Free NCP-DS Exam Braindumps (page: 11)

Page 10 of 25

An existing Objects bucket was created for backups with these parameters:

· WORM policy of three years Versioning policy of two years Lifecycle policy of two years

The customer reports that the cluster is nearly full due to backups created during a recent

crypto locker attack. The customer would like to automatically delete backups older than one
year to free up space in the cluster.

How should the administrator change settings within Objects?

  1. Create a new bucket with the WORM policy of two years.
  2. Modify the existing bucket lifecycle policy from two years to one year
  3. Create a new bucket with the lifecycle policy of one year.
  4. Modify the existing bucket WORM policy from three years to one year

Answer(s): A



An administrator wants to replicate an Objects bucket between two clusters, managed by
separate Prism Central instances.

Which step must the administrator take into account when planning to set up streaming

replication?

  1. The clusters must be defined on each Prism Central instance as an Availability Zone.
  2. The clusters must be defined on each Prism Central instance in a Protection Policy
  3. The dusters, managed by different Prism Central instances, do not allow replication of buckets
  4. The clusters must be defined on each Prism Central Instance in a Protection Domain.

Answer(s): D



A company uses a Nutanix 3-node cluster environment. In Prism Pro, the Capacity Runway
shows these capacity values:

Max Capacity 6 TiB Effective Capacity 4 TiB

The company wants to upgrade the environment to use an RF3 container and also requires all
cluster nodes to be the same model.

What must the effective capacity of the Nutanix cluster be to support the new RF3 container?

  1. 6 TIB
  2. 9 TIB
  3. 4 TiB
  4. 10 TiB

Answer(s): A



A company's IT security policy requires that all network traffic must be secure, and no web
browser certificate error warnings should be accepted by end users.

An administrator is tasked with configuring Objects so that it uses a certificate from an
internal Certificate Authority (CA).

How should the administrator configure Objects to meet the security policy?

  1. Import the Private key with a Subject Alternate Name of the company domain.
  2. Import the Private key and certificate files from the internal CA
  3. Regenerate the CSR and download certificates from the internal CA
  4. Regenerate the self-signed certificate with RSA 2048 as the bit type.

Answer(s): B






Post your Comments and Discuss Nutanix NCP-DS exam with other Community members:

NCP-DS Exam Discussions & Posts