Nutanix NCP-US - Nutanix Certified Professional – Unified Storage (NCP-US) v6 exam
An administrator needs to upgrade all the File Analytics deployments in the air-gapped environments.
During the preparation stage, the administrator downloads the lcm_file_analytics_3.2.0.tar.gz bundle and transfers it to the dark site web server.
upon performing the LCM inventory and trying to upgrade File Analytics, the administrator does not see the new version in the software tab.
Which additional file should the administrator transfer to the web server in order for the inventory to work?
An administrator has mapped a Volume Group named VGI to a VM, Due to changes in the application running inside the VM, two additional volumes are required. At the time of creation, the VM was assigned to a Protection Domain named PDI.
Which two steps should the administrator take to add the additional volumes to the VM while maintaining data protection? (Choose two.)
A two-VM Oracle RAC cluster was recently configured with Linux Red Hat using a Nutanix Volume Group. At the time Of performing the failover tests Of simulating a failure in each Of the three Nutanix cluster nodes, the cluster administrator noticed that tile virtual machines Of the RAC cluster do not come up and the failover fails.
The administrator must to follow the best practices from Nutanix to construct the RAC cluster using AHV.
What should the administrator Veri'/ in the Steps performed to configure the RAC cluster to prevent this situation from occurring again?
During a recent audit, the auditors discovered several shares that were unencrypted. To remediate the audit item, the administrator enabled Encrypt SMB3 Messages on the accounting, finance, and facilities shares. After encryption was enabled, several users have reported that they are no longer able to access the shares.
What is causing this issue?
Why should an administrator avoid allocating over half the RAM on a host to a FSVM?
Which two network requirements must an administrator take into consideration for a new scale-out Files cluster when configuring and defining separate client and storage networks? (Choose two.)
Where should an administrator look to see which user is the most active within a Files implementation?
An administrator has deployed an SMB v3 Files cluster, but needs to make the cluster able to support Multi-protocol access,
Which protocol will be native?
Which administrator action within Files will enable the monitoring of users' files for malware and viruses?
An administrator has been experiencing performance issues with a SQL VM. To address these issues, the administrator migrated the database to a Volume Group. Following the migration, the performance issues have continued.
What should the administrator do to resolve these performance issues?