What are the three predefined resource profiles when deploying Objects?
C
A company has deployed several Files clusters, which are managed by a single File Analytics
instance. An administrator is trying to get File Distribution by Type information, but the data
shown in the GUI seems to be incorrect
What should the administrator do in order to get the correct data?
A
While preparing for migrating data from a legacy storage environment to a new Files scaleout file
server, the administrator make the following notes
Requirements
Number of home directories: 4000
Number of Departmental shares: 1
Everyone is permitted to accessing it
All users use the same Departmental share
The administrator deploys Files using the following configuration:
Number of FSVMS: 3
VCPU & RAM/FSVM: 4vCPU,12GB
One Distributed share & ABE enabled for
One Standard share for the Departmental share
Does this configuration satisfy the project's requirements?
D
A company's IT security policy requires that all network traffic must be secure, and no web
browser certificate error warnings should be accepted by end users.
An administrator is tasked with configuring Objects so that it uses a certificate from an
internal Certificate Authority (CA).
How should the administrator configure Objects to meet the security policy?
B
An administrator has mapped a Volume Group named VG1 to a VM. Due to changes in the
application running inside the VM, two additional volumes are required. At the time of
creation, the VM was assigned to a Protection Domain named PD1.
Which two steps should the administrator take to add the additional volumes to the VM while
maintaining data protection? (Choose two)
AC
What happens to an FSVM during a node failure in a 3-node cluster?
B
The Files administrator has received reports from users in the accounting department that
they can see folders that they don't have permission to access. The accounting department
manager has requested that employees should only be able to see folders that they have
permission to access
How would a Files administrator ensure that users in the Accounting share can only see
folders they have permission to access?
D
An administrator needs to configure VMs in an in-guest cluster running on a vSphere
environment. This configuration is for a critical database workload in a demilitarized zone.
The company's Risk Management department requires that data traffic not be exposed to
other types of traffic. What should the administrator do to comply with the Risk Management
department's
requirements?
B
An administrator needs to ensure maximum performance, throughput and redundancy for the
company's Oracle RAC implementation, while using the native method for securing
workloads.
Which configuration meets these requirements?
C
A company is using a vSphere-based 5-node Nutanix cluster. Currently, the cluster is using
three full HCl nodes and two storage-only nodes. VMs are configured with Volumes with
multiple vDisks.
Which statement about Volumes Load Balancing is correct?
A
An administrator has deployed a new Files cluster within a Windows environment.
After some days, the Files environment is not able to synchronize users with the Active
Directory server anymore. The administrator observes a large time difference between the
Files environment and the Active Directory server that is responsible for the behavior.How should the
administrator prevent the Files environment and the AD Server from having
such a time difference in future?
B
An administrator needs to deploy Files Analytics (FA). After logging into the Prism
management console using personal credentials, the administrator is not able to deploy the
Virtual Appliance
What action is needed to resolve this issue?
A
An administrator is using Objects for the company's DevOps department.
The administrator must ensure that the data meets regulatory compliance requirements for
many critical sectors and still gives users the option to recover from accidental overwrite or
unwanted modification of an object.
Which two components should the administrator enable to complete this task? (Choose two.)
C
An administrator needs to create a new Volume Group named vg101 to share storage to four
client initiators using the CLI command:
vg.create vg101 shared=true
After creating the Volume Group, the administrator needs to add disks to the new Volume
Group and attach the Initiator IQNs for each host
Which next two commands must the administrator run to complete this task? (Choose two.)
A,B
The administrator is migrating users' home directories from a legacy SAN to Files. The
administrator wants to make sure that the users can only access their home directory, and that
when a new employee logs in for the first time, a home directory is automatically created.
What should the administrator do to satisfy these requirements?
B