An administrator needs to analyze data created by a custom application, which writes data
into an SMB share hosted on Files. This application uses custom-built file extensions such
as .zyx, . zzz,theadministrator needs to provide a collapsed view of space usage, number
of files, and changes within a given time frame.
How should the administrator provide the required information?
A. Go to Files, select the share used by the application and point to Usage View.
B. Add a new' file category in File Analytics and use File Distribution View,
C. Configure SNMP server with Nutanix MIBS and use Excel to analyze traps.
D. Create a File Server Resource Manager MMC and use File Screens,
An administrator is determining the most recent operation a user performed on the share
cifs1within the last 24 hours.
How should the administrator complete this task in File Analytics?
A. In the Anomalis section. select Users exceed an operation count threshold an input the 24 hour range for share cifs1.
B. In the Audit Trails section, search for the user and view their last operations.
C. In the Audit Trails section, search for the cifs1 share and view the actions on the share over the past 24-hour range.
D. In the Anomalies section view the anomaly rule created for the user with an interval of 24 hours.
Explanation: File Analytics is a tool used for monitoring and auditing file activity within an
organization's file servers. The administrator needs to determine the most recent operation
a user performed on the share cifs1 within the last 24 hours. To accomplish this task in File
Analytics, the administrator should go to the Audit Trails section, where they can search for
the cifs1 share and view the actions on the share over the past 24-hour range. This will
allow the administrator to see all the activity that has occurred on the share, including the
most recent operation performed by the user.
According to the Nutanix Unified Storage v6 documents at nutanix.com1, File Analytics
captures all file activity for registered file server instances and provides an audit trail for
administrators2. In the Audit Trails section, you can search for the user or the share name
and view their operations over a specified time range2. This would allow you to determine
the most recent operation a user performed on the share cifs1 within the last 24 hours.
During a recent audit, the auditors discovered several shares that were unencrypted. To
remediate the audit item, the administrator enabled Encrypt SMB3 Messages on the
accounting, finance, and facilities shares. After encryption was enabled, several users have
reported that they are no longer able to access the shares.
What is causing this issue?
A. The users are accessing the shares from Windows 8 desktops.
B. Advanced Encryption Standard 128 & 256 are disabled in Windows 7.
C. Advanced Encryption Standard 128 & 256 are disabled in Linux or Mac OS.
D. The users are accessing the shares from Linux desktops.
An administrator is building a new application server and has decided to use post-process
compression for the file server and inline compression for the database components.
The current environment has these characteristics:
Two Volume Groups named VGI and VG2.
A Storage Container named SCI with inline-compression.
A Storage Container named SC2 with post-process compression.
Which action should the administrator take to most efficiently satisfy this requirement?
A. Wfithin VG1, create one vDisk in SC1 and one vDisk in Sc2.
B. Within SC1, create one Wisk in VG1 and within SC2. create one Disk in VG2
C. Wthin SC1, create one vDisk in VG1 and one vDisk in VG2,
D. Writhin VG1, create one vDisk in SC1 and within VG2, create one vDisk in SC2.
An administrator has been experiencing performance issues with a SQL VM. To address
these issues, the administrator migrated the database to a Volume Group. Following the
migration, the performance issues have continued.
What should the administrator do to resolve these performance issues?
A. use multiple vDisks in the Volume Group.
B. Enable Jumbo Frames.
C. Enable Jumbo Frames.
D. Use multiple subnets for iSCSI traffic.
An administrator is implementing a VDI solution in a Nutanix cluster running AHV. The
implementation includes home shares for user files. The shares have to be highly available,
only accessible by the named user, and replicated to a DR site.
What solution would best fulfill these requirements?
A. Files with Access Based Enumerationenabled.
B. Volumes with ISCSI Initiators disabled.
C. Objects with WORMenabled
D. Nutanix container with Whitelistingconfigured
An existing Objects bucket was created for backups with these parameters:
A)WORM policy of three years
B)Versioning policy of two years
C)Lifecycle policy of two years
The customer reports that the cluster is nearly full due to backups created during a recent
crypto locker attack. The customer would like to automatically delete backups older than
one year to free up space in the cluster.
How should the administrator change settings within Objects?
A. Modify the existing bucket lifecycle policy from two years to one year.
B. Create a new' bucket with the lifecycle policy of one year
C. Create a new' bucket with the WORM policy of two years.
D. Modify the existing bucket WORM policy from three years to one year.
A service provider must provide mufti-tenancy capabilities, allowing for each of their
customers' data to be isolated on their hosting infrastructure.
How should the Objects administrator configure the environment to meet this requirement?
A. Create independent Objects stores for each customer
B. Create independent Objects buckets for each customer.
C. Configure micro segmentation on the Objects stores
D. Configure Role-based access on the Objects buckets
A company is implementing Files and has these requirements:
Six departments
Each department needs to access its own shared namespace
18,000 users
Given the nature of the workload, the administrator has decided to scale up by adding the
maximum amount of vCPU and RAM.
What should the administrator implement to satisfy the stated requirements?
A. Six standard shares with 3,000 concurrent sessions.
B. The administrator should create a distributed share.
C. Six distributed shares with 3,000 concurrent sessions
D. The Admittatur should create a standard share.
An administrator needs to configure a service to collect data from a forensic software
package that audits client access to a specific location. Data need to be immutable,
Which option meets these requirements?
A. Configure WORM options to an Objects bucket.
B. Configure an Objects bucket with versioning.
C. Configure an Objects bucket with the Expire current objects lifecycle policy enabled
D. Configure standard Objects bucket with the read-on)' attribute enabled
Which setting should the administrator apply to a newly-created Objects bucket to ensure the requirements are met?
A. Configure a Lifecycle Policy to overwrite one-year old data in the bucket
B. Apply an Object versioning policy with one-year retention.
C. Configure the bucket WORM policy with a one-year retention
D. Apply a bucket Lifecycle Policy with a one-year expiration.
An administrator needs to upgrade all the File Analytics deployments in the air-gapped
environments.
During the preparation stage, the administrator downloads the
lcm_file_analytics_3.2.0.tar.gz bundle and transfers it to the dark site web server.
upon performing the LCM inventory and trying to upgrade File Analytics, the administrator
does not see the new version in the software tab.
Which additional file should the administrator transfer to the web server in order for the
inventory to work?
A. Nutanix_compatibility_bundle.tar.gz
B. Nutanix_file_server_4.1.0.3.tar.gz
C. Lcm_fsm_x.x.x.x. tar.gz
D. lcm_file_manager_x.x.x.tar.gz
Page 1 out of 6 Pages |