Nutanix Certified Professional – Unified Storage NCP-US 6.10 Exam Questions Total Questions: 184 – 4 Mock Exams
Practice Set 1
Time limit: 0
0 of 60 questions completed
Questions:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Information
Click on Start Test
You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Nutanix Certified Professional - Unified Storage NCP-US 6.10 Practice Test 1 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Nutanix Certified Professional - Unified Storage NCP-US 6.10
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
An administrator has deployed two object store instances, one in New York and the other in London. Both object stores are managed by their own Prism Central instances running compatible versions. Availability zone pairing and IAM replication have been configured between Prism Central instances; the implementation requires a common namespace. Which additional configuration is required to support this setup?
Correct
Since the administrator has completed availability zone pairing and IAM replication between the Prism Central instances managing the object stores in New York and London, the next logical step is to create a Global Namespace. This allows users and applications to access the object data seamlessly across both regions under a single namespace, fulfilling the requirement for a common namespace.
Incorrect
Since the administrator has completed availability zone pairing and IAM replication between the Prism Central instances managing the object stores in New York and London, the next logical step is to create a Global Namespace. This allows users and applications to access the object data seamlessly across both regions under a single namespace, fulfilling the requirement for a common namespace.
Unattempted
Since the administrator has completed availability zone pairing and IAM replication between the Prism Central instances managing the object stores in New York and London, the next logical step is to create a Global Namespace. This allows users and applications to access the object data seamlessly across both regions under a single namespace, fulfilling the requirement for a common namespace.
Question 2 of 60
2. Question
An administrator is unable to configure new directories in Active Directory using the Nutanix Objects dashboard. What could be the reason for this?
Correct
When IAM-HA is enabled, certain configurations like directory management are locked to ensure consistency and centralized identity management.
Incorrect
When IAM-HA is enabled, certain configurations like directory management are locked to ensure consistency and centralized identity management.
Unattempted
When IAM-HA is enabled, certain configurations like directory management are locked to ensure consistency and centralized identity management.
Question 3 of 60
3. Question
An administrator has determined that adding File Server VMs to the cluster will provide more resources. What should the administrator validate so that the new File Server VMs can be added?
Correct
In a Nutanix Files deployment, each FSVM runs on its own physical host (node). If you want to scale out and add more FSVMs, the system requires additional nodes that are not currently hosting FSVMs. This ensures load distribution and avoids resource contention. Without extra nodes, you cannot add more FSVMs, making option d the correct and critical prerequisite.
Incorrect
In a Nutanix Files deployment, each FSVM runs on its own physical host (node). If you want to scale out and add more FSVMs, the system requires additional nodes that are not currently hosting FSVMs. This ensures load distribution and avoids resource contention. Without extra nodes, you cannot add more FSVMs, making option d the correct and critical prerequisite.
Unattempted
In a Nutanix Files deployment, each FSVM runs on its own physical host (node). If you want to scale out and add more FSVMs, the system requires additional nodes that are not currently hosting FSVMs. This ensures load distribution and avoids resource contention. Without extra nodes, you cannot add more FSVMs, making option d the correct and critical prerequisite.
Question 4 of 60
4. Question
Which two protocols can be enabled during a Nutanix Files installation? (Choose two.)
Correct
Nutanix Files supports two protocols during installation: NFS (Network File System) and SMB (Server Message Block). While Nutanix Files uses iSCSI (Internet Small Computer System Interface) for its backend storage presentation, it‘s not a protocol enabled during Files installation itself. Nutanix Files does not support S3 as a native front-end protocol, but it does support S3 as a target for tiering data based on file age.
Incorrect
Nutanix Files supports two protocols during installation: NFS (Network File System) and SMB (Server Message Block). While Nutanix Files uses iSCSI (Internet Small Computer System Interface) for its backend storage presentation, it‘s not a protocol enabled during Files installation itself. Nutanix Files does not support S3 as a native front-end protocol, but it does support S3 as a target for tiering data based on file age.
Unattempted
Nutanix Files supports two protocols during installation: NFS (Network File System) and SMB (Server Message Block). While Nutanix Files uses iSCSI (Internet Small Computer System Interface) for its backend storage presentation, it‘s not a protocol enabled during Files installation itself. Nutanix Files does not support S3 as a native front-end protocol, but it does support S3 as a target for tiering data based on file age.
Question 5 of 60
5. Question
An administrator working with user home directories in a distributed share realizes that a specific top-level directory cannot be deleted. What should the administrator do to resolve this issue?
Correct
When working with distributed shares in Nutanix Files, top-level directories (especially those created for home directory use) may be protected to ensure integrity and proper functioning. The Files MMC Snap-in provides administrative control for these situations and should be used to delete such directories. Other tools either lack sufficient access or are not appropriate for managing Nutanix Files-specific objects.
Incorrect
When working with distributed shares in Nutanix Files, top-level directories (especially those created for home directory use) may be protected to ensure integrity and proper functioning. The Files MMC Snap-in provides administrative control for these situations and should be used to delete such directories. Other tools either lack sufficient access or are not appropriate for managing Nutanix Files-specific objects.
Unattempted
When working with distributed shares in Nutanix Files, top-level directories (especially those created for home directory use) may be protected to ensure integrity and proper functioning. The Files MMC Snap-in provides administrative control for these situations and should be used to delete such directories. Other tools either lack sufficient access or are not appropriate for managing Nutanix Files-specific objects.
Question 6 of 60
6. Question
An administrator wants to stop an FSVM. How should the administrator check before stopping a specific FSVM?
Correct
Before stopping an FSVM, the administrator must verify the High Availability (HA) state to ensure that failover mechanisms are working correctly and no active client connections will be disrupted. This prevents downtime or data access issues.
Incorrect
Before stopping an FSVM, the administrator must verify the High Availability (HA) state to ensure that failover mechanisms are working correctly and no active client connections will be disrupted. This prevents downtime or data access issues.
Unattempted
Before stopping an FSVM, the administrator must verify the High Availability (HA) state to ensure that failover mechanisms are working correctly and no active client connections will be disrupted. This prevents downtime or data access issues.
Question 7 of 60
7. Question
An administrator is assigned to migrate physical SQL workloads from a legacy SAN platform to a newly deployed Nutanix environment. The current physical hosts boot from SAN, and the Nutanix environment has plenty of storage resources available. Which action can the administrator take to complete this task?
Correct
To migrate physical SQL workloads that currently boot from SAN, the administrator can use Nutanix Volumes to present iSCSI LUNs. These can replace the SAN LUNs and support booting over iSCSI. This makes Option d the correct and practical solution.
Incorrect
To migrate physical SQL workloads that currently boot from SAN, the administrator can use Nutanix Volumes to present iSCSI LUNs. These can replace the SAN LUNs and support booting over iSCSI. This makes Option d the correct and practical solution.
Unattempted
To migrate physical SQL workloads that currently boot from SAN, the administrator can use Nutanix Volumes to present iSCSI LUNs. These can replace the SAN LUNs and support booting over iSCSI. This makes Option d the correct and practical solution.
Question 8 of 60
8. Question
An administrator is deploying File Analytics on a Nutanix Cluster. The following subnets are available:
CVM subnet: 10.1.1.0/24
AHV subnet: 10.1.1.0/24
Nutanix Files client network: 10.1.3.0/24
Nutanix Files storage network: 10.1.4.0/24
The administrator had used the following IP address while deploying the Files Analytics IP.
10.1.4.100
During deployment, the installation fails with the error message shown in the exhibit.
What action must the administrator take to successfully deploy Files Analytics?
Correct
Allow port 445 in the firewall.
Incorrect: Port 445 is used for SMB traffic. While File Analytics uses SMB internally, this error is not related to a blocked port but rather an invalid network placement of the VM.
Allow port 139 in the firewall.
Incorrect: Port 139 is also used for older SMB communication (NetBIOS over TCP/IP). Again, this is not the root cause of a failed deployment; the deployment failure is due to network misplacement, not blocked ports.
Correct answer
Re-deploy File Analytics on the Files client network.
Correct: File Analytics must be deployed on the same subnet (client network) that clients use to access Nutanix Files shares. This allows it to analyze access patterns, user behavior, and monitor anomalies effectively. Also, this client network should have access to the ISCSI data services IP.
Re-deploy File Analytics on the Files storage network.
Incorrect: This is exactly what the administrator did ? they used 10.1.4.100, which is on the storage network, and it resulted in a deployment failure. File Analytics cannot function on the storage network, as it is not routable or intended for management or analytics traffic.
Details:
The failure occurs because File Analytics was deployed on the Files storage network, which is not suitable for its function. To monitor file access and user activity, File Analytics must be on the client-accessible network, where file shares are accessed. Re-deploying it on the Files client network resolves this issue.
Incorrect
Allow port 445 in the firewall.
Incorrect: Port 445 is used for SMB traffic. While File Analytics uses SMB internally, this error is not related to a blocked port but rather an invalid network placement of the VM.
Allow port 139 in the firewall.
Incorrect: Port 139 is also used for older SMB communication (NetBIOS over TCP/IP). Again, this is not the root cause of a failed deployment; the deployment failure is due to network misplacement, not blocked ports.
Correct answer
Re-deploy File Analytics on the Files client network.
Correct: File Analytics must be deployed on the same subnet (client network) that clients use to access Nutanix Files shares. This allows it to analyze access patterns, user behavior, and monitor anomalies effectively. Also, this client network should have access to the ISCSI data services IP.
Re-deploy File Analytics on the Files storage network.
Incorrect: This is exactly what the administrator did ? they used 10.1.4.100, which is on the storage network, and it resulted in a deployment failure. File Analytics cannot function on the storage network, as it is not routable or intended for management or analytics traffic.
Details:
The failure occurs because File Analytics was deployed on the Files storage network, which is not suitable for its function. To monitor file access and user activity, File Analytics must be on the client-accessible network, where file shares are accessed. Re-deploying it on the Files client network resolves this issue.
Unattempted
Allow port 445 in the firewall.
Incorrect: Port 445 is used for SMB traffic. While File Analytics uses SMB internally, this error is not related to a blocked port but rather an invalid network placement of the VM.
Allow port 139 in the firewall.
Incorrect: Port 139 is also used for older SMB communication (NetBIOS over TCP/IP). Again, this is not the root cause of a failed deployment; the deployment failure is due to network misplacement, not blocked ports.
Correct answer
Re-deploy File Analytics on the Files client network.
Correct: File Analytics must be deployed on the same subnet (client network) that clients use to access Nutanix Files shares. This allows it to analyze access patterns, user behavior, and monitor anomalies effectively. Also, this client network should have access to the ISCSI data services IP.
Re-deploy File Analytics on the Files storage network.
Incorrect: This is exactly what the administrator did ? they used 10.1.4.100, which is on the storage network, and it resulted in a deployment failure. File Analytics cannot function on the storage network, as it is not routable or intended for management or analytics traffic.
Details:
The failure occurs because File Analytics was deployed on the Files storage network, which is not suitable for its function. To monitor file access and user activity, File Analytics must be on the client-accessible network, where file shares are accessed. Re-deploying it on the Files client network resolves this issue.
Question 9 of 60
9. Question
A financial services company must comply with strict data retention regulations, which mandate that certain client transaction data cannot be altered or deleted once collected. The company is using Nutanix Objects to store this data. Which step should the administrator take to ensure data remains immutable and meets regulatory requirements?
Correct
WORM is the industry-standard solution for making data immutable and tamper-proof, which is what financial regulations demand. It is the only option listed that directly aligns with the compliance need.
Incorrect
WORM is the industry-standard solution for making data immutable and tamper-proof, which is what financial regulations demand. It is the only option listed that directly aligns with the compliance need.
Unattempted
WORM is the industry-standard solution for making data immutable and tamper-proof, which is what financial regulations demand. It is the only option listed that directly aligns with the compliance need.
Question 10 of 60
10. Question
An administrator would like to get email notifications of unusual behavior related to permission changes on their corporate file shares. How would the administrator configure File Analytics to receive notifications in a timely fashion?
Correct
To get notified by email of unusual behavior such as permission changes on file shares, the administrator needs to use File Analytics‘ Anomaly Detection feature. This involves defining Anomaly Rules that match the behavior patterns of interest and configuring those rules to send alerts via email when triggered. Therefore, the correct answer is Option A: Define Anomaly Rules.
Incorrect
To get notified by email of unusual behavior such as permission changes on file shares, the administrator needs to use File Analytics‘ Anomaly Detection feature. This involves defining Anomaly Rules that match the behavior patterns of interest and configuring those rules to send alerts via email when triggered. Therefore, the correct answer is Option A: Define Anomaly Rules.
Unattempted
To get notified by email of unusual behavior such as permission changes on file shares, the administrator needs to use File Analytics‘ Anomaly Detection feature. This involves defining Anomaly Rules that match the behavior patterns of interest and configuring those rules to send alerts via email when triggered. Therefore, the correct answer is Option A: Define Anomaly Rules.
Question 11 of 60
11. Question
An administrator has configured a corporate antivirus solution to quarantine virus-infected files, ensuring they are inaccessible for reading or writing by clients. In addition to Rescan and Unquarantine, what other actions can the administrator perform on these quarantined files?
Correct
In addition to Rescan (to re-check the file) and Unquarantine (to restore access), the administrator can also Delete the quarantined file. This is useful when the file is confirmed to be malicious and no longer needed. Options like Alert, Report, or Reset are not valid user-triggered actions for quarantined files.
Incorrect
In addition to Rescan (to re-check the file) and Unquarantine (to restore access), the administrator can also Delete the quarantined file. This is useful when the file is confirmed to be malicious and no longer needed. Options like Alert, Report, or Reset are not valid user-triggered actions for quarantined files.
Unattempted
In addition to Rescan (to re-check the file) and Unquarantine (to restore access), the administrator can also Delete the quarantined file. This is useful when the file is confirmed to be malicious and no longer needed. Options like Alert, Report, or Reset are not valid user-triggered actions for quarantined files.
Question 12 of 60
12. Question
An administrator observes that a database virtual machine is experiencing degraded disk performance. Which storage technology should the administrator consider implementing to improve disk I/O performance?
Correct
For a database VM experiencing poor disk performance, the best choice is to use Volume Groups. Volume Groups provide dedicated block storage volumes that optimize low-latency, high IOPS, and throughput performance required by database applications. File-based storage (NFS/SMB) or object storage is generally not suitable for high-performance database disk needs.
Incorrect
For a database VM experiencing poor disk performance, the best choice is to use Volume Groups. Volume Groups provide dedicated block storage volumes that optimize low-latency, high IOPS, and throughput performance required by database applications. File-based storage (NFS/SMB) or object storage is generally not suitable for high-performance database disk needs.
Unattempted
For a database VM experiencing poor disk performance, the best choice is to use Volume Groups. Volume Groups provide dedicated block storage volumes that optimize low-latency, high IOPS, and throughput performance required by database applications. File-based storage (NFS/SMB) or object storage is generally not suitable for high-performance database disk needs.
Question 13 of 60
13. Question
An administrator needs to recover a deleted file from an NFS share that has Smart Snapshot Restore (SSR) enabled. What is the correct method to recover the file using SSR?
Correct
In Nutanix Files environments with SSR enabled, the recovery method depends on the protocol in use. For NFS shares, SSR provides read-only snapshots of the entire share/export, but does not integrate with Windows Previous Versions. Therefore, recovering deleted files requires manually copying the needed data from these read-only snapshots. This contrasts with SMB shares, where SSR supports recovery through Windows Previous Versions. Understanding this difference is critical for proper file recovery based on the protocol.
Incorrect
In Nutanix Files environments with SSR enabled, the recovery method depends on the protocol in use. For NFS shares, SSR provides read-only snapshots of the entire share/export, but does not integrate with Windows Previous Versions. Therefore, recovering deleted files requires manually copying the needed data from these read-only snapshots. This contrasts with SMB shares, where SSR supports recovery through Windows Previous Versions. Understanding this difference is critical for proper file recovery based on the protocol.
Unattempted
In Nutanix Files environments with SSR enabled, the recovery method depends on the protocol in use. For NFS shares, SSR provides read-only snapshots of the entire share/export, but does not integrate with Windows Previous Versions. Therefore, recovering deleted files requires manually copying the needed data from these read-only snapshots. This contrasts with SMB shares, where SSR supports recovery through Windows Previous Versions. Understanding this difference is critical for proper file recovery based on the protocol.
Question 14 of 60
14. Question
What is the default cold data age threshold configured in the File Analytics Data Age widget?
Correct
The cold data threshold in the Nutanix File Analytics Data Age widget is defined as data not accessed in the last four weeks or more. This classification helps in identifying stale data that can be offloaded, archived, or deleted to optimize storage usage.
Incorrect
The cold data threshold in the Nutanix File Analytics Data Age widget is defined as data not accessed in the last four weeks or more. This classification helps in identifying stale data that can be offloaded, archived, or deleted to optimize storage usage.
Unattempted
The cold data threshold in the Nutanix File Analytics Data Age widget is defined as data not accessed in the last four weeks or more. This classification helps in identifying stale data that can be offloaded, archived, or deleted to optimize storage usage.
Question 15 of 60
15. Question
An administrator notices that the Upgrade option for Objects Manager is disabled. What is the most likely reason for this behavior?
Correct
The most likely reason for the Objects Manager upgrade option being disabled is that a previous Objects Service upgrade failed, prompting the system to block further upgrade attempts until the problem is addressed.
Incorrect
The most likely reason for the Objects Manager upgrade option being disabled is that a previous Objects Service upgrade failed, prompting the system to block further upgrade attempts until the problem is addressed.
Unattempted
The most likely reason for the Objects Manager upgrade option being disabled is that a previous Objects Service upgrade failed, prompting the system to block further upgrade attempts until the problem is addressed.
Question 16 of 60
16. Question
For large block sequential workloads with I/O sizes of 1 MB or larger, it‘s beneficial to increase the iSCSI MaxTransferLength to:
Correct
Increasing the MaxTransferLength to 1 MB is a well-recognized best practice for improving performance in sequential workloads with large I/O sizes, especially in high-performance environments using Nutanix Volumes or other iSCSI-based storage.
Incorrect
Increasing the MaxTransferLength to 1 MB is a well-recognized best practice for improving performance in sequential workloads with large I/O sizes, especially in high-performance environments using Nutanix Volumes or other iSCSI-based storage.
Unattempted
Increasing the MaxTransferLength to 1 MB is a well-recognized best practice for improving performance in sequential workloads with large I/O sizes, especially in high-performance environments using Nutanix Volumes or other iSCSI-based storage.
Question 17 of 60
17. Question
An administrator is tasked with creating a volume group (VG) to host highly sensitive data. These two requirements must be achieved: The VG must be accessible only by the OS where the data is going to be used by the application. The access needs to be secured with an additional security login Which two features or settings can help fulfill these requirements? (Choose two.)
Correct
To secure a volume group with highly sensitive data and ensure it is only accessible by a specific OS, the administrator should: Limit access by specifying only the allowed IQN(s) in the VG configuration. Enable CHAP authentication to enforce an additional login security layer. Encryption on the wire (option b) is recommended but does not control access, and RDMA (option a) is unrelated to these security controls.
Incorrect
To secure a volume group with highly sensitive data and ensure it is only accessible by a specific OS, the administrator should: Limit access by specifying only the allowed IQN(s) in the VG configuration. Enable CHAP authentication to enforce an additional login security layer. Encryption on the wire (option b) is recommended but does not control access, and RDMA (option a) is unrelated to these security controls.
Unattempted
To secure a volume group with highly sensitive data and ensure it is only accessible by a specific OS, the administrator should: Limit access by specifying only the allowed IQN(s) in the VG configuration. Enable CHAP authentication to enforce an additional login security layer. Encryption on the wire (option b) is recommended but does not control access, and RDMA (option a) is unrelated to these security controls.
Question 18 of 60
18. Question
An administrator observes that object stores have stopped gathering analytics data approximately nine months after they were enabled. What action must be taken to resume the Data Lens functionality?
Correct
Object stores using Nutanix Objects versions before 4.4 may stop analytics due to key rotation. The correct method to resume functionality is to disable and re-enable analytics on the object store.
Incorrect
Object stores using Nutanix Objects versions before 4.4 may stop analytics due to key rotation. The correct method to resume functionality is to disable and re-enable analytics on the object store.
Unattempted
Object stores using Nutanix Objects versions before 4.4 may stop analytics due to key rotation. The correct method to resume functionality is to disable and re-enable analytics on the object store.
Question 19 of 60
19. Question
While configuring Nutanix Objects, an administrator has specified an NTP server in Prism Element but has not set up DNS in Prism Central. Is this configuration considered valid for a functional Nutanix Objects deployment?
Correct
Proper functioning of Nutanix Objects and related services requires accurate time (NTP) and domain resolution (DNS). To avoid resolution or time sync issues, both settings must be configured on both Prism Element (cluster-specific) and Prism Central (management and external services).
Incorrect
Proper functioning of Nutanix Objects and related services requires accurate time (NTP) and domain resolution (DNS). To avoid resolution or time sync issues, both settings must be configured on both Prism Element (cluster-specific) and Prism Central (management and external services).
Unattempted
Proper functioning of Nutanix Objects and related services requires accurate time (NTP) and domain resolution (DNS). To avoid resolution or time sync issues, both settings must be configured on both Prism Element (cluster-specific) and Prism Central (management and external services).
Question 20 of 60
20. Question
Which of the following represents the correct format for an iSCSI Qualified Name (IQN)?
Correct
The IQN must follow the standard format: iqn.yyyy-mm.naming-authority:unique_name. This includes the year and month in correct order, a naming authority, and a unique device name separated by a colon.
Incorrect
The IQN must follow the standard format: iqn.yyyy-mm.naming-authority:unique_name. This includes the year and month in correct order, a naming authority, and a unique device name separated by a colon.
Unattempted
The IQN must follow the standard format: iqn.yyyy-mm.naming-authority:unique_name. This includes the year and month in correct order, a naming authority, and a unique device name separated by a colon.
Question 21 of 60
21. Question
An administrator has been tasked with locking a file indefinitely. The lock can be explicitly removed only by authorized users. Which configuration meets these requirements?
A four-node Nutanix cluster at the primary site has three FSVM instances deployed. The administrator would like to configure Smart DR on a five-node Nutanix cluster at the recovery site. How many FSVMs must be deployed on the recovery site to support Smart DR?
Correct
Nutanix Smart DR replicates Nutanix Files data and configuration between the primary and recovery sites. For efficient and seamless failover, the FSVM (File Server VM) configuration should ideally be mirrored between both sites.
In this scenario:
The primary site has 3 FSVMs.
Therefore, the recovery site should also have 3 FSVMs to:
Ensure proper load handling
Maintain high availability (HA)
Prevent performance degradation
Guarantee symmetry between clusters
Deploying fewer FSVMs (such as 1 or 2) would compromise redundancy and DR reliability, while deploying more (like 4) is unnecessary unless scaling for future growth.
Incorrect
Nutanix Smart DR replicates Nutanix Files data and configuration between the primary and recovery sites. For efficient and seamless failover, the FSVM (File Server VM) configuration should ideally be mirrored between both sites.
In this scenario:
The primary site has 3 FSVMs.
Therefore, the recovery site should also have 3 FSVMs to:
Ensure proper load handling
Maintain high availability (HA)
Prevent performance degradation
Guarantee symmetry between clusters
Deploying fewer FSVMs (such as 1 or 2) would compromise redundancy and DR reliability, while deploying more (like 4) is unnecessary unless scaling for future growth.
Unattempted
Nutanix Smart DR replicates Nutanix Files data and configuration between the primary and recovery sites. For efficient and seamless failover, the FSVM (File Server VM) configuration should ideally be mirrored between both sites.
In this scenario:
The primary site has 3 FSVMs.
Therefore, the recovery site should also have 3 FSVMs to:
Ensure proper load handling
Maintain high availability (HA)
Prevent performance degradation
Guarantee symmetry between clusters
Deploying fewer FSVMs (such as 1 or 2) would compromise redundancy and DR reliability, while deploying more (like 4) is unnecessary unless scaling for future growth.
Question 23 of 60
23. Question
Refer to the exhibit below: 10.1.216.192 3260 iqn.2010-06.com.nutanix:vg1-5ff34411-080e-4b95-97c8-c2e34d9e1a82-tgt0 “NuTforyou@123“ What does the string “NuTforyou@123“ represent in this iSCSI connection configuration?
Correct
In the iSCSI configuration string: 10.1.216.192 3260 iqn.2010-06.com.nutanix:vg1–tgt0 “NuTforyou@123“ 10.1.216.192 is the iSCSI target IP (host). 3260 is the default iSCSI port. iqn.2010-06.com.nutanix:vg1-… identifies the iSCSI target using an IQN which includes the volume group. “NuTforyou@123“ is the CHAP secret, used for secure iSCSI authentication.
Incorrect
In the iSCSI configuration string: 10.1.216.192 3260 iqn.2010-06.com.nutanix:vg1–tgt0 “NuTforyou@123“ 10.1.216.192 is the iSCSI target IP (host). 3260 is the default iSCSI port. iqn.2010-06.com.nutanix:vg1-… identifies the iSCSI target using an IQN which includes the volume group. “NuTforyou@123“ is the CHAP secret, used for secure iSCSI authentication.
Unattempted
In the iSCSI configuration string: 10.1.216.192 3260 iqn.2010-06.com.nutanix:vg1–tgt0 “NuTforyou@123“ 10.1.216.192 is the iSCSI target IP (host). 3260 is the default iSCSI port. iqn.2010-06.com.nutanix:vg1-… identifies the iSCSI target using an IQN which includes the volume group. “NuTforyou@123“ is the CHAP secret, used for secure iSCSI authentication.
Question 24 of 60
24. Question
During a Nutanix Objects cluster deployment, an administrator encounters a failure at the precheck stage. Which log files should the administrator review to troubleshoot and gather more details about the failure?
Correct
Deployment and precheck issues are managed by the Objects Service Manager, and its logs contain the required diagnostics for failure analysis.
Incorrect
Deployment and precheck issues are managed by the Objects Service Manager, and its logs contain the required diagnostics for failure analysis.
Unattempted
Deployment and precheck issues are managed by the Objects Service Manager, and its logs contain the required diagnostics for failure analysis.
Question 25 of 60
25. Question
To move tagged objects to a remote Nutanix Objects instance after a specific duration, what action must the administrator take?
Correct
To move tagged objects to a remote Nutanix Objects instance after a certain time, the administrator must: Set up a Cloud Bucket Endpoint using the Nutanix provider. Create a Lifecycle Policy that targets tagged objects and defines the time-based rule for migration.
Incorrect
To move tagged objects to a remote Nutanix Objects instance after a certain time, the administrator must: Set up a Cloud Bucket Endpoint using the Nutanix provider. Create a Lifecycle Policy that targets tagged objects and defines the time-based rule for migration.
Unattempted
To move tagged objects to a remote Nutanix Objects instance after a certain time, the administrator must: Set up a Cloud Bucket Endpoint using the Nutanix provider. Create a Lifecycle Policy that targets tagged objects and defines the time-based rule for migration.
Question 26 of 60
26. Question
An administrator must configure an SMB share for the user profiles in a company. Which type of network share is best suited for storing and managing user profiles?
Correct
When setting up an SMB share for user profiles, it?s essential to have full read/write access and support for file locking, sharing, and permissions. A standard share meets all these requirements and is optimized for such use cases. Other share types like WORM or distributed are tailored for niche needs such as compliance or multi-site redundancy.
Incorrect
When setting up an SMB share for user profiles, it?s essential to have full read/write access and support for file locking, sharing, and permissions. A standard share meets all these requirements and is optimized for such use cases. Other share types like WORM or distributed are tailored for niche needs such as compliance or multi-site redundancy.
Unattempted
When setting up an SMB share for user profiles, it?s essential to have full read/write access and support for file locking, sharing, and permissions. A standard share meets all these requirements and is optimized for such use cases. Other share types like WORM or distributed are tailored for niche needs such as compliance or multi-site redundancy.
Question 27 of 60
27. Question
An administrator plans to conduct a disaster recovery (DR) test using Nutanix Files at a secondary site. Which Nutanix Files feature enables the administrator to perform the test without affecting the production environment?
Correct
While snapshots are used to replicate and protect file server data, File Cloning is the correct feature for conducting DR tests. It allows the admin to create cloned instances of the file server or share at the secondary site, enabling thorough testing of disaster recovery procedures without downtime or risk to the production environment.
Incorrect
While snapshots are used to replicate and protect file server data, File Cloning is the correct feature for conducting DR tests. It allows the admin to create cloned instances of the file server or share at the secondary site, enabling thorough testing of disaster recovery procedures without downtime or risk to the production environment.
Unattempted
While snapshots are used to replicate and protect file server data, File Cloning is the correct feature for conducting DR tests. It allows the admin to create cloned instances of the file server or share at the secondary site, enabling thorough testing of disaster recovery procedures without downtime or risk to the production environment.
Question 28 of 60
28. Question
Which workload type is characterized by I/O sizes for read and write operations that are less than or equal to 16 KB while file sizes are equal to 10 MB or more?
In an online deployment scenario, which two URLs must Prism Central be able to access to support a Nutanix Objects server? (Choose two.)
Correct
In an online deployment of Nutanix Objects through Prism Central, access to download.nutanix.com is essential for retrieving installation metadata and required packages, while docker.io is necessary for pulling container images. These two endpoints must be reachable for the Objects service to be deployed and function correctly.
Incorrect
In an online deployment of Nutanix Objects through Prism Central, access to download.nutanix.com is essential for retrieving installation metadata and required packages, while docker.io is necessary for pulling container images. These two endpoints must be reachable for the Objects service to be deployed and function correctly.
Unattempted
In an online deployment of Nutanix Objects through Prism Central, access to download.nutanix.com is essential for retrieving installation metadata and required packages, while docker.io is necessary for pulling container images. These two endpoints must be reachable for the Objects service to be deployed and function correctly.
Question 30 of 60
30. Question
A project team includes users working on both Windows and Linux systems. The administrator needs to configure a shared storage solution that both groups can access seamlessly. What is the best way to configure the share to meet this requirement?
Correct
To support file sharing between Windows and Linux users, Nutanix Files offers multiprotocol access, allowing a single share to be accessed via SMB (Windows) and NFS (Linux). A standard share with SMB as the primary protocol ensures better integration with Active Directory and more robust permission management, making it the best choice for collaborative environments.
Incorrect
To support file sharing between Windows and Linux users, Nutanix Files offers multiprotocol access, allowing a single share to be accessed via SMB (Windows) and NFS (Linux). A standard share with SMB as the primary protocol ensures better integration with Active Directory and more robust permission management, making it the best choice for collaborative environments.
Unattempted
To support file sharing between Windows and Linux users, Nutanix Files offers multiprotocol access, allowing a single share to be accessed via SMB (Windows) and NFS (Linux). A standard share with SMB as the primary protocol ensures better integration with Active Directory and more robust permission management, making it the best choice for collaborative environments.
Question 31 of 60
31. Question
An administrator is granting users access to Data Lens. The user doesn‘t see the file servers or object stores in the Account. What should the administrator do to enable their data source in the Account Dashboard?
Correct
For a file server or object store to appear in the Data Lens Account Dashboard, the underlying AOS cluster must have Pulse Health Monitoring enabled. Pulse allows the cluster to share telemetry and metadata with Nutanix‘s centralized services, including Data Lens. If Pulse is disabled, the data sources on that cluster will not be discoverable or shown in the dashboard, regardless of user permissions or login credentials. Therefore, the administrator must enable Pulse on the AOS cluster to ensure data sources appear correctly in the Data Lens interface.
Incorrect
For a file server or object store to appear in the Data Lens Account Dashboard, the underlying AOS cluster must have Pulse Health Monitoring enabled. Pulse allows the cluster to share telemetry and metadata with Nutanix‘s centralized services, including Data Lens. If Pulse is disabled, the data sources on that cluster will not be discoverable or shown in the dashboard, regardless of user permissions or login credentials. Therefore, the administrator must enable Pulse on the AOS cluster to ensure data sources appear correctly in the Data Lens interface.
Unattempted
For a file server or object store to appear in the Data Lens Account Dashboard, the underlying AOS cluster must have Pulse Health Monitoring enabled. Pulse allows the cluster to share telemetry and metadata with Nutanix‘s centralized services, including Data Lens. If Pulse is disabled, the data sources on that cluster will not be discoverable or shown in the dashboard, regardless of user permissions or login credentials. Therefore, the administrator must enable Pulse on the AOS cluster to ensure data sources appear correctly in the Data Lens interface.
Question 32 of 60
32. Question
An administrator has created a multi-protocol department share on Nutanix Files with the following configuration: Max Size of 800GB SMB is configured as the primary protocol NFS is configured for read-write access Quota policy for the AD group HR, limited to 20GB A second quota policy of 30GB was set for the AD group Finance. A user in the HR group has begun receiving daily email notifications, telling them that they have consumed all available space. However, they are still able to write new files. Another user in the Finance AD group who uses a Linux workstation is able to write files and receives no email notification. What should an administrator do to restrict the HR user from writing new data?
Correct
The HR user receives quota alerts but is still able to write data because the quota is a soft limit. To enforce storage limits and prevent further writes, the administrator must set the quota policy to a hard limit, which actively blocks data writes once the quota is breached.
Incorrect
The HR user receives quota alerts but is still able to write data because the quota is a soft limit. To enforce storage limits and prevent further writes, the administrator must set the quota policy to a hard limit, which actively blocks data writes once the quota is breached.
Unattempted
The HR user receives quota alerts but is still able to write data because the quota is a soft limit. To enforce storage limits and prevent further writes, the administrator must set the quota policy to a hard limit, which actively blocks data writes once the quota is breached.
Question 33 of 60
33. Question
An administrator manages a 3-node AHV cluster running Nutanix Files and is performing a scale-out operation on a multi-node FSVM deployment. However, the operation has failed. What should the administrator do first?
Correct
Nutanix Files, in multi-node FSVM deployments, requires one FSVM per physical node. In a 3-node cluster, if there are already 3 FSVMs deployed, a scale-out cannot proceed without adding more physical hosts. Therefore, to enable the scale-out, the AHV cluster must be expanded by adding at least one more node.
Incorrect
Nutanix Files, in multi-node FSVM deployments, requires one FSVM per physical node. In a 3-node cluster, if there are already 3 FSVMs deployed, a scale-out cannot proceed without adding more physical hosts. Therefore, to enable the scale-out, the AHV cluster must be expanded by adding at least one more node.
Unattempted
Nutanix Files, in multi-node FSVM deployments, requires one FSVM per physical node. In a 3-node cluster, if there are already 3 FSVMs deployed, a scale-out cannot proceed without adding more physical hosts. Therefore, to enable the scale-out, the AHV cluster must be expanded by adding at least one more node.
Question 34 of 60
34. Question
In File Analytics, what enables searching for a specific user or file activities?
Correct
Among all the options, Audit Trails is the only feature that provides the ability to search for and review the activity of specific users, files, or folders. It offers precise and filterable access logs, making it essential for security audits and compliance monitoring.
Incorrect
Among all the options, Audit Trails is the only feature that provides the ability to search for and review the activity of specific users, files, or folders. It offers precise and filterable access logs, making it essential for security audits and compliance monitoring.
Unattempted
Among all the options, Audit Trails is the only feature that provides the ability to search for and review the activity of specific users, files, or folders. It offers precise and filterable access logs, making it essential for security audits and compliance monitoring.
Question 35 of 60
35. Question
An administrator has a primary Nutanix Files instance running on an ESXi-based Nutanix cluster at the main site. An identical Files instance has been configured at a secondary site for disaster recovery purposes with less than 5ms latency between the two sites. Management has asked that the primary Files instance be configured in such a way that provides a zero RPO. Which File Server option needs to be enabled to support the request?
Correct
To achieve zero RPO for Nutanix Files in a multi-site environment with low latency, the administrator must enable the Metro Protection Domain feature. This provides synchronous replication, ensuring data consistency between primary and secondary sites.
Incorrect
To achieve zero RPO for Nutanix Files in a multi-site environment with low latency, the administrator must enable the Metro Protection Domain feature. This provides synchronous replication, ensuring data consistency between primary and secondary sites.
Unattempted
To achieve zero RPO for Nutanix Files in a multi-site environment with low latency, the administrator must enable the Metro Protection Domain feature. This provides synchronous replication, ensuring data consistency between primary and secondary sites.
Question 36 of 60
36. Question
An administrator has recently added several NGT-enabled VMs with in-guest iSCSI initiators to a Volume Group (VG) using the IP address in the VG allowlist. After a few days, the administrator had to restore the VG. Upon restoring the VG, the VMs lost connectivity to the Group. What should the administrator have done differently to prevent this from happening?
Correct
When using in-guest iSCSI initiators with NGT-enabled VMs, the VG allowlist must reference the iSCSI IQN of each initiator to maintain persistent access, especially after events like VG restore or IP address changes. Using IP addresses alone is fragile, as IPs can change, causing loss of connectivity.
Incorrect
When using in-guest iSCSI initiators with NGT-enabled VMs, the VG allowlist must reference the iSCSI IQN of each initiator to maintain persistent access, especially after events like VG restore or IP address changes. Using IP addresses alone is fragile, as IPs can change, causing loss of connectivity.
Unattempted
When using in-guest iSCSI initiators with NGT-enabled VMs, the VG allowlist must reference the iSCSI IQN of each initiator to maintain persistent access, especially after events like VG restore or IP address changes. Using IP addresses alone is fragile, as IPs can change, causing loss of connectivity.
Question 37 of 60
37. Question
Which authentication type do SMB clients use to access exports?
Correct
SMB clients have only one authentication type, Active Directory (AD), that they can use to access exports. NFS clients can access SMB shares using AD, LDAP, system, or unmanaged protocols.
Incorrect
SMB clients have only one authentication type, Active Directory (AD), that they can use to access exports. NFS clients can access SMB shares using AD, LDAP, system, or unmanaged protocols.
Unattempted
SMB clients have only one authentication type, Active Directory (AD), that they can use to access exports. NFS clients can access SMB shares using AD, LDAP, system, or unmanaged protocols.
Question 38 of 60
38. Question
When can an admin configure WORM policies for a bucket?
Correct
WORM is enabled post-creation to give administrators time to configure and review policies. It ensures administrators explicitly set WORM protection only where required.
Incorrect
WORM is enabled post-creation to give administrators time to configure and review policies. It ensures administrators explicitly set WORM protection only where required.
Unattempted
WORM is enabled post-creation to give administrators time to configure and review policies. It ensures administrators explicitly set WORM protection only where required.
Question 39 of 60
39. Question
An administrator needs to ensure the company has access to key information about their Nutanix Files deployment share folders, such as:
Malicious Clients
Vulnerable Shares
List of potential ransomware attack attempts
What must be deployed on-premises to provide the monitoring needed to see this information?
Correct
To meet compliance and security requirements in on-premises (especially dark site) environments, the File Analytics VM must be deployed. It provides visibility into key metrics such as:
Malicious clients
Vulnerable SMB/NFS shares
Potential ransomware behavior
Audit activity and anomalies
This solution is ideal for environments where cloud-based tools like Data Lens cannot be used, ensuring security monitoring and operational awareness for Nutanix Files deployments.
Incorrect
To meet compliance and security requirements in on-premises (especially dark site) environments, the File Analytics VM must be deployed. It provides visibility into key metrics such as:
Malicious clients
Vulnerable SMB/NFS shares
Potential ransomware behavior
Audit activity and anomalies
This solution is ideal for environments where cloud-based tools like Data Lens cannot be used, ensuring security monitoring and operational awareness for Nutanix Files deployments.
Unattempted
To meet compliance and security requirements in on-premises (especially dark site) environments, the File Analytics VM must be deployed. It provides visibility into key metrics such as:
Malicious clients
Vulnerable SMB/NFS shares
Potential ransomware behavior
Audit activity and anomalies
This solution is ideal for environments where cloud-based tools like Data Lens cannot be used, ensuring security monitoring and operational awareness for Nutanix Files deployments.
Question 40 of 60
40. Question
Which share workload type must be configured to support workloads with small I/O?
Correct
When supporting workloads with small, frequent, and random I/O patterns, such as databases or virtual desktops, the “Random“ share workload type should be configured. This setting tunes storage behavior (like caching and data path handling) to optimize performance under small I/O loads.
Incorrect
When supporting workloads with small, frequent, and random I/O patterns, such as databases or virtual desktops, the “Random“ share workload type should be configured. This setting tunes storage behavior (like caching and data path handling) to optimize performance under small I/O loads.
Unattempted
When supporting workloads with small, frequent, and random I/O patterns, such as databases or virtual desktops, the “Random“ share workload type should be configured. This setting tunes storage behavior (like caching and data path handling) to optimize performance under small I/O loads.
Question 41 of 60
41. Question
How can an admin configure Nutanix Volumes to make sure secure iSCSI connections?
Correct
To secure iSCSI connections in Nutanix Volumes, the most effective approach is to enable CHAP authentication. This ensures that only authenticated initiators can access the Volume Group. While setting up a Data Services IP is necessary for connectivity and failover, it does not provide authentication or encryption. CHAP is the essential setting for security.
Incorrect
To secure iSCSI connections in Nutanix Volumes, the most effective approach is to enable CHAP authentication. This ensures that only authenticated initiators can access the Volume Group. While setting up a Data Services IP is necessary for connectivity and failover, it does not provide authentication or encryption. CHAP is the essential setting for security.
Unattempted
To secure iSCSI connections in Nutanix Volumes, the most effective approach is to enable CHAP authentication. This ensures that only authenticated initiators can access the Volume Group. While setting up a Data Services IP is necessary for connectivity and failover, it does not provide authentication or encryption. CHAP is the essential setting for security.
Question 42 of 60
42. Question
When naming an Object Store instance, what are the two naming rules that must be followed? (Choose two.)
Correct
When naming a Nutanix Object Store instance, you must follow DNS-compatible naming conventions. These include: Starting with a letter and ending with a letter or number. Being unique across all Object Store instances within the system. Following these rules ensures the name is valid and resolvable in distributed environments where consistency and uniqueness are critical.
Incorrect
When naming a Nutanix Object Store instance, you must follow DNS-compatible naming conventions. These include: Starting with a letter and ending with a letter or number. Being unique across all Object Store instances within the system. Following these rules ensures the name is valid and resolvable in distributed environments where consistency and uniqueness are critical.
Unattempted
When naming a Nutanix Object Store instance, you must follow DNS-compatible naming conventions. These include: Starting with a letter and ending with a letter or number. Being unique across all Object Store instances within the system. Following these rules ensures the name is valid and resolvable in distributed environments where consistency and uniqueness are critical.
Question 43 of 60
43. Question
What is the correct upgrade order for Nutanix components?
Correct
Nutanix recommends upgrading Prism Central first, followed by Prism Element, then MSP Controller, Objects Manager, and finally Objects Service to ensure version compatibility across the stack.
Incorrect
Nutanix recommends upgrading Prism Central first, followed by Prism Element, then MSP Controller, Objects Manager, and finally Objects Service to ensure version compatibility across the stack.
Unattempted
Nutanix recommends upgrading Prism Central first, followed by Prism Element, then MSP Controller, Objects Manager, and finally Objects Service to ensure version compatibility across the stack.
Question 44 of 60
44. Question
What are the two options that show the correct minimum configurations when deploying Nutanix File servers?
Correct
When focusing strictly on minimum configuration requirements (not scalability), the correct answers are: 1. CVMs must be equal to or greater than FSVMs 2. Each FSVM must have at least 12 GiB of RAM Options (c) and (d) either exceed the minimum requirements or refer to scalable deployments rather than minimum viable deployments.
Incorrect
When focusing strictly on minimum configuration requirements (not scalability), the correct answers are: 1. CVMs must be equal to or greater than FSVMs 2. Each FSVM must have at least 12 GiB of RAM Options (c) and (d) either exceed the minimum requirements or refer to scalable deployments rather than minimum viable deployments.
Unattempted
When focusing strictly on minimum configuration requirements (not scalability), the correct answers are: 1. CVMs must be equal to or greater than FSVMs 2. Each FSVM must have at least 12 GiB of RAM Options (c) and (d) either exceed the minimum requirements or refer to scalable deployments rather than minimum viable deployments.
Question 45 of 60
45. Question
An administrator at a healthcare organization is tasked with ensuring compliance with HIPAA data retention regulations while also improving data accessibility and security. Which of the following actions should the administrator take to effectively meet the organization s requirements? (Choose two)
Correct
These two settings together enforce data lifecycle control (age-based policies) and immutability (WORM), which are both critical to HIPAA retention and data integrity requirements.
Incorrect
These two settings together enforce data lifecycle control (age-based policies) and immutability (WORM), which are both critical to HIPAA retention and data integrity requirements.
Unattempted
These two settings together enforce data lifecycle control (age-based policies) and immutability (WORM), which are both critical to HIPAA retention and data integrity requirements.
Question 46 of 60
46. Question
An administrator has noticed that a firewall-enabled ESXi-based Nutanix cluster fails with the error:
Based on the above Error, which network should the administrator add to the vSphere Web Client firewall to allow the connection?
Correct
192.168.2.0/24
Incorrect: This network is not part of the standard Nutanix internal or external communication used between CVMs and ESXi hosts or vSphere Web Client.
192.168.3.0/24
Incorrect: This subnet is not designated for critical internal communications between the CVM and vSphere for storage or upgrade tasks.
192.168.4.0/24
Incorrect: Although this may be used in some lab environments, it is not the standard internal CVM-to-ESXi/vSphere communication subnet required for storage traffic or file server operations.
Correct answer
192.168.5.0/24
Correct: This subnet is used for internal communication between Nutanix CVMs and the vSphere environment (including ESXi and the vSphere Web Client) for storage traffic. If blocked by the firewall, operations like file server upgrades can fail due to interrupted communication between the CVMs and ESXi hosts.
Details:
The error message indicates a failure in communication between Nutanix CVMs and the ESXi hosts, specifically when performing a file server upgrade.
Nutanix uses 192.168.5.0/24 for internal storage communication between CVMs and vSphere components. The administrator must ensure that this network is allowed through the vSphere Web Client firewall for successful upgrades and storage operations.
Incorrect
192.168.2.0/24
Incorrect: This network is not part of the standard Nutanix internal or external communication used between CVMs and ESXi hosts or vSphere Web Client.
192.168.3.0/24
Incorrect: This subnet is not designated for critical internal communications between the CVM and vSphere for storage or upgrade tasks.
192.168.4.0/24
Incorrect: Although this may be used in some lab environments, it is not the standard internal CVM-to-ESXi/vSphere communication subnet required for storage traffic or file server operations.
Correct answer
192.168.5.0/24
Correct: This subnet is used for internal communication between Nutanix CVMs and the vSphere environment (including ESXi and the vSphere Web Client) for storage traffic. If blocked by the firewall, operations like file server upgrades can fail due to interrupted communication between the CVMs and ESXi hosts.
Details:
The error message indicates a failure in communication between Nutanix CVMs and the ESXi hosts, specifically when performing a file server upgrade.
Nutanix uses 192.168.5.0/24 for internal storage communication between CVMs and vSphere components. The administrator must ensure that this network is allowed through the vSphere Web Client firewall for successful upgrades and storage operations.
Unattempted
192.168.2.0/24
Incorrect: This network is not part of the standard Nutanix internal or external communication used between CVMs and ESXi hosts or vSphere Web Client.
192.168.3.0/24
Incorrect: This subnet is not designated for critical internal communications between the CVM and vSphere for storage or upgrade tasks.
192.168.4.0/24
Incorrect: Although this may be used in some lab environments, it is not the standard internal CVM-to-ESXi/vSphere communication subnet required for storage traffic or file server operations.
Correct answer
192.168.5.0/24
Correct: This subnet is used for internal communication between Nutanix CVMs and the vSphere environment (including ESXi and the vSphere Web Client) for storage traffic. If blocked by the firewall, operations like file server upgrades can fail due to interrupted communication between the CVMs and ESXi hosts.
Details:
The error message indicates a failure in communication between Nutanix CVMs and the ESXi hosts, specifically when performing a file server upgrade.
Nutanix uses 192.168.5.0/24 for internal storage communication between CVMs and vSphere components. The administrator must ensure that this network is allowed through the vSphere Web Client firewall for successful upgrades and storage operations.
Question 47 of 60
47. Question
Which Data Lens feature facilitates replication of data at the share level, ensuring that all necessary files are consistently available across different locations?
Correct
The Smart DR feature in Nutanix Data Lens is specifically designed to replicate file share data across different locations, ensuring business continuity and disaster recovery. It allows for share-level replication, making it the most appropriate and accurate choice for ensuring that all necessary files remain accessible across geographically separate environments.
Incorrect
The Smart DR feature in Nutanix Data Lens is specifically designed to replicate file share data across different locations, ensuring business continuity and disaster recovery. It allows for share-level replication, making it the most appropriate and accurate choice for ensuring that all necessary files remain accessible across geographically separate environments.
Unattempted
The Smart DR feature in Nutanix Data Lens is specifically designed to replicate file share data across different locations, ensuring business continuity and disaster recovery. It allows for share-level replication, making it the most appropriate and accurate choice for ensuring that all necessary files remain accessible across geographically separate environments.
Question 48 of 60
48. Question
To deploy Nutanix Files, which two networks should be created before deploying Files?
Correct
To deploy Nutanix Files, you must create: A Storage Network: Enables internal backend communication between FSVMs and CVMs. A Client Network: Allows external access to file shares and communication with DNS/AD. These are mandatory for a functional Nutanix Files deployment.
Incorrect
To deploy Nutanix Files, you must create: A Storage Network: Enables internal backend communication between FSVMs and CVMs. A Client Network: Allows external access to file shares and communication with DNS/AD. These are mandatory for a functional Nutanix Files deployment.
Unattempted
To deploy Nutanix Files, you must create: A Storage Network: Enables internal backend communication between FSVMs and CVMs. A Client Network: Allows external access to file shares and communication with DNS/AD. These are mandatory for a functional Nutanix Files deployment.
Question 49 of 60
49. Question
A company is managing two Nutanix clusters across two different availability zones:
One on-premises
One running in the public cloud (NC2)
The company is evaluating Nutanix Files and is looking for a solution that supports:
15-minute RPO or less
Guided DR process
Minimal operations at failover time
Which data protection strategy should be considered for Nutanix Files?
Correct
To meet the companys needs for a 15-minute RPO, guided disaster recovery (DR) process, and minimal manual intervention during failover, the correct solution is Smart DR.
Smart DR provides:
Low RPOs (as low as 15 minutes)
Automated and guided DR workflows
Minimal manual operations during failover and failback
Cross-cluster replication support, including on-prem to NC2 (public cloud)
Smart DR is specifically designed for Nutanix Files to enable seamless replication, failover, and failback between different environments, making it the most appropriate solution for this use case.
Incorrect
To meet the companys needs for a 15-minute RPO, guided disaster recovery (DR) process, and minimal manual intervention during failover, the correct solution is Smart DR.
Smart DR provides:
Low RPOs (as low as 15 minutes)
Automated and guided DR workflows
Minimal manual operations during failover and failback
Cross-cluster replication support, including on-prem to NC2 (public cloud)
Smart DR is specifically designed for Nutanix Files to enable seamless replication, failover, and failback between different environments, making it the most appropriate solution for this use case.
Unattempted
To meet the companys needs for a 15-minute RPO, guided disaster recovery (DR) process, and minimal manual intervention during failover, the correct solution is Smart DR.
Smart DR provides:
Low RPOs (as low as 15 minutes)
Automated and guided DR workflows
Minimal manual operations during failover and failback
Cross-cluster replication support, including on-prem to NC2 (public cloud)
Smart DR is specifically designed for Nutanix Files to enable seamless replication, failover, and failback between different environments, making it the most appropriate solution for this use case.
Question 50 of 60
50. Question
An administrator needs to deploy a new application that requires high availability and efficient data management. The application will run on a cluster of physical servers and needs to be integrated with an existing Windows Server Failover Clustering (WSFC) setup. Which storage solution should the administrator use to support this application?
Correct
For an application requiring high availability integrated with Windows Server Failover Clustering, block storage with shared access is needed. Nutanix Volumes via iSCSI offer this capability, supporting WSFC?s requirement for shared disks and providing good performance and manageability.
Incorrect
For an application requiring high availability integrated with Windows Server Failover Clustering, block storage with shared access is needed. Nutanix Volumes via iSCSI offer this capability, supporting WSFC?s requirement for shared disks and providing good performance and manageability.
Unattempted
For an application requiring high availability integrated with Windows Server Failover Clustering, block storage with shared access is needed. Nutanix Volumes via iSCSI offer this capability, supporting WSFC?s requirement for shared disks and providing good performance and manageability.
Question 51 of 60
51. Question
What are the recommended settings when hardening a Nutanix Objects bucket with sensitive data?
Correct
To harden a Nutanix Objects bucket with sensitive data, the WORM setting ensures data cannot be changed or deleted, which is essential for compliance, data retention, and audit purposes.
Incorrect
To harden a Nutanix Objects bucket with sensitive data, the WORM setting ensures data cannot be changed or deleted, which is essential for compliance, data retention, and audit purposes.
Unattempted
To harden a Nutanix Objects bucket with sensitive data, the WORM setting ensures data cannot be changed or deleted, which is essential for compliance, data retention, and audit purposes.
Question 52 of 60
52. Question
An administrator is deploying File Analytics on a Nutanix Cluster. Which subnet should the administrator reserve an IP address for the File Analytics?
Correct
For the deployment of File Analytics, the administrator should ensure that all relevant subnets (CVM, AHV, Nutanix Files client, and storage networks) are properly connected and that necessary firewall rules and routing are configured to allow data flow between these subnets. The client network (10.1.3.0/24) and storage network (10.1.4.0/24) are critical for monitoring file access, so their connectivity with the CVM subnet (10.1.1.0/24) is essential for File Analytics to operate effectively.
Incorrect
For the deployment of File Analytics, the administrator should ensure that all relevant subnets (CVM, AHV, Nutanix Files client, and storage networks) are properly connected and that necessary firewall rules and routing are configured to allow data flow between these subnets. The client network (10.1.3.0/24) and storage network (10.1.4.0/24) are critical for monitoring file access, so their connectivity with the CVM subnet (10.1.1.0/24) is essential for File Analytics to operate effectively.
Unattempted
For the deployment of File Analytics, the administrator should ensure that all relevant subnets (CVM, AHV, Nutanix Files client, and storage networks) are properly connected and that necessary firewall rules and routing are configured to allow data flow between these subnets. The client network (10.1.3.0/24) and storage network (10.1.4.0/24) are critical for monitoring file access, so their connectivity with the CVM subnet (10.1.1.0/24) is essential for File Analytics to operate effectively.
Question 53 of 60
53. Question
An administrator is planning to deploy Nutanix Objects on an AHV cluster in a multi-cluster environment. The Virtual IP address and Data Services IP address have already been configured on the AHV cluster. Which additional IP address should be configured for successful Objects deployment?
Correct
For Nutanix Objects deployment in a multi-cluster AHV environment, the Data Services IP on the cluster where Prism Central is deployed must be configured to enable proper management and communication between clusters.
Incorrect
For Nutanix Objects deployment in a multi-cluster AHV environment, the Data Services IP on the cluster where Prism Central is deployed must be configured to enable proper management and communication between clusters.
Unattempted
For Nutanix Objects deployment in a multi-cluster AHV environment, the Data Services IP on the cluster where Prism Central is deployed must be configured to enable proper management and communication between clusters.
Question 54 of 60
54. Question
An administrator opens the Previous Versions tab for a specific folder in an SMB share. What kind of information will be displayed?
Correct
When an administrator or user views the Previous Versions tab on an SMB share folder, they see a list of snapshots taken at different points in time. This list allows browsing and restoring files or folders from specific snapshot points, enabling file recovery or rollback to previous states. It does not show every file modification but the snapshots as a whole, which reflect the data state at those snapshot times.
Incorrect
When an administrator or user views the Previous Versions tab on an SMB share folder, they see a list of snapshots taken at different points in time. This list allows browsing and restoring files or folders from specific snapshot points, enabling file recovery or rollback to previous states. It does not show every file modification but the snapshots as a whole, which reflect the data state at those snapshot times.
Unattempted
When an administrator or user views the Previous Versions tab on an SMB share folder, they see a list of snapshots taken at different points in time. This list allows browsing and restoring files or folders from specific snapshot points, enabling file recovery or rollback to previous states. It does not show every file modification but the snapshots as a whole, which reflect the data state at those snapshot times.
Question 55 of 60
55. Question
An administrator is managing a Nutanix Files instance at a dark site. The administrator has been tasked to configure a solution to alert the security team when more than 500 files are renamed in an hour. Which configuration should be applied?
Correct
The most appropriate solution to alert the security team when more than 500 files are renamed hourly is to define an anomaly rule in File Analytics
Incorrect
The most appropriate solution to alert the security team when more than 500 files are renamed hourly is to define an anomaly rule in File Analytics
Unattempted
The most appropriate solution to alert the security team when more than 500 files are renamed hourly is to define an anomaly rule in File Analytics
Question 56 of 60
56. Question
An administrator is implementing two production networks for Nutanix Objects: Object Storage Network (internal) Objects Public Network (external) In which two ways is it recommended that the administrator configure these networks?
Correct
Nutanix Objects uses two types of networks: an internal Objects Storage Network and an external Objects Public Network. Best practice is to place the Object Storage Network on the same network as the CVM to simplify internal communication and reduce complexity. Additionally, it‘s recommended to configure the Object Storage and Public Networks on different virtual networks to maintain proper security boundaries and prevent unnecessary exposure of internal services. While combining the two networks is technically supported, it is discouraged in production due to potential risks. Therefore, the correct configuration choices are options 1 and 2.
Incorrect
Nutanix Objects uses two types of networks: an internal Objects Storage Network and an external Objects Public Network. Best practice is to place the Object Storage Network on the same network as the CVM to simplify internal communication and reduce complexity. Additionally, it‘s recommended to configure the Object Storage and Public Networks on different virtual networks to maintain proper security boundaries and prevent unnecessary exposure of internal services. While combining the two networks is technically supported, it is discouraged in production due to potential risks. Therefore, the correct configuration choices are options 1 and 2.
Unattempted
Nutanix Objects uses two types of networks: an internal Objects Storage Network and an external Objects Public Network. Best practice is to place the Object Storage Network on the same network as the CVM to simplify internal communication and reduce complexity. Additionally, it‘s recommended to configure the Object Storage and Public Networks on different virtual networks to maintain proper security boundaries and prevent unnecessary exposure of internal services. While combining the two networks is technically supported, it is discouraged in production due to potential risks. Therefore, the correct configuration choices are options 1 and 2.
Question 57 of 60
57. Question
After a planned maintenance, an administrator notices that an active CVM in a Nutanix Volumes cluster is offline. How will this impact iSCSI clients that are connected to the CVM? Will the administrator need to intervene to ensure connectivity?
Correct
Nutanix Volumes is designed for resilience. When iSCSI clients connect through the iSCSI Data Services IP, the system provides high availability and seamless failover. If a CVM goes offline, active sessions are interrupted, but clients automatically reconnect and are redirected to healthy CVMs. This ensures zero manual intervention from the administrator.
Incorrect
Nutanix Volumes is designed for resilience. When iSCSI clients connect through the iSCSI Data Services IP, the system provides high availability and seamless failover. If a CVM goes offline, active sessions are interrupted, but clients automatically reconnect and are redirected to healthy CVMs. This ensures zero manual intervention from the administrator.
Unattempted
Nutanix Volumes is designed for resilience. When iSCSI clients connect through the iSCSI Data Services IP, the system provides high availability and seamless failover. If a CVM goes offline, active sessions are interrupted, but clients automatically reconnect and are redirected to healthy CVMs. This ensures zero manual intervention from the administrator.
Question 58 of 60
58. Question
During deployment of the Windows 2019 Failover Cluster, an administrator is unable to deploy a Nutanix Files witness share. The Nutanix Files cluster environment is as follows: SMB shares need to be highly available DFS is enabled for the cluster Three FSVMs are deployed in the cluster The cluster is using a general share type WORM is disabled What should the administrator do to resolve the issue?
Correct
To deploy a Windows Server 2019 Failover Cluster successfully using a Nutanix Files SMB share as a file share witness, the DFS feature must be disabled on the target share. DFS introduces a namespace abstraction that prevents the cluster from locking and managing the share properly for quorum functionality. The administrator should configure a non-DFS-enabled SMB share directly accessible by the WSFC nodes.
Incorrect
To deploy a Windows Server 2019 Failover Cluster successfully using a Nutanix Files SMB share as a file share witness, the DFS feature must be disabled on the target share. DFS introduces a namespace abstraction that prevents the cluster from locking and managing the share properly for quorum functionality. The administrator should configure a non-DFS-enabled SMB share directly accessible by the WSFC nodes.
Unattempted
To deploy a Windows Server 2019 Failover Cluster successfully using a Nutanix Files SMB share as a file share witness, the DFS feature must be disabled on the target share. DFS introduces a namespace abstraction that prevents the cluster from locking and managing the share properly for quorum functionality. The administrator should configure a non-DFS-enabled SMB share directly accessible by the WSFC nodes.
Question 59 of 60
59. Question
An administrator needs to configure Nutanix Objects in an AHV-based cluster. Which IP range must be available for this task?
Correct
When deploying Nutanix Objects in an AHV environment, Prism Central requires two unused internal /16 IP ranges. By default, Nutanix reserves the following:
10.100.0.0/16
10.200.0.0/16
These ranges are essential for the internal networking of the Object Storage components, including:
S3 front-end IPs
DNS services
Metadata services
Load balancers
The /16 subnet size ensures theres sufficient address space for scaling and operations across object store components.
Other options like /24 ranges or non-default networks are too small or unsupported for Nutanix Objects deployment. Therefore, 10.100.0.0/16 and 10.200.0.0/16 are the correct and required ranges.
Incorrect
When deploying Nutanix Objects in an AHV environment, Prism Central requires two unused internal /16 IP ranges. By default, Nutanix reserves the following:
10.100.0.0/16
10.200.0.0/16
These ranges are essential for the internal networking of the Object Storage components, including:
S3 front-end IPs
DNS services
Metadata services
Load balancers
The /16 subnet size ensures theres sufficient address space for scaling and operations across object store components.
Other options like /24 ranges or non-default networks are too small or unsupported for Nutanix Objects deployment. Therefore, 10.100.0.0/16 and 10.200.0.0/16 are the correct and required ranges.
Unattempted
When deploying Nutanix Objects in an AHV environment, Prism Central requires two unused internal /16 IP ranges. By default, Nutanix reserves the following:
10.100.0.0/16
10.200.0.0/16
These ranges are essential for the internal networking of the Object Storage components, including:
S3 front-end IPs
DNS services
Metadata services
Load balancers
The /16 subnet size ensures theres sufficient address space for scaling and operations across object store components.
Other options like /24 ranges or non-default networks are too small or unsupported for Nutanix Objects deployment. Therefore, 10.100.0.0/16 and 10.200.0.0/16 are the correct and required ranges.
Question 60 of 60
60. Question
At what level of granularity can Smart DR replicate?
Correct
Smart DR is a disaster recovery feature for Nutanix Files, allowing you to replicate file shares between clusters for business continuity. It works at the share level, meaning entire file shares (and their contents and metadata) are replicated from a source to a destination cluster. This granularity ensures that all necessary data structures for file access are intact on the recovery side without replicating individual files or unrelated volumes.
Incorrect
Smart DR is a disaster recovery feature for Nutanix Files, allowing you to replicate file shares between clusters for business continuity. It works at the share level, meaning entire file shares (and their contents and metadata) are replicated from a source to a destination cluster. This granularity ensures that all necessary data structures for file access are intact on the recovery side without replicating individual files or unrelated volumes.
Unattempted
Smart DR is a disaster recovery feature for Nutanix Files, allowing you to replicate file shares between clusters for business continuity. It works at the share level, meaning entire file shares (and their contents and metadata) are replicated from a source to a destination cluster. This granularity ensures that all necessary data structures for file access are intact on the recovery side without replicating individual files or unrelated volumes.
X
Use Page numbers below to navigate to other practice tests