An administrator needs to analyze data created by a custom application, which writes data
into an SMB share hosted on Files. This application uses custom-built file extensions such
as .zyx, . zzz,theadministrator needs to provide a collapsed view of space usage, number
of files, and changes within a given time frame.
How should the administrator provide the required information?
A. Go to Files, select the share used by the application and point to Usage View.
B. Add a new' file category in File Analytics and use File Distribution View,
C. Configure SNMP server with Nutanix MIBS and use Excel to analyze traps.
D. Create a File Server Resource Manager MMC and use File Screens,
An administrator is determining the most recent operation a user performed on the share
cifs1within the last 24 hours.
How should the administrator complete this task in File Analytics?
A. In the Anomalis section. select Users exceed an operation count threshold an input the 24 hour range for share cifs1.
B. In the Audit Trails section, search for the user and view their last operations.
C. In the Audit Trails section, search for the cifs1 share and view the actions on the share over the past 24-hour range.
D. In the Anomalies section view the anomaly rule created for the user with an interval of 24 hours.
Explanation: File Analytics is a tool used for monitoring and auditing file activity within an
organization's file servers. The administrator needs to determine the most recent operation
a user performed on the share cifs1 within the last 24 hours. To accomplish this task in File
Analytics, the administrator should go to the Audit Trails section, where they can search for
the cifs1 share and view the actions on the share over the past 24-hour range. This will
allow the administrator to see all the activity that has occurred on the share, including the
most recent operation performed by the user.
According to the Nutanix Unified Storage v6 documents at nutanix.com1, File Analytics
captures all file activity for registered file server instances and provides an audit trail for
administrators2. In the Audit Trails section, you can search for the user or the share name
and view their operations over a specified time range2. This would allow you to determine
the most recent operation a user performed on the share cifs1 within the last 24 hours.
During a recent audit, the auditors discovered several shares that were unencrypted. To
remediate the audit item, the administrator enabled Encrypt SMB3 Messages on the
accounting, finance, and facilities shares. After encryption was enabled, several users have
reported that they are no longer able to access the shares.
What is causing this issue?
A. The users are accessing the shares from Windows 8 desktops.
B. Advanced Encryption Standard 128 & 256 are disabled in Windows 7.
C. Advanced Encryption Standard 128 & 256 are disabled in Linux or Mac OS.
D. The users are accessing the shares from Linux desktops.
An administrator is building a new application server and has decided to use post-process
compression for the file server and inline compression for the database components.
The current environment has these characteristics:
Two Volume Groups named VGI and VG2.
A Storage Container named SCI with inline-compression.
A Storage Container named SC2 with post-process compression.
Which action should the administrator take to most efficiently satisfy this requirement?
A. Wfithin VG1, create one vDisk in SC1 and one vDisk in Sc2.
B. Within SC1, create one Wisk in VG1 and within SC2. create one Disk in VG2
C. Wthin SC1, create one vDisk in VG1 and one vDisk in VG2,
D. Writhin VG1, create one vDisk in SC1 and within VG2, create one vDisk in SC2.
An administrator has been experiencing performance issues with a SQL VM. To address
these issues, the administrator migrated the database to a Volume Group. Following the
migration, the performance issues have continued.
What should the administrator do to resolve these performance issues?
A. use multiple vDisks in the Volume Group.
B. Enable Jumbo Frames.
C. Enable Jumbo Frames.
D. Use multiple subnets for iSCSI traffic.
Page 1 out of 14 Pages |