ExamGecko
Home / Nutanix / NCP-DS / List of questions
Ask Question

Nutanix NCP-DS Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

An administrator needs to configure VMs in an in-guest cluster running on a vSphere environment. This configuration is for a critical database workload in a demilitarized zone.

The company's Risk Management department requires that data traffic not be exposed to other types of traffic. What should the administrator do to comply with the Risk Management department's requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 82

Report Export Collapse

The Files administrator has received reports from users in the accounting department that they can see folders that they don't have permission to access. The accounting department manager has requested that employees should only be able to see folders that they have permission to access How would a Files administrator ensure that users in the Accounting share can only see folders they have permission to access?

Become a Premium Member for full access
  Unlock Premium Member

Question 83

Report Export Collapse

What happens to an FSVM during a node failure in a 3-node cluster?

Become a Premium Member for full access
  Unlock Premium Member

Question 84

Report Export Collapse

An administrator has mapped a Volume Group named VG1 to a VM. Due to changes in the application running inside the VM, two additional volumes are required. At the time of creation, the VM was assigned to a Protection Domain named PD1.

Which two steps should the administrator take to add the additional volumes to the VM while maintaining data protection? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 85

Report Export Collapse

A company's IT security policy requires that all network traffic must be secure, and no web browser certificate error warnings should be accepted by end users.

An administrator is tasked with configuring Objects so that it uses a certificate from an internal Certificate Authority (CA).

How should the administrator configure Objects to meet the security policy?

Become a Premium Member for full access
  Unlock Premium Member

Question 86

Report Export Collapse

While preparing for migrating data from a legacy storage environment to a new Files scaleout file server, the administrator make the following notes Requirements

• Number of home directories: 4000

• Number of Departmental shares: 1

• Everyone is permitted to accessing it

• All users use the same Departmental share

The administrator deploys Files using the following configuration:

• Number of FSVMS: 3

• VCPU & RAM/FSVM: 4vCPU,12GB

• One Distributed share & ABE enabled for

• One Standard share for the Departmental share

Does this configuration satisfy the project's requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 87

Report Export Collapse

A company has deployed several Files clusters, which are managed by a single File Analytics instance. An administrator is trying to get File Distribution by Type information, but the data shown in the GUI seems to be incorrect What should the administrator do in order to get the correct data?

Become a Premium Member for full access
  Unlock Premium Member

Question 88

Report Export Collapse

What are the three predefined resource profiles when deploying Objects?

Become a Premium Member for full access
  Unlock Premium Member

Question 89

Report Export Collapse

A company has distributed a new document bundle, entitled Health and Security Policies to all employees H has to verify if key users have opened the document How can an administrator support this request with File Analytics

Become a Premium Member for full access
  Unlock Premium Member

Question 90

Report Export Collapse

After migrating to Files for the company's users home directories, the administrator started receiving complaints that accessing certain files will often result in long wait times before the file is even opened or an access denied error message after four minutes Upon further investigation, the administrator has determined that the files in question are very large audio and videos Which two actions should the administrator take to mitigate this issue! (Choose two

Become a Premium Member for full access
  Unlock Premium Member
Total 98 questions
Go to page: of 10
Search

Related questions