Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which feature ensures that a host failure's impact on a Files cluster will be minimal?

A.

VM-VM anti-affinity rules

B.

VM-VM affinity rules

C.

VM-Host anti-affinityrules

D.

VM-Host affinity rules

Full Access
Question # 5

An administrator is increasing the read performance for Splunk at their remote site, which uses Objects at the primary site for SmartStore capability. Read latency is extremely high due to WAN traversal for data,

What should the administrator do to remediate this problem?

A.

Deploy another Objects instance at the remote site and configure Streaming Replication of the SmartStore bucket from the primary site.

B.

Deploy another Splunk instance at the remote site and configure Splunk Replication of the SmartStore bucket from the primary site.

C.

Deploy another Splunk instance at the primary site and configure Streaming Replication of the SmartStore bucket from the remote site.

D.

Deploy another Objects instance at the primary site and configure SmartStore Replication

Full Access
Question # 6

Which administrator action within Files will enable the monitoring of users' files for malware and viruses?

A.

Install antivirus on a server and mount the share for scan.

B.

Connect to an ICAP server.

C.

Install ClamAV on each FSVM,

D.

Leave the threat detection to the local machine's antivirus application.

Full Access
Question # 7

A company has distributed a new document bundle, entitled Health and Security Policies to all employees. HR has asked an administrator to verify if key users have opened the document.

How can an administrator support this request with File Analytics?

A.

use Audit Trails, search for Files, ViewAudit and filter by operations.

B.

Select the file from the Top 5 Accessed list, then filter by user,

C.

Select the user from the Top 5 Active Users list then filter by file.

D.

use Audit Trails, search for users, View Audit and filter by file.

Full Access
Question # 8

An administrator needs to analyze data created by a custom application, which writes data into an SMB share hosted on Files. This application uses custom-built file extensions such as .zyx, . zzz,theadministrator needs to provide a collapsed view of space usage, number of files, and changes within a given time frame.

How should the administrator provide the required information?

A.

Go to Files, select the share used by the application and point to Usage View.

B.

Add a new' file category in File Analytics and use File Distribution View,

C.

Configure SNMP server with Nutanix MIBS and use Excel to analyze traps.

D.

Create a File Server Resource Manager MMC and use File Screens,

Full Access
Question # 9

An administrator configured WORM on an existing Objects bucket at 4 p.m. on Monday. During the configuration, the administrator did not select Enable Version. At 8 a.m. the next morning, a ticket was submitted to update the bucket to include versioning.

What are the correct steps to make the requested change?

A.

Create a bucket with Enable Version selected and migrate all data since versioning cannot be changed immediately after WORM is enabled.

B.

Create a new' bucket with Enable Version selected and migrate all data since versioning cannot be changed after 12 hours once WORM is enabled.

C.

Disable WORM and reconfigure with Enable Version and Enable WORM checked as it has been less than 24 hours sinceWORM was enabled.

D.

update the WORM settings to Enable Version as that setting can be turned on at any point after WORM is enabled.

Full Access
Question # 10

A service provider must provide mufti-tenancy capabilities, allowing for each of their customers' data to be isolated on their hosting infrastructure.

How should the Objects administrator configure the environment to meet this requirement?

A.

Create independent Objects stores for each customer.

B.

Create independent Objects buckets for each customer.

C.

Configure micro segmentation on the Objects stores.

D.

Configure Role-based access on the Objects buckets.

Full Access
Question # 11

The Files administrator has received reports from users in the accounting department that they can see folders that they don't have permission to access. The accounting department manager has requested that employees should only be able to see folders that they have permission to access.

How would a Files administrator ensure that users in theaccountingshare can only see folders they have permission to access?

A.

Remove read-only access to shares users should not access.

B.

Enable Access-Based Enumeration on the accounting share.

C.

Enable Access-Based Enumeration on the File Sewer.

D.

Remove File Blocking on the accounting shares.

Full Access