ExamGecko
Home Home / Nutanix / NCP-US-6.5

Nutanix NCP-US-6.5 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











What are two network requirements for a four-node FSVM deployment? (Choose two.)

A.
Four available IP addresses on the Storage network
A.
Four available IP addresses on the Storage network
Answers
B.
Five available IP addresses on the Client network
B.
Five available IP addresses on the Client network
Answers
C.
Five available IP addresses on the Storage network
C.
Five available IP addresses on the Storage network
Answers
D.
Four available IP addresses on the Client network
D.
Four available IP addresses on the Client network
Answers
Suggested answer: B

Explanation:

The two network requirements for a four-node FSVM deployment are five available IP addresses on the Client network and five available IP addresses on the Storage network. The Client network is used for communication between the FSVMs and the clients, while the Storage network is used for communication between the FSVMs and the CVMs. For each FSVM, one Client IP and one Storage IP are required. Additionally, one extra Client IP is required for the file server VIP (Virtual IP), which is used as a single point of access for all shares and exports on the file server. Reference: Nutanix Files Administration Guide, page 28; Nutanix Files Solution Guide, page 7

Which error logs should the administrator be reviewing to determine why the relates service is down?

A.
Solver.log
A.
Solver.log
Answers
B.
Arithmos.ERROR
B.
Arithmos.ERROR
Answers
C.
Cerebro.ERROR
C.
Cerebro.ERROR
Answers
D.
Tcpkill.log
D.
Tcpkill.log
Answers
Suggested answer: C

Explanation:

The error log that the administrator should review to determine why the relay service is down is Cerebro.ERROR. Cerebro is a service that runs on each FSVM and provides relay functionality for Data Lens. Relay service is responsible for collecting metadata and statistics from FSVMs and sending them to Data Lens via HTTPS. If Cerebro.ERROR log shows any errors or exceptions related to relay service, it can indicate that relay service is down or not functioning properly. Reference: Nutanix Files Administration Guide, page 23; Nutanix Data Lens User Guide

With the settings shown on the exhibit, if there were 1000 files in the repository, how many files would have to be… anomaly alert to the administrator?

A.
1
A.
1
Answers
B.
10
B.
10
Answers
C.
100
C.
100
Answers
D.
1000
D.
1000
Answers
Suggested answer: B

Explanation:

With the settings shown on the exhibit, if there were 1000 files in the repository, 10 files would have to be deleted within an hour to trigger an anomaly alert to the administrator. Anomaly alert is a feature that notifies the administrator when there is an unusual or suspicious activity on file data, such as mass deletion or encryption. Anomaly alert can be configured with various parameters, such as threshold percentage, time window, minimum number of files, and so on. In this case, the threshold percentage is set to 1%, which means that if more than 1% of files in a repository are deleted within an hour, an anomaly alert will be triggered. Since there are 1000 files in the repository, 1% of them is 10 files. Therefore, if 10 or more files are deleted within an hour, an anomaly alert will be sent to the administrator. Reference: Nutanix Files Administration Guide, page 98; Nutanix Data Lens User Guide

Which two platform are currently supported for Smart Tiering? (Choose two.)

A.
Google Cloud Storage
A.
Google Cloud Storage
Answers
B.
AWS Standard
B.
AWS Standard
Answers
C.
Wasabi
C.
Wasabi
Answers
D.
Azure Blob
D.
Azure Blob
Answers
Suggested answer: B

Explanation:

The two platforms that are currently supported for Smart Tiering are AWS Standard and Azure Blob. Smart Tiering is a feature that allows administrators to tier data from Files to cloud storage based on file age, file size, and file type. Smart Tiering can help reduce the storage cost and optimize the performance of Files. Smart Tiering currently supports AWS Standard and Azure Blob as the cloud storage platforms, and more platforms will be added in the future. Reference: Nutanix Files Administration Guide, page 99; Nutanix Files Solution Guide, page 11

An administrator has received an alert AI303551 – VolumeGroupProtectionFailed details of alerts as follows:

Which error logs should the administrator be reviewing to determine why the relative service is down:

A.
solver.log
A.
solver.log
Answers
B.
arithmos.ERROR
B.
arithmos.ERROR
Answers
Suggested answer: B

Explanation:

The error log that the administrator should review to determine why the relative service is down is arithmos.ERROR. Arithmos is a service that runs on each CVM and provides volume group protection functionality for Volumes. Volume group protection is a feature that allows administrators to create protection policies for volume groups, which define how often snapshots are taken, how long they are retained, and where they are replicated. If arithmos.ERROR log shows any errors or exceptions related to volume group protection, it can indicate that the relative service is down or not functioning properly. Reference: Nutanix Volumes Administration Guide, page 29; Nutanix Volumes Troubleshooting Guide

An administrator successfully installed Objects and was able to create a bucket.

When using the reference URL to access this Objects store, the administrator is unable to write data in the bucket when using an Action Directory account.

Which action should the administrator take to resolve this issue?

A.
Verify sharing policies at the bucket level.
A.
Verify sharing policies at the bucket level.
Answers
B.
Reset the Active Directory user password.
B.
Reset the Active Directory user password.
Answers
C.
Replace SSL Certificates at the Object store level.
C.
Replace SSL Certificates at the Object store level.
Answers
D.
Verify Access Keys for the user.
D.
Verify Access Keys for the user.
Answers
Suggested answer: D

Explanation:

The action that the administrator should take to resolve this issue is to verify Access Keys for the user. Access Keys are credentials that allow users to access Objects buckets using S3-compatible APIs or tools. Access Keys consist of an Access Key ID and a Secret Access Key, which are used to authenticate and authorize requests to Objects. If the user is unable to write data in the bucket using an Active Directory account, it may be because the user does not have valid Access Keys or the Access Keys do not have sufficient permissions. The administrator can verify and manage Access Keys for the user in Prism Central. Reference: Nutanix Objects User Guide, page 13; Nutanix Objects Solution Guide, page 8

A company uses Linux and Windows workstations. The administrator is evaluating solution for their file storage needs.

The solution should support these requirements:

• Distributed File System

• Active Directory integrated

• Scale out architecture

A.
Mine
A.
Mine
Answers
B.
Objects
B.
Objects
Answers
C.
Volumes
C.
Volumes
Answers
D.
Files
D.
Files
Answers
Suggested answer: D

Explanation:

The solution that meets the company's requirements for their file storage needs is Files. Files is a feature that allows users to create and manage file server instances (FSIs) on a Nutanix cluster. FSIs can provide SMB and NFS access to file shares and exports for different types of clients. Files supports these requirements:

Distributed File System: Files uses a distributed file system that spans across multiple FSVMs (File Server VMs), which improves scalability, performance, and availability.

Active Directory integrated: Files can integrate with Active Directory for authentication and authorization of SMB clients and multiprotocol NFS clients.

Scale out architecture: Files can scale out by adding more FSVMs to an existing FSI or creating new FSIs on the same or different clusters. Reference: Nutanix Files Administration Guide, page 27; Nutanix Files Solution Guide, page 6

What best describes the data protection illustrated in the exhibit?

A.
Smart DR
A.
Smart DR
Answers
B.
Metro Availability
B.
Metro Availability
Answers
C.
Availability Zones
C.
Availability Zones
Answers
D.
NearSync
D.
NearSync
Answers
Suggested answer: A

Explanation:

The data protection illustrated in the exhibit is Smart DR. Smart DR is a feature that allows sharelevel replication between active file server instances for disaster recovery. Smart DR can replicate shares from a primary FSI to one or more recovery FSIs on different clusters or sites. Smart DR can also perform failover and failback operations in case of a disaster or planned maintenance. The exhibit shows a Smart DR configuration with one primary FSI and two recovery FSIs. Reference: Nutanix Files Administration Guide, page 79; Nutanix Files Solution Guide, page 9

An administrator wants to monitor their Files environment for suspicious activities, such mass deletion or access denials.

How can the administrator be alerted to such activities?

A.
Configure Alerts & Events in the Files Console, filtering for Warning severity.
A.
Configure Alerts & Events in the Files Console, filtering for Warning severity.
Answers
B.
Deploy the Files Analytics VM. and configure anomaly rules.
B.
Deploy the Files Analytics VM. and configure anomaly rules.
Answers
C.
Configure Files to use ICAP servers, with monitors for desired activities.
C.
Configure Files to use ICAP servers, with monitors for desired activities.
Answers
D.
Create a data protection policy in the Files view in Prism Central.
D.
Create a data protection policy in the Files view in Prism Central.
Answers
Suggested answer: B

Explanation:

The administrator can monitor their Files environment for suspicious activities, such as mass deletion or access denials, by deploying the File Analytics VM and configuring anomaly rules. File Analytics is a feature that provides insights into the usage and activity of file data stored on Files. File Analytics consists of a File Analytics VM (FAVM) that runs on a Nutanix cluster and communicates with the File Server VMs (FSVMs) that host the file shares. File Analytics can alert the administrator when there is an unusual or suspicious activity on file data, such as mass deletion, encryption, permission change, or access denial. The administrator can configure anomaly rules to define the threshold, time window, and notification settings for each type of anomaly. Reference: Nutanix Files Administration Guide, page 93; Nutanix File Analytics User Guide

An administrator needs to allow individual users to restore files and folders hosted in Files.

How can the administrator meet this requirement?

A.
Configure a Protection Domain for the shares/exports.
A.
Configure a Protection Domain for the shares/exports.
Answers
B.
Configure a Protection Domain on the FSVMs.
B.
Configure a Protection Domain on the FSVMs.
Answers
C.
Enable Self-Service Restore on shares/exports.
C.
Enable Self-Service Restore on shares/exports.
Answers
D.
Enable Self-Service Restore on the FSVMs.
D.
Enable Self-Service Restore on the FSVMs.
Answers
Suggested answer: C

Explanation:

Self-Service Restore (SSR) is a feature that allows individual users to restore files and folders hosted in Files without requiring administrator intervention. SSR can be enabled on a per-share or perexport basis, and users can access the snapshots of their data through a web portal or a Windows client application1. Reference: Nutanix Files Administration Guide1

Total 76 questions
Go to page: of 8