Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

Nutanix NCP-US-6.10 Dumps

Page: 1 / 11
Total 106 questions

Nutanix Certified Professional - Unified Storage (NCP-US) v6.10 Questions and Answers

Question 1

Which component is a prerequisite for deploying Nutanix Files?

Options:

A.

A minimum of two vCPUs

B.

Prism Central

C.

Storage Container

D.

iSCSI Data Services IP

Question 2

as

Question:

An administrator is deployingFile Analytics. The following subnets are available:

    CVM subnet: 10.1.1.0/24

    AHV subnet: 10.1.2.0/24

    Nutanix Files client network: 10.1.3.0/24

    Nutanix Files storage network: 10.1.4.0/24

The administrator has reserved10.1.4.100as the File Analytics IP. However, the deploymentfailswith the error shown:

“Error creating volume group, please check logs for more details.”

What action must the administrator take to successfully deploy File Analytics?

Options:

A.

Allow port 445 in the firewall.

B.

Re-deploy File Analytics on the Files storage network.

C.

Re-deploy File Analytics on the Files client network.

D.

Allow port 139 in the firewall.

Question 3

An administrator needs to create a volume group (VG) that will host highly sensitive data. These two requirements must be met:

• The VG must be accessible only by the OS where the data is going to be used by the application

• The access needs to be secured with an additional security login

Which three features or settings will help the administrator meet those requirements? (Choose two.)

Options:

A.

CHAP authentication needs to be setup for that Volume Group.

B.

On-the-wire encryption must be enabled for all iSCSI traffic.

C.

All CVMs must have RDMA-capable NICs to facilitate direct peer-to-peer communication.

D.

The VG configuration must contain only the IQN of the client OS where the application runs.

Question 4

An administrator has a Nutanix Files deployment hosted on an AHV-based Nutanix cluster, scaled out to four FSVMs hosting several department shares. In the event of a ransomware attack, files need to be quickly recovered from a self-hosted snapshot.

How can this be accomplished?

Options:

A.

Configure an Async DR Protection Domain.

B.

Install NGT and enable self-service restore.

C.

Configure a DR Availability Zone.

D.

Use File Analytics to enable self-service restore.

Question 5

An administrator wants to use Smart DR to ensure that in the event of an unplanned loss of service, users are redirected automatically to the recovery site. What can satisfy this requirement?

Options:

A.

Configure Protection Policy replication schedule.

B.

Configure AD and DNS access for seamless client failover.

C.

Register PE clusters to PC before enabling the Files Manager.

D.

Register Nutanix Files with the same PC.

Question 6

An administrator has configured a corporate antivirus solution to place virus-infected files into quarantine where clients cannot read or write the files.

Which actions in addition to Rescan and Unquarantine can the administrator perform on the quarantined files?

Options:

A.

Alert

B.

Report

C.

Reset

D.

Delete

Question 7

An administrator is setting a Windows client to access a Volume Group (VG) served by a Nutanix cluster.

Which configuration items should the administrator take from the cluster? (Choose two.)

Options:

A.

The cluster's data services IP (DSIP)

B.

The cluster's fully qualified domain name (FQDN)

C.

The IPs of all cluster CVMs IP

D.

The VG name

Question 8

An administrator notices that a database VM is experiencing poor disk performance. Which storage technology should the administrator consider using?

Options:

A.

Volume Groups

B.

Nutanix Files NFS export

C.

Nutanix Objects

D.

Nutanix Files SMB share

Question 9

What prerequisite must be met before a Nutanix Files SMB share can be used?

Options:

A.

Configure directory services.

B.

Register the cluster with Prism Central.

C.

Run afs infra.start

D.

Enable a strong password policy.

Question 10

An administrator is trying to configure Mutual CHAP on a Linux guest. During configuration, the administrator keeps getting an Authentication Failure error.

What should the administrator do to resolve the issue?

Options:

A.

Configure the password on the target, leave the client password blank.

B.

Configure the client and target with different passwords.

C.

Configure the client and target with the same password.

D.

Configure the password on the client, leave the target password blank.

Question 11

Question:

An administrator needs to allow replicatinguser data across file servers in different locations.

Which Nutanix Files feature should the administrator utilize?

Options:

A.

Data Protection

B.

Smart Sync

C.

Data Sync

D.

VDI Sync

Question 12

An administrator is managing a Nutanix Files instance at a dark site. The administrator has been tasked to configure a solution to alert the security team when more than 500 files are renamed hourly. Which configuration should be applied?

Options:

A.

Set up Data Management Protection in Files Manager

B.

Define an anomaly rule in File Analytics

C.

Configure Nutanix Data Lens ransomware protection

D.

Add MMC Snap-In for Nutanix Files

Question 13

An administrator is concerned that storage in the Nutanix File Server is being used to store personal photos and videos. How can the administrator determine if this is the case?

Options:

A.

Examine the Usage Summary table for the File Server Container in the Prism Element Storage page.

B.

Examine the File Activity widget in the File Analytics dashboard for the File Server.

C.

Examine the File Distribution by Type widget from the Files Console for the File Server.

D.

Examine the File Distribution by Type widget in the File Analytics dashboard for the File Server.

Question 14

Refer to the exhibit.

as

In the exhibit, what does "AIXforyou@123" represent?

Options:

A.

Volume Group

B.

CHAP Secret

C.

Volume Name

D.

iSCSI Host

Question 15

Exhibit:

as

as

An administrator is enabling Nutanix Volumes for use with workloads within a Nutanix-based environment. Based on the exhibit, which field is required by Nutanix Volumes to be populated?

Options:

A.

FQDN

B.

iSCSI Data Services IP

C.

Virtual IPv6

D.

Virtual IP

Question 16

Question:

A user with Edit Buckets permission has been tasked with deleting old Nutanix Objects buckets created by a former employee.

Why is this user unable to execute the task?

Options:

A.

User is only able to delete buckets assigned to them.

B.

The buckets don't have Object Versioning enabled.

C.

The buckets don't have a Lifecycle Policy associated.

D.

User does not have the Delete Buckets permission.

Question 17

How many IP addresses are required by the client network when deploying Nutanix Files?

Options:

A.

One additional IP address as the number of FSVMs

B.

The same number of IP addresses as the number of FSVM nodes

C.

One less IP address as the number of FSVMs

D.

Twice as many IP addresses as the number of FSVMs

Question 18

An administrator needs to create a Nutanix Data Lens Report, which will be scheduled to automatically run Friday at 7:00pm. Which two formats can be used for the scheduled report? (Choose two.)

Options:

A.

JSON

B.

CSV

C.

XML

D.

PDF

Question 19

Question:

An administrator has been asked to lock a file indefinitely. The lock can be explicitly removed only by authorized users.

Which configuration matches the requirements of this task?

Options:

A.

Nutanix Objects Legal hold

B.

Nutanix Objects with WORM versioning

C.

Data Lens Ransomware Protection

D.

Blocked File Types for Files

Question 20

An administrator has determined that adding File Server VMs to the cluster will provide more resources.

What must the administrator validate so that the new File Server VMs can be added?

Options:

A.

Ensure network ports are available.

B.

Sufficient nodes in the cluster is greater than current number of FSVMs.

C.

Sufficient storage container space is available to host the volume groups.

D.

Ensure Files Analytics is installed.

Question 21

An administrator needs to ensure the company has access to key information about their Nutanix Files deployment shares and files, such as Malicious Clients, Vulnerable Shares, and a list of potential ransomware attack attempts. What must be deployed on-premises to provide the monitoring needed to see this information?

Options:

A.

LCM dark site webserver

B.

Prism Central

C.

Data Lens

D.

File Analytics VM

Question 22

After enabling Nutanix Objects, what action should be performed before starting the deployment?

Options:

A.

Create a Container

B.

Perform an LCM inventory

C.

Create a Volume Group

D.

Create Object Store

Question 23

A company is planning to upgrade the Nutanix Objects cluster deployed on-premise to the latest version. An administrator has logged into Prism Central using domain credentials. After navigating to the LCM page and performing an inventory, the administrator notices that the latest version of Objects is not showing. The following components have been updated to the latest available version listed in LCM: MSP Controller, Objects Manager, Objects Services. After running an LCM inventory successfully, the latest version of Objects still is not listed. What could be the reason?

Options:

A.

The administrator does not have needed permissions

B.

The Objects version is not supported on-premise

C.

Prism Central is not running a compatible version

D.

The MSP Controller on Prism Element has not been updated

Question 24

Question:

Which two minimum permission roles must a non-admin user have to enable Nutanix Objects? (Choose two.)

Options:

A.

Files Admin

B.

Cluster Admin

C.

Category Admin

D.

User Admin

Question 25

Question:

as

as

An administrator has received a complaint from a user that a Windows VM lost access to an iSCSI Volume Group (VG) during a maintenance window of an ESXi-based Nutanix cluster. The VM’s iSCSI configuration shows it is connecting to a specific IP (172.20.100.104).

What recommended change should the administrator make to resolve this disruption?

Options:

A.

Change the Discovery IP to match the configured VIP.

B.

Remove Discovery IP and configure with DSIP.

C.

Add all missing CVM IPs in Discovery tab.

D.

Select the Enable multi-path checkbox.

Question 26

An administrator needs to configure a bare-metal server to boot from a Nutanix Volumes-hosted virtual disk.

Which volume-group configuration option must be entered or selected for the client to boot over the network?

Options:

A.

Iscsi_max_recv_data_segment_length

B.

Use DHCP for iSCSI Target Information

C.

Enable external client access

D.

Enable Chap log on

Question 27

as

An administrator is currently troubleshooting a failed Nutanix Objects deployment using LCM and sees the error message shown in the exhibit.

The Objects cluster deployment is experiencing the following symptoms:

• The Objects Home UI Page shows the error: unable to pull the docker images

• The docker pull is failing on the first image

The administrator determined that MSP cluster deployment has completed successfully looking at msp_controller.out.

Which log file should the administrator use to investigate and troubleshoot this issue further?

Options:

A.

domain_manager.out

B.

aoss_service_manager.out

C.

1cm_metrics_uploader.out

D.

cluster_health.out

Question 28

An administrator manages a three-node AHV cluster running Nutanix Files and is attempting a Files scale-out operation on a multi-node FSVM deployment. However, the operation has failed. What should the administrator do first?

Options:

A.

Add RAM to the physical hosts

B.

Failover to secondary site

C.

Expand the AHV cluster

D.

Add DNS entries

Question 29

An administrator wants to control the user visibility of SMB folders and files based on user permissions.

What feature should the administrator choose to accomplish this?

Options:

A.

Access Based-Enumeration (ABE)

B.

File Analytics

C.

Files blocking

D.

Role Based Access Control (RBAC)

Question 30

An administrator has configured a volume-group with four vDisks and needs them to be load-balanced across multiple CVMs. The volume-group will be directly connected to the VM. Which task must the administrator perform to meet this requirement?

Options:

A.

Enable load-balancing for the volume-group using ncli

B.

Select multiple initiator IQNs when creating the volume-group

C.

Select multiple iSCSI adapters within the VM

D.

Enable load-balancing for the volume-group using acli

Question 31

An administrator has noticed that the object stores have stopped gathering analytics data approximately nine months after they were enabled. How can the administrator resume Data Lens functionality?

Options:

A.

Disable and re-enable analytics on the object store

B.

Rename the bucket within the object store

C.

Remove and re-add IAM user permissions on the object store

D.

Disable and re-enable versioning on the object store

Page: 1 / 11
Total 106 questions