Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Nutanix NCP-US Nutanix Certified Professional - Unified Storage (NCP-US) v6 exam Exam Practice Test

Page: 1 / 8
Total 75 questions

Nutanix Certified Professional - Unified Storage (NCP-US) v6 exam Questions and Answers

Question 1

An administrator needs to deploy a new Linux log collector package which creates a directory for each monitored item. The logs would be analyzed by a Windows application.

Which action should the administrator take, that will provide the best performance and simplicity?

Options:

A.

Create an Objects bucket with versioning enabled.

B.

Assign e Volume vDisk to the Linux collector VM,

C.

Create a Files distributed share with multi-protocol access.

D.

Configure Files Analytics to analyze the collected logs.

Question 2

Refer the exhibit.

Question # 2

An administrator has received a support request indicating that after an update and reboot Of a Linux VM, the VM is no longer able to access the Volume Groups (VG) assigned to it.

When the administrator investigates the issue, the error message shown in the exhibit is displayed.

What are two possible reasons for the behavior? (Choose two.)

Options:

A.

The newiscsiadmbinary is not compatible with the version.

B.

The administrator has a mistake wheninputtingthe data services IP.

C.

Afirewallrule ispreventing theclient to access the x.x.x.250 IP.

D.

Theclient’s IQNis no longer in the whitelist of the affected VG

Question 3

An administrator configured WORM on an existing Objects bucket at 4 p.m. on Monday. During the configuration, the administrator did not select Enable Version. At 8 a.m. the next morning, a ticket was submitted to update the bucket to include versioning.

What are the correct steps to make the requested change?

Options:

A.

Create a bucket with Enable Version selected and migrate all data since versioning cannot be changed immediately after WORM is enabled.

B.

Create a new' bucket with Enable Version selected and migrate all data since versioning cannot be changed after 12 hours once WORM is enabled.

C.

Disable WORM and reconfigure with Enable Version and Enable WORM checked as it has been less than 24 hours sinceWORM was enabled.

D.

update the WORM settings to Enable Version as that setting can be turned on at any point after WORM is enabled.

Question 4

A corporate compliance team has asked an administrator to stop using default passwords in the environment. The administrator needs to update the password used on the FSVM.

In which order should the administrator change the FSVM’s default password?

Task Step

Step 1

Step 2

step 3

Step 4

Select

Log onto a file server VM via SSH

Change the password

Respond to the prompts, providing the current and new Nutanix user password

Repeat the steps on the remaining FSVMs

A company decided to switch their existing Windows file server to a new Files instance. After successfully deploying Files. an administrator now needs to plan to reduce the impact of any potential outage. As the source file server resides across the WAN from the destination file server over an unreliable network connection.

The administrator needs to ensure there is minimal impact to data already copied, should a network outage occur.

How should the administrator meet this requirement?

Options:

A.

use Microsoft DFS-R to replicate the files.

B.

use a method allowing files to be copied in restartable mode.

C.

use rsync in incremental copy mode.

D.

Check where the data cog failed and restart from that location.

Question 5

Due to a new IP addressing plan for the vDesktops network, an administrator needs to change the Files client-side network.

Which action should the administrator perform first?

Options:

A.

Stop the Files service,

B.

Power off the FSVMs.

C.

Create a new' managed virtualnetwork.

D.

Remove existing DNSentries.

Question 6

An existing Objects bucket was created for backups with these parameters:

A)WORM policy of three years

B)Versioning policy of two years

C)Lifecycle policy of two years

The customer reports that the cluster is nearly full due to backups created during a recent crypto locker attack. The customer would like to automatically delete backups older than one year to free up space in the cluster.

How should the administrator change settings within Objects?

Options:

A.

Modify the existing bucket lifecycle policy from two years to one year.

B.

Create a new' bucket with the lifecycle policy of one year.

C.

Create a new' bucket with the WORM policy of two years.

D.

Modify the existing bucket WORM policy from three years to one year.

Question 7

An administrator needs to configure a service to collect data from a forensic software package that audits client access to a specific location. Data need to be immutable,

Which option meets these requirements?

Options:

A.

Configure WORM options to an Objects bucket.

B.

Configure an Objects bucket with versioning.

C.

Configure an Objects bucket with the Expire current objects lifecycle policy enabled

D.

Configure standard Objects bucket with the read-on)' attribute enabled.

Question 8

An administrator of an existing Nutanix cluster running Kubernetes with multiple PODs notices that NCC checks report that some volume groups experience the following error:

Node x .x.x.x:

FAIL: Volume Group pvc -XXXXXX-XXXX-XXXX-XXXX-XXXXXXXXX space usage (908)

The administrator checks the volume group usage from the Kubernetes pod and get different usage results. The current stats are 55% used disk space.

The results of the NCC check do not match what manually-executed checks report.

What is the cause of this behavior?

Options:

A.

The garbage collection process has yet to run.

B.

Kubernetes is not correctly reporting its storage usage

C.

The NCC checks need to be updated to the latest version.

D.

Volumes has not received the needed uNMAP commands.

Question 9

A company has distributed a new document bundle, entitled Health and Security Policies to all employees. HR has asked an administrator to verify if key users have opened the document.

How can an administrator support this request with File Analytics?

Options:

A.

use Audit Trails, search for Files, ViewAudit and filter by operations.

B.

Select the file from the Top 5 Accessed list, then filter by user,

C.

Select the user from the Top 5 Active Users list then filter by file.

D.

use Audit Trails, search for users, View Audit and filter by file.

Question 10

An administrator is implementing a VDI solution in a Nutanix cluster running AHV. The implementation includes home shares for user files. The shares have to be highly available, only accessible by the named user, and replicated to a DR site.

What solution would best fulfill these requirements?

Options:

A.

Files with Access Based Enumerationenabled.

B.

Volumes with ISCSI Initiators disabled.

C.

Objects with WORMenabled.

D.

Nutanix container with Whitelistingconfigured.

Question 11

A company has a number of thin clients which need to boot over the network. The company is using Volumes for this project.

Which component is needed to meet this requirement?(Choose two.)

Options:

A.

A compatibleEthernetadapter per client

B.

VM-attached VG with client iSCSIInitiator.

C.

A DHCP server pointing to the Nutanixcluster.

D.

A client with MPIO access to the VG

Page: 1 / 8
Total 75 questions