When completing the Linux Client iSCSI discovery process of the Nutanix cluster Volumes target, which action should an administrator complete first?

When completing the Linux Client iSCSI discovery process of the Nutanix cluster Volumes target, which action should an administrator complete first?A . Ensure the iSCSI is started. B. Restart iSCSI service on CVM. C. Discover the Volumes target. D. Establish connection to the Volumes target.View AnswerAnswer: A Explanation: To use...

May 30, 2023 No Comments READ MORE +

Which Nutanix interface is used to deploy a new Files instance?

Which Nutanix interface is used to deploy a new Files instance?A . Prism Element B. Prism Central C. Files Manager D. Life Cycle ManagerView AnswerAnswer: B Explanation: According to Nutanix Support & Insights1, Nutanix Files is a scale-out file storage solution that provides SMB and NFS file services to clients....

May 29, 2023 No Comments READ MORE +

What should the administrator Veri'/ in the Steps performed to configure the RAC cluster to prevent this situation from occurring again?

A two-VM Oracle RAC cluster was recently configured with Linux Red Hat using a Nutanix Volume Group. At the time Of performing the failover tests Of simulating a failure in each Of the three Nutanix cluster nodes, the cluster administrator noticed that tile virtual machines Of the RAC cluster do...

May 27, 2023 No Comments READ MORE +

Does this configuration satisfy the project's requirements?

While preparing for migrating data from a legacy storage environment to a new Files scale-out file server, the administrator make the following notes: Requirements: Number of home directories: 4000 Number of Departmental shares: 1 Everyone is permitted to accessing it All users use the same Departmental share The administrator deploys...

May 27, 2023 No Comments READ MORE +

What is causing this issue?

During a recent audit, the auditors discovered several shares that were unencrypted. To remediate the audit item, the administrator enabled Encrypt SMB3 Messages on the accounting, finance, and facilities shares. After encryption was enabled, several users have reported that they are no longer able to access the shares. What is...

May 27, 2023 No Comments READ MORE +

What should be changed to have a good capacity runway at least for the next 6 months?

63 TiB storage The total target workload requests are: 5 Ghz CPU 10 GB RAM 40 TiB storage What should be changed to have a good capacity runway at least for the next 6 months?A . Review storage capacity requested by the workload. B. Increase the storage capacity for physical...

May 26, 2023 No Comments READ MORE +

Which protocol will be native?

An administrator has deployed an SMB v3 Files cluster, but needs to make the cluster able to support Multi-protocol access, Which protocol will be native?A . NFS B. S3 C. SMB D. cifsView AnswerAnswer: C Explanation: According to the Nutanix Files SMB Migration Guide1, Nutanix Files supports SMB protocol V2...

May 26, 2023 No Comments READ MORE +

Which Objects feature will satisfy this requirement?

An administrator needs to ensure objects in a bucket expire after a certain period of time. Which Objects feature will satisfy this requirement?A . WORM bucket B. Object versioning C. Lifecycle polices D. Protection policiesView AnswerAnswer: C Explanation: According to Nutanix documentation on unified storage (NCP-US) v6, Lifecycle policies enable...

May 25, 2023 No Comments READ MORE +

Which two steps should the administrator take to add the additional volumes to the VM while maintaining data protection?

An administrator has mapped a Volume Group named VGI to a VM, Due to changes in the application running inside the VM, two additional volumes are required. At the time of creation, the VM was assigned to a Protection Domain named PDI. Which two steps should the administrator take to...

May 25, 2023 No Comments READ MORE +

Which administrator action within Files will enable the monitoring of users' files for malware and viruses?

Which administrator action within Files will enable the monitoring of users' files for malware and viruses?A . Install antivirus on a server and mount the share for scan. B. Connect to an ICAP server. C. Install ClamAV on each FSVM, D. Leave the threat detection to the local machine's antivirus...

May 25, 2023 No Comments READ MORE +