Nutanix ncp-ds practice test

Nutanix Certified Professional - Data Services Exam

Last exam update: Mar 07 ,2025
Page 1 out of 6. Viewing questions 1-15 out of 98

Question 1

What are the three predefined resource profiles when deploying Objects?

  • A. Small, Medium, and Heavy
  • B. Light Medium, and Large
  • C. Light Medium, and Heavy
  • D. Small, Medium, and Large
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

A company has deployed several Files clusters, which are managed by a single File Analytics
instance. An administrator is trying to get File Distribution by Type information, but the data
shown in the GUI seems to be incorrect
What should the administrator do in order to get the correct data?

  • A. Verify that the right File server view is being observed
  • B. Install another File Analytics instance for the file server being managed
  • C. Modify the administrator's Role Based Access Control settings
  • D. Create a new dashboard to manage the desired file server
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

While preparing for migrating data from a legacy storage environment to a new Files scaleout file
server, the administrator make the following notes
Requirements
Number of home directories: 4000
Number of Departmental shares: 1
Everyone is permitted to accessing it
All users use the same Departmental share
The administrator deploys Files using the following configuration:
Number of FSVMS: 3
VCPU & RAM/FSVM: 4vCPU,12GB
One Distributed share & ABE enabled for
One Standard share for the Departmental share
Does this configuration satisfy the project's requirements?

  • A. No, the project needs two distributed shares, 4 FSVMs, 24 vCPU & 128GB RAM
  • B. No, the project needs two distributed shares, 4 FSVMS, 6 VCPU & 32GB RAM
  • C. No, the project needs 4 FSVMS, 4 VCPU & 12GB RAM
  • D. Yes, the listed configuration elements satisfy the requirements the Home Directories
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

A company's IT security policy requires that all network traffic must be secure, and no web
browser certificate error warnings should be accepted by end users.
An administrator is tasked with configuring Objects so that it uses a certificate from an
internal Certificate Authority (CA).
How should the administrator configure Objects to meet the security policy?

  • A. Import the Private key with a Subject Alternate Name of the company domain.
  • B. Import the Private key and certificate files from the internal CA
  • C. Regenerate the CSR and download certificates from the internal CA
  • D. Regenerate the self-signed certificate with RSA 2048 as the bit type.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

An administrator has mapped a Volume Group named VG1 to a VM. Due to changes in the
application running inside the VM, two additional volumes are required. At the time of
creation, the VM was assigned to a Protection Domain named PD1.
Which two steps should the administrator take to add the additional volumes to the VM while
maintaining data protection? (Choose two)

  • A. Add two additional Disks to VG1
  • B. Add the new vDisks to the same Consistency Group
  • C. Manually update PD1 to include the newly created Disks
  • D. Map the new vDisks as volumes to the VM
Answer:

AC

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

What happens to an FSVM during a node failure in a 3-node cluster?

  • A. Due to host affinity rules, the FSVM will not restart
  • B. The FSVM will automatically restart on one of the remaining nodes.
  • C. The FSVM must be manually restarted on one of the remaining nodes.
  • D. A new FSVM must be deployed to the cluster.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

The Files administrator has received reports from users in the accounting department that
they can see folders that they don't have permission to access. The accounting department
manager has requested that employees should only be able to see folders that they have
permission to access
How would a Files administrator ensure that users in the Accounting share can only see
folders they have permission to access?

  • A. Remove File Blocking on the accounting shares
  • B. Remove read-only access to shares users should not access
  • C. Enable Access-Based Enumeration on the accounting share
  • D. Enable Access-Based Enumeration on the File Server
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

An administrator needs to configure VMs in an in-guest cluster running on a vSphere
environment. This configuration is for a critical database workload in a demilitarized zone.
The company's Risk Management department requires that data traffic not be exposed to
other types of traffic. What should the administrator do to comply with the Risk Management
department's
requirements?

  • A. Mount shared Disks within the VMs as an RDM.
  • B. Enable NAT for Data Services IP Address.
  • C. Control iSCSI access through the firewall.
  • D. Enable iSCSI Network Segmentation
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

An administrator needs to ensure maximum performance, throughput and redundancy for the
company's Oracle RAC implementation, while using the native method for securing
workloads.
Which configuration meets these requirements?

  • A. Files with a general purpose share and File Blocking
  • B. Volumes with CHAP and multiple Disks
  • C. Volumes with MPIO and a single vDisk
  • D. Files with a distributed share and ABE
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

A company is using a vSphere-based 5-node Nutanix cluster. Currently, the cluster is using
three full HCl nodes and two storage-only nodes. VMs are configured with Volumes with
multiple vDisks.
Which statement about Volumes Load Balancing is correct?

  • A. Disks can be redirected to all CVMs within the cluster
  • B. VDisks are managed by the CVM, which hosts the VM
  • C. vDisks are managed by the two storage-only nodes
  • D. VDisks can be redirected only to the three full HD nodes
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

An administrator has deployed a new Files cluster within a Windows environment.
After some days, the Files environment is not able to synchronize users with the Active
Directory server anymore. The administrator observes a large time difference between the
Files environment and the Active Directory server that is responsible for the behavior.How should the
administrator prevent the Files environment and the AD Server from having
such a time difference in future?

  • A. Use Opoolntp org as the NTP Server for the AD Server
  • B. Use the same NTP Servers for the Files environment and the AD Server
  • C. Connect to every FSVM and edit the time manually
  • D. Use 0.pool ntp.org as the NTP Server for the Files environment
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

An administrator needs to deploy Files Analytics (FA). After logging into the Prism
management console using personal credentials, the administrator is not able to deploy the
Virtual Appliance
What action is needed to resolve this issue?

  • A. Move FA to another storage container.
  • B. Download the FA Virtual Appliance.
  • C. Perform FA deployment in Prism Central
  • D. Deploy FA using the admin user account
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

An administrator is using Objects for the company's DevOps department.
The administrator must ensure that the data meets regulatory compliance requirements for
many critical sectors and still gives users the option to recover from accidental overwrite or
unwanted modification of an object.
Which two components should the administrator enable to complete this task? (Choose two.)

  • A. Windows Previous Versions (WPS)
  • B. Self Service Restore (SSR)
  • C. Object versioning
  • D. Write-Once-Read-Many (WORM)
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

An administrator needs to create a new Volume Group named vg101 to share storage to four
client initiators using the CLI command:
vg.create vg101 shared=true
After creating the Volume Group, the administrator needs to add disks to the new Volume
Group and attach the Initiator IQNs for each host
Which next two commands must the administrator run to complete this task? (Choose two.)

  • A. vg.attach_external va name initiator name= <initiator iqn>
  • B. vg.disk create vg201 container=container name create size=disk size
  • C. vg. attach_external vg101. attach external initiator name <initiator iqn>
  • D. vg.disk create vgl01 create size-disk size container container name index= <index_num
Answer:

A,B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

The administrator is migrating users' home directories from a legacy SAN to Files. The
administrator wants to make sure that the users can only access their home directory, and that
when a new employee logs in for the first time, a home directory is automatically created.
What should the administrator do to satisfy these requirements?

  • A. Create a Standard SMB share and edit folder permissions using the MMC plugin.
  • B. Create a Standard NFS share and set the default access to Read-only.
  • C. Create a Distributed NFS share and set the default access to No Access
  • D. Create a Distributed SMB share and edit folder permissions using the MMC plugin.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2