ExamGecko
Home Home / Nutanix / NCP-DS

Nutanix NCP-DS Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











An administrator needs to configure VMs in an in-guest cluster running on a vSphere environment. This configuration is for a critical database workload in a demilitarized zone.

The company's Risk Management department requires that data traffic not be exposed to other types of traffic. What should the administrator do to comply with the Risk Management department's requirements?

A.
Mount shared Disks within the VMs as an RDM.
A.
Mount shared Disks within the VMs as an RDM.
Answers
B.
Enable NAT for Data Services IP Address.
B.
Enable NAT for Data Services IP Address.
Answers
C.
Control iSCSI access through the firewall.
C.
Control iSCSI access through the firewall.
Answers
D.
Enable iSCSI Network Segmentation
D.
Enable iSCSI Network Segmentation
Answers
Suggested answer: B

The Files administrator has received reports from users in the accounting department that they can see folders that they don't have permission to access. The accounting department manager has requested that employees should only be able to see folders that they have permission to access How would a Files administrator ensure that users in the Accounting share can only see folders they have permission to access?

A.
Remove File Blocking on the accounting shares
A.
Remove File Blocking on the accounting shares
Answers
B.
Remove read-only access to shares users should not access
B.
Remove read-only access to shares users should not access
Answers
C.
Enable Access-Based Enumeration on the accounting share
C.
Enable Access-Based Enumeration on the accounting share
Answers
D.
Enable Access-Based Enumeration on the File Server
D.
Enable Access-Based Enumeration on the File Server
Answers
Suggested answer: D

What happens to an FSVM during a node failure in a 3-node cluster?

A.
Due to host affinity rules, the FSVM will not restart
A.
Due to host affinity rules, the FSVM will not restart
Answers
B.
The FSVM will automatically restart on one of the remaining nodes.
B.
The FSVM will automatically restart on one of the remaining nodes.
Answers
C.
The FSVM must be manually restarted on one of the remaining nodes.
C.
The FSVM must be manually restarted on one of the remaining nodes.
Answers
D.
A new FSVM must be deployed to the cluster.
D.
A new FSVM must be deployed to the cluster.
Answers
Suggested answer: B

An administrator has mapped a Volume Group named VG1 to a VM. Due to changes in the application running inside the VM, two additional volumes are required. At the time of creation, the VM was assigned to a Protection Domain named PD1.

Which two steps should the administrator take to add the additional volumes to the VM while maintaining data protection? (Choose two)

A.
Add two additional Disks to VG1
A.
Add two additional Disks to VG1
Answers
B.
Add the new vDisks to the same Consistency Group
B.
Add the new vDisks to the same Consistency Group
Answers
C.
Manually update PD1 to include the newly created Disks
C.
Manually update PD1 to include the newly created Disks
Answers
D.
Map the new vDisks as volumes to the VM
D.
Map the new vDisks as volumes to the VM
Answers
Suggested answer: A, C

A company's IT security policy requires that all network traffic must be secure, and no web browser certificate error warnings should be accepted by end users.

An administrator is tasked with configuring Objects so that it uses a certificate from an internal Certificate Authority (CA).

How should the administrator configure Objects to meet the security policy?

A.
Import the Private key with a Subject Alternate Name of the company domain.
A.
Import the Private key with a Subject Alternate Name of the company domain.
Answers
B.
Import the Private key and certificate files from the internal CA
B.
Import the Private key and certificate files from the internal CA
Answers
C.
Regenerate the CSR and download certificates from the internal CA
C.
Regenerate the CSR and download certificates from the internal CA
Answers
D.
Regenerate the self-signed certificate with RSA 2048 as the bit type.
D.
Regenerate the self-signed certificate with RSA 2048 as the bit type.
Answers
Suggested answer: B

While preparing for migrating data from a legacy storage environment to a new Files scaleout file server, the administrator make the following notes Requirements

• Number of home directories: 4000

• Number of Departmental shares: 1

• Everyone is permitted to accessing it

• All users use the same Departmental share

The administrator deploys Files using the following configuration:

• Number of FSVMS: 3

• VCPU & RAM/FSVM: 4vCPU,12GB

• One Distributed share & ABE enabled for

• One Standard share for the Departmental share

Does this configuration satisfy the project's requirements?

A.
No, the project needs two distributed shares, 4 FSVMs, 24 vCPU & 128GB RAM
A.
No, the project needs two distributed shares, 4 FSVMs, 24 vCPU & 128GB RAM
Answers
B.
No, the project needs two distributed shares, 4 FSVMS, 6 VCPU & 32GB RAM
B.
No, the project needs two distributed shares, 4 FSVMS, 6 VCPU & 32GB RAM
Answers
C.
No, the project needs 4 FSVMS, 4 VCPU & 12GB RAM
C.
No, the project needs 4 FSVMS, 4 VCPU & 12GB RAM
Answers
D.
Yes, the listed configuration elements satisfy the requirements the Home Directories
D.
Yes, the listed configuration elements satisfy the requirements the Home Directories
Answers
Suggested answer: D

A company has deployed several Files clusters, which are managed by a single File Analytics instance. An administrator is trying to get File Distribution by Type information, but the data shown in the GUI seems to be incorrect What should the administrator do in order to get the correct data?

A.
Verify that the right File server view is being observed
A.
Verify that the right File server view is being observed
Answers
B.
Install another File Analytics instance for the file server being managed
B.
Install another File Analytics instance for the file server being managed
Answers
C.
Modify the administrator's Role Based Access Control settings
C.
Modify the administrator's Role Based Access Control settings
Answers
D.
Create a new dashboard to manage the desired file server
D.
Create a new dashboard to manage the desired file server
Answers
Suggested answer: A

What are the three predefined resource profiles when deploying Objects?

A.
Small, Medium, and Heavy
A.
Small, Medium, and Heavy
Answers
B.
Light Medium, and Large
B.
Light Medium, and Large
Answers
C.
Light Medium, and Heavy
C.
Light Medium, and Heavy
Answers
D.
Small, Medium, and Large
D.
Small, Medium, and Large
Answers
Suggested answer: C

A company has distributed a new document bundle, entitled Health and Security Policies to all employees H has to verify if key users have opened the document How can an administrator support this request with File Analytics

A.
Use Audit Trails search for Files View Audit and filter by operations
A.
Use Audit Trails search for Files View Audit and filter by operations
Answers
B.
Use Audit Trails search for Users, View Audit and filter by file
B.
Use Audit Trails search for Users, View Audit and filter by file
Answers
C.
Select the file from the Top 5 Accessed list then filter by user
C.
Select the file from the Top 5 Accessed list then filter by user
Answers
D.
Select the User from the Top 5 Active Users list the filter by file
D.
Select the User from the Top 5 Active Users list the filter by file
Answers
Suggested answer: B

After migrating to Files for the company's users home directories, the administrator started receiving complaints that accessing certain files will often result in long wait times before the file is even opened or an access denied error message after four minutes Upon further investigation, the administrator has determined that the files in question are very large audio and videos Which two actions should the administrator take to mitigate this issue! (Choose two

A.
Uncheck the Block access to files if scan cannot be completed (recommended) option in the ICAP settings for the Files cluster.
A.
Uncheck the Block access to files if scan cannot be completed (recommended) option in the ICAP settings for the Files cluster.
Answers
B.
Enable the Scan on Read option and decrease resources for the ICAP server
B.
Enable the Scan on Read option and decrease resources for the ICAP server
Answers
C.
Enable the Scan on Write option increase resources for the ICAP server
C.
Enable the Scan on Write option increase resources for the ICAP server
Answers
D.
Add the extensions of the affected the types to the ICAP s Exclude File Types field in the ICAP settings for the Files cluster.
D.
Add the extensions of the affected the types to the ICAP s Exclude File Types field in the ICAP settings for the Files cluster.
Answers
Suggested answer: A, D
Total 98 questions
Go to page: of 10