0% found this document useful (0 votes)
261 views23 pages

NCP-US-6.5 Final

Uploaded by

tareq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
261 views23 pages

NCP-US-6.5 Final

Uploaded by

tareq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

1. An administrator want to provide security against ransomware attacks in Files .

The administrator
wants to configure the environment to scan files for ransomware in real time and provide notification in
the event of ransomware.
Which component should the administrator use to meet this requirement? Which component should
the administrator use to meet this requirement?

1. File Analytics
2. Syslog Server
3. Files Console
4. Protection Domain

Ans : Option-A

2. An organization currently has a Files cluster for their back-office data including all department shares.
Most of the data is considered Caid Data and they are looking to migrate to free up space for future
growth or newer data.

The organization has recently added an additional node with more storage. In addition, the organization
is using the Public Cloud for other storage needs.
What will be the best way to achieve this requirement?

1. Migrate cold data from Files to tape storage.


2. Backup the data using a third - party software and replicate to the cloud.
3. Setup another cluster and replicate the data with Protection Domain.
4. Enable Smart Tiering in Files within the File Console.

Ans : Option-D

3. An administrator has received an alert A130370 VgSyncRepContainerNotFound details of alert as


follows

A110370 VgSyncRepContainerNotFound

Block Serial Number : 165MXXXXXXXXXXXXXX

alert time : Thu Jan 19 2023 20:15:10 GMT - 0800 ( PST )

alert type : VgSyncRepContainer Not Found

alert msg : A130370 : Failed to replicate the Volume Group : ( volume_group_name ) ' synchronously
since ' ( details )

cluster id : xxxxx

alert body : No Alert Body Available


What is the cause of the alert that needs to be addressed to allow successful synchronous protection of
the Volume Group ?

Ans:
4. An administrator needs to protect a Files cluster with unique policies for different shares. How should
the administrator meet this requirement?

1. Create a protection domain in the Data Protection view in Prism Element.


2. Configure data protection polices in File Server view in Prism Element.
3. Create a protection domain in the Data Protection view in Prism Central.
4. Configure data protection polices in the Files view in Prism Central.

Ans: Option-C

5. Deploying Files instances require which two minimum resources? (Choose two)

1. 12 GiB of memory per host


2. 8 vCPUs per host
3. 8 GiB of memory per host
4. 4 vCPUs per host

Ans: Option C & D

6. An administrator has performed an upgrade to Files. After upgrading, the file server cannot reach the
given domain name with the specified DNS server list.
Which two steps should the administrator perform to resolve the connectivity issues with the domain
controller servers? (Choose two)

1. Verify the DNS settings in Prism Element.


2. Verify the DNS entries for the given domain name.
3. Verify the DNS settings in Prism Central.
4. Verify the DNS server addresses of the domain controllers.

Ans: Option B & D

7. Which configuration is required for an Objects deployment?

1. Configure Domain Controllers on both Prism Element and Prism Central.


2. Configure VPC on both Prism Element and Prism Central.
3. Configure a dedicated storage container on Prism Element or Prism Central.
4. Configure NTP servers on both Prism Element and Prism Central.

Ans: Option-D
8. A team of developers are working on a new processing application and requires a solution where they
can upload the latest code for testing via API calls. Older iterations should be retained as newer code is
developed and tested.

Which solution will work best for the development team?

1. Create an SMB Share with Files and enable Previous Version.


2. Provision a Volume Group and connect via iSCSI with MPIO.
3. Create an NFS Share, mounted on a Linux Server with Files .
4. Create a bucket in Objects with Versioning enabled.

Ans: Option-D

9. An organization deployed Files in multiple sites, including different geographical locations across the
globe. The organization has the following requirements to improves their data management lifecycle:
• Provide a centralized management solution.

• Automate archiving tier policies for compliance purposes.

• Protect the data against ransomware.

Which solution will satisfy the organization's requirements?

1. Prism Central
2. Data Lens
3. Files Analytics

Ans: Option-A

10. Which Nutanix Unified Storage capability allows for monitoring usage for all Files deployments
globally?

1. File Analytics
2. Nutanix Cloud Manager
3. Files Manager
4. Data Lens

Ans: Option-A
11. An administrator created a bucket for an upcoming project where internal users as well as an outside
consultant will Object Browser. The administrator needs to provide both internal and consultant access
to the same bucket.
The organization would like to prevent internal access to the consultant, based on their security policy.

Which two items are require to fulfill this requirement? (Choose two.)

1. Configure Directory Services under the Access Keys section.


2. Generate access keys based on directory and email - based users.
3. Install third - party software for bucket access to all users.
4. Generate access keys using third - party software.

Ans: Option A & B

12. Which two prerequisites are needed when deploying Objects to a Nutanix cluster? (Choose two.)

1. Microsegmentation is enabled.
2. Data Services IP is configured on the PE.
3. DNS is configured on PE.
4. AHV IPAM is disabled on the VLAN used for Objects.

Ans: Option B & C

13. How many configured snapshots are supported for SSR in a file server?

1. 25
2. 50
3. 100
4. 200

Ans: Option-C

14. An administrator has deployed a new Files cluster within a Windows environment.

After some days, the Files environment is not able to synchronize users with the Active Directory server
anymore. The administrator observes a large time difference between the Files environment and the
Active Directory server that is responsible for the behavior.

How should the administrator prevent the Files environment and the AD Server from having such a time
difference in future?

1. Use the same NTP Servers for the Files environment and the AD Server.
2. Use 0.pool.ntp.org as the NTP Server for the AD Server.
3. Use 0.pool.ntp.org as the NTP Server for the Files environment.
4. Connect to every FSVM and edit the time manually.

Ans: Option-A
15. Which action is required to allow the deletion of file server audit data in Data Lens?

1. Enable the File Server.


2. Disable the File Server.
3. Update the data retention period.
4. Configure the audit trail target.

Ans: Option-C

16. Which metric is utilized when sizing a Files deployment based on performance requirements?

1. Quantity of SMB shares


2. SMB concurrent connections
3. NFS concurrent connections
4. Quantity of NFS

exports Ans: Option-B

17. An administrator is required to place all iSCSI traffic on an isolated network.

How can the administrator meet this requirement?

1. Create a new network interface on the CVMs via ncli.


2. Create a Volumes network in Prism Central.
3. Configure network segmentation for Volumes.
4. Configure the Data Services IP on an isolated network.

Ans: Option-C

18. An administrator is upgrading Files from version 3.7 to 4.1 in the highly secured environment, the pre
- upgrade check fails with below error:
FileServer preupgrade check failed with cause (s) Sub task poll timed out

What initial troubleshooting step should the administrator take?

1. Examine the failed tasks on the FSVMs.


2. Check there is enough disk space on FSVMs.
3. Verify connectivity between the FSVMs.
4. Increase upgrades timeout from ecli.

Ans: Option-A

19. An administrator has received an alert A160068 - AFSDuplicate IPDetected details of alert as follows

Block Serial Number: 165MXXXXXXXXXXXXXXX

alert_time : Thu Jan 19 2023 23:14:10 GMT - 0800 ( PST )


alert_type : AFSDuplicateIPDetected

alert_msg : A160068 : Duplicate IP address detected for a file server VMs for ( file_server_name ) . Error
Message

cluster_id : xxxxxxxx

alert body: No Alert Body Available

Which error log should the administrator review to determine the related Duplicate IP address involved?

1. tcpkill.log
2. minerva_cvm.log
3. solver.log
4. minerva_nvm.log

Ans: Option-B

20. What is the binary image extension of File Analytics ?

1. JSON
2. QCOW2
3. ISO
4. VMDK

Ans: Option-B

21. The administrator needs to review the following graphs, as displayed in the exhibit:
 Storage Used
 Open Connections
 Number of Files
 Top Shares by Current Capacity
 Top Shares by Current Connections

Where should the administrator complete this action?

1. Files Console Shares View


2. Files Console Data Management View
3. Files Console Monitoring View
4. Files Console Dashboard

View Ans: Option-D


22. An administrator is tasked with deploying a Microsoft Server Failover Cluster for a critical application
that uses shared storage.
The failover cluster instance will consist of VMs running on an AHV - hosted cluster and bare metal
servers for maximum resiliency.

What should the administrator do to satisfy this requirement?

1. Create a Bucket with Objects.


2. Provision a Volume Group with Volumes.
3. Create an SMB Share with Files.
4. Provision a new Storage Container.

Ans: Option-B

23. What is the primary criteria that should be considered for performance - sensitive application shares
with sequential I/O?
1. IOPS
2. Connections
3. Block size
4. Throughput

Ans: Option-D

24. Which two steps are required for enabling Data Lens? (Choose two.)

1. In Prism, enable Pulse health monitoring.


2. Configure a MyNutanix account to access the Data Lens console.
3. Add File Services VM admin credentials to a MyNutanix account.
4. Configure the Data Services IP in Prism Central.

Ans: Option B & C

25. An administrator has received an alert A130358 - ConsistencyGroupWithStaleEntities details of alert


as follows.
Block Serial Number: 16SMXXXXXXXXXX

alert time : Thu Jan 19 2023 21:56:10 GMT - 0800 ( PST )

alert type : ConsistencyGroupWithStaleEntities

alert asg : A130358 :

ConsistencyGroupWithStaleEntities cluster_id : xxxxx

alert_body : No alert body available .


Which scenario is causing the alert and needs to be addressed to allow the entities to be protected ?

1. One or more VMs or Volume Groups belonging to the Consistency Group is part
of multiple Recovery Plans configured with a Witness.
2. One or more VMs or Volume Groups belonging to the Consistency Group may have
been deleted.
3. The logical timestamp for one or more of the Volume Groups is not consistent
between dusters.
4. One or more VMs or Volume Groups belonging to the Consistency Group contains stale
metadata.

Ans: Option-B

26. Which Data Lens feature maximizes the available file server space by moving cold data from the file
server to an object store?
1. Backup
2. Versioning
3. Smart Tier
4. Smart DR
Ans: Option-C

27. An administrator is trying to create a Distributed Share, but the Use Distributed Share / Export type
instead of Standard option is not present when creating the share.
What is most likely the cause for this?

1. The file server does not have the correct license.


2. The cluster only has three nodes.
3. The file server resides on a single node cluster.
4. The cluster is configured with hybrid storage.

Ans: option-C

28. An administrator is tasked with performing an upgrade to the latest Objects version.
What should the administrator do prior to upgrading Objects Manager?

1. Upgrade Lifecycle Manager


2. Upgrade MSP
3. Upgrade Objects service
4. Upgrade

AOS Ans: Option-A

29. Life Cycle Manager must have compatible versions of which two components before installing or
upgrading Files? (Choose two.)
1. Active Directory Services
2. Nutanix Cluster Check
3. File Server Module
4. Acropolis Operating System
Ans: Option C & D
30. An administrator has created a volume and needs to attach it to a Windows host via iSCSI. The Data
Services IP has been configured in the MS ISCSI Initiator, but no targets are visible.
What is most likely the cause of this issue?

1. The host's IP Address is not authorized to access the volume.


2. The CHAP password configured on the client is incorrect.
3. The CHAP Authentication has not been configured on the client.
4. The host's ION is not authorized to access the volume.

Ans: Option-C

31. Which ransomware prevention solution for Files is best when the list of malicious file signatures to
block is greater than 300?
1. Third - party solution
2. Flow Security Central
3. Data Lens
4. File Analytics

Ans: Option-A

32. An administrator has been asked to confirm the ability of a physical Windows Server 2019 host to
boot from storage on a Nutanix AOS cluster.
Which statement is true regarding this confirmation by the administrator?

1. Physical servers may boot from an object bucket from the data services IP and MPIO
is required.
2. Physical servers may boot from a volume group from the data services IP and MPIO is
not required.
3. Physical servers may boot from a volume group from the data services IP and MPIO
is required.
4. Physical servers may boot from an object bucket from the data services IP and MPIO is
not required.

Ans: Option-D

33. How can an administrator deploy a new instance of Files?

1. From LCM in Prism Central.


2. From LCM in Prism Element.
3. From the Storage view in Prism Element.
4. From the Files Console view in Prism Central.

Ans: Option-A

34. Which tool allows a report on file sizes to be automatically generated on a weekly basis?

1. Data Lens
2. Files view in Prism Central
3. Files Console via Prism Element
4. File Analytics

Ans: Option-D

35. What is a mandatory criteria for configuring Smart Tier?

1. VPC name
2. Target URL over HTTP
3. Certificate
4. Access and secret

keys Ans: Option-D

36. What is the minimum and maximum file size limitations for Smart Tiering?

1. 64 KiB minimum and 15 TiB maximum


2. 128 KiB minimum and 5 TiB maximum
3. 64 KiB minimum and 5 TiB maximum
4. 128 KiB minimum and 15 TiB

maximum Ans: Option-C

37. An administrator needs to allow individual users to restore files and folders hosted in Files. How can
the administrator meet this requirement?

1. Configure a Protection Domain for the shares / exports.


2. Configure a Protection Domain on the FSVMs.
3. Enable Self - Service Restore on shares / exports.
4. Enable Self - Service Restore on the FSVMs.

Ans: Option-C

38. A healthcare administrator configures a Nutanix cluster with the following requirements

 Enabled for long - term data retention of large files.


 Data should be kept for two years.
 Deletion or overwrite of the data must not be allowed.

Which Nutanix - enabled technology should the administrator employ to satisfy these requirements?

1. Files- Connected share


2. Files - Read - only share
3. Objects - WORM with versioning
4. Objects - Life Cycle

Policy Ans: Option-C


39. Immediately after creation, the administrator is asked to change the name of Objects store How will
the administrator achieve this request ?

1. Enable versioning and then rename the Objects store, disable versioning .
2. The Objects store can only be renamed if hosted on ESXi .
3. Delete and recreate a new Objects store with the updated name.
4. Update the name of the Objects store by using a CORS XML file.

Ans: Option-C

40. An organization currently has two Objects instances deployed between two sites. Both instances are
managed via the same Prism Central to simplify management.
The organization has a critical application with all data in a bucket that needs to be replicated to the
secondary site for DR purposes. The replication needs to be asynchronous, including all delete marker
versions.

How can the organization satisfy this requirement in Objects?

1. Create a Bucket replication rule, set the destination Objects instance.


2. With Object Browser, upload the data at the destination site.
3. Leverage the Objects Baseline Replication Tool from a Linux VM.
4. Use a Protection Domain to replicate the Objects Volume Group.

Ans: Option-D

41. An administrator is looking for a tool that includes these features:

• Permission Denials
 Top 5 Active Users
• Top 5 Accessed Files
• File Distribution by Type

Which Nutanix tool should the administrator choose?

1. File Server Manager


2. Prism Central
3. File Analytics
4. Files Console
Ans: Option-C
42. An administrator is tasked with creating an Objects store with the following settings:

• Medium Performance (around 10,000 requests per second) .


• 10 TiB capacity
• Versioning disabled.
• Hosted on an AHV cluster.

Immediately after creation, the administrator is asked to change the name of Objects store.

How will the administrator achieve this request?

1. Enable versioning and then rename the Objects store, disable versioning.
2. The Objects store can only be renamed if hosted on ESXi,

43. What tool can be used to report on a specific user's activity within a Files environment?

1. Prism Element Alerts menu


2. Prism Central Activity menu
3. Data Lens Audit Trails
4. Files Console Usage

Ans: Option-C
44. An administrator is planning to upgrade all ESXi hypervisors in a cluster hosting Files. When
performing one - click hypervisor upgrades, what prerequisite must be performed?

1. Enable the anti - affinity rules on all FSVMs.


2. Manually migrate the FSVMs.
3. Shutdown the FSVMs.
4. Disable the anti - affinity rules on all FSVMs.

Ans: Option-D

45. Which user is authorized to deploy File Analytics?

1. Prism Central administrator


2. AD user mapped to a Prism admin role.
3. Prism Element administrator
4. AD user mapped to a Cluster admin role.
Ans: Option-A
46. An administrator has performed an AOS upgrade, but noticed that the compression on containers is
not happening
What is the delay before compression begins on the Files container?
1. 0 minutes
2. 60 minutes
3. 12 hours
4. 24 hours

Ans: Option-D

47. An administrator wants to monitor their Files environment for suspicious activities, such as mass
deletions or access denials.
How can the administrator be alerted to such activities?

1. Configure Alerts & Events in the Files Console, filtering for Warning severity.
2. Deploy the Files Analytics VM and configure anomaly rules.
3. Configure Files to use ICAP servers, with monitors for desired activities.
4. Create a data protection policy in the Files view in Prism Central.

Ans: Option-B

48. What best describes the data protection illustrated in the exhibit?

1. Smart DR
2. Metro Availability
3. Availability Zones
4. NearSync

Ans: Option-B

49. A company uses Linux and Windows workstations. The administrator is evaluating solutions for their
file storage needs.
The solution should support these requirements:

• Distributed File System

• Active Directory integrated

• Scale out architecture


Which solution should the administrator choose to satisfy this requirement ?

1. Mine
2. Objects
3. Volumes
4. Files

Ans: Option-D
50. An administrator successfully installed Objects and was able to create a bucket.

When using the reference URL to access this Objects store, the administrator is unable to write data in
the bucket when using an Account Directory account.

Which action should the administrator take to resolve this issue?

1. Verify sharing policies at the bucket level.


2. Reset the Active Directory user password.
3. Replace SSL Certificates at the Objects store level.
4. Verify Access Keys for the user.
Ans: Option-A

51. An administrator has received an alert A130351- VolumeGroupProtectionFailed details of alert as


follows
Block Serial Number : 16SMXXXXXXXXXXXXXXXX

alert_time : Thu Jan 19 2023 21:23:10 GMT - 0800 ( PST )

alert_type : Volume Group Protection Failed .

alert msg : Failed to protect Volume Group : ( volume_group_name ) ' , because of ' ( reason ) " .
cluster_id : xxxxxx

alert_body : No Alert Body Available .

Which error logs should the administrator be reviewing to determine why the relative service is down ?
1. solver.log
2. arithmos . ERROR
Ans: Option-A

52. Which two platforms are currently supported for Smart Tiering? (Choose two.)
1. Google Cloud Storage
2. AWS Standard
3. Wasabi
4. Azure Blob
Ans: Option-A
53.

An organization is utilizing File Analytics to check for anomalies in a Nutanix cluster.


With the settings shown on the exhibit, if there were 1000 files in the repository , how many files would
have to be deleted to anomaly alert to the administrator ?

1.1
2.10
3.100
4.1000
Ans: Option-C

54. Which error logs should the administrator be reviewing to determine why the relative service is
down?

1. solver.log
2. arithmos.ERROR
3. cerebro . ERROR
4. tepkill.log

Ans: Option-C
55. What are two network requirements for a four - node FSVM deployment? (Choose two)
1. Four available IP addresses on the Storage network
2. Five available IP addresses on the Client network
3. Five available IP addresses on the Storage network
4. Four available IP addresses on the Client network.
Ans: Option-A

56.

An administrator is able to review and modify objects in a registered ESXi cluster from a PE instance , but
when the
57. An administrator is attempting to create a share that will provide user access via SMB and NFS.
However, the Enable multiprotocol access for NFS clients setting is not available. What would cause this
issue?

1. The connection to Active Directory has not been configured.


2. The File server instance was only configured with SMB.
3. The incorrect Files license has been applied.
4. NFS is configured to use unmanaged authentication.
Ans: Option-B

58.
Users are complaining about having to reconnect to a share when there are networking issues

Which Files feature should the administrator enable to ensure the sessions will auto - reconnect in such
events?
1. Durable File Handles
2. Multi - Protocol Shares
3. Connected Shares
4. Workload Optimization
Ans: Option-A

59. An administrator is able to review and modify objects in a registered ESXi cluster from a PE instance,
but when the administrator attempts to deploy an Objects cluster to the same ESXi cluster , the error that
is shown in the exhibit is shown.
What is the appropriate configuration to verify to allow successful Objects cluster deployment to this
ESXi cluster?
1. Ensure that vCenter in PE cluster is registered using FQDN and that vCenter details in Objects
UI are using FQDN .
2. Replace the expired self - signed SSL certificate for the Object Store with a non -
expired public certificate signed by a valid Certificate Authority .
3. Replace the expired self - signed SSL certificate for the Object Store with a non - expired
self signed SSL certificate .
4. Ensure that vCenter in PE cluster is registered using FQDN and that vCenter details
in Obiects UI are using IP address .
Ans: Option-A
60. Before upgrading Files or creating a file server, which component must first be upgraded to a
compatible version
1. FSM
2. File Analytics
3. Prism Central
4. FSVM
Ans: Option-D

61. Which protocols are supported by Files?

1. SMBv2 , SMBv3 , NFSv2 , NFSv3


2. SMBv1 , SMBv2 , NFSv2 , NFSv3
3. SMBv1 , SMBv2 , NFSv3 , NFSv4
4. SMBv2 , SMBv3 , NFSv3 , NFSv4
Ans: Option-D

62. An administrator is having difficulty enabling Data Lens for a file server. What is the most likely cause
of this issue?

1. The file server has blacklisted file types.


2. SSR is enabled on the file server.
3. The file server has been cloned.
4. The file server is in a Protection Domain.
Ans: Option-B

63. An administrator has discovered that File server services are down on a cluster. Which service should
the administrator investigate for this issue?

1. minerva nvm
2. sys_stats_server
3. cassandra
4. insights_collector
Ans: Option-C

64. An existing Objects bucket was created for backups with these requirements:
• WORM policy of one year
• Versioning policy of one year
• Lifecycle policy of three years.
A recent audit has reported a compliance failure. Data that should be retained for three years has been
deleted prematurely.
How should the administrator resolve the compliance failure within Objects?
1. Modify the existing bucket versioning policy from one year to three years.
2. Recreate a new bucket with the retention policy of three years.
3. Modify the existing bucket WORM policy from one year to three years.
4. Create a tiering policy to store deleted data on cold storage for three years.
Ans: Option-B
65. A Files administrator needs to generate a report listing the files matching those in the exhibit What is
the most efficient way to complete this task?

1. Use Report Builder in File Analytics.


2. Create a custom report in Prism Central.
3. Use Report Builder in Files Console.
4. Create a custom report in Files Console.
Ans: Option-A

66. What are two ways to manage Objects? (Choose two.)


PC

CLI

API

SSH

Ans: Option-A & C

67. An administrator needs to scale out an existing Files instance. Based on the company's requirements,
the Files instance has four ESVMMS configured and needs to expand to six.
How many additional Client IP addresses and Storage IP addresses does the administrator require to
complete this task?
1. 3 Client IPs and 2 Storage IPs
2. 2 Client IPs and 2 Storage IPs
3. 3 Client IPs and 3 Storage IPs
4. 2 Client IPs and 3 Storage Ips
Ans: Option-B

68.
69. An administrator needs to ensure maximum performance, throughput, and redundancy for the
company's Oracle RAC on Linux implementation, while using the native method for securing workloads .
Which configuration meets these requirements?

1. Files with a distributed share and ABE


2. Files with a general-purpose share and File Blocking
3. Volumes with MPIO and a single vDisk
4. Volumes with CHAP and multiple vDisks
Ans: Option-D

70. An administrator has been tasked with creating a distributed share on a single - node cluster but has
been unable to successfully complete the task.
Why is this task failing?

1. File server version should be greater than 3.8.0.


2. AOS version should be greater than 6.0.
3. Number of distributed shares limit reached.
4. Distributed shares require multiple nodes.
Ans: Option-D
71. What is the most efficient way of enabling users to restore their files without administrator
intervention in multiple Files shares

1. Click Enable next to the name of the share in Manage Recovery Settings from Data Lens.
2. Click Enable Self Service Restore in the Edit wizard for each share in Shares tab from
Files Console.
3. Assign the same Category to all FSVMs and adding that Category to a single
Protection Policy in PC.
4. Add all FSVMs to a Consistency Group within a single asynchronous Protection Domain
in PE
Ans: Option-B

72. After configuring Smart DR , an administrator is unable see the policy in the Policies tab . The
administrator has confirmed that all FSVMs are able to connect to Prism Central via port 9440
bidirectionally.
What is the possible reason for this issue?

1. The primary and recovery file servers do not have the same protocols.
2. Port 7515 should be open for all External / Client IPs of FSVMs on the Source and Target
cluster.
3. The primary and recovery file servers do not have the same version.
4. Port 7515 should be open for all Internal / Storage IPs of FSVMs on the Source and Target
duster.
Ans: Option-B

73. Which port is required between a CVM or Prism Central to insights.nutanix.com for Data Lens
Configuration?

1. 80
2. 443
3. 8443
4. 9440
Ans: Option-B

74.What is a prerequisite for deploying Smart DR?

1. Requires one-to-many shares.


2. The File Manager must have at least three file servers.
3. The primary and recovery file servers must have the same domain name.
4. Open TCP port 7515 on all client network Ips (uni-directionally on the source and
recovery file servers).
Ans: Option-D
75. What does the “X” represent on the icon?

1. Share Disconnected File


2. Compact ISO
3. Distributed shared file
4. Tiered File
Ans: Option-A

76. An administration has been directed to configure Volumes to Nutanix’s best practices for
security.
What should the administrator do to be compliant?

1. Enable at-rest encryption on Volume Groups.


2. Configure Volume Groups to use CHAP.
3. Use the data services IP for external host connectivity.
4. Segment iSCSI traffic to a physically separate network.
Ans: Option-A

77. What is the network requirement for a File Analytics deployment?

1. Must use the VM network


2. Must use the Backplane network
3. Must use the Storage-side network
4. Must use the Client-side network
Ans: Option-C

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy