While preparing for migrating data from a legacy storage environment to a new Files scaleout file server, the administrator make the following notes
Requirements
* Number of home directories: 4000
* Number of Departmental shares: 1
* Everyone is permitted to accessing it
* All users use the same Departmental share
The administrator deploys Files using the following configuration:
* Number of FSVMS: 3
* VCPU & RAM/FSVM: 4vCPU,12GB
* One Distributed share & ABE enabled for
* One Standard share for the Departmental share
Does this configuration satisfy the project's requirements?
Answer : D
A company's IT security policy requires that all network traffic must be secure, and no web
browser certificate error warnings should be accepted by end users.
An administrator is tasked with configuring Objects so that it uses a certificate from an
internal Certificate Authority (CA).
How should the administrator configure Objects to meet the security policy?
Answer : B
An administrator has mapped a Volume Group named VG1 to a VM. Due to changes in the
application running inside the VM, two additional volumes are required. At the time of
creation, the VM was assigned to a Protection Domain named PD1.
Which two steps should the administrator take to add the additional volumes to the VM while
maintaining data protection? (Choose two)
Answer : A, C
What happens to an FSVM during a node failure in a 3-node cluster?
Answer : B
An administrator needs to create a new Volume Group named vg101 to share storage to four
client initiators using the CLI command:
vg.create vg101 shared=true
After creating the Volume Group, the administrator needs to add disks to the new Volume
Group and attach the Initiator IQNs for each host
Which next two commands must the administrator run to complete this task? (Choose two.)
Answer : A, B
An administrator is implementing a storage solution with these requirements:
* Is easily searchable
* Natively supports disaster recovery * Access to each item needs to be fast
* Can scale to petabytes of data
* Users are granted access after authentication * User data is isolated, but could be shared
How should the administrator satisfy these requirements?
Answer : C
A company uses a Nutanix 3-node cluster environment. In Prism Pro, the Capacity Runway
shows these capacity values:Max Capacity 6 TiB Effective Capacity 4 TiB
The company wants to upgrade the environment to use an RF3 container and also requires all
cluster nodes to be the same model.
What must the effective capacity of the Nutanix cluster be to support the new RF3 container?
Answer : A