Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Question:

In order to deploy Nutanix Files, which two networks should be created? (Choose two.)

A.

Client Network

B.

Overlay Network

C.

Storage Network

D.

Management Network

Question:

An administrator has been asked to lock a file indefinitely. The lock can be explicitly removed only by authorized users.

Which configuration matches the requirements of this task?

A.

Nutanix Objects Legal hold

B.

Nutanix Objects with WORM versioning

C.

Data Lens Ransomware Protection

D.

Blocked File Types for Files

An administrator has configured a share in Nutanix Files to support clients using Windows and Linux. A user on an Ubuntu client is unable to create any files. Which share configuration option should be updated?

A.

Allow simultaneous read access to same files

B.

Update the blocked file types in the file server

C.

Modify NFS Client Access to read-write

D.

Add NTFS permissions for the user account

An administrator has been tasked with troubleshooting a storage performance problem for a large database VM with the following configuration:

    16 vCPU

    64 GB RAM

    One 50 GB native AHV virtual disk hosting the guest OS

    Six 500 GB virtual disks containing database files connecting via iSCSI to a Nutanix volume group

    One NIC for client connectivity

    One NIC for iSCSI connectivity

In the course of investigating the problem, the administrator determines that the issue is isolated to large block-size I/O operations. What step should the administrator take to improve performance for the VM?

A.

Add an additional NIC for iSCSI connectivity and enable MPIO

B.

Add additional virtual disks to the volume group

C.

Increase the iSCSI adapter maximum transfer length

D.

Locate the iSCSI NIC on the same VLAN as the cluster DSIP

Exhibit:

An administrator is enabling Nutanix Volumes for use with workloads within a Nutanix-based environment. Based on the exhibit, which field is required by Nutanix Volumes to be populated?

A.

FQDN

B.

iSCSI Data Services IP

C.

Virtual IPv6

D.

Virtual IP

An administrator has been asked to protect a Nutanix Files instance between two sites supporting the following capabilities: 1-hour RPO, four recovery points, and cross-hypervisor capabilities. Which Nutanix feature matches the requirements?

A.

Protection Policies

B.

Smart DR

C.

Smart Sync

D.

Protection Domain

An administrator needs to recover a previous version of a file or share.

Which Nutanix Files feature should the administrator enable to allow this?

A.

Snapshot

B.

Data Protection

C.

Self-Service Restore

D.

Protection Policies

Question:

What should be enabled for Windows clients when using the SMB protocol in a Nutanix Files deployment?

A.

Zettabyte File System

B.

Internet Information Services

C.

Distributed File System

D.

Automatic Windows Update

Question:

An administrator needs to allow replicatinguser data across file servers in different locations.

Which Nutanix Files feature should the administrator utilize?

A.

Data Protection

B.

Smart Sync

C.

Data Sync

D.

VDI Sync

An administrator wants to utilize File Analytics to send anomaly alerts and data to email recipients. Which statement describes when File Analytics will send the emails?

A.

As defined in the Anomaly Rules.

B.

Whenever an anomaly is detected.

C.

Every 15 minutes.

D.

When a minimum of anomalies are detected.