An administrator is implementing a VDI solution in a Nutanix cluster running AHV. The
implementation includes home shares for user files. The shares have to be highly available,
only accessible by the named user, and replicated to a DR site.
What solution would best fulfill these requirements?
A. Files with Access Based Enumerationenabled.
B. Volumes with ISCSI Initiators disabled.
C. Objects with WORMenabled
D. Nutanix container with Whitelistingconfigured
An existing Objects bucket was created for backups with these parameters:
A)WORM policy of three years
B)Versioning policy of two years
C)Lifecycle policy of two years
The customer reports that the cluster is nearly full due to backups created during a recent
crypto locker attack. The customer would like to automatically delete backups older than
one year to free up space in the cluster.
How should the administrator change settings within Objects?
A. Modify the existing bucket lifecycle policy from two years to one year.
B. Create a new' bucket with the lifecycle policy of one year
C. Create a new' bucket with the WORM policy of two years.
D. Modify the existing bucket WORM policy from three years to one year.
A service provider must provide mufti-tenancy capabilities, allowing for each of their
customers' data to be isolated on their hosting infrastructure.
How should the Objects administrator configure the environment to meet this requirement?
A. Create independent Objects stores for each customer
B. Create independent Objects buckets for each customer.
C. Configure micro segmentation on the Objects stores
D. Configure Role-based access on the Objects buckets
A company is implementing Files and has these requirements:
Six departments
Each department needs to access its own shared namespace
18,000 users
Given the nature of the workload, the administrator has decided to scale up by adding the
maximum amount of vCPU and RAM.
What should the administrator implement to satisfy the stated requirements?
A. Six standard shares with 3,000 concurrent sessions.
B. The administrator should create a distributed share.
C. Six distributed shares with 3,000 concurrent sessions
D. The Admittatur should create a standard share.
An administrator needs to configure a service to collect data from a forensic software
package that audits client access to a specific location. Data need to be immutable,
Which option meets these requirements?
A. Configure WORM options to an Objects bucket.
B. Configure an Objects bucket with versioning.
C. Configure an Objects bucket with the Expire current objects lifecycle policy enabled
D. Configure standard Objects bucket with the read-on)' attribute enabled
Page 2 out of 14 Pages |
Previous |