Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Refer to the exhibit.

An administrator reports that a Volume Group (VG) is no longer accessible on their server.

Upon attempting to reconnect, an error is displayed , as shown in the exhibit.

Which condition would cause this error?

A.

The client is trying to access the wrong target.

B.

MPIO is enabled for the volume group

C.

Encryption is enabled for the container hosting the VG.

D.

The wrong CHAP secret has been configured.

The Compliance department would like the administrator to have the ability to revert

documents to previous versions. How should the administrator facilitate this request?

A.

Configure protection snapshots on the File Server

B.

Enable Self-Service Restore on the Share/Export

C.

Configure Protection snapshots on the Share/Export

D.

Enable Self-Service Restore on the File Server

An administrator is experiencing the following objects failure error message:

IAM service is not healthy

The object store domain entries appear grayed out in the user interface, as shown in the exhibit.

Which commands should the administrator execute to identify the failure source?

A.

A mspcli cluster_list

B mspcli status -u

B.

A mspctl cluster_objects

B mspctl status -u

C.

A mspcli cluster_objects

B mspcli status -u

D.

A mspctl cluster_list

B mspctl status -u

Which two statements are true about object counts in an object store?

A.

Upload counts are included in the object counts

B.

Each upload of a multipart upload is counted as a separate object until the object is finalized.

C.

Each upload of a multipart upload is counted as a separate object

D.

Upload Counts are not included in the object counts

An administrator installed a new Log Analyzer which collects data from physical endpoints

Data collected needs to be accessible and editable for three years after which the data must be

deleted to optimize storage consumption

Which setting should the administrator apply to meet these requirements?

A.

Create a WORM enabled bucket with Lifecycle policy to expire the current objects after three years

B.

Create a Storage Container with a Lifecycle policy to expire the current version after three Years

C.

Create a bucket with a Lifecycle policy to expire the current objects after three years.

D.

Create a Files share with a Lifecycle policy to win the Current files are three years

An administrator manages a vSphere-based Nutanix cluster and has enabled Flash Mode for

extremely latency sensitive The administrator recently migrated several workloads from this

cluster to another cluster with higher CFU and migration, users complained about the VM

performance of the latency sensitive workloads.What must the administrator to resolve this issue?

A.

Manually fingerprint the migrated

B.

Flash Mode can only be enabled on the VM curing the world

C.

Flash usage exceeds 20% of the new SSD capacity tier

D.

Manually enable Flash Mode on the migrated workloads

Where can an administrator find the latency associated with a Files SMB Share?

A.

FSVM performance

B.

File Analytics Health

C.

ncli > fs get-file-servers-usage

D.

File Server Performance Tab

A company uses a Nutanix 3-node cluster environment. In Prism Pro, the Capacity Runway

shows these capacity values:Max Capacity 6 TiB Effective Capacity 4 TiB

The company wants to upgrade the environment to use an RF3 container and also requires all

cluster nodes to be the same model.

What must the effective capacity of the Nutanix cluster be to support the new RF3 container?

A.

6 TIB

B.

9 TIB

C.

4 TiB

D.

10 TiB

During a recent audit the auditors discovered several shares that were unencrypted. To

remediate the audit item the administrator enabled Encrypt SMB3 Messages on the

accounting, finance, and facilities shares. After encryption was enabled several users have

reported that they are no longer able to access the shares

What is causing this issue?

A.

Advanced Encryption Standard 128 & 256 are disabled in Linux or Mac OS.

B.

The users are accessing the shares from Linux or Mac OS.

C.

Advanced Encryption Standard 128 & 256 are disabled in Windows 7

D.

The users are accessing the shares from Windows 7 and 8 desktops