Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Why should an administrator avoid allocating over half the RAM on a host to a FSVM?

A.

The FSVM has a set memory.configuration.

B.

The FSVM would experience host swapping of memory

C.

The FSVM would cross NUMA node boundaries

D.

The FSVM would be in a single NUMA node boundary

Full Access
Question # 5

A company’s Marketing department requires the ability to recover files hosted in a Files share.

They also require the ability to restore files with a timeframe of 14 days.

Which two configurations are required to meet these requirements? ( Choose Two)

A.

Enable Self service restore at share level.

B.

Install Nutanix Guest Tools on clients who need to perform Self service Restore.

C.

Change the Protection domain settings to keep at least 14 days of snapshots.

D.

Change Default settings in the protection configuration window

Full Access
Question # 6

An administrator installed a new Log Analyzer which collects data from physical endpoints

Data collected needs to be accessible and editable for three years after which the data must be

deleted to optimize storage consumption

Which setting should the administrator apply to meet these requirements?

A.

Create a WORM enabled bucket with Lifecycle policy to expire the current objects after three years

B.

Create a Storage Container with a Lifecycle policy to expire the current version after three Years

C.

Create a bucket with a Lifecycle policy to expire the current objects after three years.

D.

Create a Files share with a Lifecycle policy to win the Current files are three years

Full Access
Question # 7

An administrator has been asked to create a new user account for an auditor during an audit

event. The auditor will write data to a Files share. For confidentiality reasons the auditor’s

tasks should be not analyzed by the system. How should the administrator configure File

Analytics to accomplish this task?

A.

Restrict Files access for the auditor

B.

Create a dedicated share for the auditor in Files

C.

Define a blacklisting rule in File Analytics

D.

Grant anonymous access to the share used by the auditor.

Full Access
Question # 8

Users from the brazil HQ office are complaining that they are not able to save data stored on the

company’s Files solution. The save process often fails and they are unable to work.

While troubleshooting, the storage administrator observes that the share auth process times

out. Files is connected to a domain controller located in the UK.

What should the administrator do to solve the problem?

A.

Check the Active Directory Domain Trust settings

B.

Leave the UK Domain and join the Brazil domain

C.

Use afs commands on an FSVM to set the local DC as preferred

D.

Ask the affected users to install the latest security patches and reboot.

Full Access
Question # 9

An administrator has received multiple trouble tickets from users who are unable to access a

particular Distributed share.

While troubleshooting the administrator observes that data located on FSVM 3 can be

accessed but the data located on FSVMs 1 and 2 is inaccessible. The administrator receives

this message when attempting to access data on FSVMS 1 and 2

Network object not found

Both FSVM 1 and 2 nodes successfully reply to pings and the administrator is able to access

data via the node IP

What must the administrator check as a next step?

A.

Check if user permissions are configured correctly

B.

Check if Kerberos_time_skew is logged on the client

C.

Check if SMB1 is enabled on FSVM node 1 and 2

D.

Check if all DNS records are created on the DNS server.

Full Access
Question # 10

Refer to the exhibit.

An administrator has been informed that a new workload will be deployed in six months with these characteristics.

• CPU: 210 GHz

• Memory: 600 GiB

• Storage:11.72 TiB

Upon receiving the new project notification, the administrator creates a scenario to determine whether or not the Nutanix cluster has enough space capacity to properly handle the new workload.

Why is the Overall Cluster runway showing that cluster resources are not exhausted (red color)?

A.

Target analysis timeframe starts after additional resources are added.

B.

There are enough available resources to support the new workload.

C.

Additional resources will be added before the new workload is added

D.

Target analysis timeframe ends before the new workload is added.

Full Access
Question # 11

The Files administrator has received reports from users in the accounting department that

they can see folders that they don't have permission to access. The accounting department

manager has requested that employees should only be able to see folders that they have

permission to access

How would a Files administrator ensure that users in the Accounting share can only see

folders they have permission to access?

A.

Remove File Blocking on the accounting shares

B.

Remove read-only access to shares users should not access

C.

Enable Access-Based Enumeration on the accounting share

D.

Enable Access-Based Enumeration on the File Server

Full Access
Question # 12

What is the most likely cause of an Objects bucket that is shared with multiple users to

approach its assigned capacity limit?

A.

Objects store capacity includes snapshots.

B.

Some multi-part operations are pending.

C.

Malware infections is causing the usage.

D.

Other users have written to the bucket.

Full Access
Question # 13

An administrator is building a new application server and has decided to use post-process

compression for the file server and inline compression for the database components.

The current environment has these characteristics:

• Two Volume Groups named VG1 and VG2. • A Storage Container named SC1 with inlinecompression.• A Storage Container named SC2 with post-process compression.

Which action should the administrator take to most efficiently satisfy this requirement?

A.

Within SC1. create one vDisk in VG1 and one vDisk in VG2.

B.

Within VG1, create one vDisk in SC1 and within VG2. create one Disk in SC2.

C.

Within VG1, create one Disk in SC1 and one Disk in SC2

D.

Within SC1, create one Disk in VG1 and within SC2. create one Disk in VG2

Full Access
Question # 14

An administrator has to enable both Linux and Windows machines to access the same share

served by a Files cluster.

The parameters are as follows:

• Most of the clients are Windows machines• All users have Active Directory (AD) Accounts

• All Linux clients are part of the same class 8 network, everyone else must be denied access

over NFS

• .mp3 files are not allowed on the share

How should the administrator configure the multi-protocol share to achieve these

requirements?

A.

• NFS as the primary protocol SMB with LDAP authentication as secondary

• Enable Default Access (For All Clients) with CIDR notation values

• Configure the ICAP settings to deny mp3 files

B.

• SMB as the primary protocol NFS with AD authentication as secondary

• Enable Default Access (For All Clients) with CIDR notation values

• Select the Blocked File Types checkbox

C.

• SMB as the primary protocol NFS with AD authentication as secondary –

• Enable Default Access (For All Clients) with Netgroups notation values

• Configure the ICAP settings to deny mp3 files

D.

• NFS as the primary protocol SMB with LDAP authentication as secondary

• Enable Default Access (For All Clients) with Netgroups notation values

• Select the Blocked File Types checkbox

Full Access