Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

NCP Us v6.5 Exam Dumps Allquestion 76qa

Download as pdf or txt
Download as pdf or txt
You are on page 1of 60

Exam : NCP-US-6.

5 Nutanix Certified Professional - Unified Storage


(NCP-US) v6.5

-----------------------------------------------------------------------------------
Question #1
An administrator has received an alert A160068 – AFSDuplicateIPDetected details of
alert as follows:

Which error log should the administrator review to determine the related Duplicate IP
address involved?

• A. solver.log
• B. minerva_cvm.log
• C. tcpkill.log

D. minerva_nvm.log

Correct Answer: D

https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000CvHICA0

Question #2
An administrator is planning to upgrade all ESXi hypervisors in a cluster hosting Files.
When performing one-click hypervisor upgrades, what prerequisite must be performed?

• A. Enable the anti-affinity rules on all FSVMs.


• B. Manually migrate the FSVMs.

C. Disable the anti-affinity rules on all FSVMs.


• D. Shutdown the FSVMs.

Correct Answer: C

https://portal.nutanix.com/page/documents/details?targetId=Files-v5_0:fil-fs-lcm-upgrade-c.html

[ESXi only] When performing one-click hypervisor upgrades that have Files, disable the anti-affinity rules
on all FSVMs. After the hypervisor successfully upgrades, enable the anti-affinity rules on the FSVMs.
Question #3

What is the minimum and maximum file size limitations for Smart Tiering?

A. 64 KiB minimum and 5 TiB maximum


• B. 64 KiB minimum and 15 TiB maximum
• C. 128 KiB minimum and 15 TiB maximum
• D. 128 KiB minimum and 5 TiB maximum

Correct Answer: A

https://portal.nutanix.com/page/documents/details?targetId=Files-v5_0:fil-files-tiering-
c.html#:~:text=You%20cannot%20tier%20files%20that,of%2010%20minutes%20to%20resume.

You cannot tier files that are smaller than 64 KiB or larger than 5 TiB.

Question #4

What is a prerequisite for deploying Smart DR?

• A. Requires one-to-many shares.


B The primary and recovery file servers must have the same domain name.
• C. The Files Manager must have at least three file servers.
• D. Open TCP port 7515 on all client network IPs (uni-directionally on the source and recovery
file servers).

Correct Answer: B
https://portal.nutanix.com/page/documents/details?targetId=Files-Manager-v5_0:fil-fm-dr-
c.html#:~:text=Meet%20the%20following%20requirements%20to,and%20recovery%20sites%20must%20
match.

o The Files Manager must have at least two file servers.


o Nutanix recommends using file servers on different PE clusters to ensure DR after a cluster-wide
outage.
o The number of FSVMs between the source and recovery sites must match.
o After protection policy creation, perform scale-out on the recovery file server before performing it on the
primary file server.
o The primary and recovery file servers must support the same protocols.
o For AD, the primary and recovery file servers must have the same domain name.
o Open TCP port 7515 on all client network IPs (bi-directionally on the source and recovery file servers).
Question #5

Deploying Files instances require which two minimum resources? (Choose two.)

• A. 12 GiB of memory per host


B. 8 vCPUs per host
• C. 4 vCPUs per host
D. 8 GiB of memory per host

Correct Answer: AC

https://portal.nutanix.com/page/documents/details?targetId=Files-v5_0:fil-file-server-prerequisite-r.html

File servers require the following minimum configurations.


• A minimum of 4 vCPUs per host.
• A minimum of 12 GiB of memory per host.
• For each file server, the number of CVMs must equal to or be greater than the number of
FSVMs to ensure availability in case of node failure

Question #6

An administrator has discovered that File server services are down on a cluster.
Which service should the administrator investigate for this issue?

A. minerva_nvm
• B. insights_collector
• C. cassandra
• D. sys_stats_server

Correct Answer: A

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2041-Nutanix-Files:TN-2041-
Nutanix-Files

The Minerva NVM Service talks to the local CVM (of FSVM) and sends heartbeats to share health
information and help with failover. The service that the administrator should investigate for this issue is
minerva_nvm. minerva_nvm is a service that runs on each CVM and provides communication between
Prism Central and Files services. minerva_nvm also monitors the health of Files services and reports any
failures or alerts to Prism Central. If minerva_nvm is down on any CVM, it can affect the availability and
functionality of Files services on that cluster.

Question #7

Which Nutanix Unified Storage capability allows for monitoring usage for all Files
deployments globally?

• A. Files Manager
B. Data Lens
• C. Nutanix Cloud Manager
• D. File Analytics

Correct Answer: B
https://portal.nutanix.com/page/documents/details?targetId=Data-Lens:Data-
Lens#:~:text=Hosting%20File%20Analytics%20on%20premises,to%20a%20single%20Nutanix%20cluster.

Nutanix Data Lens™ (Data Lens) provides a cloud-hosted analytics and monitoring service for Isilon file
servers, Nutanix object stores and file servers hosted on Nutanix Files. Data Lens centralizes data from all
of your clusters connected to Pulse, across various data center locations. Hosting File Analytics on
premises limits the service to local file servers only. In contrast, Data Lens functions on a global level, in a
cluster-neutral environment, without being tied to a single Nutanix cluster.

Question #8

What is the primary criteria that should be considered for performance-sensitive


application shares with sequential I/O?

• A. Connections
• B. IOPS
C. Throughput
• D. Block size

Correct Answer: C

Throughput: High throughput is essential for sequential I/O as these operations typically involve large,
contiguous blocks of data. Ensure that the storage system and network infrastructure can support the
required data transfer rates.
Question #9

An administrator is tasked with performing an upgrade to the latest Objects version.


What should the administrator do prior to upgrading Object Manager?

• A. Upgrade Objects service


B. Upgrade MSP
• C. Upgrade AOS
• D. Upgrade Lifecycle Manager

Correct Answer: C

Please upgrade to the latest available MSP version prior to running any upgrade/deployment of Object
Clusters via LCM (represented by Object Services in LCM).

https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000Csb4CAC

Microservices Platform (MSP) is a platform based on Kubernetes where all the Objects microservices
run. The lifecycle of MSP is controlled by a service running on Prism Central called MSP Controller. You
need to upgrade the MSP Controller before upgrading the Objects Manager and Objects Service.

https://portal.nutanix.com/page/documents/details?targetId=Objects-v4_3:top-msp-lifecycle-c.html
Question #10

Refer to the exhibit.

An administrator is attempting to create a share that will provide user access via SMB
and NFS. However, the Enable multiprotocol access for NFS clients setting is not
available. What would cause this issue?

• A. The incorrect Files license has been applied.


• B. NFS is configured to use unmanaged authentication.
C. The connection to Active Directory has not been configured.
• D. The File server instance was only configured with SMB.

Correct Answer: C

The cause of this issue is that the connection to Active Directory has not been configured. Active
Directory is a service that provides centralized authentication and authorization for Windows-based
clients and servers. To create a share that will provide user access via SMB and NFS, the
administrator must first configure the connection to Active Directory in the Files Console. This will
allow the administrator to enable multiprotocol accounts for NFS clients, which are accounts that map
NFS users to SMB users and groups for consistent access control across both protocols.
Question #11

Refer to the exhibit.

An administrator is able to review and modify objects in a registered ESXi cluster from a
PE instance, but when the administrator attempts to deploy an Objects cluster to the
same ESXi cluster, the error that is shown in the exhibit is shown.

What is the appropriate configuration to verify to allow successful Objects cluster


deployment to this ESXi cluster?

• A. Ensure that vCenter in PE cluster is registered using FQDN and that vCenter
details in Objects UI are using IP address.
• B. Replace the expired self-signed SSL certificate for the Object Store with a non-
expired public certificate signed by a valid Certificate Authority.
C. Ensure that vCenter in PE cluster is registered using FQDN and that vCenter details in
Objects UI are using FQDN.
• D. Replace the expired self-signed SSL certificate for the Object Store with a non-
expired self-signed SSL certificate.

Correct Answer: C
You have registered vCenter in the Prism Element cluster as IP but you have added the vCenter details in
Objects UI via FQDN or vice-versa where you added vCenter in Prism Element with FQDN but added in
Objects as IP. If you use FQDN in Prism Element, then FQDN should be used in the Objects page.
Similarly for IP address.

https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000bv2GCAQ
Question #12

Which port is required between a CVM or Prism Central to insights.nutanix.com for Data
Lens configuration?

• A. 80
B. 443
• C. 8443
• D. 9440

Correct Answer: B

Data Lens is a SaaS that provides file analytics and reporting, anomaly detection, audit trails,
ransomware protection features, and tiering management for Nutanix Files. To configure Data Lens,
one of the network requirements is to allow HTTPS (port 443) traffic between a CVM or Prism Central
to insights.nutanix.com. This allows Data Lens to collect metadata and statistics from the FSVMs and
display them in a graphical user interface.

Question #13

Which Data Lens feature maximizes the available file server space by moving cold data
from the file server to an object store?

• A. Backup
B. Smart Tier
• C. Versioning
• D. Smart DR

Correct Answer: B

Use Smart Tiering to maximize the available file server space by moving cold data from the file server to an
object store. Nutanix supports using Nutanix Objects, AWS Standard, AWS IA, Azure hot and Azure Cool
or Wasabi (S3 compatible storage) as the object storage.

https://portal.nutanix.com/page/documents/details?targetId=Data-Lens:dat-analytics-tiering-c.html
Question #14

An organization currently has two Objects instances deployed between two sites. Both
instances are managed via the same Prism Central to simplify management. The
organization has a critical application with all data in a bucket that needs to be replicated
to the secondary site for DR purposes. The replication needs to be asynchronous,
including all delete marker versions.

How can the organization satisfy this requirement in Objects?

• A. Use a Protection Domain to replicate the Objects Volume Group.


• B. With Object Browser, upload the data at the destination site.
• C. Leverage the Objects Baseline Replication Tool from a Linux VM.
D. Create a Bucket replication rule, set the destination Objects instance.

Correct Answer: D
Objects streaming replication enables automatic and asynchronous copying of source buckets to the target
buckets in different Objects instances.
The administrator can achieve this requirement by creating a bucket replication rule and setting the
destination Objects instance. Bucket replication is a feature that allows administrators to replicate data
from one bucket to another bucket on a different Objects instance for disaster recovery or data migration
purposes. Bucket replication can be configured with various parameters, such as replication mode,
replication frequency, replication status, etc. Bucket replication can also replicate all versions of objects,
including delete markers, which are special versions that indicate that an object has been deleted. By
creating a bucket replication rule and setting the destination Objects instance, the administrator can
replicate data from one Objects instance to another asynchronously, including all delete markers and
versions.

https://portal.nutanix.com/page/documents/details?targetId=Objects-v4_3:top-objects-replication-c.html

Question #15
Which two steps are required for enabling Data Lens? (Choose two.)

A. Configure a MyNutanix account to access the Data Lens console.


• B. Add File Services VM admin credentials to a MyNutanix account.
C. In Prism, enable Pulse health monitoring.
• D. Configure the Data Services IP in Prism Central.

Correct Answer: AC
Data Lens centralizes data from all of your clusters connected to Pulse, across various data center
locations. Meet the requirements for running Data Lens:

o Configure a MyNutanix account to access the Data Lens console.


o In Prism, enable Pulse health monitoring.

https://portal.nutanix.com/page/documents/details?targetId=Data-Lens:dat-datalens-overview-c.html

Question #16

An administrator wants to provide security against ransomware attacks in Files. The


administrator wants to configure the environment to scan files for ransomware in real
time and provide notification in the event of a ransomware attack.

Which component should the administrator use to meet this requirement?

• A. Files Console
• B. Syslog Server
• C. Protection Domain
D. File Analytics

Correct Answer: D

File Analytics offers ransomware protection for your file server. File Analytics scans files for ransomware
in real-time and notifies you in the event of a ransomware attack once you configure email notifications.
Using a curated list of over 250 signatures that frequently appear in ransomware files, the Nutanix Files
file blocking mechanism identifies and blocks files with ransomware extensions from carrying out
malicious operations. File Analytics is a feature that provides insights into the data stored in Files, such
as file types, sizes, owners, permissions, and access patterns. File Analytics also provides security
against ransomware attacks by scanning files for ransomware in real time and providing notification in
the event of a ransomware attack. File Analytics can detect ransomware based on file extensions, file
signatures, or third-party solutions

https://portal.nutanix.com/page/documents/details?targetId=File-Analytics-v3_3:ana-analytics-ransomware-c.html

Question #17

Which of the following increases the usable capacity of a cluster?

▪ A. Controller Latency

▪ B. Deduplication

▪ C. Compression
▪ D. Erasure Coding

Correct Answer: D

Erasure Coding can help increase the usable capacity of a Nutanix cluster. Erasure Coding is a data
protection method that spreads data and parity across multiple nodes in a cluster. It allows for data
redundancy similar to RAID, but with more efficient storage utilization. Erasure Coding reduces the
amount of space needed for data redundancy.

Question #18

A planned failover involves moving a protection domain to another site due to which of the
following reasons (select two):

▪ A. Domain Disturbance

▪ B. Expansion

▪ C. License Expiry

▪ D. System Maintenance

Correct Answer: B,D

In a Nutanix cluster, a planned failover might be necessary in the following scenarios:

1. Maintenance Activities: When performing maintenance or upgrades on cluster HW components such


as nodes, disks, or network interfaces.
or when upgrading the Nutanix AOS (Acropolis Operating System) or other critical SW components that
require downtime.

2. Load Balancing: To balance the workload across different nodes or clusters for optimal performance
and resource utilization.

3. Disaster Recovery Testing: To validate disaster recovery plans and ensure that the failover
mechanisms work correctly.

4. Infrastructure Changes: When relocating data centers or moving workloads between data centers
or When changing the network or storage topology that affects the cluster.

5. Proactive Measures: In anticipation of potential failures or to preemptively address performance


degradation issues.

6. Cluster Expansion: When adding new nodes to the cluster, it may be necessary to perform a failover to
integrate the new resources without impacting the existing workloads.
Question #19
What is a mandatory criteria for configuring Smart Tier?

• A. Certificate
• B. Access and secret keys
• C. Target URL over HTTP
• D. VPC name

Correct Answer: B

Nutanix Smart Tier is a feature designed to optimize storage efficiency by automatically moving cold or
infrequently accessed data from primary storage to more cost-effective and scalable object storage
solutions. This helps organizations manage their storage resources more effectively and reduce costs.

To configure Nutanix Smart Tier, you need to meet several requirements and follow specific steps.

1. Tiering Location: Define a supported S3 compliant target.

This includes:

o Target URL over HTTPS


o Bucket Name
o Access and Secret Keys
o Retention Period

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2041-Nutanix-
Files:smart-tier.html
Question #20

An administrator has performed an AOS upgrade, but noticed that the compression on
containers is not happening.
What is the delay before compression begins on the Files container?

• A. 30 minutes
• B. 60 minutes
• C. 12 hours
• D. 24 hours

Correct Answer: B

The following types of compression are available:

• Post-process compression
Data is compressed after it is written. The delay time between write and compression is
configurable, and Nutanix recommends a delay of 60 minutes.

• Inline compression
Data is compressed as it is written. When you create a new storage container, inline compression is
enabled by default for all license tiers. It is set to a delay of 0, compressing data immediately as it is
written.

https://portal.nutanix.com/page/documents/details?targetId=Web-Console-Guide-Prism-v6_8:sto-
compression-c.html
Question #21

A company uses Linux and Windows workstations. The administrator is evaluating solutions
for their file storage needs. The solution should support these requirements:

• Distributed File System


• Active Directory integrated
• Scale out Architecture

Which solution should the administrator choose to satisfy this requirement?


• A. Objects
• B. Files
• C. Mine
• D. Volumes

Correct Answer: B

Nutanix Files (Files) is a software-defined, scale-out file storage solution that lets you share files in a
centralized and protected location to eliminate the requirement for a third-party file server. Files uses a
scale-out architecture that provides file services to clients through the Server Message Block (SMB) and
Network File System (NFS) protocols. Shares (SMB) and exports (NFS) encapsulate file directories. There
are two types of shares or exports: Distributed: A distributed share ("home") or export ("sharded")
spreads data across all of the FSVMs on the file server to improve the performance and scalability of client
connections.

https://portal.nutanix.com/page/documents/details?targetId=Files-v5_0:fil-file-server-wc-c.html

Question #22
_____ are groups of physical disks from one or more tiers.

• A. vDisks

• B. Datastores

• C. Storage Pools

• D. Storage Tiers

Correct Answer: C

A storage pool on Nutanix is a group of physical disks from one or more tiers. Nutanix recommends
configuring only one storage pool for each Nutanix cluster.
Question #23

Which of the following compressions are available in Storage Management? (select two)

• A. In line compression

• B. Post-process compression

• C. In-post compression

• D. Outline compression

Correct Answer: A,B

Nutanix systems currently offer two types of compression policies:


Inline - The system compresses data synchronously as it is written to optimize capacity and to maintain
high performance for sequential I/O operations. Inline compression only compresses sequential I/O to
avoid degrading performance for random write I/O.
Post-process - For random workloads, data is written to the SSD tier uncompressed for high performance.
Compression occurs after cold data migrates to lower-performance storage tiers. Post-process
compression acts only when data and compute resources are available, so it doesn't affect normal I/O
operations.

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2028-Nutanix-Cloud-
Clusters-on-AWS:compression.html

Question #24

Which protocols are supported by Files?

• A. SMBv2, SMBv3, NFSv2, NFSv3


• B. SMBv1, SMBv2, NFSv3, NFSv4

• C. SMBv2, SMBv3, NFSv3, NFSv4


• D. SMBv1, SMBv2, NFSv2, NFSv3

Correct Answer: C

Files includes the following features:

• SMBv2, SMBv3, NFSv3 and NFSv4 protocol support.

https://portal.nutanix.com/page/documents/details?targetId=Files-v5_0:fil-file-server-wc-c.html
Question #25

A healthcare administrator configures a Nutanix cluster with the following requirements:

• Enabled for long-term data retention of large files


• Data should be kept for two years
• Deletion or overwrite of the data must not be allowed

Which Nutanix-enabled technology should the administrator employ to satisfy these


requirements?

• A. Files – Read-only share


• B. Files – Connected share
• C. Objects – WORM with versioning
• D. Objects – Life Cycle Policy

Correct Answer: C

The Nutanix-enabled technology that meets these requirements is Objects - WORM with versioning.
WORM (Write-Once Read-Many) is a feature that prevents anyone from modifying or deleting data in a
bucket while the policy is active. WORM policies help comply with strict data retention regulations that
mandate how long specific data must be stored. Versioning is a feature that keeps multiple versions of an
object in a bucket whenever it is overwritten or deleted.

Versioning policies help preserve previous versions of an object for backup or recovery purposes. By
enabling WORM and versioning for an Objects bucket, the administrator can ensure that data is kept for
two years without being deleted or overwritten.

In Nutanix, Objects – WORM (Write Once, Read Many) with versioning is a feature designed to provide
immutable storage for data objects. This ensures that once data is written, it cannot be modified or
deleted, enhancing data protection and compliance. Versioning complements WORM by keeping multiple
versions of an object, allowing recovery from accidental overwrites or deletions.
Question #26

Which action is required to allow the deletion of file server audit data in Data Lens?

• A. Update the data retention period.


• B. Configure the audit trail target.
• C. Enable the File Server.
• D. Disable the File Server.

Correct Answer: A
The action that is required to allow the deletion of file server audit data in Data Lens is to update the data
retention period. Data retention period is a setting that defines how long Data Lens keeps the file server
audit data in its database. Data Lens collects and stores various metadata and statistics from file servers,
such as file name, file type, file size, file owner, file operation, file access time, etc. Data Lens uses this
data to generate reports and dashboards for file analytics and anomaly detection. The administrator can
update the data retention period for each file server in Data Lens to control how long the audit data is kept
before being deleted.

Question #27
An existing Objects bucket was created for backups with these requirements:

• WORM policy of one year


• Versioning policy of one year
• Lifecycle policy of three years

A recent audit has reported a compliance failure. Data that should be retained for three years has
been deleted prematurely. How should the administrator resolve the compliance failure within
Objects?

• A. Recreate a new bucket with the retention policy of three years.


• B. Modify the existing bucket versioning policy from one year to three years.
• C. Create a tiering policy to store deleted data on cold storage for three years.

• D. Modify the existing bucket WORM policy from one year to three years.

Correct Answer: D
The administrator should resolve the compliance failure within Objects by modifying the existing bucket
WORM (Write-Once Read-Many) policy from one year to three years. WORM is a feature that prevents
anyone from modifying or deleting data in a bucket while the policy is active. WORM policies help comply
with strict data retention regulations that mandate how long specific data must be stored.
The administrator can extend the WORM retention period for a bucket at any time, but cannot reduce it or
delete it. By extending the WORM policy from one year to three years, the administrator can ensure that
data in the bucket is retained for the required duration and not deleted prematurely.
Question #28

An administrator needs to protect a Files cluster with unique policies for different
shares. How should the administrator meet this requirement?

• A. Create a protection domain in the Data Protection view in Prism Element.


• B. Configure data protection policies in File Server view in Prism Element.
• C. Create a protection domain in the Data Protection view in Prism Central.

• D. Configure data protection policies in Files view in Prism Central.

Correct Answer: D
Question #29

Refer to the exhibit.

What does the “X” represent on the icon?

• A. Tiered File
• B. Corrupt ISO
• C. Distributed shared file
• D. Share Disconnected File

Correct Answer: A

Tiered Data

When data reaches the configured age and the file server is at its capacity threshold, Smart Tier moves
file data to the target. Smart Tier marks the previously consumed space as free, creating additional space
in the share for new or recalled data.

Tiered files appear as regular files in their folder paths. SMB shares have an offline attribute set, which in
Windows Explorer shows an X beside the file icon.

You can see the file size (size on disk), which represents just the metadata, and the actual file size, which
represents the tiered data. You can retrieve the data inline (or read) from tiered files at any time, but you
can't write to a tiered file directly. You need to either recall the file or make a separate copy to edit it.

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2041-Nutanix-Files:smart-
tier.html
Question #30
An administrator has performed an upgrade to Files. After upgrading, the file server cannot reach
the given domain name with the specified DNS server list. Which two steps should the
administrator perform to resolve the connectivity issues with the domain controller servers?
(Choose two)

• A. Verify the DNS settings in Prism Element.


• B. Verify the DNS entries for the given domain name.
• C. Verify the DNS settings in Prism Central.
• D. Verify the DNS server addresses of the domain controllers.

Answer Correct: A,B

The two steps that the administrator should perform to resolve the connectivity issues with the domain
controller servers are:

• Verify the DNS settings in Prism Element: DNS (Domain Name System) is a system that translates
domain names into IP addresses. DNS settings are configurations that specify which DNS servers to
use for resolving domain names. Verifying the DNS settings in Prism Element is a step that the
administrator should perform, because it can help identify and correct any incorrect or outdated DNS
server addresses or domain names that may cause connectivity issues with the domain controller
servers.

• Verify the DNS entries for the given domain name: DNS entries are records that map domain
names to IP addresses or other information. Verifying the DNS entries for the given domain name is
another step that the administrator should perform, because it can help check and update any incorrect
or outdated IP addresses or other information that may cause connectivity issues with the domain
controller servers.
Question #31

Refer to the exhibit.

An organization is utilizing File Analytics to check for anomalies in a Nutanix cluster.

An organization is utilizing File Analytics to check for anomalies in a Nutanix cluster.


With the settings shown on the exhibit, if there were 1000 files in the repository, how
many files would have to be deleted to trigger an anomaly alert to the administrator?

• A. 1

• B. 10

• C. 100
• D. 1000

Correct Answer: B

Consider a scenario where you have 1 thousand files, the operation count threshold defined as 10, and the
operation percentage threshold defined as 10%. The count threshold takes precedence, as 10% of 1
thousand is 100, which is greater than the count threshold of 10.

https://portal.nutanix.com/page/documents/details?targetId=File-Analytics-v3_3:ana-fs-analytics-
anomalies-
r.html#:~:text=File%20Analytics%20calculates%20the%20minimum,would%20trigger%20an%20anomaly
%20alert
Question #32

Which configuration is required for an Objects deployment?

• A. Configure Domain Controllers on both Prism Element and Prism Central.


• B. Configure VPC on both Prism Element and Prism Central.
• C. Configure a dedicated storage container on Prism Element or Prism Central.
• D. Configure NTP servers on both Prism Element and Prism Central.

Correct Answer: D

Ensure to configure the following network requirements before running Objects:

• Configure Domain Name Servers (DNS) on both Prism Element and Prism Central.
• Configure Network Time Protocol (NTP) servers on both Prism Element and Prism Central.
• Set up the Virtual IP address and the data services IP address on the Prism Element where you plan to
deploy Objects.
• Ensure that the communication between Objects (Storage or Public network) and Prism Central must
be direct and not through a proxy server.
• AHV: Ensure VLANs that are required internally for Object Store Services and externally for accessing
the object store endpoints are configured on Prism Element correctly.

https://portal.nutanix.com/page/documents/details?targetId=Objects-v4_4:top-prerequisites-c.html
Question #33

An administrator has received an alert A130351 – VolumeGroupProtectionFailed details of alert


as follows:

Which error logs should the administrator be reviewing to determine why the relative
service is down?

• A. solver.log

• B. cerebro.ERROR

• C. tcpkill.log

• D. arithmos.ERROR

Correct Answer: B

The Alert is raised when a Volume Group supposed to be protected by a protection policy isn't protected
due to any issue with the Cerebro service. Review the /home/nutanix/data/logs/cerebro.ERROR log on the
Cerebro leader node for any relevant messages - this can be done by searching "Failed to protect entity"
within the log:

nutanix@CVM:~$ grep -i "Failed to protect entity" ~/data/logs/cerebro.ERROR

https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000buluCAA
Question #34
Refer to the exhibit.

An administrator has created a volume and needs to attach it to a windows host a via iSCSI.
The data Services IP has been configured in the MS iSCSI Initiator, but no target are visible.
What is most likely the cause this issue?

• A. The host' s IP address is not authorized to access the volume.


• B. The CHAP password configured on the client is incorrect.
• C. The CHAP Authentication has not been configured on the client.
• D. The host's IQN is not authorized to access to the volume.

Correct Answer: D

Nutanix Volumes uses IQN-based authorization to control access to volumes. The administrator must
specify the IQN of the host that needs to access the volume when creating or editing the volume. If the
host's IQN is not authorized, it will not be able to see the target in the MS iSCSI Initiator. In a domain
server infrastructure, IQN stands for iSCSI Qualified Name. It is a unique identifier used in the iSCSI
(Internet Small Computer Systems Interface) protocol, which allows for the transmission of SCSI
commands over IP networks.
IQN (iSCSI Qualified Name) is a standardized naming convention used to uniquely identify iSCSI initiators
and targets within a storage area network (SAN). It ensures that each iSCSI device can be uniquely
identified, similar to how a MAC address uniquely identifies a network interface card.

Question #35

Which two prerequisites are needed when deploying Objects to a Nutanix cluster? (Choose two.)

• A. Microsegmentation is enabled.
• B. AHV IPAM is disabled on the VLAN used for Objects.
• C. Data Services IP is configured on the PE.
• D. DNS is configured on the PE.

Correct Answer: C,D

Network Requirements
• Configure Domain Name Servers (DNS) on both Prism Element and Prism Central.
• Configure Network Time Protocol (NTP) servers on both Prism Element and Prism Central.
• Set up the Virtual IP address and the data services IP address on the Prism
Element where you plan to deploy Objects. Also, ensure that you set the DSIP on the
Prism Element cluster where the Prism Central is deployed. Ensure that the
communication between Objects (Storage or Public network) and Prism Central must be
direct and not through a proxy server.

Question #36

An administrator has received an alert A130358 – ConsistencyGroupWithStaleEntities


details of alert as follows:

Which scenario is causing the alert and needs to be addressed to allow the entities to
be protected?
• A. One or more VMs or Volume Groups belonging to the Consistency Group is part of
multiple Recovery Plans configured with a Witness.

• B. One or more VMs or Volume Groups belonging to the Consistency Group contains
stale metadata.
• C. One or more VMs or Volume Groups belonging to the Consistency Group may have
been deleted.
• D. The logical timestamp for one or more of the Volume Group is not consistent
between clusters.

Correct Answer: C

The ConsistencyGroupWithStaleEntities alert is generated when the Consistency Group contains VMs
or Volume Groups that have already been deleted from the cluster.

https://portal.nutanix.com/page/documents/kbs/details?targetId=kA07V000000LUnwSAG

Question #37
Which two platforms are currently supported for Smart Tiering? (Choose two.)

• A. Google Cloud Storage


• B. Wasabi

• C. AWS Standard
• D. Azure Blob

Correct Answer: CD
The Nutanix Files tiering engine uses API calls over HTTPS to accept tiering and recall requests and to
move data to targets. Some of the available targets for tiering include the following:
• Nutanix Objects
• Amazon S3

✓ Standard
✓ Infrequent Access (IA)
✓ Glacier Instant Retrieval (IR)

• Wasabi Cloud Storage

• Azure Blob
✓ Hot

✓ Cool

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2188-Nutanix-Data-Lens:smart-
tiering.html#:~:text=Smart%20Tiering%20maintains%20a%20file,or%20with%20manual%20recall%20oper
ations.

Question #38
Which ransomware prevention solution for Files is best when the list of malicious file
signatures to block is greater than 300?

• A. Third-party solution
• B. File Analytics

• C. Data Lens
• D. Flow Security Central

Correct Answer: C

The legacy file blocking policy has an upper limit of 300 ransomware extensions in File Analytics, whereas
Data Lens can block a higher number of extensions. Hosting File Analytics on premises limits the service
to local file servers only.
Nutanix Files can block file creation or rename operations for specific file extensions and file names,
including wildcards. When you enable ransomware protection in Nutanix Data Lens, over 5,600 names and
extensions of known ransomware variants are added to the file server's blocking list.
Data Lens scans file audit events for ransomware in near real time and notifies you in the event of a
ransomware attack once you configure email notifications. Ransomware protection includes signature-
based and event-pattern-based ransomware detection.

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2188-Nutanix-Data-Lens:nutanix-
data-lens-ransomware-protection.html

https://portal.nutanix.com/page/documents/details?targetId=File-Analytics-v3_3:ana-analytics-ransomware-
c.html

Question #39
An administrator needs to scale out an existing Files instance. Based on the Company’s
requirements, File instance has four FSVMs configured and needs to expand to six.

How many additional Client IP addresses and Storage IP addresses does the administrator
require to complete this task?

• A . 3 Client IPs and 2 Storage IPs


• B . 2 Client IPs and 2 Storage IPs
• C . 3 Client IPs and 3 Storage IPs
• D . 2 Client IPs and 3 Storage IPs

Correct Answer: B

To scale out an existing Files instance, the administrator needs to add one Client IP and one
Storage IP for each additional FSVM. Since the Files instance needs to expand from four FSVMs to
six FSVMs, the administrator needs to add two Client IPs and two Storage IPs in total. The Client IPs
are used for communication between the FSVMs and the clients, while the Storage IPs are used for
communication between the FSVMs and the CVMs.

Question #40

An administrator has received an alert A130370 – VgSyncRepContainerNotFound details of


alert as follows:
What is the cause of the alert that needs to be addressed to allow successful
synchronous protection of the Volume Group?

• A. The cerebro service is not running on all CVMs within the target cluster.
• B. The container does not exist or is marked for removal on the source cluster.
• C. The cerebro service is not running on all CVMs within the source cluster.

• D. The container does not exist or is marked for removal on the target cluster.

Correct Answer: D

The A130370 - Volume Group SyncRep Container not found alert occurs when the container with
the same name where the Volume Group resides on primary site does not exist on the target PE to
enable synchronous protection of the Volume Group.

https://portal.nutanix.com/page/documents/kbs/details?targetId=kA07V000000LZHLSA4

Question #41
What are two ways to manage Objects? (Choose two.)

• A. CLI
• B. API
• C. PC
• D. SSH
Correct Answer: B,C

There are two ways to manage Objects: PC (Prism Central) and API (Application Programming
Interface). PC is a web-based user interface that allows administrators to create, configure, monitor,
and manage Objects clusters, buckets, users, and policies. API is a set of S3-compatible REST APIs
that allows applications and users to interact with Objects programmatically. API can be used to
perform operations such as creating buckets, uploading objects, listing objects, downloading objects,
deleting objects, and so on.

Question #42
Which user is authorized to deploy File Analytics?

• A. Prism Central administrator


• B. Prism Element administrator
• C. AD user mapped to a Cluster admin role
• D. AD user mapped to a Prism admin role

Correct Answer: A
Deploying Nutanix File Analytics requires a Prism Central administrator for the following reasons:

Centralized Management: Prism Central provides a unified platform for managing multiple clusters and
services, including File Analytics.
Advanced Features and Integration: Prism Central includes advanced features and services necessary
for File Analytics.
Permissions and Access Control: The Prism Central administrator has the required permissions and
access to deploy and configure File Analytics.
Scalability and Visibility: File Analytics requires access to data from multiple clusters to provide
comprehensive insights.
Security and Compliance: Using Prism Central for deployment ensures that the deployment adheres to
security and compliance policies set at a centralized level, providing a consistent and secure configuration
across the environment.

Question #43

An administrator needs to allow individual users to restore files and folders hosted in
Files. How can the administrator meet this requirement?

• A. Configure a Protection Domain on the FSVMs.


• B. Enable Self-Service Restore on shares/exports.
• C. Enable Self-Service Restore on the FSVMs.
• D. Configure a Protection Domain for the shares/exports.
Correct Answer: B

Files take snapshots of the stored cluster data at the share/export level. Self-Service Restore (SSR)
exposes these snapshots to the share or export. SSR lets you restore a file from any of the previous
snapshots without an administrator.

https://next.nutanix.com/how-it-works-22/self-service-restore-ssr-39452

Question #44
How many configured snapshots are supported for SSR in a file server?

• A. 25
• B. 50
• C. 100
• D. 200

Correct Answer: B

Use self-service restore (SSR) to create snapshot schedules to protect the file server. You can change the
snapshot intervals but cannot change the specific time when Files takes the snapshot, except for hourly
snapshots. Files takes snapshots at 00:00 UTC (midnight) for daily snapshots and at 0 minutes for hourly
snapshots.

Question #45

Which tool allows a report on file sizes to be automatically generated on a weekly


basis?

• A. Data Lens
• B. Files Console via Prism Element
• C. Files view in Prism Central
• D. File Analytics
Correct Answer: D
The Nutanix tool that allows a report on file sizes to be automatically generated on a weekly basis is
Nutanix File Analytics. Nutanix File Analytics provides the capability to schedule and generate
automated reports, including reports on file sizes. You can configure the frequency of these reports,
such as weekly, to meet your organization's needs.

Question #46
Where are Leap Availability Zones configured?

• A. Prism Central
• B. Controller VM
• C. Prism Element
• D. Cloud Connect

Correct Answer: A

Leap offers an entity-centric automated approach to protect and recover applications. It uses categories to
group the guest VMs and automate the protection of the guest VMs as the application scales. Application
recovery is more flexible with network mappings, an enforceable VM start sequence, and inter-stage
delays. Leap works with sets of physically isolated locations called availability zones. An instance of Prism
Central represents an availability zone. One availability zone serves as the primary site for an application
while one or more paired availability zones serve as the recovery sites.

https://portal.nutanix.com/page/documents/details?targetId=Xi-Leap-Admin-Guide:Xi-Leap-Admin-Guide
Question #47
An organization currently has a Files cluster for their back office data including all
department shares. Most of the data is considered Cold Data and they are looking to
migrate to free up space for future growth or newer data.

The organization has recently added an additional node with more storage. In addition,
the organization is using the Public Cloud for other storage needs.

What will be the best way to achieve this requirement?

• A. Setup another cluster and replicate the data with Protection Domain.
• B. Migrate cold data from Files to tape storage.
• C. Enable Smart Tiering in Files within the File Console.
• D. Backup the data using a third-party software and replicate to the cloud.

Correct Answer: C

When data reaches the configured age and the file server is at its capacity threshold, Smart Tier
moves file data to the target. Smart Tier marks the previously consumed space as free, creating
additional space in the share for new or recalled data. Tiered files appear as regular files in their
folder paths. SMB shares have an offline attribute set, which in Windows Explorer shows an X
beside the file icon.

You can see the file size (size on disk), which represents just the metadata, and the actual file size,
which represents the tiered data. You can retrieve the data inline (or read) from tiered files at any
time, but you can't write to a tiered file directly. You need to either recall the file or make a separate
copy to edit it.

Question #48

Before upgrading Files or creating a file server, which component must first be
upgraded to a compatible version?

• A. FSM
• B. File Analytics
• C. FSVM
• D. Prism Central

Correct Answer: A

Installation Prerequisites
Before deploying Nutanix Files, you need to:

• Install the File Server Module (FSM) from the Downloads page on the Support Portal, or
upgrade to a compatible version using the Life-Cyle Manager (LCM).
• Configure and define the storage network.
• Configure and define the client network.
• Have at least one network (two networks recommended).
• Set up a Network Time Protocol (NTP) server.
• If you use Active Directory for user authentication, have credentials of the domain administrator or a
user with delegated permissions.
• If using SMB shares, enable the distributed file system (DFS) for Windows clients (on by default).
• If you plan to use LDAP for NFS with permissions required for search, have credentials of the bind
distinguished name (DN).
• (ESXi clusters only) Have vCenter registered with all of the ESXi hosts in the AOS cluster managed
by the same vCenter.
• Have an assigned iSCSI Data Services IP configured for the clusters.
• NFS clients should have unique hostnames.

Question #49

An administrator successfully installed Objects and was able to create a bucket. When using the
reference URL to access this Objects store, the administrator is unable to write data in the bucket
when using an Active Directory account.

Which action should the administrator take to resolve this issue?

• A. Replace SSL Certificates at the Objects store level.


• B. Verify Access Keys for the user.

• C. Verify sharing policies at the bucket level.


• D. Reset the Active Directory user password.

Correct Answer: C

Buckets are logical containers in which you store objects. A single object store can contain thousands of
buckets. You set access permissions at the bucket level. Before you can upload objects to a bucket, you
must create a bucket in an object store. You can create a bucket using both S3 and NFS protocols. You
can also configure a S3 bucket while creating it except applying the WORM policy. A user with Edit
Buckets permissions can perform all bucket operations, such as create, update, and delete on all the
buckets on the assigned Object Store. You can enable Lifecycle Policies, Versioning, WORM, Replication,
Static Website, CORS, and Notifications to an S3 bucket. These S3 features cannot be enabled in a multi-
protocol access bucket (NFS).
https://portal.nutanix.com/page/documents/details?targetId=Objects-v4_4:top-deploy-configure-c.html

Question #50

Which metric is utilized when sizing a Files deployment based on performance


requirements?

• A. SMB concurrent connections


• B. Quantity of NFS exports
• C. Quantity of SMB shares
• D. NFS concurrent connections

Correct Answer: A
This metric indicates the number of active clients that are accessing the Files cluster via SMB protocol,
which affects the performance of the Files cluster. NFS concurrent connections is also a relevant metric,
but it is not the best answer, as it only applies to NFS protocol, not SMB. The quantity of SMB shares or
NFS exports does not directly affect the performance of the Files cluster, as they are logical entities that do
not consume resources.

Question #51

An administrator has deployed a new Files cluster within a Windows environment.


After some days, the Files environment is not able to synchronize users with the Active
Directory server anymore. The administrator observes a large time difference between
the Files environment and the Active Directory server that is responsible for the
behavior.

How should the administrator prevent the Files environment and the AD Server from
having such a time difference in future?

• A. Use 0.pool.ntp.org as the NTP Server for the Files environment.


• B. Use 0.pool.ntp.org as the NTP Server for the AD Server.
• C. Connect to every FSVM and edit the time manually.

• D. Use the same NTP Servers for the Files environment and the AD Server.

Correct Answer: D

The administrator should prevent the Files environment and the AD Server from having such a
time difference in future by using the same NTP Servers for the File environment and the AD
Server. NTP (Network Time Protocol) is a protocol that synchronizes the clocks of devices on a
network with a reliable time source. NTP Servers are devices that provide accurate time
information to other devices on a network. By using the same NTP Servers for the File
environment and the AD Server, the administrator can ensure that they have consistent and
accurate time settings and avoid any synchronization issues or errors

Question #52
Refer to the exhibit.

An administrator has received reports of resource issues on a file server. The administrator
needs to review the following graphs, as displayed in the exhibit:

• Storage Used
• Open Connections
• Number of Files
• Top Shares by Current Capacity
• Top Shares by Current Connections

Where should the administrator complete this action?

• A. Files Console Dashboard View


• B. Files Console Data Management View
• C. Files Console Shares View
• D. Files Console Monitoring View

Correct Answer: A

The Files Console Dashboard View provides an overview of the Files cluster performance and usage,
including the following graphs:
• Storage Used: Shows the total storage used by the Files cluster, including data, metadata, and
snapshots.
• Open Connections: Shows the number of active SMB and NFS connections to the Files cluster.
• Number of Files: Shows the number of files stored in the Files cluster, excluding snapshots.
• Top Shares by Current Capacity: Shows the top five shares by current capacity usage in the Files
cluster.
• Top Shares by Current Connections: Shows the top five shares by current connection count in the
Files cluster

Question #53
An administrator is having difficulty enabling Data Lens for a file server.
What is the most likely cause of this issue?

• A. The file server is in a Protection Domain.


• B. SSR is enabled on the file server.

• C. The file server has been cloned.


• D. The file server has blacklisted file types.

Correct Answer: C

Known Limitation
Lists the unsupported features for Data Lens.

• Data Lens does not support cloned file server.


• Data Lens does not support NFS enabled buckets on object stores.

https://portal.nutanix.com/page/documents/details?targetId=Data-Lens:dat-datalens-unsupported-features-
r.html
Question #54

An administrator created a bucket for an upcoming project where internal users as well
as an outside consultant will be uploading data via Object Browser. The administrator
needs to provide both internal and consultant access to the same bucket. The
organization would like to prevent internal access to the consultant, based on their
security policy.

Which two items are required to fulfill this requirement? (Choose two.)

• A. Generate access keys using third-party software.


• B. Install third-party software for bucket access to all users
• C. Configure Directory Services under the Access Keys section.
• D. Generate access keys based on directory and email-based users.

Correct Answer: CD
Nutanix Objects supports directory services integration, which allows administrators to configure
access keys based on directory and email-based users. This enables granular access control
and security for buckets and objects. The administrator can configure directory services under
the Access Keys section in Prism Central, and then generate access keys for internal users
from the directory service and for the consultant from an email address.

Question #55

An administrator has been asked to confirm the ability of a physical Windows Server
2019 host to boot from storage on a Nutanix AOS cluster.

Which statement is true regarding this confirmation by the administrator?

• A. Physical servers may boot from an object bucket from the data services IP and MPIO
is not required.
• B. Physical servers may boot from a volume group from the data services IP and MPIO
is required.
• C. Physical servers may boot from a volume group from the data services IP and MPIO
is not required.
• D. Physical servers may boot from an object bucket from the data services IP and MPIO
is required.

Correct Answer: B
Nutanix Volumes allows physical servers to boot from a volume group that is exposed as an iSCSI
target from the data services IP. To ensure high availability and load balancing, multipath I/O (MPIO)
is required on the physical server. Object buckets cannot be used for booting physical servers
Question #56

Users are complaining about having to reconnect to a share when there are networking
issues.
Which Files feature should the administrator enable to ensure the sessions will auto-
reconnect in such events?

• A. Connected Shares
• B. Durable File Handles
• C. Workload Optimization
• D. Multi-Protocol Shares

Correct Answer: B
The Files feature that the administrator should enable to ensure the sessions will auto-reconnect in such
events is Durable File Handles. Durable File Handles is a feature that allows SMB clients to reconnect to a
file server after a temporary network disruption or a client sleep state without losing the handle to the open
file. Durable File Handles can improve the user experience and reduce the risk of data loss or corruption.
Durable File Handles can be enabled for each share in the Files Console.

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2041-Nutanix-
Files:durable-smb-file-handles.html

Question #57

Life Cycle Manager must have compatible versions of which two components before
installing or upgrading Files? (Choose two.)

• A. Acropolis Operating System


• B. File Server Module
• C. Active Directory Services
• D. Nutanix Cluster Check

Correct Answer: AB
Nutanix Files requires a component in AOS known as Files Server Module (FSM). The version of
FSM required varies depending on the desired version of Files. Normally, this requirement is
enforced during a Nutanix Files upgrade via Life Cycle Manager (LCM) or 1-click.

https://portal.nutanix.com/page/documents/kbs/details?targetId=kA07V000000LXguSAG
Question #58

What process is initiated when a share is protected for the first time?

• A. A local snapshot is created for the share.


• B. A remote snapshot is created for the share.
• C. The share is created on the recovery site with a similar configuration.

• D. Share data movement is started to the recovery site.

Correct Answer: D

Nutanix Files automatically creates recovery site shares after the creation of a protection policy.
Files begins space consumption on the recovery site after initiating replication. Follow the steps
as indicated to create a protection policy.

https://portal.nutanix.com/page/documents/details?targetId=Files-Manager-v5_0:fil-fm-dr-protect-t.html

Question #59

An administrator has been directed to configure Volumes to Nutanix’s best practices for
security. What should the administrator do to be compliant?

A. Enable at-rest encryption on Volume Groups.


• B. Configure Volume Groups to use CHAP.
• C. Segment iSCSI traffic to a physically separate network.
• D. Use the data services IP for external host connectivity.

Correct Answer: B

Nutanix Volumes is a feature that allows users to create and manage block storage devices
(volume groups) on a Nutanix cluster. Volume groups can be accessed by external hosts using the
iSCSI protocol. To secure volume groups from unauthorized access, Nutanix recommends
configuring CHAP (Challenge-Handshake Authentication Protocol) for each volume group in Prism
Element. CHAP is a security feature that authenticates iSCSI initiators and targets before allowing
access to a volume group. CHAP requires both the initiator and the target to have a shared secret
(a password) that is used to generate a challenge and a response during the authentication
process. CHAP can prevent unauthorized access to volume groups and protect data from malicious
attacks.
Question #60

HOTSPOT -
Within the Prism Central Entity → Services → Objects menu option, What is the
correct task order for creating an Object Store?

Correct Answer:

STEP 1 – Select Object Store Service and Click Enable


STEP 2 – Click Download Creation Checklist to download the list of prerequisites for
deploying an Object Store
STEP 3 – Click Create Object Store to Start Creating the first Object Store

https://help.ovhcloud.com/csm/en-nutanix-objects?id=kb_article_view&sysparm_article=KB0056813
Question #61
An administrator is tasked with creating an Objects store with the following settings:
▪ Medium Performance (around 10,000 requests per second)
▪ 10 TiB capacity
▪ Versioning disabled
▪ Hosted on an AHV cluster

Immediately after creation, the administrator is asked to change the name of Objects
store. How will the administrator achieve this request?

• A. Delete and recreate a new Objects store with the updated name.
• B. The Objects store can only be renamed if hosted on ESXi.
• C. Enable versioning and then rename the Objects store, disable versioning.
• D. Update the name of the Objects store by using a CORS XML file.

Correct Answer: A
The administrator can achieve this request by deleting and recreating a new Objects store with the
updated name. Objects is a feature that allows users to create and manage object storage clusters on
a Nutanix cluster. Objects clusters can provide S3-compatible access to buckets and objects for
various applications and users. Objects clusters can be created and configured in Prism Central.
However, once an Objects cluster is created, its name cannot be changed or edited. Therefore, the
only way to change the name of an Objects cluster is to delete the existing cluster and create a new
cluster with the updated name.

Question #62

An administrator is required to place all iSCSI traffic on an isolated network.


How can the administrator meet this requirement?

• A. Configure network segmentation for Volumes.


• B. Create a new network interface on the CVMs via ncli.
• C. Configure the Data Services IP on an isolated network.
• D. Create a Volumes network in Prism Central.

Correct Answer: A

The administrator can meet this requirement by configuring network segmentation for Volumes.
Network segmentation is a feature that allows administrators to isolate network traffic for different
types of services, such as Volumes, Files, or Objects, on a Nutanix cluster. Network segmentation
can improve the security, performance, and manageability of network traffic. By configuring network
segmentation for Volumes, the administrator can place all iSCSI traffic on an isolated network and
prevent it from interfering with other services or applications.

https://portal.nutanix.com/page/documents/details?targetId=Files-v5_0:fil-files-network-segmentation-c.html
Question #63

Refer to the Exhibit.

A Files administrator needs to generate a report listing the files matching those in the exhibit.
What is the most efficient way to complete this task?

• A. User Report Builder in File Analytics


• B. Create a Custom Report in Prism Central
• C. User Report Builder in Files Console
• D. Create a Custom Report in Files Console

Correct Answer: A

The most efficient way to generate a report listing the files matching those in the exhibit is to use Report
Builder in File Analytics. Report Builder is a feature that allows administrators
to create custom report based on various filters and criteria, such as file name, file type, file size, file
owner, file age, file access time, file modification time, file permission change time, and so on. Report
Builder can also export the reports in CSV format for further analysis or sharing.
Question #64

An administrator has received an alert AI60068 -- ADSDuplicationIPDetected details of alert as


follows:

Which error log should the administrator review to determine the related Duplicate IP address
involved?

• A. tcpkill.log
• B. minerva_cvm.log
• C. solver.log
• D. minerva_nvm.log

Correct Answer: B

The minerva_nvm.log file contains information about the Minerva service, which is responsible for
managing the FSVMs and their communication with Prism Central. The minerva_nvm.log file can be
used to troubleshoot issues related to Nutanix Files, such as duplicate IP address detection. The log
file can be found in /home/nutanix/data/logs/minerva on any CVM in the cluster. Reference: Nutanix
Support Portal - Troubleshooting Nutanix Files

https://portal.nutanix.com/page/documents/kbs/details?targetId=kA00e000000CvHICA0
Question #65
How can an administrator deploy a new instance of Files?

• From LCM in Prism Central


• From LCM in Prism Element
• From the Storage view in Prism Element
• From the Files Console view in Prism Central

Correct Answer: D
Do the following to create a file server:

1. From the Files home page in Prism Central, select Files Servers => New File Server.
2. In the Create a File Server window, select the cluster where you want to create a file server.

https://portal.nutanix.com/page/documents/details?targetId=Files-Manager-v5_0:fil-fm-file-server-create-t.html

Question #66
What are two network requirements for a four-node FSVM deployment?(Choose two)

• A. Four available IP addresses on the Storage network


• B. Five available IP addresses on the Client network
• C. Five available IP addresses on the Storage network
• D. Four available IP addresses on the Client network

Correct Answer: C,D

For a four-node FSVM (File Server Virtual Machine) deployment in Nutanix Files, the network
requirements include:

• Storage Network: You need five available IP addresses on the Storage network (N + 1,
where N is the number of FSVM nodes, in this case, 4 + 1 = 5).
• Client Network: You need four available IP addresses on the Client network (equal to the
number of FSVM nodes, which is 4).

This configuration ensures that both the internal communication for storage traffic and external
communication for client access, Active Directory (AD), Domain Name System (DNS), and Network
Time Protocol (NTP) are properly managed. The two network requirements for a four-node FSVM
deployment are four available IP addresses on the Client network and five available IP addresses on
the Storage network. The Client network is used for communication between the FSVMs and the
clients, while the Storage network is used for communication between the FSVMs and the CVMs. For
each FSVM, one Client IP and one Storage IP are required. Additionally, one extra Client IP is
required for the file server VIP (Virtual IP), which is used as a single point of access for all shares and
exports on the file server.

Question #67

An administrator is upgrading Files from version 3.7 to 4.1 in the highly secured environment the
pre-upgrade check fail with below error:

FileServer preupgrade check failed with cause (s) Sub task poll timed out

What initial troubleshooting step should the administrator take?

• A. Examine the failed tasks on the FSVMs

• B. Check there is enough disk space on FSVMs.

• C. Verify connectivity between the FSVMs.

• D. Increase upgrades timeout from ecli

Correct Answer : C

One of the possible causes of a failed pre-upgrade check for Files is network connectivity issues between
the FSVMs. The administrator should verify that there are no firewall rules or network policies that block
the communication between the FSVMs on ports 22 (SSH), 9440 (HTTPS), and 2009 (RPC). The
administrator can use tools such as ping, traceroute, and telnet to test the connectivity between the
FSVMs.
Question #68

What is the binary image extension of File Analytics?

• A. JSON

• B. QCOW2

• C. ISO

• D. VMDK

Correct Answer : B

File Analytics is a feature that provides insights into the data stored in Files, such as file types, sizes,
owners, permissions, and access patterns. File Analytics is deployed as a VM on an AHV cluster using a
QCOW2 binary image file that contains the File Analytics software and configuration.

Question #69

What is the most efficient way of enabling users to restore their files without administering
intervention in multiple Files shares?

• A. Click Enable next to the name of the share in Manage Recovery Settings from Data
Lens.

• B. Click Enable Self Service Restore in the Edit Wizard for each share in Shares tab
from Files Console

• C. Assign the same Category to all FSVMs and adding that Category to a single
Protection Policy in PC.

• D. Add all FSVMs to a Consistency Group within a single asynchronous Protection


Domain in PE

Correct Answer: B
Nutanix Files allows users to restore their files from the snapshots taken by the protection policy. A
protection policy is a set of rules that defines how often snapshots are taken, how long they are retained,
and where they are replicated. A protection policy can be applied to one or more file shares. To enable
users to restore their files without administrator intervention, the administrator must enable the Self Service
Restore option for each share in the Files Console. This option adds a hidden folder named .snapshot in
each share, which contains all the snapshots taken by the protection policy. Users can access this folder
and browse the snapshots to find and restore their files. The administrator can also configure the
permissions and quota for the .snapshot folder

Question #70

What is the network requirement for a File Analytics deployment?

• A. Must use the CVM network


• B. Must use the Backplane Network
• C. Must use the Storage-side Network
• D. Must use the Client-side Network

Correct Answer: D

Nutanix File Analytics is a feature that provides insights into the usage and activity of file data
stored on Nutanix Files. File Analytics consists of a File Analytics VM (FAVM) that runs on a
Nutanix cluster and communicates with the File Server VMs (FSVMs) that host the file shares. The
FAVM collects metadata and statistics from the FSVMs and displays them in a graphical user
interface (GUI). The FAVM must be deployed on the same network as the FSVMs, which is
the Client-side network. This network is used for communication between File Analytics and
FSVMs, as well as for accessing the File Analytics UI from a web browser. The Client-side network
must have DHCP enabled and must be routable from the external hosts that access the file shares
and File Analytics UI.
Question #71

An administrator has been tasked with creating a distributed share on a single-node cluster, but
has been unable to successfully complete the task.

Why is this task failing?

• A. File Server version should be greater than 3.8.0


• B. AOS version should be greater than 6.0
• C. Number of distributed shares limit reached
• D. Distributed shares require multiple nodes

Correct Answer: D

A distributed share is a type of SMB share or NFS export that distributes the hosting of top-level
directories across multiple FSVMs, which improves load balancing and performance. A distributed
share cannot be created on a single-node cluster, because there is only one FSVM available. A
distributed share requires at least two nodes in the cluster to distribute the directories. Therefore, the
task of creating a distributed share on a single-node cluster will fail.

Question #72

An administrator needs to ensure maximum performance, throughput, and redundancy for the
company’s Oracle RAC on Linux implementation, while using the native method for securing
workloads. Which configuration meets these requirements?

• A. Files with a distributed share and ABE


• B. Files with a general purpose share and File Blocking
• C. Volumes with MPIO and single Disk
• D. Volumes with CHAP and multiple Disks

Correct Answer: C

Volumes is a feature that allows users to create and manage block storage devices (volume groups)
on a Nutanix cluster. Volume groups can be accessed by external hosts using the iSCSI protocol. To
ensure maximum performance, throughput, and redundancy for Oracle RAC on Linux
implementation, while using the native method for securing workloads, the recommended
configuration is to use Volumes with MPIO (Multipath I/O) and a single vDisk (virtual disk). MPIO is a
technique that allows multiple paths between an iSCSI initiator and an iSCSI target, which improves
performance and availability. A single vDisk is a logical unit number (LUN) that can be assigned to
multiple hosts in a volume group, which simplifies management and reduces overhead.

Question #73

After configuring Smart DR, an administrator is unable see the policy in the Policies Tab. The
administrator has confirmed that all FSVMs are able to connect to Prism Central via port 9440
bidirectional.

What is the possible reason for this issue?

• A. The primary and recovery file servers do not have the same protocols.
• B. Port 7575 should be open for all External/Client IPs of FSVMs on the Source and Target
cluster
• C. The primary and recovery file servers do not have the same version
• D. Port 7575 should be open for all Internal/Storage IPs of FSVMs on the Source and Target
cluster.

Correct Answer: B

Smart DR is a feature that allows share-level replication between active file server instances for
disaster recovery. To configure Smart DR, one of the prerequisites is to open TCP port 7575 for all
External/Client IPs of FSVMs on the Source and Target cluster. This port is used for
communication between the FSVMs and Prism Central. If this port is not open, Smart DR policies will
not be visible in the Policies tab in Prism Central.

Question #74

An administrator is tasked with deploying a Microsoft Server Failover Cluster for a critical
application that uses shared storage. The failover cluster instance will consist of VMs running on
an AHV-hosted cluster and bare metal servers for maximum resiliency.

What should the administrator do to satisfy this requirement?

• A. Create a Bucket with Objects.

• B. Provision a Volume Group with Volume.

• C. Create an SMB Share with Files.

• D. Provision a new Storage Container.

Correct Answer: B
Nutanix Volumes allows administrators to provision a volume group with one or more volumes that
can be attached to multiple VMs or physical servers via iSCSI. This enables the creation of a
Microsoft Server Failover Cluster that uses shared storage for a critical application. The volume
group can be attached to VMs running on an AHV-hosted cluster and bare metal servers for
maximum resiliency

Question #75

An administrator is looking for a tool that includes these features:


* Permission Denials
* Top 5 Active Users
* Top 5 Accessed Files
* File Distribution by Type
Which Nutanix tool should the administrator choose?

• A. File Analytics
• B. File Server Manager
• C. Prism Central
• D. Files Console

Correct Answer: A
The tool that includes these features is File Analytics. File Analytics is a feature that provides
insights into the usage and activity of file data stored on Files.

File Analytics consists of a File Analytics VM (FAVM) that runs on a Nutanix cluster and
communicates with the File Server VMs (FSVMs) that host the file shares. File Analytics can display
various reports and dashboards that include these features:

• Permission Denials: This report shows the number of permission denied events for file
operations, such as read, write, delete, etc., along with the user, file, share, and server
details.
• Top 5 Active Users: This dashboard shows the top five users who performed the most file
operations in a given time period, along with the number and type of operations.
• Top 5 Accessed Files: This dashboard shows the top five files that were accessed the most
in a given time period, along with the number of accesses and the file details.
• File Distribution by Type: This dashboard shows the distribution of files by their type or
extension, such as PDF, DOCX, JPG, etc., along with the number and size of files for each
type.

Question #76

What tool can be used to report on a specific user's activity within a Files environment?
• A. Files Console Usage
• B. Prism Element Alerts menu
• C. Data Lens Audit Trails
• D. Prism Central Activity menu

Correct Answer: C

The tool that can be used to report on a specific user's activity within a Files environment is Data
Lens Audit Trails. Data Lens Audit Trails is a feature that provides detailed logs of all file
operations performed by users on Files shares and exports, such as create, read, write, delete,
rename, move, copy, etc. Data Lens Audit Trails can help administrators track and audit user
actions and identify any unauthorized or malicious activities. The administrator can use Data Lens
Audit Trails to filter and search for a specific user's activity based on various criteria, such as file
name, file type, file size, file path, file share, file server, operation type, operation time, operation
status, and so on.

Question #77

An administrator is tasked with performing an upgrade to the latest Objects version.


What should the administrator do prior to upgrade Objects Manager?

• A. Upgrade Objects service


• B. Upgrade Lifecycle Manager
• C. Upgrade AOS
• D. Upgrade MSP

Correct Answer: D

The lifecycle of MSP is controlled by a service running on Prism Central called MSP Controller. You
need to upgrade the MSP Controller before upgrading the Objects Manager and Objects Service.
The first object-store cluster deployed on Prism Central is the primary MSP or the primary object-
store. The rest of the service MSPs are secondary MSPs or secondary object stores

https://portal.nutanix.com/page/documents/details?targetId=Objects-v4_3:top-msp-lifecycle-
c.html

Question #78

An administrator has created a distributed share on the File cluster. The administrator connects to
the share using Windows Explorer and starts creating folders in the share. The administrator
observes that none of the created folder can be renamed as the company naming convention
requires.
How should the administrator resolve this issue?

• A. Use the Files MMC Snap-ln and rename the folders.


• B. Modify the read/write permissions on the created folders.
• C. Modify the Files shares to use the NFS protocol.
• D. Use the Microsoft Shared Folder MMC Snap-ln.

Correct Answer: A

The administrator should resolve this issue by using the Files MMC Snap-in and renaming the folders.
The Files MMC Snap-in is a tool that allows administrators to manage Files shares and exports from a
Windows machine. The administrator can use the Files MMC Snap-in to connect to a distributed share or
export and rename the top-level directories that are hosted by different FSVMs. Renaming the directories
from Windows Explorer will not work because Windows Explorer does not recognize the distributed
nature of the share or export and will try to rename all directories on the same FSVM, which will fail.
Reference: Nutanix Files Administration Guide, page 35; Nutanix Files MMC Snap-in.

Question #79
Refer to the exhibit.
What best describes the data protection illustrated in the exhibit?

• A. Availability Zones
• B. NearSync
• C. Smart DR
• D. Metro Availability

Correct Answer: C

The data protection illustrated in the exhibit is Smart DR. Smart DR is a feature that allows share-
level replication between active file server instances for disaster recovery. Smart DR can replicate
shares from a primary FSI to one or more recovery FSIs on different clusters or sites. Smart DR
can also perform failover and failback operations in case of a disaster or planned maintenance.
The exhibit shows a Smart DR configuration with one primary FSI and two recovery FSIs.

Smart DR Requirements

▪ The following requirements must be met to deploy Smart DR:


▪ The Files Manager must have at least two file servers
▪ The number of FSVMs between the source and recovery sites must match
▪ The primary and recovery file servers must support the same protocols.
▪ For AD, the primary and recovery file servers must have the same domain name.
▪ Register Prism Element clusters of the primary and recovery site to the same PC instance.
▪ Open TCP port 7515 on all client network IPs (bi-directionally on the source and recovery
file servers).

Question #80

An administrator needs to protect a Files cluster unique policies for different shares.
How should the administrator meet this requirement?

• A. Configure data protection polices in the Files view in Prism Central.

• B. Create a protection domain in the Data Protection view in Prism Element.

• C. Create a protection domain in the Data Protection view in Prism Central.


• D. Configure data protection polices in File Server view in Prism Element

Correct Answer: A

The administrator can meet this requirement by configuring data protection policies in the Files
view in Prism Central. Data protection policies are policies that define how file data is protected
by taking snapshots, replicating them to another site, or tiering them to cloud storage. Data
protection policies can be configured for each share or export in a file server in the Files view in
Prism Central. The administrator can create different data protection policies for different
shares or exports based on their protection needs and requirements

Question #81

How many configure snapshots are supported for SSR in a file server?

• A. 100
• B. 30
• C. 50
• D. 14

Correct Answer: C

You can configure a maximum of 50 total snapshots in the SSR schedule.

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2041-Nutanix-Files:tn-
backup-and-disaster-
recovery.html#:~:text=You%20can%20configure%20a%20maximum,day%20protection%20against%
20accidental%20deletions.

Question #82

A team of developers are working on a new processing application and requires a solution where
they can upload the ... code for testing API calls. Older iterations should be retained as newer code
is developer and tested.

• A. Provision a Volume Group and connect via iSCSI with MPIO.


• B. Create a bucket in Objects with Versioning enabled.
• C. Create an SMB Share with Files and enable Previous Version
• D. Create an NFS Share, mounted on a Linux Server with Files.
Correct Answer: B

Nutanix Objects supports versioning, which is a feature that allows multiple versions of an object to be
preserved in the same bucket. Versioning can be useful for developers who need to upload their code
for testing API calls and retain older iterations as newer code is developed and tested. Versioning can
also provide protection against accidental deletion or overwrite of objects.

Question #83

An organization deployed Files in multiple sites, including different geographical locations across
the globe. The organization has the following requirements to improves their data management
lifecycle:

• Provide a centralized management solution.


• Automate archiving tier policies for compliance purposes.
• Protect the data against ransomware.

Which solution will satisfy the organization's requirements?

• A. Prism Central
• B. Data Lens
• C. Files Analytics
• D. Third-Party Solution

Correct Answer: B
Data Lens can provide a centralized management solution for Files deployments in multiple sites,
including different geographical locations. Data Lens can also automate archiving tier policies for
compliance purposes, by allowing administrators to create policies based on file attributes, such
as age, size, type, or owner, and move files to a lower-cost tier or delete them after a specified
period. Data Lens can also protect the data against ransomware, by allowing administrators to
block malicious file signatures from being written to the file system.

Question #84

Refer to the exhibit


An administrator is trying to create a Distributed Share, but the Use Distributed Share / Export type
instead of Standard option is not present when creating the share.
What is most likely the cause for this?

• A. The file server does not have the correct license.


• B. The cluster only has three nodes.
• C. The file server resides on a single node cluster.
• D. The cluster is configured with hybrid storage.

Question #85

An administrator wants to monitor their Files environment for suspicious activities, such as mass
deletions or access denials.
How can the administrator be alerted to such activities?

• A. Configure Alerts & Events in the Files Console, filtering for Warning severity.

• B. Deploy the Files Analytics VM and configure anomaly rules.

• C. Configure Files to use ICAP servers, with monitors for desired activities.

• D. Create a data protection policy in the Files view in Prism Central.

Correct Answer: B
With File Analytics, you can define anomaly alerts that represent specific operations as run by an
individual or against the file server as a whole. You can configure anomaly detection in the following
ways:

• Specify anomaly events, such as permission changes, permission denials, file deletes, and file
creates.
• Define an operation percentage and operation count as a part of the alert.
• Set the interval for when alert thresholds apply to the operations in question.
• Specify email recipients for anomaly event alerts.

https://portal.nutanix.com/page/documents/solutions/details?targetId=TN-2041-Nutanix-
Files:anomaly-detection.html

--------------------------------
End of Document

https://quizlet.com/866709381/ncp-us-flash-cards/

Within the Prism Central Entity > Services > Objects menu option, what is the correct task order
for creating an object storage?
https://www.dumpsbase.com/freedumps/nutanix-certification-ncp-us-6-5-dumps-online-pass
nutanix-certified-professional-unified-storage-ncp-us-v6-5-exam-on-the-first-attempt.html

https://www.itexams.com/exam/NCP-US-v6-5?

https://www.dumpspedia.com/nutanix-certified-professional-unified-storage-ncp-us-v6-exam-
dumps.html

You might also like