Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

NCP-US-6.10 Questions and Answers

Question # 6

An administrator has a Nutanix Files deployment hosted on an AHV-based Nutanix cluster, scaled out to four FSVMs hosting several department shares. In the event of a ransomware attack, files need to be quickly recovered from a self-hosted snapshot.

How can this be accomplished?

A.

Configure an Async DR Protection Domain.

B.

Install NGT and enable self-service restore.

C.

Configure a DR Availability Zone.

D.

Use File Analytics to enable self-service restore.

Full Access
Question # 7

Which two protocols can be enabled during a Nutanix Files installation? (Choose two.)

A.

S3

B.

NFS

C.

SMB

D.

iSCSI

Full Access
Question # 8

Question:

A user with Edit Buckets permission has been tasked with deleting old Nutanix Objects buckets created by a former employee.

Why is this user unable to execute the task?

A.

User is only able to delete buckets assigned to them.

B.

The buckets don't have Object Versioning enabled.

C.

The buckets don't have a Lifecycle Policy associated.

D.

User does not have the Delete Buckets permission.

Full Access
Question # 9

What should the administrator do to satisfy the configuration requirements?

A.

Configure Lifecycle rules with enabled tiering for AWS S3 and Objects instance.

B.

Configure Lifecycle rule with enabled tiering for AWS S3 and replication for Objects instance.

C.

Configure Lifecycle rule with enabled replication for AWS S3 and tiering for Objects instance.

D.

Configure Lifecycle rules with enabled replication for AWS S3 and Objects instance.

Full Access
Question # 10

An administrator has determined that adding File Server VMs to the cluster will provide more resources.

What must the administrator validate so that the new File Server VMs can be added?

A.

Ensure network ports are available.

B.

Sufficient nodes in the cluster is greater than current number of FSVMs.

C.

Sufficient storage container space is available to host the volume groups.

D.

Ensure Files Analytics is installed.

Full Access
Question # 11

Question:

Which two URLs must Prism Central have access to, in an online deployment, for a Nutanix Objects server? (Choose two.)

A.

download.nutanix.com

B.

portal.nutanix.com

C.

kubernetes.io

D.

docker.io

Full Access
Question # 12

Question:

Which statement is true regarding Self-Service Restore?

A.

Supports 15 minute snapshots.

B.

Does not require NGT on the VM.

C.

Supports Windows and Linux.

D.

Supported with a Starter license.

Full Access
Question # 13

When hardening the network for Nutanix Objects, which is the only network endpoint that should be exposed to users?

A.

S3

B.

virbr0

C.

eth0

D.

OOB

Full Access
Question # 14

Question:

What is the most likely cause no Prism Element clusters are listed when trying to create a new object store?

A.

The administrator did not manually sync Prism Element to Prism Central after registration.

B.

Prism Element cluster CVMs must be restarted after registration.

C.

Although Prism Element is registered, object stores cannot be added via Prism Central.

D.

Prism Element has not yet completed synchronization with Prism Central.

Full Access
Question # 15

An administrator has been asked to upgrade an S3-compatible bucket on-premise using Prism Central. Prior to running the LCM upgrade, the administrator validated the following configurations for this task:

    Inbound traffic allowlist:

      Controller Virtual Machine (CVM) IP addresses (including secondary/segmented)

      Prism Central IP address

      Pod network range, usually 10.100.0.0/16

      All IP addresses, such as 0.0.0.0/0 for ports TCP 80 and 443

Outbound traffic allowlist:

    CVM IP addresses (including secondary/segmented)

    Prism Central IP address

    Pod network range, usually 10.100.0.0/16

    All IP addresses such as 0.0.0.0/0 for ports TCP 53, 7100, 5553 and UDP 53, 123

After the validation, the LCM upgrade is launched but did not complete. After reaching the security team, the administrator is informed that security has been enforced on the outbound traffic to the Internet as well. The administrator has been asked to provide a list of components that require Internet access. What should the administrator provide to the security team for a successful upgrade?

A.

Pod network

B.

Prism Central IP address/port

C.

LCM

D.

CVM IP address/port

Full Access
Question # 16

Which term describes Nutanix Files blocking access to a file until its file state is manually changed?

A.

Unquarantined

B.

Quarantined

C.

Cleaned

D.

Deleted

Full Access
Question # 17

Question:

An administrator needs to move infrequently accessed data to lower-cost storage based on file type and owner, and automatically recall data if data access frequency has increased.

What should administrator do to satisfy these requirements?

A.

Configure Advanced tiering in Data Lens.

B.

Create a Lifecycle Rule in Objects Buckets tab.

C.

Create an SSR-enabled share in Files.

D.

Configure Smart tiering in Files.

Full Access
Question # 18

An administrator is tasked with migrating physical SQL workloads from a legacy SAN platform to a newly-deployed Nutanix environment. The current physical hosts boot from SAN. The Nutanix environment has plenty of storage resources available. Which action can the administrator take to complete this task?

A.

Boot over iSCSI using Nutanix Volumes

B.

Boot using PXE protocol with Nutanix Files

C.

Boot using the NFS protocol with Nutanix Files

D.

Boot using Nutanix Object stores

Full Access
Question # 19

An administrator has been tasked with troubleshooting a storage performance problem for a large database VM with the following configuration:

    16 vCPU

    64 GB RAM

    One 50 GB native AHV virtual disk hosting the guest OS

    Six 500 GB virtual disks containing database files connecting via iSCSI to a Nutanix volume group

    One NIC for client connectivity

    One NIC for iSCSI connectivity

In the course of investigating the problem, the administrator determines that the issue is isolated to large block-size I/O operations. What step should the administrator take to improve performance for the VM?

A.

Add an additional NIC for iSCSI connectivity and enable MPIO

B.

Add additional virtual disks to the volume group

C.

Increase the iSCSI adapter maximum transfer length

D.

Locate the iSCSI NIC on the same VLAN as the cluster DSIP

Full Access
Question # 20

Question:

An administrator is deployingFile Analytics. The following subnets are available:

    CVM subnet: 10.1.1.0/24

    AHV subnet: 10.1.2.0/24

    Nutanix Files client network: 10.1.3.0/24

    Nutanix Files storage network: 10.1.4.0/24

The administrator has reserved10.1.4.100as the File Analytics IP. However, the deploymentfailswith the error shown:

“Error creating volume group, please check logs for more details.”

What action must the administrator take to successfully deploy File Analytics?

A.

Allow port 445 in the firewall.

B.

Re-deploy File Analytics on the Files storage network.

C.

Re-deploy File Analytics on the Files client network.

D.

Allow port 139 in the firewall.

Full Access
Question # 21

What is a requirement for Smart DR?

A.

Primary and recovery file servers must have different domain names.

B.

File servers may have different FSVM numbers at the primary and recovery sites.

C.

Primary and recovery file servers must support the same protocols.

D.

The Files Manager must have only one file server.

Full Access
Question # 22

Which Nutanix Objects metric provides the total input requests per second of a bucket?

A.

Puts

B.

Throughput

C.

Gets

D.

NFS Reads

Full Access
Question # 23

What is the maximum number of object stores that can be deployed per AOS cluster?

A.

4

B.

8

C.

16

D.

32

Full Access
Question # 24

An administrator wants to control the user visibility of SMB folders and files based on user permissions.

What feature should the administrator choose to accomplish this?

A.

Access Based-Enumeration (ABE)

B.

File Analytics

C.

Files blocking

D.

Role Based Access Control (RBAC)

Full Access
Question # 25

After configuring Smart DR, an administrator observes that a policy in the Policies tab is not visible within Prism Central (PC).

What is the likely cause of this issue?

A.

The share permissions include more than one local user.

B.

The initial replication has not completed.

C.

The administrator is logged into PC with a local account rather than an AD account.

D.

Port 7515 is not opened between the source and recovery networks.

Full Access
Question # 26

An administrator needs to recover a previous version of a file or share.

Which Nutanix Files feature should the administrator enable to allow this?

A.

Snapshot

B.

Data Protection

C.

Self-Service Restore

D.

Protection Policies

Full Access
Question # 27

Question:

What should be enabled for Windows clients when using the SMB protocol in a Nutanix Files deployment?

A.

Zettabyte File System

B.

Internet Information Services

C.

Distributed File System

D.

Automatic Windows Update

Full Access
Question # 28

Question:

An administrator has been advised to access the Nutanix Files Server VM and ensure that passwords meet the organization's security policy for server access.

Which password complexity requirement does Nutanix Files support?

A.

At least 2 lowercase letters

B.

At least 8 characters difference

C.

At least 8 characters long

D.

At least 2 uppercase letters

Full Access
Question # 29

An administrator has configured a volume-group with four vDisks and needs them to be load-balanced across multiple CVMs. The volume-group will be directly connected to the VM. Which task must the administrator perform to meet this requirement?

A.

Enable load-balancing for the volume-group using ncli

B.

Select multiple initiator IQNs when creating the volume-group

C.

Select multiple iSCSI adapters within the VM

D.

Enable load-balancing for the volume-group using acli

Full Access
Question # 30

An administrator is concerned that storage in the Nutanix File Server is being used to store personal photos and videos. How can the administrator determine if this is the case?

A.

Examine the Usage Summary table for the File Server Container in the Prism Element Storage page.

B.

Examine the File Activity widget in the File Analytics dashboard for the File Server.

C.

Examine the File Distribution by Type widget from the Files Console for the File Server.

D.

Examine the File Distribution by Type widget in the File Analytics dashboard for the File Server.

Full Access
Question # 31

An administrator is trying to add a Nutanix Volume Group (VG) over iSCSI for storage to a Windows VM, but receives the error as shown in the exhibit.

What is a likely reason for this error?

A.

The Windows login authentication is incorrect.

B.

The Windows IP address is not in the whitelist.

C.

The CHAP authentication configured is incorrect.

D.

There is already a VG connected on that client.

Full Access