, therefore it was created in the default workspace and needs to be manually attached.

D.

NKP vSphere clusters cannot be assigned NKP workspaces and instead are assigned the default NKP workspace. The cluster can be viewed from this workspace instead.

Buy Now
Questions 14

Refer to the exhibits.

A Cloud Administrator had provisioned a Kubernetes cluster named demo that is no longer actively being used. A Quick review from the Systems Engineer confirms that the following VMs are part of the demo Kubernetes cluster

How should the demo cluster be properly deleted?

Options:

A.

Run nkp delete cluster -c demo -n kommander-default-workspace

B.

Delete all the VMs and inform of the results.

C.

Run acli vm.delete demo* from a CVM.

D.

Run kubectl config delete-cluster demo -n kommander-default-workspace and delete the VMs.

Buy Now
Questions 15

A Platform Engineer is deploying a new Kubernetes application in Amazon Web Services (AWS) Elastic Container Service for Kubernetes (EKS) and Azure Kubernetes Service (AKS). The engineer’s team has decided to use a custom image instead of the default images provided by AWS or Azure for their clusters. What functionality will the engineer lose in both AWS EKS and Azure AKS by choosing to use a custom image?

Options:

A.

Native monitoring tools, logging, and alerting

B.

Cluster networking and load balancing

C.

Built-in autoscaling and security capabilities

D.

Ability to use GPUs and persistent storage

Buy Now
Questions 16

After creating the project, what should the administrator configure in order for the new software releases to automatically deploy to both environments?

Options:

A.

Continue Deployment (CD)

B.

Continue Integration (CI)

C.

Project Secrets

D.

Project ConfigMaps

Buy Now
Questions 17

A Platform Engineer has a requirement for backup and recovery and would like to leverage an Out-Of-The-Box solution distributed with NKP. What is the backup and recovery solution distributed for NKP?

Options:

A.

Tar

B.

Kasten

C.

Velero

D.

Nutanix Snapshot

Buy Now
Questions 18

A Platform Engineer has been tasked with backing up and restoring a production environment to ensure persistent data is available during a disaster at a primary site. What is recommended for backup and restore production use cases?

Options:

A.

Protection Domain

B.

Rook Ceph

C.

External Storage Class

D.

S3-compatible API

Buy Now
Questions 19

A dev team needed to optimize their logging system to be more robust, because the CPU and memory limits were insufficient, which caused delays in log collection and processing during times of high demand.

After a deep performance analysis, they decided to increase the CPU limits from 1 to 4 and the memory from 1000Mi to 4Gi.

Which ConfigMap should the development team run with custom resource requests and limit values for fluentd?

Options:

A.

bash

Copy

[nutanix@nkp-boot ~]$ cat < configmap.yaml

apiVersion v1

kind ConfigMap

metadata

name logging-operator-logging-overrides

namespace kommander

data

values.yaml |

fluentd

resources

limits

cpu 1

memory 1000Mi

requests

cpu 4

memory 4Gi

EOF

B.

bash

Copy

[nutanix@nkp-boot ~]$ cat < configmap.yaml

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-operator-logging-overrides

namespace: kommander

data:

values.yaml: |

fluentd:

resources:

limits:

cpu: 4

memory: 4Gi

requests:

cpu: 4

memory: 4Gi

EOF

C.

bash

Copy

[nutanix@nkp-boot ~]$ cat < configmap.yaml

apiVersion v1

kind ConfigMap

metadata

name logging-operator-logging-overrides

namespace kommander

data

values.yaml |

fluentd

resources

limits

cpu 4

EOF

values.yaml |

fluentd

resources

limits

cpu 4

memory 4Gi

requests

cpu 1

memory 1000Mi

D.

bash

Copy

[nutanix@nkp-boot ~]$ cat < configmap.yaml

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-operator-logging-overrides

namespace: kommander

data:

values.yaml: |

fluentd

resources

limits

cpu 4

memory 1000Mi

requests

cpu 1

memory 4Gi

EOF

Buy Now
Questions 20

A company has enabled auto-scaling within an NKP cluster. What is the behavior for auto-scaling?

Options:

A.

CPU is hot-added or hot-removed from a node.

B.

Memory is hot-added or hot-removed from a node.

C.

The Power-On Status/Mode of a node is changed to meet load conditions.

D.

Nodes will be CAPI-created or CAPI-deleted as needed by the cluster.

Buy Now
Questions 21

After a finished project, three Kubernetes clusters within a workspace were deleted, so the workspace is empty. Now a Platform Engineer needs to delete the workspace. How should the engineer delete the workspace in NKP?

Options:

A.

Run kubectl delete workspace

B.

Run kubectl delete workspace

C.

From NKP UI, on top menu bar select Global, then select Workspaces in the menu, select the three-dot button for the workspace to delete, and then click Delete.

D.

Ask a workspace user to delete the workspace. The user has the Delete option in their workspace home page.

Buy Now
Questions 22

A technology company has decided to migrate its infrastructure to NKP to improve the scalability and management of its applications. After a successful initial implementation, the operations team faces a new challenge of validating the HelmReleases to ensure that all applications are running correctly and avoid problems in production. Which command should the company execute to know the right status of their HelmReleases?

Options:

A.

kubectl get namespaces

B.

kubectl get helmreleases -n ${PROJECT_NAMESPACE}

C.

kubectl edit helmreleases -n ${PROJECT_NAMESPACE}

D.

kubectl apply -f fluent-bit-overrides.yaml

Buy Now
Questions 23

A DevOps team faces a growing challenge of managing logs from multiple applications in an NKP cluster. With several teams working on different projects, it is essential to implement a Multi-Tenant Logging system that allows each team to access their own logs securely and efficiently. Initially, two namespaces have been configured for each project, as shown in the exhibit. Then a ConfigMap has also been configured for each tenant, which contains the logging configuration. Which YAML output corresponds to a retention period of 30 days for tenant-innovation and seven days for tenant-analytics?

Options:

A.

yaml

CollapseWrap

Copy

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-innovation-config

namespace: tenant-innovation

data:

values.yaml: |

loki:

structuredConfig:

limits_config:

retention_period: 30d

---

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-analytics-config

namespace: tenant-analytics

data:<

B.

yaml

CollapseWrap

Copy

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-innovation-config

namespace: tenant-innovation

data:

values.yaml: |

loki:

structuredConfig:

limits_config:

retention_period: 30d

---

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-analytics-config

namespace: tenant-innovation

data:

C.

yaml

CollapseWrap

Copy

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-innovation-config

namespace: tenant-innovation

data:

values.yaml: |

loki:

structuredConfig:

limits_config:

retention_period: 30h

---

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-analytics-config

namespace: tenant-analytics

data:<

D.

yaml

CollapseWrap

Copy

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-innovation-config

namespace: tenant

data:

values.yaml: |

loki:

structuredConfig:

limits_config:

retention_period: 30d

---

apiVersion: v1

kind: ConfigMap

metadata:

name: logging-analytics-config

namespace: tenant

data:

values.yaml: |<

Buy Now
Questions 24

NKP Starter is bundled with which entitlement?

Options:

A.

NCI Pro

B.

NCI Starter

C.

NCM Pro

D.

NCM Starter

Buy Now
Questions 25

A company was using a test application called temp-shop developed in the temp-ecommerce NKP Starter cluster. Now, the cluster has just been taking up valuable resources that could be used for other projects, so the development team has decided to remove it.

Before proceeding, they verified that they had the cluster configuration file temp-ecommerce.conf.

What command should the development team execute to delete the cluster with its nodes and application?

Options:

A.

nkp delete cluster --all

B.

nkp delete cluster --application-name=temp-shop --self-managed --kubeconfig=temp-ecommerce.conf

C.

nkp delete cluster --cluster-name=temp-ecommerce --self-managed --kubeconfig=temp-ecommerce.conf

D.

nkp delete cluster --cluster-name=temp-shop --self-managed --kubeconfig=temp-shop.conf

Buy Now
Questions 26

A company uses an Artifactory private registry for development. The NKP deployment must use this private registry since the Security Administrator has the firewall configured to reject connections to public container registries. The first task is to push the NKP bundle to this private registry.

What options should be used to push the NKP bundle to this private registry?

Options:

A.

--registry-mirror-url, --registry-mirror-username and --registry-mirror-password

B.

--mirror-url, --mirror-username and --mirror-password

C.

--registry-url, --registry-username and --registry-password

D.

--to-registry, --to-registry-username and --to-registry-password

Buy Now
Questions 27

A Platform Engineer is attaching existing Kubernetes clusters to NKP, but a particular Kubernetes Amazon EKS cluster is getting errors with application deployments. These errors are related to persistent volumes. What could be the issue, and what can the engineer do?

Options:

A.

The storage appliance is having issues. The storage engineer should be contacted to take a look.

B.

There is no compatible storage to be attached to the EKS cluster. Ask for compatible storage.

C.

There is no default StorageClass. Storage classes should be reviewed, and only one should be set as default.

D.

There could be a misconfiguration in the ConfigMap. It should be adjusted to NKP requirements.

Buy Now
Questions 28

Recently, the reliability of some developer platforms has been impacted by out-of-memory errors, causing pods to crash and then remain in a pending state. A Cloud Engineer has been tasked with collecting and reviewing centralized metrics across the various platform environments to identify differences between them and better understand what is causing these performance issues. What should the engineer do to address this request?

Options:

A.

Utilize Fluentd and Fluent Bit to collect and present centralized metrics on NKP attached and managed clusters. Then configure Thanos Query to monitor and send out alerts based on the metric thresholds that have been configured within it.

B.

Utilize Fluentd and Fluent Bit to collect and present centralized metrics on NKP attached and managed clusters. Then visualize these collected and centralized metrics in Grafana.

C.

Utilize Prometheus to collect and present centralized metrics on NKP attached and managed clusters. Then configure Thanos Query to monitor and send out alerts based on the metric thresholds that have been configured within it.

D.

Utilize Thanos to collect and present centralized metrics on NKP attached and managed clusters. Then visualize these collected and centralized metrics in Grafana.

Buy Now
Questions 29

A Platform Engineer is deploying an NKP cluster within an air-gapped AWS environment. However, after an infrastructure planning session with the network team, it’s been determined that the default CIDR block range that is used by pods on NKP clusters is already in use in their environment.

How can the engineer ensure there are no collisions between NKP pod traffic and the existing network using that subnet range?

Options:

A.

Because the environment is air-gapped, there will be no network traffic collision concerns and no adjustment needs to be made to the pod network CIDR block range.

B.

Create an NKP infrastructure provider for AWS in the NKP UI.

Select the Advanced Options button from the Network section of the Create Cluster page and specify a unique CIDR block range within the pod network field.

C.

Create the NKP cluster’s manifest using the nkp create cluster command set and include the pod CIDR block range parameter when generating the cluster manifest.

Deploy the NKP cluster manifest.

D.

Create an NKP infrastructure provider for AWS in the NKP UI.

When deploying the NKP cluster through the UI, specify a unique CIDR block range for the pod network field in the Network section of the Create Cluster page.

Buy Now
Questions 30

A Platform Engineer is deploying a new NKP cluster that has internet connectivity. Now, a Cloud Administrator and Security Administrator are discussing the security of communications between the NKP Kubernetes cluster and the container registry. The engineer proposes to have an on-prem private registry.

What is the most significant reason that the engineer should create a private registry instead of configuring a secure connection between the NKP cluster and Github (SaaS)?

Options:

A.

Private registry license is included with NKP.

B.

NKP requires specific registry versions.

C.

NKP cannot connect to public clouds.

D.

Private registry provides security and privacy.

Buy Now
Questions 31

When deploying an NKP cluster onto air-gapped, pre-provisioned servers, Konvoy Image Builder is utilized to prepare the servers to become NKP cluster nodes.

What does the konvoy-image upload command do as a part of this preparation process?

Options:

A.

The command is used to create a konvoy userid on the servers, as well as upload artifacts to them such as the container runtime, the OS bundle, and Kubernetes components.

B.

The command is used to upload OS hardening scripts to the server (must be client supplied).

C.

The command uploads artifacts to the servers such as the container runtime, the OS bundle, and Kubernetes components.

D.

The command uploads artifacts to the servers such as the container runtime, the OS bundle, and Kubernetes components, including optional OS hardening scripts (must be client supplied).

Buy Now
Questions 32

A development team is working on a new application that requires access to certain cluster resources. The team needs to ensure that they have limited permissions to avoid unauthorized changes in other environments. Among the tasks they will perform are the following:

    Deploy new versions of the application to their specific namespace.

    Scale deployments according to demand.

    View logs and metrics of their applications to monitor performance.When using the NKP GUI, what type of access should the team configure?

Options:

A.

NKP Role

B.

Cluster Role

C.

Cluster Admin

D.

Kommander Role

Buy Now
Exam Code: NCP-CN
Exam Name: Nutanix Certified Professional - Cloud Native (NCP-CN-6.10)
Last Update: Feb 2, 2026
Questions: 108
NCP-CN pdf

NCP-CN PDF

$25.5  $84.99
NCP-CN Engine

NCP-CN Testing Engine

$30  $99.99
NCP-CN PDF + Engine

NCP-CN PDF + Testing Engine

$40.5  $134.99