ExamGecko
Home Home / Nutanix / NCP-DS

Nutanix NCP-DS Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











An administrator wants to centralize the storage of CCTV data from all its branches in a remote datacenter. To meet compliance standards, the requirements for this solution are as follows:

• Data must be kept for a minimum of 10 years

• Data must be accessible for use at any time

• Data must be secure

How should the administrator satisfy these requirements?

A.
Create a Volume Group and mount to a server2) Configure a LifeCycle policy for a 10year retention3) Enable encryption on the vDisks
A.
Create a Volume Group and mount to a server2) Configure a LifeCycle policy for a 10year retention3) Enable encryption on the vDisks
Answers
B.
1) Create an Objects bucket2) Configure WORM for a 10year retention3) Replace Objects’s self-signed certificate with a CA-signed certificate
B.
1) Create an Objects bucket2) Configure WORM for a 10year retention3) Replace Objects’s self-signed certificate with a CA-signed certificate
Answers
C.
1) Create a Storage Container2) Configure WORM for a 10year retention3) Replace Prism Element’s self-signed certificate with a CA-signed certificate
C.
1) Create a Storage Container2) Configure WORM for a 10year retention3) Replace Prism Element’s self-signed certificate with a CA-signed certificate
Answers
D.
Create a Files share2) Configure a Lifecycle policy for a 10 year retention3) Enable encryption on SMB protocol
D.
Create a Files share2) Configure a Lifecycle policy for a 10 year retention3) Enable encryption on SMB protocol
Answers
Suggested answer: A

What are the three main metrics monitored for each Files instance and per share?

A.
Concurrent Connections, Throughput and OP sizes
A.
Concurrent Connections, Throughput and OP sizes
Answers
B.
Access time, IOPS and Throughput
B.
Access time, IOPS and Throughput
Answers
C.
Bandwidth, Speed and IOPS
C.
Bandwidth, Speed and IOPS
Answers
D.
Latency, Throughput and IOPS
D.
Latency, Throughput and IOPS
Answers
Suggested answer: C

The Compliance department would like the administrator to have the ability to revert documents to previous versions. How should the administrator facilitate this request?

A.
Configure protection snapshots on the File Server
A.
Configure protection snapshots on the File Server
Answers
B.
Enable Self-Service Restore on the Share/Export
B.
Enable Self-Service Restore on the Share/Export
Answers
C.
Configure Protection snapshots on the Share/Export
C.
Configure Protection snapshots on the Share/Export
Answers
D.
Enable Self-Service Restore on the File Server
D.
Enable Self-Service Restore on the File Server
Answers
Suggested answer: A

An administer is determining the most recent operation a user performed on the share cifs1 within the last 24 hours? How should the administrator complete this task in File Analytics?

A.
In the Anomalies section, view the anomaly rule created for the user with an interval of 24 hours.
A.
In the Anomalies section, view the anomaly rule created for the user with an interval of 24 hours.
Answers
B.
In the Audit Trails section, search for the cifs1 share and view the actions on the share over the past 24hour range
B.
In the Audit Trails section, search for the cifs1 share and view the actions on the share over the past 24hour range
Answers
C.
In the Audit Trails section, search for the user and view their last operations.
C.
In the Audit Trails section, search for the user and view their last operations.
Answers
D.
In the Anomalies section, select Users exceed an operation count threshold an input the 24hour range for share cifs1
D.
In the Anomalies section, select Users exceed an operation count threshold an input the 24hour range for share cifs1
Answers
Suggested answer: D

An administrator is upgrading Files. When running the pre upgrade check, the following message is generated:

FileServer in HA state

Which two steps should the administrator take to resolve this error message? (Choose two.)

A.
Check if Stargate services are running.
A.
Check if Stargate services are running.
Answers
B.
Check for alerts for NVB being down.
B.
Check for alerts for NVB being down.
Answers
C.
Check if Zookeeper services are running
C.
Check if Zookeeper services are running
Answers
D.
Verify FSVM is booted and not stuck
D.
Verify FSVM is booted and not stuck
Answers
Suggested answer: B, D

Refer to the exhibit.

An administrator reports that a Volume Group (VG) is no longer accessible on their server.

Upon attempting to reconnect, an error is displayed , as shown in the exhibit.

Which condition would cause this error?

A.
The client is trying to access the wrong target.
A.
The client is trying to access the wrong target.
Answers
B.
MPIO is enabled for the volume group
B.
MPIO is enabled for the volume group
Answers
C.
Encryption is enabled for the container hosting the VG.
C.
Encryption is enabled for the container hosting the VG.
Answers
D.
The wrong CHAP secret has been configured.
D.
The wrong CHAP secret has been configured.
Answers
Suggested answer: A

Which two statements are true about object counts in an object store?

A.
Upload counts are included in the object counts
A.
Upload counts are included in the object counts
Answers
B.
Each upload of a multipart upload is counted as a separate object until the object is finalized.
B.
Each upload of a multipart upload is counted as a separate object until the object is finalized.
Answers
C.
Each upload of a multipart upload is counted as a separate object
C.
Each upload of a multipart upload is counted as a separate object
Answers
D.
Upload Counts are not included in the object counts
D.
Upload Counts are not included in the object counts
Answers
Suggested answer: C, D

A company has two Files clusters for their workloads. Once cluster is running VDI workloads and another one is running Big Data (large file ingestion) workloads. The administrator is planning to optimize the workload performance on the cluster where the VDI workloads are running.

The administrator needs to complete these requirements

• Determine the current workload type on the cluster.

• Optimize the file share for operations such as small overwrites into larger files Which two actions should the administrator take to satisfy this requirement? (choose two)

A.
Set the share workload type to sequential
A.
Set the share workload type to sequential
Answers
B.
Execute command afs share.edit share-name share_workload_type=default
B.
Execute command afs share.edit share-name share_workload_type=default
Answers
C.
Set the share workload type to random
C.
Set the share workload type to random
Answers
D.
Execute command afs share.io_size_distribution
D.
Execute command afs share.io_size_distribution
Answers
Suggested answer: A, D

An administer has a new requirement to separate management and block storage network traffic for bare-metal workloads. What should the administrator do to satisfy this requirement?

A.
Add a second virtual NIC to CVMs, configure them in prism.
A.
Add a second virtual NIC to CVMs, configure them in prism.
Answers
B.
Configure Backplane LAN to isolate hypervisor traffic
B.
Configure Backplane LAN to isolate hypervisor traffic
Answers
C.
Configure Management LAN to segment internal communication.
C.
Configure Management LAN to segment internal communication.
Answers
D.
Enable Volumes network segmentation
D.
Enable Volumes network segmentation
Answers
Suggested answer: C

An administrator has received the following alert:

File Server In Heterogeneous State

What is the reason for this alert?

A.
The FSVMs do not match in their CPU or memory configuration.
A.
The FSVMs do not match in their CPU or memory configuration.
Answers
B.
The FSVMs are not distributed properly on the hosts in the cluster
B.
The FSVMs are not distributed properly on the hosts in the cluster
Answers
C.
Performance of the File Server is optimal and the alert can be ignored
C.
Performance of the File Server is optimal and the alert can be ignored
Answers
D.
The hosts where the FSVMs run do not match in their CPU or memory configuration.
D.
The hosts where the FSVMs run do not match in their CPU or memory configuration.
Answers
Suggested answer: B
Total 98 questions
Go to page: of 10