Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Nutanix > Nutanix Certifications > NCP-US-6.5 > NCP-US-6.5 Online Practice Questions and Answers

NCP-US-6.5 Online Practice Questions and Answers

Questions 4

An administrator has created a volume and needs to attach it to a windows host a via iSCSI. The data Services IP has been configured in the MS iSCSI Initiator, but no target are visible.

What is most likely the cause this issue?

A. The host' s IP address is not authorized to access the volume.

B. The CHAP password configured on the client is incorrect.

C. The CHAP Authentication has not been configured on the client.

D. The host's IQN is not authorized to access to the volume.

Buy Now

Correct Answer: D

Explanation: Nutanix Volumes uses IQN-based authorization to control access to volumes. The administrator must specify the IQN of the host that needs to access the volume when creating or editing the volume. If the host's IQN is not authorized, it will not be able to see the target in the MS iSCSI Initiator3. References: Nutanix Volumes Administration Guide3

Questions 5

With the settings shown on the exhibit, if there were 1000 files in the repository, how many files would have to be... anomaly alert to the administrator?

A. 1

B. 10

C. 100

D. 1000

Buy Now

Correct Answer: B

Explanation: With the settings shown on the exhibit, if there were 1000 files in the repository, 10 files would have to be deleted within an hour to trigger an anomaly alert to the administrator. Anomaly alert is a feature that notifies the administrator when there is an unusual or suspicious activity on file data, such as mass deletion or encryption. Anomaly alert can be configured with various parameters, such as threshold percentage, time window, minimum number of files, and so on. In this case, the threshold percentage is set to 1%, which means that if more than 1% of files in a repository are deleted within an hour, an anomaly alert will be triggered. Since there are 1000 files in the repository, 1% of them is 10 files. Therefore, if 10 or more files are deleted within an hour, an anomaly alert will be sent to the administrator. References: Nutanix Files Administration Guide, page 98; Nutanix Data Lens User Guide

Questions 6

The Administrator needs to review the following graphs, as displayed in the exhibit.

*

Storage Used

*

Open Connections

*

Number of Files

*

Top Shares by Current Capacity

*

Top Shares by current Connections

Where should the administrator complete this action?

A. Files Console Share View

B. Files Console Data Management View

C. Files Console Monitoring View

D. Files Console Dashboard View

Buy Now

Correct Answer: D

Explanation: The Files Console Dashboard View provides an overview of the Files cluster performance and usage, including the following graphs:

Storage Used: Shows the total storage used by the Files cluster, including data, metadata, and snapshots.

Open Connections: Shows the number of active SMB and NFS connections to the Files cluster.

Number of Files: Shows the number of files stored in the Files cluster, excluding snapshots.

Top Shares by Current Capacity: Shows the top five shares by current capacity usage in the Files cluster.

Top Shares by Current Connections: Shows the top five shares by current connection count in the Files cluster2. References: Nutanix Files Administration Guide2

Questions 7

A Files administrator needs to generate a report listing the files matching those in the exhibit.

What is the most efficient way to complete this task?

A. Use Report Builder in File Analytics.

B. Create a custom report in Prism Central.

C. Use Report Builder in Files Console.

D. Create a custom report in Files Console.

Buy Now

Correct Answer: A

Explanation: The most efficient way to generate a report listing the files matching those in the exhibit is to use Report Builder in File Analytics. Report Builder is a feature that allows administrators to create custom reports based on various filters and criteria, such as file name, file type, file size, file owner, file age, file access time, file modification time, file permission change time, and so on. Report Builder can also export the reports in CSV format for further analysis or sharing. References: Nutanix Files Administration Guide, page 97; Nutanix File Analytics User Guide

Questions 8

What is the most efficient way of enabling users to restore their files without administrator intervention in multiple Files shares?

A. Click Enable next to the name of the share in Manage Recovery Settings from Data Lens.

B. Click Enable Self Service Restore in the Edit wizard for each share in Shares tab from Files Console.

C. Assign the same Category to all FSVMs and adding that Category to a single Protection Policy in PC.

D. Add all FSVMs to a Consistency Group within a single asynchronous Protection Domain in PE.

Buy Now

Correct Answer: B

Explanation: Nutanix Files allows users to restore their files from the snapshots taken by the protection policy. A protection policy is a set of rules that defines how often snapshots are taken, how long they are retained, and where they are replicated. A protection policy can be applied to one or more file shares. To enable users to restore their files without administrator intervention, the administrator must enable the Self Service Restore option for each share in the Files Console. This option adds a hidden folder named .snapshot in each share, which contains all the snapshots taken by the protection policy. Users can access this folder and browse the snapshots to find and restore their files. The administrator can also configure the permissions and quota for the .snapshot folder. References: Nutanix Files Administration Guide, page 75; Nutanix Files Self-Service Restore Guide

Questions 9

An administrator is tasked with creating an Objects store with the following settings:

Medium Performance (around 10,000 requests per second) 10 TiB capacity Versioning disabled Hosted on an AHV cluster

immediately after creation, the administrator is asked to change the name of Objects store

Who will the administrator achieve this request?

A. Enable versioning and then rename the Object store, disable versioning

B. The Objects store can only be renamed if hosted on ESXI.

C. Delete and recreate a new Objects store with the updated name

Buy Now

Correct Answer: C

Explanation: The administrator can achieve this request by deleting and recreating a new Objects store with the updated name. Objects is a feature that allows users to create and manage object storage clusters on a Nutanix cluster. Objects clusters can provide S3- compatible access to buckets and objects for various applications and users. Objects clusters can be created and configured in Prism Central. However, once an Objects cluster is created, its name cannot be changed or edited. Therefore, the only way to change the name of an Objects cluster is to delete the existing cluster and create a new cluster with the updated name. References: Nutanix Objects User Guide, page 9; Nutanix Objects Solution Guide, page 8

Questions 10

An administrator successfully installed Objects and was able to create a bucket.

When using the reference URL to access this Objects store, the administrator is unable to write data in the bucket when using an Action Directory account.

Which action should the administrator take to resolve this issue?

A. Verify sharing policies at the bucket level.

B. Reset the Active Directory user password.

C. Replace SSL Certificates at the Object store level.

D. Verify Access Keys for the user.

Buy Now

Correct Answer: D

Explanation: The action that the administrator should take to resolve this issue is to verify Access Keys for the user. Access Keys are credentials that allow users to access Objects buckets using S3-compatible APIs or tools. Access Keys consist of an Access Key ID and a Secret Access Key, which are used to authenticate and authorize requests to Objects. If the user is unable to write data in the bucket using an Active Directory account, it may be because the user does not have valid Access Keys or the Access Keys do not have sufficient permissions. The administrator can verify and manage Access Keys for the user in Prism Central. References: Nutanix Objects User Guide, page 13; Nutanix Objects Solution Guide, page 8

Questions 11

An administrator needs to ensure maximum performance, throughput, and redundancy for the company's Oracle RAC on Linux implementation, while using the native method for securing workloads.

Which configuration meets these requirements?

A. Flies with a distributed share and ABE

B. Files with a general purpose share and File Blocking

C. Volumes with MPIO and a single vDisk

D. Volumes with CHAP and multiple vDisks

Buy Now

Correct Answer: C

Explanation: Volumes is a feature that allows users to create and manage block storage devices (volume groups) on a Nutanix cluster. Volume groups can be accessed by external hosts using the iSCSI protocol. To ensure maximum performance, throughput, and redundancy for Oracle RAC on Linux implementation, while using the native method for securing workloads, the recommended configuration is to use Volumes with MPIO (Multipath I/O) and a single vDisk (virtual disk). MPIO is a technique that allows multiple paths between an iSCSI initiator and an iSCSI target, which improves performance and availability. A single vDisk is a logical unit number (LUN) that can be assigned to multiple hosts in a volume group, which simplifies management and reduces overhead. References: Nutanix Volumes Administration Guide, page 13; Nutanix Volumes Best Practices Guide

Questions 12

Which two prerequisites are needed when deploying Objects to a Nutanix cluster? (Choose two.)

A. Microsegmentation is enabled.

B. Data Services IP is configured on the PI

C. DNS is configured on the PE.

D. AHV IPAM is disabled on the VLAN used for Objects.

Buy Now

Correct Answer: AB

References: Nutanix Objects Administration Guide1

Questions 13

An administrator needs to protect a Files cluster unique policies for different shares.

How should the administrator meet this requirement?

A. Create a protection domain in the Data Protection view in Prism Element.

B. Configure data protection polices in File Server view in Prism Element

C. Create a protection domain in the Data Protection view in Prism Central.

D. Configure data protection polices in the Files view in Prism Central.

Buy Now

Correct Answer: D

Explanation: The administrator can meet this requirement by configuring data protection policies in the Files view in Prism Central. Data protection policies are policies that define how file data is protected by taking snapshots, replicating them to another site, or tiering them to cloud storage. Data protection policies can be configured for each share or export in a file server in the Files view in Prism Central. The administrator can create different data protection policies for different shares or exports based on their protection needs and requirements. References: Nutanix Files Administration Guide, page 79; Nutanix Files Solution Guide, page 9

Exam Code: NCP-US-6.5
Exam Name: Nutanix Certified Professional - Unified Storage (NCP-US) v6.5
Last Update: Jun 13, 2025
Questions: 76

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.