Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NCP-DS Exam Dumps - Nutanix Certified Professional - Data Services

Question # 4

Which two configuration items are mandatory for deploying a Files cluster? (Choose two.)

A.

Configure two networks

B.

Configure a DNS server

C.

Configure an NTP server

D.

Configure a AHV managed network

Full Access
Question # 5

A company has two clusters which run several Files instances on each, as well as a legacy 3-

tier cluster analyzed using Files Analytics (FA).

How should this company implement Files Analytics?

A.

Deploy two FA one per Nutanix cluster

B.

Deploy as many FA as Files running instances

C.

Install FA package on any VM running in the company's environment

D.

Install one FA on the legacy cluster to monitor Nutanix clusters

Full Access
Question # 6

An administrator has mapped a Volume Group named VG1 to a VM. Due to changes in the

application running inside the VM, two additional volumes are required. At the time of

creation, the VM was assigned to a Protection Domain named PD1.

Which two steps should the administrator take to add the additional volumes to the VM while

maintaining data protection? (Choose two)

A.

Add two additional Disks to VG1

B.

Add the new vDisks to the same Consistency Group

C.

Manually update PD1 to include the newly created Disks

D.

Map the new vDisks as volumes to the VM

Full Access
Question # 7

A company requires that object data that is unused for a period of 12 months should be moved

to AWS Glacier. This should be applied immediately to all new and existing data within the

organization. An administrator creates and applies the tiering rule, but observes that no existing data is

moved from buckets where the tiering rule is applied, despite being created over 12 months ago.

What is the reason for data over 12 months old failing to tier?

A.

Enable versioning has not been selected on the Tiering Endpoint configuration,

B.

The category has not been added to existing data.

C.

Tiering lifecycle policies are non-retroactive.

D.

The Apply to existing data option has not been selected on the life cycle rule.

Full Access
Question # 8

An administrator is deploying a new Files cluster. After ensuring that best practices have been

followed, the administrator begins the deployment Network segmentation for Volumes is not

configured.

After some time, the administrator observes that the deployment failed and was rolled back.

After further investigation, the administrator discovers that the CVM was not able to ping the IP

addresses of all FSVMs.

How should the administrator resolve this issue?

A.

Open a support ticket and report the installation bug.

B.

Ensure that the back-end IPs are in the same VLAN as the CVM IP.

C.

Inform the networking team that LLDP is incorrectly configured.

D.

Disable the firewall on the CVM to prevent blocked packets

Full Access
Question # 9

An administrator needs to upgrade Files in a dark site environment without LCM, Which set of actions should the administrator perform?

A.

Setup a web server and point prism to it to fetch the bits and then click Upgrade.

B.

Run any NCC checks related to Files and trigger an upgrade from Prism.

C.

Download the metadata and binary bits from the portal, upload then to prism and click Upgrade.

D.

Connect the cluster to the internet to perform the upgrade through prism.

Full Access
Question # 10

An administrator has to enable both Linux and Windows machines to access the same share

served by a Files cluster.

The parameters are as follows:

• Most of the clients are Windows machines• All users have Active Directory (AD) Accounts

• All Linux clients are part of the same class 8 network, everyone else must be denied access

over NFS

• .mp3 files are not allowed on the share

How should the administrator configure the multi-protocol share to achieve these

requirements?

A.

• NFS as the primary protocol SMB with LDAP authentication as secondary

• Enable Default Access (For All Clients) with CIDR notation values

• Configure the ICAP settings to deny mp3 files

B.

• SMB as the primary protocol NFS with AD authentication as secondary

• Enable Default Access (For All Clients) with CIDR notation values

• Select the Blocked File Types checkbox

C.

• SMB as the primary protocol NFS with AD authentication as secondary –

• Enable Default Access (For All Clients) with Netgroups notation values

• Configure the ICAP settings to deny mp3 files

D.

• NFS as the primary protocol SMB with LDAP authentication as secondary

• Enable Default Access (For All Clients) with Netgroups notation values

• Select the Blocked File Types checkbox

Full Access
Question # 11

What fields are included in Object Store alerts?

A.

Alert Time, Alert Type, Severity, Title, Message, UUID

B.

Title, Source, Impact, severity, resolved, Acknowledged and Create Time

C.

Name, Description, Severity, Created and Silenced

D.

Severity, Issues, Create Time, Last Occurred, Status, Entities, Documentation

Full Access
Question # 12

An administrator configured WORM on an existing Objects bucket at 4 p.m. on Monday. During

the configuration, the administrator did not select Enable Version. At 8 am, the next morning a

ticket was submitted to update the bucket to include versioning

What are the correct steps to make the requested change?

A.

Create a new bucket with Enable Version selected and migrate all data since versioning

cannot be changed after 12 hours once WORM is enabled

B.

Disable WORM and reconfigure with Enable Version and Enable WORM checked as it has been

less than 24 hours since WORM was enabled

C.

Update the WORM settings to Enable Version as that setting can be turned on at any

point after WO is enabled

D.

Create a new bucket with Enable Version selected and migrate all data since versioning

cannot be changed immediately after WORM is enabled.

Full Access
Question # 13

An administrator needs to analyze data created by a custom application, which writes data

into an SMB share hosted on Files This application uses custom-built file extensions such as

.zyz, zzz. The administrator needs to provide a collapsed view of space usage number of files,

and changes within a given time frame.

How should the administrator provide the required information?

A.

Create a new File Server Resource Manager MMC and use File Screens

B.

Configure a SNMP server with Nutanix MIBs and use Excel to analyze traps

C.

Add a new file category in File Analytics and use File Distribution View

D.

Go to Files select the share used by the application and point to Usage View

Full Access
Question # 14

An administrator is upgrading Files. When running the pre upgrade check, the following

message is generated:

FileServer in HA state

Which two steps should the administrator take to resolve this error message? (Choose two.)

A.

Check if Stargate services are running.

B.

Check for alerts for NVB being down.

C.

Check if Zookeeper services are running

D.

Verify FSVM is booted and not stuck

Full Access