A company has a number of thin clients which need to boot over the network. The company is using Volumes for this project.
Which component is needed to meet this requirement?(Choose two.)
When completing the Linux Client iSCSI discovery process of the Nutanix cluster Volumes target, which action should an administrator complete first?
An administrator is scheduling to upgrade Files from version 3.8.1.3 to 4.1.0.2 for all the dark sites.
After transferring the dark site bundle to the internal web server, the administrator performs an LCM inventory but cannot check off the Files upgrade to be performed.
Which component needs to be upgraded along side of the core Files components?
A company has distributed a new document bundle, entitled Health and Security Policies to all employees. HR has asked an administrator to verify if key users have opened the document.
How can an administrator support this request with File Analytics?
An administrator is implementing a storage solution with these requirements:
Is easily searchable
Natively supports disaster recovery
Access to each item needs to be fast
Can scale to petabytes of data
users are granted access after authentication
user data is isolated, but could be shared
How should the administrator satisfy these requirements?
Which administrator action within Files will enable the monitoring of users' files for malware and viruses?
A company uses a Nutanix 3-node cluster environment. In Prism Pro, the Capacity Runway shows these capacity values:
Max Capacity: 6 TiB
Effective Capacity 4 TiB
The company wants to upgrade the environment to use an RF3 container and also requires all cluster nodes to be the same model,
What must the effective capacity Of the Nutanix cluster be to support the new RF3 container?
A company is implementing Files and has these requirements:
Six departments
Each department needs to access its own shared namespace
18,000 users
Given the nature of the workload, the administrator has decided to scale up by adding the maximum amount of vCPU and RAM.
What should the administrator implement to satisfy the stated requirements?
Which two network requirements must an administrator take into consideration for a new scale-out Files cluster when configuring and defining separate client and storage networks? (Choose two.)
Which two statements are true about object counts in an object store? (Choose two.)
An administrator of an existing Nutanix cluster running Kubernetes with multiple PODs notices that NCC checks report that some volume groups experience the following error:
Node x .x.x.x:
FAIL: Volume Group pvc -XXXXXX-XXXX-XXXX-XXXX-XXXXXXXXX space usage (908)
The administrator checks the volume group usage from the Kubernetes pod and get different usage results. The current stats are 55% used disk space.
The results of the NCC check do not match what manually-executed checks report.
What is the cause of this behavior?
An administrator is upgrading Objects when the following error message is shown:
type [UPGRADE] : code: 500, message: error in processing pod: application post failed: image updatefailed: unable to pull docker image 464585393164. dkr. com/nutanix—msp/poseidon-zookeeper:buckets—l.o: err Max retries done: exit status 1 status code: 500
How should the administrator resolve this error?
An administrator is implementing a VDI solution in a Nutanix cluster running AHV. The implementation includes home shares for user files. The shares have to be highly available, only accessible by the named user, and replicated to a DR site.
What solution would best fulfill these requirements?
An existing Objects bucket was created for backups with these parameters:
A)WORM policy of three years
B)Versioning policy of two years
C)Lifecycle policy of two years
The customer reports that the cluster is nearly full due to backups created during a recent crypto locker attack. The customer would like to automatically delete backups older than one year to free up space in the cluster.
How should the administrator change settings within Objects?
An administrator is determining the most recent operation a user performed on the share cifs1within the last 24 hours.
How should the administrator complete this task in File Analytics?
Refer the exhibit
When creating an Object Store. an administrator receives an error. as shown in the exhibit.
How should the administrator resolve the error?
An administrator has mapped a Volume Group named VGI to a VM, Due to changes in the application running inside the VM, two additional volumes are required. At the time of creation, the VM was assigned to a Protection Domain named PDI.
Which two steps should the administrator take to add the additional volumes to the VM while maintaining data protection? (Choose two.)