0% found this document useful (0 votes)
38 views32 pages

NCP Us 6.5

The document contains a series of questions and answers related to the deployment and management of Nutanix Files and other storage services. It covers various scenarios such as troubleshooting, configuration, and compliance requirements for file analytics and storage solutions. Each question is followed by the correct answer, providing guidance for administrators managing Nutanix environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views32 pages

NCP Us 6.5

The document contains a series of questions and answers related to the deployment and management of Nutanix Files and other storage services. It covers various scenarios such as troubleshooting, configuration, and compliance requirements for file analytics and storage solutions. Each question is followed by the correct answer, providing guidance for administrators managing Nutanix environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

NCP-US-6.

5 (1)
Q1. An administrator needs to deploy Files Analytics (FA). After logging into the
Prism management console using personal credentials, the administrator is not
able to deploy the Virtual Appliance.
What action is needed to resolve this issue?
1. Download the FA Virtual Appliance.
2. Move FA to another storage container.
3. Perform FA deployment in Prism Central,
4. Deploy FA using the Prism admin user account.
Answer(s): C
Q2. An administrator wants to be warned about suspicious activity, such as file
deletion, for the company's Files installation,
How can the administrator accomplish this task in File Analytics?
1. Define a new anomaly rule,
2. use Audit Trails search engine.
3. Create a dashboard for deleted files.
4. Configure alerts notifications from the Gear menu.
Answer(s): A
Q3. An administrator of an existing Nutanix cluster running Kubernetes with
multiple PODs notices that NCC checks report that some volume groups
experience the following error:
Node x .x.x.x:
FAIL: Volume Group pvc -XXXXXX-XXXX-XXXX-XXXX-XXXXXXXXX space
usage (908)
The administrator checks the volume group usage from the Kubernetes pod
and get different usage results. The current stats are 55% used disk space.
The results of the NCC check do not match what manually-executed checks
report.

What is the cause of this behavior?


1. The garbage collection process has yet to run.
2. Kubernetes is not correctly reporting its storage usage

NCP-US-6.5 (1) 1
3. The NCC checks need to be updated to the latest version.
4. Volumes has not received the needed uNMAP commands.
Answer(s): A
Q4. In a Nutanix cluster based on AHV, multiple Nutanix unified Storage
services such as Volumes, Files and Objects are deployed. After performing an
LCM inventory, MSP is listed as an update.
Which storage service requires MSP to be updated?
1. Prism
2. Objects
3. Files
4. Volumes
Answer(s): B
Q5. A CIO has been reviewing the corporate BCDR plan. In this review, the CIO
has noticed that they are replicating their Files deployments using the built in
Files DR capabilities that are configured out of the box.

Upon further investigation, the CIO has identified that there are no granular
share replications between their Files deployments and has requested the
administrator to take an initiative and implement a granular Files Share recovery
model.

Which Files capability should the administrator configure in order to be able to


failover only certain shares?
1. Data Lens
2. Smart DR
3. Smart Tiering
4. NC2 on AWS
Answer(s): B

Q6. A RHEL administrator has requested a new NFS v4 export share to be


deployed.
The task has been completed with the following settings:

· Authentication - System
· Default Access - Read-Write

Which mount--t nfs -o sec option should the RHEL administrator issue in order
to properly mount the new share?

NCP-US-6.5 (1) 2
1. Krb5p
2. None
3. Sys
4. Krb5i
Answer(s): C

Q7. While preparing for migrating data from a legacy storage environment to a
new Files scale-out file server, the administrator make the following notes:
Requirements:

Number of home directories: 4000


Number of Departmental shares: 1

Everyone is permitted to accessing it


All users use the same Departmental share

The administrator deploys Files using the following configuration:


Number of FSVMs: 3

VCPU & RAM/FSVM: 4VCPU,12GB


One Distributed share with SSR & ABE enabled for the Home Directories

One Standard share for the Departmental share


Does this configuration satisfy the project's requirements?

1. No, the project needs two distributed Share 4 FSVMs. 6 vCPU & 326B RAM
2. Yes, the listed configuration elements satisfy the requirements.
3. No, the project needs two distributed 4 FSVMs, 24 vcpu & 128GB RAM
4. No, the project needs 4 FSVMs 4 vCPU & 12GB RAM.

Answer(s): B
Q8. What is the reason for the alert: File Server In Heterogeneous State?

1. The FSVMs are distributed properly on the hosts in the cluster.


2. Performance of the File Server is optimal, and the alert can be ignored.
3. The FSVMs do not match in their CPU or memory
4. The hosts where the FSVMs run do not match in their CPU or memory
configuration

Answer(s): C
Q9. A company has a number of thin clients which need to boot over the
network. The company is using Volumes for this project.

NCP-US-6.5 (1) 3
Which component is needed to meet this requirement? (Choose two.)
1. A compatible Ethernet adapter per client
2. VM-attached VG with client iSCSI Initiator.
3. A DHCP server pointing to the Nutanix cluster.
4. A client with MPIO access to the VG

Answer(s): A,C

Q10. An administrator has deployed an SMB v3 Files cluster, but needs to make
the cluster able to support Multi-protocol access,

Which protocol will be native?

1. NFS
2. S3
3. SMB
4. cifs

Answer(s): C

Q11. Which feature ensures that a host failure's impact on a Files cluster will be
minimal?

1. VM-VM anti-affinity rules


2. VM-VM affinity rules
3. VM-Host anti-affinity rules
4. VM-Host affinity rules

Answer(s): C
Q12. A corporate compliance team has asked an administrator to stop using
default passwords in the environment. The administrator needs to update the
password used on the FSVM.
In which order should the administrator change the FSVM's default password?

Task Step

Step 1

Step 2
step 3

Step 4

Select

Log onto a file server VM via SSH

NCP-US-6.5 (1) 4
Change the password
Respond to the prompts, providing the current and new Nutanix user password

Repeat the steps on the remaining FSVMs

A company decided to switch their existing Windows file server to a new Files
instance. After
successfully deploying Files. an administrator now needs to plan to reduce the
impact of any potential outage. As the source file server resides across the
WAN from the destination file server over an unreliable network connection.

The administrator needs to ensure there is minimal impact to data already


copied, should a network outage occur.

How should the administrator meet this requirement?


1. use Microsoft DFS-R to replicate the files.
2. use a method allowing files to be copied in restartable mode.
3. use rsync in incremental copy mode.
4. Check where the data cog failed and restart from that location.

Answer(s): B

Q13. The Compliance department would like the administrator to have the
ability to revert documents to previous versions.

How should the administrator facilitate this request?

1. Configure Protection snapshots on the File Server.


2. Enable Self-Service Restore on the Share/Export.
3. Configure Protection snapshots on the Share/Export.
4. Enable Self-Service Restore on the File Server

Answer(s): C

Q14. An administrator is upgrading Files. When running the preupgrade check,


the following message is generated:

Fileserver in HA state

Which two steps should the administrator take to resolve this error message?
(Choose two.)

1. Verify FSVM is booted and not stuck.


2. Check if Zookeeper services are running.
3. Check for alerts for NVM being down.
4. Check if Stargate services are running,

NCP-US-6.5 (1) 5
Answer(s): A,B

Q15. An administrator is managing a Nutanix cluster used for Citrix full clone
virtual desktops.

Capacity Runway is in a warning state, indicating storage resources may be


fully utilized within 90 days.

Which action can be performed to increase current capacity?

1. Enable deduplication at the container level.


2. Power off over- provisioned VMs.
3. Analyze inefficient VMS and delete the inactive ones.
4. update resources for constrained VMs,
Answer(s): A

Q16. Which administrator action within Files will enable the monitoring of users'
files for malware and viruses?
1. Install antivirus on a server and mount the share for scan.
2. Connect to an ICAP server.
3. Install ClamAV on each FSVM,
4. Leave the threat detection to the local machine's antivirus application.

Answer(s): B

Q17. An administrator receive a warning message concerning a file server


hosted in a 3-node cluster. On the Files Console Dashboard tab, the file server
displays a warning to recommend performance optimization,

How should the administrator resolve this issue?


1. Increase the CVM's CPU and RAM.
2. Scale up the FSVM'5 resources.
3. Scale out adding a new FSVM in the cluster.
4. Apply the recommendation to rebalance,

Answer(s): D

Q18. When deploying Nutanix unified Storage Objects. which two protocols are
supported? (Choose two.)
1. NFS
2. S3
3. SMBv2
4. SMBv3

NCP-US-6.5 (1) 6
Answer(s): B,C
Q19. A company has distributed a new document bundle, entitled Health and
Security Policies to all employees. HR has asked an administrator to verify if
key users have opened the document.
How can an administrator support this request with File Analytics?

1. use Audit Trails, search for Files, View Audit and filter by operations.
2. Select the file from the Top 5 Accessed list, then filter by user.
3. Select the user from the Top 5 Active Users list then filter by file.
4. use Audit Trails, search for users, View Audit and filter by file.

Answer(s): A
Q20. Which two statements are true about object counts in an object store?
(Choose two.)
1. Upload counts are included in the object counts at the bucket level.
2. each upload of a multipart upload is counted as a separate object.
3. Each upload of a multipart upload is counted as a separate object until the
object is finalized.
4. upload counts are not included in the object counts at the bucket level,
Answer(s): A,C

Q21. An administrator is migrating a legacy iSCSI solution to Volumes and


needs to reconfigure the iSCSI initiator in the Windows client devices.
What should the administrator understand about the client-side iSCSI
configuration?
1. The Enable mufti-path option should be unchecked.
2. IP addresses of all CVMs should be entered.
3. The Nutanix MPIO drivers should be installed.
4. IP addresses of all FSVMs should be entered.
Answer(s): D

Q22. An administrator would like to convert an existing Volume Group with an


attached external Windows client to use Volumes.
The administrator has taken these actions:

· Disconnect any existing iSCSI targets


· Remove targets from the Favorite Targets tab

· Remove targets from the Discovery tab

NCP-US-6.5 (1) 7
Which action must the administrator take next to complete this task?
1. Connect with MPIO to the iSCSI Data Services IP.
2. Connect with MPIO to the Cluster Virtual IP.
3. Connect without MPIO to the iSCSI Data Services IP.
4. Connect without MPIO to the Cluster Virtual IP.

Answer(s): A
Q23. A DevOps engineer needs to backup a newly-deployed NKE development
cluster that contains persistent volumes with MySQL Data.

Which solution should the DevOps engineer use?


1. Files
2. Volumes
3. Objects
4. Storage Container
Answer(s): B

Q24. Which two networks are required in order to deploy Objects? (Choose
two.)
1. Objects Storage Network (internal)
2. Objects Storage Network (External)
3. Objects Public Network (Internal)
4. Objects Public Network (External)
Answer(s): A,B

Q25. An administrator is implementing a VDI solution in a Nutanix cluster


running AHV. The implementation includes home shares for user files. The
shares have to be highly available, only accessible by the named user, and
replicated to a DR site.
What solution would best fulfill these requirements?
1. Files with Access Based Enumeration enabled.
2. Volumes with ISCSI Initiators disabled.
3. Objects with WORM enabled.
4. Nutanix container with Whitelisting configured.

Answer(s): A
Q26. An administrator needs to deploy a Files cluster, create shares and make
sure that users cannot upload any infected files to the shares.

NCP-US-6.5 (1) 8
Which configuration will fulfill this requirement?
1. NFS share with ICAP server integration.
2. SMB share with ICAP server integration
3. NFS share with File Analytics deployed.
4. SMB share with File Analytics deployed.

Answer(s): A
Q27. An administrator has deployed a new backup software suite and needs to
meet the following requirements:

1. use S3-compatible storage.


2. provide one-year retention.
3. protect from deletions or overwrites for one year.
4. meet regulatory requirements.
Answer(s): A
Q28. Which setting should the administrator apply to a newly-created Objects
bucket to ensure the requirements are met?
1. Configure a Lifecycle Policy to overwrite one-year old data in the bucket.
2. Apply an Object versioning policy with one-year retention.
3. Configure the bucket WORM policy with a one-year retention,
4. Apply a bucket Lifecycle Policy with a one-year expiration.
Answer(s): C

Q29. An administrator is scheduling to upgrade Files from version 3.8.1.3 to


4.1.0.2 for all the dark sites.
After transferring the dark site bundle to the internal web server, the
administrator performs an LCM inventory but cannot check off the Files
upgrade to be performed.
Which component needs to be upgraded along side of the core Files
components?

1. Files Sender
2. File Server Module
3. Files Manager
4. File Analytics
Answer(s): B
Q30. Why should an administrator avoid allocating over half the RAM on a host
to a FSVM?

NCP-US-6.5 (1) 9
1. The FSVM would cross NUMA node boundaries.
2. The FSVM has a set memory configuration.
3. The FSVM would be in a single NUMA node boundary.
4. The FSVM would experience host swapping of memory.
Answer(s): A

Q31. Refer the exhibit.

An administrator is experiencing the following Objects failure error message:


IAM Service is not healthy.
The Object Store Domain entries appear grayed out in the user Interface, as
shown in the exhibit.
Which commands should the administrator execute to identify the failure
source?

1. mspcli_cluster_objectmspcli_status -u <UUID- UUID - UUID - UUID >


2. mspctl_cluster_listmspctl_status -u <UUID- UUID - UUID - UUID >
3. mspcli_cluster_listmspcli_status -u <UUID- UUID - UUID - UUID >
4. mspctl_cluster_objectmspctl_status -u <UUID- UUID - UUID - UUID >

Answer(s): C
Q32. A developer has finished developing a new eCommerce site that is broken
out into several different Kubernetes pods. In order to promote the new
application to production, a storage location for static content that the site uses
needs to be defined in the file.
Application requirements:

versioning
WORM

NCP-US-6.5 (1) 10
Replication
Which solution should the administrator choose?

1. Objects
2. Volumes
3. Files with SMB
4. Files with NFS
Answer(s): A
Q33. An administrator performed an upgrade to Prism Central. However, after
reviewing the configuration, Objects is enabled but was not upgraded to the
latest version.
The Objects configuration is showing enabled for the environment and Prism
Element has been updated on the cluster.
How should the administrator resolve this issue?
1. Upgrade NCC and rerun the upgrade.
2. Restaff Objects service and rerun the upgrade.
3. Perform LCM Inventory and apply updates.
4. reapply the Prism Central upgrade,

Answer(s): D
Q34. An administrator is increasing the read performance for Splunk at their
remote site, which uses Objects at the primary site for SmartStore capability.
Read latency is extremely high due to WAN traversal for data,
What should the administrator do to remediate this problem?
1. Deploy another Objects instance at the remote site and configure Streaming
Replication of the SmartStore bucket from the primary site.
2. Deploy another Splunk instance at the remote site and configure Splunk
Replication of the SmartStore bucket from the primary site.
3. Deploy another Splunk instance at the primary site and configure Streaming
Replication of the SmartStore bucket from the remote site.
4. Deploy another Objects instance at the primary site and configure
SmartStore Replication

Answer(s): A
Q35. An administrator needs to deploy a new Linux log collector package which
creates a directory for each monitored item. The logs would be analyzed by a
Windows application.

NCP-US-6.5 (1) 11
Which action should the administrator take, that will provide the best
performance and simplicity?

1. Create an Objects bucket with versioning enabled.


2. Assign e Volume vDisk to the Linux collector VM,
3. Create a Files distributed share with multi-protocol access.
4. Configure Files Analytics to analyze the collected logs.
Answer(s): C
Q36. Due to a new IP addressing plan for the vDesktops network, an
administrator needs to change the Files client-side network.
Which action should the administrator perform first?
1. Stop the Files service,
2. Power off the FSVMs.
3. Create a new' managed virtual network.
4. Remove existing DNS entries.

Answer(s): C
Q37. Due to a new IP addressing plan for the vDesktops network, an
administrator needs to change the Files client-side network.

Which action should the administrator perform first?


1. Stop the Files service,
2. Power off the FSVMs.
3. Create a new' managed virtual network.
4. Remove existing DNS entries.
Answer(s): C

Q38. An administrator is determining the most recent operation a user


performed on the share cifs1 within the last 24 hours.

How should the administrator complete this task in File Analytics?


1. In the Anomalis section. select Users exceed an operation count threshold an
input the 24 hour range for share cifs.
2. In the Audit Trails section, search for the user and view their last operations.
3. In the Audit Trails section, search for the cifs1 share and view the actions on
the share over the past 24-hour range.
4. In the Anomalies section view the anomaly rule created for the user with an
interval of 24 hours.
Answer(s): C

NCP-US-6.5 (1) 12
Q39.

The exhibit shows a Prism Pro scenario result created by an administrator for a
Nutanix cluster.

The physical nodes in the cluster include these characteristics:


144 GHz CPU power
3 Tib RAM
41.63 TiB storage
The total target workload requests are:

5 Ghz CPU
10 GB RAM
40 TiB storage
What should be changed to have a good capacity runway at least for the next 6
months?
1. Review storage capacity requested by the workload.
2. Increase the storage capacity for physical nodes.
3. Add new physical node to the configuration.
4. Change the date of physical rode availability.
Answer(s): A
Q40. What is the most likely cause of an Objects bucket that is shared with
multiple users to approach its assigned capacity limit?

1. Other users have written to the bucket.


2. Objects store capacity includes snapshots.

NCP-US-6.5 (1) 13
3. Some mufti-part operations are pending.
4. Malware infection is causing the usage.
Answer(s): A
Q41. An administrator needs to configure a Files share with these requirements:
Supports 100 virtual desktop users
Share would host user data

Share is limited to 1 TB, evenly distributed across users


Optimized for best I/0 performance within the current environment
Which two configuration actions should the administrator take to meet these
requirements? (Choose two.)
1. Configure a standard share.
2. Create a distributed share.
3. Add a quote policy to the share.
4. Enable ABE on the share.
Answer(s): B,C

Question 1

Refer to the exhibit:

A Files administrator needs to generate a report listing the files matching those
in the exhibit.

What is the most efficient way to complete this task?

A. Use Report Builder in Files Console.

B. Use Report Builder in File Analytics.

C. Create a custom report in Prism Central.

D. Create a custom report in Files Console.

NCP-US-6.5 (1) 14
Answer : B
Question 2
What are two ways to manage Objects? (Choose two.)

A. CLI

B. API

C. PC

D. SSH

Answer : AB
Question 3
Refer to the exhibit.

What best describes the data protection illustrated in the exhibit?

A. Availability Zones

B. NearSync

C. Metro Availability

D. Smart DR

Answer : D
Question 4

NCP-US-6.5 (1) 15
An administrator has performed an upgrade to Files. After upgrading, the file
server cannot reach the given domain name with the specified DNS server list.
Which two steps should the administrator perform to resolve the connectivity
issues with the domain controller servers? (Choose two.)

A. Verify the DNS settings in Prism Central.

B. Verify the DNS settings in Prism Element.

C. Verify the DNS entries for the given domain name.

D. Verify the DNS server addresses of the domain controllers.

Answer : CD
Question 5
An administrator needs to scale out an existing Files instance. Based on the
company’s requirements, the Files instance has four FSVMs configured and
needs to expand to six.
How many additional Client IP addresses and Storage IP addresses does the
administrator require to complete this task?

A. 2 Client IPs and 3 Storage IPs

B. 3 Client IPs and 2 Storage IPs

C. 3 Client IPs and 3 Storage IPs

D. 2 Client IPs and 2 Storage IPs

Answer : D
Question 6
Which user is authorized to deploy File Analytics?

A. Prism Central administrator

B. Prism Element administrator

C. AD user mapped to a Cluster admin role

D. AD user mapped to a Prism admin role

Answer : A

Question 7
An administrator needs to allow individual users to restore files and folders
hosted in Files.

NCP-US-6.5 (1) 16
How can the administrator meet this requirement?

A. Configure a Protection Domain on the FSVMs.

B. Enable Self-Service Restore on shares/exports.

C. Enable Self-Service Restore on the FSVMs.

D. Configure a Protection Domain for the shares/exports.

Answer : B
Question 8
How many configured snapshots are supported for SSR in a file server?

A. 25

B. 50

C. 100

D. 200

Answer : B
Question 9
Which tool allows a report on file sizes to be automatically generated on a
weekly basis?

A. Data Lens

B. Files Console via Prism Element

C. Files view in Prism Central

D. File Analytics

Answer : D
Question 10
What are two network requirements for a four-node FSVM deployment?
(Choose two.)

A. Five available IP addresses on the Storage network

B. Four available IP addresses on the Storage network

C. Four available IP addresses on the Client network

D. Five available IP addresses on the Client network

NCP-US-6.5 (1) 17
Answer : AC
Question 11
An administrator is tasked with creating an Objects store with the following
settings:
Medium Performance (around 10,000 requests per second)

10 TiB capacity
Versioning disabled -
Hosted on an AHV cluster -
Immediately after creation, the administrator is asked to change the name of
Objects store.
How will the administrator achieve this request?

A. Delete and recreate a new Objects store with the updated name.

B. The Objects store can only be renamed if hosted on ESXi.

C. Enable versioning and then rename the Objects store, disable versioning.

D. Update the name of the Objects store by using a CORS XML file.

Answer : A

Question 12
An administrator is required to place all iSCSI traffic on an isolated network.
How can the administrator meet this requirement?

A. Configure network segmentation for Volumes.

B. Create a new network interface on the CVMs via ncli.

C. Configure the Data Services IP on an isolated network.

D. Create a Volumes network in Prism Central.

Answer : A
Question 13
An organization currently has a Files cluster for their back office data including
all department shares. Most of the data is considered Cold Data and they are
looking to migrate to free up space for future growth or newer data.
The organization has recently added an additional node with more storage. In
addition, the organization is using the Public Cloud for other storage needs.

NCP-US-6.5 (1) 18
What will be the best way to achieve this requirement?

A. Setup another cluster and replicate the data with Protection Domain.

B. Migrate cold data from Files to tape storage.

C. Enable Smart Tiering in Files within the File Console.

D. Backup the data using a third-party software and replicate to the cloud.

Answer : C
Question 14
Before upgrading Files or creating a file server, which component must first be
upgraded to a compatible version?

A. FSM

B. File Analytics

C. FSVM

D. Prism Central

Answer : A
Question 15

How can an administrator deploy a new instance of Files?

A. From the Storage view in Prism Element.

B. From the Files Console view in Prism Central.

C. From LCM in Prism Central.

D. From LCM in Prism Element.

Answer : B
Question 1 ( Exam A )
An administrator has received an alert A160068 – AFSDuplicateIPDetected
details of alert as follows:

NCP-US-6.5 (1) 19
Which error log should the administrator review to determine the related
Duplicate IP address involved?

A. solver.log

B. minerva_cvm.log

C. tcpkill.log

D. minerva_nvm.log

Answer : D
Question 2 ( Exam A )
An administrator is planning to upgrade all ESXi hypervisors in a cluster hosting
Files.

When performing one-click hypervisor upgrades, what prerequisite must be


performed?

A. Enable the anti-affinity rules on all FSVMs.

B. Manually migrate the FSVMs.

C. Disable the anti-affinity rules on all FSVMs.

D. Shutdown the FSVMs.

Answer : C
Question 3 ( Exam A )
What is the minimum and maximum file size limitations for Smart Tiering?

A. 64 KiB minimum and 15 TiB maximum

B. 64 KiB minimum and 5 TiB maximum

C. 128 KiB minimum and 15 TiB maximum

D. 128 KiB minimum and 5 TiB maximum

Answer : A
Question 4 ( Exam A )
What is a prerequisite for deploying Smart DR?

A. Requires one-to-many shares.

B. The primary and recovery file servers must have the same domain name.

NCP-US-6.5 (1) 20
C. Open TCP port 7515 on all client network IPs (uni-directionally on the
source and recovery file servers).

D. The Files Manager must have at least three file servers.

Answer : C
Question 5 ( Exam A )
Deploying Files instances require which two minimum resources? (Choose
two.)

A. 12 GiB of memory per host

B. 8 vCPUs per host

C. 4 vCPUs per host

D. 8 GiB of memory per host

Answer : BD
Question 6 ( Exam A )

An administrator has discovered that File server services are down on a cluster.
Which service should the administrator investigate for this issue?

A. cassandra

B. insights_collector

C. minerva_nvm

D. sys_stats_server

Answer : A
Question 7 ( Exam A )
Which Nutanix Unified Storage capability allows for monitoring usage for all
Files deployments globally?

A. Files Manager

B. Data Lens

C. Nutanix Cloud Manager

D. File Analytics

Answer : B
Question 8 ( Exam A )

NCP-US-6.5 (1) 21
What is the primary criteria that should be considered for performance-
sensitive application shares with sequential I/O?

A. Connections

B. IOPS

C. Throughput

D. Block size

Answer : C
Question 9 ( Exam A )
An administrator is tasked with performing an upgrade to the latest Objects
version.

What should the administrator do prior to upgrading Object Manager?

A. Upgrade Objects service

B. Upgrade AOS

C. Upgrade MSP

D. Upgrade Lifecycle Manager

Answer : B
Question 10 ( Exam A )
Refer to the exhibit.

NCP-US-6.5 (1) 22
An administrator is attempting to create a share that will provide user access
via SMB and NFS. However, the Enable multiprotocol access for NFS clients
setting is not available.
What would cause this issue?

A. The incorrect Files license has been applied.

B. NFS is configured to use unmanaged authentication.

C. The connection to Active Directory has not been configured.

D. The File server instance was only configured with SMB.

Answer : C
Question 11 ( Exam A )

Refer to the exhibit.

NCP-US-6.5 (1) 23
An administrator is able to review and modify objects in a registered ESXi
cluster from a PE instance, but when the administrator attempts to deploy an
Objects cluster to the same ESXi cluster, the error that is shown in the exhibit is
shown.
What is the appropriate configuration to verify to allow successful Objects
cluster deployment to this ESXi cluster?

A. Ensure that vCenter in PE cluster is registered using FQDN and that


vCenter details in Objects UI are using IP address.

B. Replace the expired self-signed SSL certificate for the Object Store with
a non-expired public certificate signed by a valid Certificate Authority.

C. Ensure that vCenter in PE cluster is registered using FQDN and that


vCenter details in Objects UI are using FQDN.

D. Replace the expired self-signed SSL certificate for the Object Store with
a non-expired self signed SSL certificate.

Answer : C

NCP-US-6.5 (1) 24
Question 12 ( Exam A )
Which port is required between a CVM or Prism Central to insights.nutanix.com
for Data Lens configuration?

A. 80

B. 443

C. 8443

D. 9440

Answer : B
Question 13 ( Exam A )
Which Data Lens feature maximizes the available file server space by moving
cold data from the file server to an object store?

A. Backup

B. Smart Tier

C. Versioning

D. Smart DR

Answer : B
Question 14 ( Exam A )
An organization currently has two Objects instances deployed between two
sites. Both instances are managed via the same Prism Central to simplify
management.
The organization has a critical application with all data in a bucket that needs to
be replicated to the secondary site for DR purposes. The replication needs to
be asynchronous, including all delete marker versions.
How can the organization satisfy this requirement in Objects?

A. Use a Protection Domain to replicate the Objects Volume Group.

B. With Object Browser, upload the data at the destination site.

C. Leverage the Objects Baseline Replication Tool from a Linux VM.

D. Create a Bucket replication rule, set the destination Objects instance.

Answer : D

Question 15 ( Exam A )

NCP-US-6.5 (1) 25
Which two steps are required for enabling Data Lens? (Choose two.)

A. Configure a MyNutanix account to access the Data Lens console.

B. Add File Services VM admin credentials to a MyNutanix account.

C. In Prism, enable Pulse health monitoring.

D. Configure the Data Services IP in Prism Central.

Answer : AC
Question 16 ( Exam A )

An administrator wants to provide security against ransomware attacks in Files.


The administrator wants to configure the environment to scan files for
ransomware in real time and provide notification in the event of a ransomware
attack.
Which component should the administrator use to meet this requirement?

A. Files Console

B. Syslog Server

C. Protection Domain

D. File Analytics

Answer : D
Question 17 ( Exam A )

An administrator is looking for a tool that includes these features:


Permission Denials -
Top 5 Active Users -
Top 5 Accessed Files -
File Distribution by Type -
Which Nutanix tool should the administrator choose?

A. Files Console

B. File Analytics

C. File Server Manager

D. Prism Central

Answer : B

NCP-US-6.5 (1) 26
Question 18 ( Exam A )

What tool can be used to report on a specific user’s activity within a Files
environment?

A. Prism Central Activity menu

B. Files Console Usage

C. Prism Element Alerts menu

D. Data Lens Audit Trails

Answer : D
Question 19 ( Exam A )
What is a mandatory criteria for configuring Smart Tier?

A. Certificate

B. Access and secret keys

C. Target URL over HTTP

D. VPC name

Answer : B
Question 20 ( Exam A )
An administrator has performed an AOS upgrade, but noticed that the
compression on containers is not happening.
What is the delay before compression begins on the Files container?

A. 30 minutes

B. 60 minutes

C. 12 hours

D. 24 hours

Answer : B
Question 21 ( Exam A )
A company uses Linux and Windows workstations. The administrator is
evaluating solutions for their file storage needs.
The solution should support these requirements:
Distributed File System -

NCP-US-6.5 (1) 27
Active Directory integrated -

Scale out architecture -


Which solution should the administrator choose to satisfy this requirement?

A. Objects

B. Files

C. Mine

D. Volumes

Answer : B
Question 22 ( Exam A )
A team of developers are working on a new processing application and requires
a solution where they can upload the latest version of the code for testing via
API calls. Older iterations should be retained as newer code is developed and
tested.
Which solution will work best for the development team?

A. Create an NFS Share, mounted on a Linux Server with Files.

B. Create an SMB Share with Files and enable Previous Version.

C. Provision a Volume Group and connect via iSCSI with MPIO.

D. Create a bucket in Objects with Versioning enabled.

Answer : D
Question 23 ( Exam A )
What is the binary image extension of File Analytics?

A. ISO

B. QCOW2

C. JSON

D. VMDK

Answer : B
Question 24 ( Exam A )
Which protocols are supported by Files?

A. SMBv2, SMBv3, NFSv2, NFSv3

NCP-US-6.5 (1) 28
B. SMBv1, SMBv2, NFSv3, NFSv4

C. SMBv2, SMBv3, NFSv3, NFSv4

D. SMBv1, SMBv2, NFSv2, NFSv3

Answer : C
Question 25 ( Exam A )
An administrator wants to monitor their Files environment for suspicious
activities, such as mass deletions or access denials.
How can the administrator be alerted to such activities?

A. Deploy the Files Analytics VM, and configure anomaly rules.

B. Create a data protection policy in the Files view in Prism Central.

C. Configure Alerts & Events in the Files Console, filtering for Warning
severity.

D. Configure Files to use ICAP servers, with monitors for desired activities.

Answer : A

Question 26 ( Exam A )
Which action is required to allow the deletion of file server audit data in Data
Lens?

A. Update the data retention period.

B. Configure the audit trail target.

C. Enable the File Server.

D. Disable the File Server.

Answer : A
Question 27 ( Exam A )
An existing Objects bucket was created for backups with these requirements:

WORM policy of one year -


Versioning policy of one year -
Lifecycle policy of three years -
A recent audit has reported a compliance failure. Data that should be retained
for three years has been deleted prematurely.

NCP-US-6.5 (1) 29
How should the administrator resolve the compliance failure within Objects?

A. Recreate a new bucket with the retention policy of three years.

B. Modify the existing bucket versioning policy from one year to three
years.

C. Create a tiering policy to store deleted data on cold storage for three
years.

D. Modify the existing bucket WORM policy from one year to three years.

Answer : D
Question 28 ( Exam A )
An administrator needs to protect a Files cluster with unique policies for
different shares.
How should the administrator meet this requirement?

A. Create a protection domain in the Data Protection view in Prism Element.

B. Configure data protection policies in File Server view in Prism Element.

C. Create a protection domain in the Data Protection view in Prism Central.

D. Configure data protection policies in Files view in Prism Central.

Answer : D

Question 29 ( Exam A )
Refer to the exhibit.

NCP-US-6.5 (1) 30
What does the “X” represent on the icon?

A. Tiered File

B. Corrupt ISO

C. Distributed shared file

D. Share Disconnected File

Answer : A
Question 30 ( Exam A )
An administrator is upgrading Files from version 3.7 to 4.1 in the highly secured
environment, the pre-upgrade check fails with below error:

What initial troubleshooting step should the administrator take?

A. Increase upgrades timeout from ecli1.

B. Examine the failed tasks on the FSVMs.

C. Verify connectivity between the FSVMs.

NCP-US-6.5 (1) 31
D. Check there is enough disk space on FSVMs.

Answer : C
Question 31 ( Exam A )
An administrator has deployed a new Files cluster within a Windows
Environment.

After some days, he Files environment is not able to synchronize users with the
Active Directory server anymore. The administrator observes a large time
difference between the Files environment and the Active Directory Server that
is responsible for the behavior.
How should the administrator prevent the Files environment and the AD Server
from having such a time difference in future?
A. Use the same NTP Servers for the File environment and the AD Server.
B. Use 0.pool.ntp.org as the NTP Server for the AD Server.
C. Use 0.pool.ntp.org as the NTP Server for the Files environment.
D. Connect to every FSVM and edit the time manually.
Correct Answer: A
The administrator should prevent the Files environment and the AD Server from
having such a time difference in future by using the same NTP Servers for the
File environment and the AD Server. NTP (Network Time Protocol) is a protocol
that synchronizes the clocks of devices on a network with a reliable time
source. NTP Servers are devices that provide accurate time information to
other devices on a network. By using the same NTP Servers for the File
environment and the AD Server, the administrator can ensure that they have
consistent and accurate time settings and avoid any synchronization issues or
errors.Reference:Nutanix Files Administration Guide, page 32; Nutanix Files
Troubleshooting Guide

NCP-US-6.5 (1) 32

You might also like