Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which feature ensures that a host failure’s impact on a Files cluster will be minimal?

A.

VM-VM affinity rules

B.

VM-Host affinity rules

C.

VM-VM anti-affinity rules

D.

VM-Host anti-affinity rules

A company has deployed several Files clusters, which are managed by a single File Analytics

instance. An administrator is trying to get File Distribution by Type information, but the data

shown in the GUI seems to be incorrect

What should the administrator do in order to get the correct data?

A.

Verify that the right File server view is being observed

B.

Install another File Analytics instance for the file server being managed

C.

Modify the administrator's Role Based Access Control settings

D.

Create a new dashboard to manage the desired file server

In a healthy shared cluster, what behaviour is expected of the FSVMs when a host fails?

A.

All FSVMS are configured with affinity on their local host and cannot be restarted on other hosts.

B.

All FSVMs are running on a single host and will be restarted on the remaining hosts.

C.

Each FSVM runs on its own host along with user VMs and will be restarted on an available host

D.

Each FSVM runs on its own host and affinity rules ensure they can be restarted on another host.

An administrator has deployed a new backup software suite and needs to meet the following

requirements:

• Use S3-Compatible Storage

• Provide One-Year retention

• Protect from deletions or overwrites for one year.

• Meet regulatory requirements

Which setting should the administrator apply to a newly-created objects bucket to ensure the

requirements are met?

A.

Apply a bucket Lifecycle Policy with a one-year expiration

B.

Configure the bucket WORM policy with a one-tear retention.

C.

Apply an object versioning policy with one-year retention.

D.

Configure a Lifecycle Policy to overwrite one-year old data in the bucket.

The Files administrator has received reports from users in the accounting department that

they can see folders that they don't have permission to access. The accounting department

manager has requested that employees should only be able to see folders that they have

permission to access

How would a Files administrator ensure that users in the Accounting share can only see

folders they have permission to access?

A.

Remove File Blocking on the accounting shares

B.

Remove read-only access to shares users should not access

C.

Enable Access-Based Enumeration on the accounting share

D.

Enable Access-Based Enumeration on the File Server

Which two configuration items are mandatory for deploying a Files cluster? (Choose two.)

A.

Configure two networks

B.

Configure a DNS server

C.

Configure an NTP server

D.

Configure a AHV managed network

An administer is determining the most recent operation a user performed on the share cifs1

within the last 24 hours? How should the administrator complete this task in File Analytics?

A.

In the Anomalies section, view the anomaly rule created for the user with an interval of 24 hours.

B.

In the Audit Trails section, search for the cifs1 share and view the actions on the share over the past 24hour range

C.

In the Audit Trails section, search for the user and view their last operations.

D.

In the Anomalies section, select Users exceed an operation count threshold an input the 24hour range for share cifs1

A company requires that object data that is unused for a period of 12 months should be moved

to AWS Glacier. This should be applied immediately to all new and existing data within the

organization. An administrator creates and applies the tiering rule, but observes that no existing data is

moved from buckets where the tiering rule is applied, despite being created over 12 months ago.

What is the reason for data over 12 months old failing to tier?

A.

Enable versioning has not been selected on the Tiering Endpoint configuration,

B.

The category has not been added to existing data.

C.

Tiering lifecycle policies are non-retroactive.

D.

The Apply to existing data option has not been selected on the life cycle rule.

An administrator of an existing Nutanix cluster running Kubernetes with multiple PODs notices

that NCC checks report that some volume groups experience the following error:

Node x.x.x.x:

FAIL: Volume Group pvc-XXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX space

usage (90%)

The administrator checks the volume group usage from the Kubernetes pod and get different

usage results. The current stats are 55% used space.

The results of the NCC check do not match what manually-executed checks report.

What is the cause of this behavior ?

A.

The garbage collection process has yet to run.

B.

The NCC checks need to be updated to the latest version.

C.

Volumes has not received the needed UNMAP commands.

D.

Kubernetes is not correctly reporting its storage usage.

Email distribution lists in the company have been redesigned and IT now has a new distribution list dedicated for all alerts In File Analytics how should an administrator change the recipient list to receive email alerts?

A.

Click on the gear icon select Define Anomaly Rules and update the field Anomaly Email Recipients

B.

Click on the gear icon, select SMTP configuration and update the field Recipient List

C.

Select User menu in the top right comer and click on Collect Logs

D.

Click on the gear icon select Update AD/LDAP configuration and update the field Username