An administrator is attempting to create a share that will provide user access via SMB and NFS. However, the Enable multiprosotocol accounts for NFS clients settings is not available.
What would cause this issue?
A. The connection to Active Directory has not been configured.
B. The file server instance was only configured with SMB.
C. The incorrect Files license has been applied.
D. NFS configured to use unmanaged authentication.
Correct Answer: A
Explanation: The cause of this issue is that the connection to Active Directory has not been configured. Active Directory is a service that provides centralized authentication and authorization for Windows-based clients and servers. To create a share that will provide user access via SMB and NFS, the administrator must first configure the connection to Active Directory in the Files Console. This will allow the administrator to enable multiprotocol accounts for NFS clients, which are accounts that map NFS users to SMB users and groups for consistent access control across both protocols. References: Nutanix Files Administration Guide, page 32; Nutanix Files Solution Guide, page 6
Question 62:
An administrator successfully installed Objects and was able to create a bucket.
When using the reference URL to access this Objects store, the administrator is unable to write data in the bucket when using an Action Directory account.
Which action should the administrator take to resolve this issue?
A. Verify sharing policies at the bucket level.
B. Reset the Active Directory user password.
C. Replace SSL Certificates at the Object store level.
D. Verify Access Keys for the user.
Correct Answer: D
Explanation: The action that the administrator should take to resolve this issue is to verify Access Keys for the user. Access Keys are credentials that allow users to access Objects buckets using S3-compatible APIs or tools. Access Keys consist of an Access Key ID and a Secret Access Key, which are used to authenticate and authorize requests to Objects. If the user is unable to write data in the bucket using an Active Directory account, it may be because the user does not have valid Access Keys or the Access Keys do not have sufficient permissions. The administrator can verify and manage Access Keys for the user in Prism Central. References: Nutanix Objects User Guide, page 13; Nutanix Objects Solution Guide, page 8
Question 63:
An administrator has deployed a new Files cluster within a Windows Environment.
After some days, he Files environment is not able to synchronize users with the Active Directory server anymore. The administrator observes a large time difference between the Files environment and the Active Directory Server that is responsible for the behavior.
How should the administrator prevent the Files environment and the AD Server from having such a time difference in future?
A. Use the same NTP Servers for the File environment and the AD Server.
B. Use 0.pool.ntp.org as the NTP Server for the AD Server.
C. Use 0.pool.ntp.org as the NTP Server for the Files environment.
D. Connect to every FSVM and edit the time manually.
Correct Answer: A
Explanation: The administrator should prevent the Files environment and the AD Server from having such a time difference in future by using the same NTP Servers for the File environment and the AD Server. NTP (Network Time Protocol) is a protocol that synchronizes the clocks of devices on a network with a reliable time source. NTP Servers are devices that provide accurate time information to other devices on a network. By using the same NTP Servers for the File environment and the AD Server, the administrator can ensure that they have consistent and accurate time settings and avoid any synchronization issues or errors. References: Nutanix Files Administration Guide, page 32; Nutanix Files Troubleshooting Guide
Question 64:
An administrator needs to ensure maximum performance, throughput, and redundancy for the company's Oracle RAC on Linux implementation, while using the native method for securing workloads.
Which configuration meets these requirements?
A. Flies with a distributed share and ABE
B. Files with a general purpose share and File Blocking
C. Volumes with MPIO and a single vDisk
D. Volumes with CHAP and multiple vDisks
Correct Answer: C
Explanation: Volumes is a feature that allows users to create and manage block storage devices (volume groups) on a Nutanix cluster. Volume groups can be accessed by external hosts using the iSCSI protocol. To ensure maximum performance, throughput, and redundancy for Oracle RAC on Linux implementation, while using the native method for securing workloads, the recommended configuration is to use Volumes with MPIO (Multipath I/O) and a single vDisk (virtual disk). MPIO is a technique that allows multiple paths between an iSCSI initiator and an iSCSI target, which improves performance and availability. A single vDisk is a logical unit number (LUN) that can be assigned to multiple hosts in a volume group, which simplifies management and reduces overhead. References: Nutanix Volumes Administration Guide, page 13; Nutanix Volumes Best Practices Guide
Question 65:
What tool can be used to report on a specific user's activity within a Files environment?
A. Prism Element Alerts menu
B. Prism Central Activity menu
C. Data Lens Audit Trails
D. Files Console Usage
Correct Answer: C
Explanation: The tool that can be used to report on a specific user's activity within a Files environment is Data Lens Audit Trails. Data Lens Audit Trails is a feature that provides detailed logs of all file operations performed by users on Files shares and exports, such as create, read, write, delete, rename, move, copy, etc. Data Lens Audit Trails can help administrators track and audit user actions and identify any unauthorized or malicious activities. The administrator can use Data Lens Audit Trails to filter and search for a specific user's activity based on various criteria, such as file name, file type, file size, file path, file share, file server, operation type, operation time, operation status, and so on. References: Nutanix Files Administration Guide, page 98; Nutanix Data Lens User Guide
Question 66:
What is a mandatory criterion for configuring Smart Tier?
A. VPC name
B. Target URL over HTTP
C. Certificate
D. Access and secret keys
Correct Answer: D
Explanation: Smart Tier requires access and secret keys to authenticate with the target storage tier, which can be Nutanix Objects or any S3-compatible storage service. The access and secret keys are generated by the target storage service and must be provided when configuring Smart Tier3. References: Nutanix Files Administration Guide3
Question 67:
Which two prerequisites are needed when deploying Objects to a Nutanix cluster? (Choose two.)
A. Microsegmentation is enabled.
B. Data Services IP is configured on the PI
C. DNS is configured on the PE.
D. AHV IPAM is disabled on the VLAN used for Objects.
Correct Answer: AB
References: Nutanix Objects Administration Guide1
Question 68:
An administrator is planning to upgrade all ESXi hypervisors in a cluster hosting Files.
When performing one-click hypervisor upgrades, what prerequisite must be performed?
A. Enable the anti-affinity rules on all FSVMs.
B. Manually migrate the FSVMs.
C. Shutdown the FSVMs.
D. Disable the anti-affinity rules on all FSVMs.
Correct Answer: D
Explanation: The prerequisite that must be performed before performing one-click hypervisor upgrades is to disable the anti-affinity rules on all FSVMs. Anti-affinity rules are rules that prevent two or more VMs from running on the same host at the same time. Anti- affinity rules can improve the availability and performance of FSVMs by distributing them across different hosts in a cluster. However, anti-affinity rules can interfere with one-click hypervisor upgrades, which require all VMs on a host to be migrated to another host before upgrading the host. Therefore, the administrator must disable the anti-affinity rules on all FSVMs before performing one-click hypervisor upgrades, and re-enable them after the upgrades are completed. References: Nutanix Files Administration Guide, page 22; Nutanix Files Upgrade Guide
Question 69:
An administrator needs to protect a Files cluster unique policies for different shares.
How should the administrator meet this requirement?
A. Create a protection domain in the Data Protection view in Prism Element.
B. Configure data protection polices in File Server view in Prism Element
C. Create a protection domain in the Data Protection view in Prism Central.
D. Configure data protection polices in the Files view in Prism Central.
Correct Answer: D
Explanation: The administrator can meet this requirement by configuring data protection policies in the Files view in Prism Central. Data protection policies are policies that define how file data is protected by taking snapshots, replicating them to another site, or tiering them to cloud storage. Data protection policies can be configured for each share or export in a file server in the Files view in Prism Central. The administrator can create different data protection policies for different shares or exports based on their protection needs and requirements. References: Nutanix Files Administration Guide, page 79; Nutanix Files Solution Guide, page 9
Question 70:
An administrator wants to monitor their Files environment for suspicious activities, such mass deletion or access denials.
How can the administrator be alerted to such activities?
A. Configure Alerts and Events in the Files Console, filtering for Warning severity.
B. Deploy the Files Analytics VM. and configure anomaly rules.
C. Configure Files to use ICAP servers, with monitors for desired activities.
D. Create a data protection policy in the Files view in Prism Central.
Correct Answer: B
Explanation: The administrator can monitor their Files environment for suspicious activities, such as mass deletion or access denials, by deploying the File Analytics VM and configuring anomaly rules. File Analytics is a feature that provides insights into the usage and activity of file data stored on Files. File Analytics consists of a File Analytics VM (FAVM) that runs on a Nutanix cluster and communicates with the File Server VMs (FSVMs) that host the file shares. File Analytics can alert the administrator when there is an unusual or suspicious activity on file data, such as mass deletion, encryption, permission change, or access denial. The administrator can configure anomaly rules to define the threshold, time window, and notification settings for each type of anomaly. References: Nutanix Files Administration Guide, page 93; Nutanix File Analytics User Guide
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Nutanix exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NCP-US-6.5 exam preparations and Nutanix certification application, do not hesitate to visit our Vcedump.com to find your solutions here.