Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

NCP-DS PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

NCP-DS PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Nutanix Certified Professional - Data Services
  • Last Update: Sep 15, 2025
  • Questions and Answers: 98
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

NCP-DS Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

NCP-DS Practice Exam Questions with Answers Nutanix Certified Professional - Data Services Certification

Question # 6

The Compliance department would like the administrator to have the ability to revert

documents to previous versions. How should the administrator facilitate this request?

A.

Configure protection snapshots on the File Server

B.

Enable Self-Service Restore on the Share/Export

C.

Configure Protection snapshots on the Share/Export

D.

Enable Self-Service Restore on the File Server

Full Access
Question # 7

Which two configuration elements can an administrator find in the File Server -> FILE SERVER DETAILS tab? (choose two.)

A.

Share/Export Count.

B.

Total Number of Files.

C.

DNS Domain Name.

D.

Quarantined Files.

Full Access
Question # 8

What are the three main metrics monitored for each Files instance and per share?

A.

Concurrent Connections, Throughput and OP sizes

B.

Access time, IOPS and Throughput

C.

Bandwidth, Speed and IOPS

D.

Latency, Throughput and IOPS

Full Access
Question # 9

An administrator experiences a failed Objects store deployment, as shown in the exhibit.

Which are the two primary logs that should be reviewed to triage deployment issues?

A.

/home/nutanix/data/logs/aoss service manager.out

/home/nutanix/data/logs/msp_controller.out

B.

/home/nutanix/data/logs/genesis.out

/home/nutanix/data/logs/msp_controller.out

C.

/home/nutanix/data/logs/install.out

/home/nutanix/data/logs/msp_controller.out

D.

/home/nutanix/data/logs/insights collector:out

/home/nutanix/data/logs/msp_controller.out

Full Access
Question # 10

Which action will improve the performance of a database server storage using Volumes that is

experiencing persistent slow queries?

A.

Enable Flash Mode on the Volume Group

B.

Disable deduplication on storage pool

C.

Upgrade CPUs on FSVMs running databases

D.

Create dedicated container for databases

Full Access
Question # 11

What fields are included in Object Store alerts?

A.

Alert Time, Alert Type, Severity, Title, Message, UUID

B.

Title, Source, Impact, severity, resolved, Acknowledged and Create Time

C.

Name, Description, Severity, Created and Silenced

D.

Severity, Issues, Create Time, Last Occurred, Status, Entities, Documentation

Full Access
Question # 12

Which two network requirements must an administrator take into consideration when configuring and defining client and storage networks? (Choose two.)

A.

Ensure there is one IP address available for the storage network

B.

Ensure there is one IP address available for client network

C.

The Client and storage networks must have separate subnets.

D.

Ensure the client and storage networks use a tagged VLAN

Full Access
Question # 13

An administrator needs to analyze data created by a custom application, which writes data

into an SMB share hosted on Files This application uses custom-built file extensions such as

.zyz, zzz. The administrator needs to provide a collapsed view of space usage number of files,

and changes within a given time frame.

How should the administrator provide the required information?

A.

Create a new File Server Resource Manager MMC and use File Screens

B.

Configure a SNMP server with Nutanix MIBs and use Excel to analyze traps

C.

Add a new file category in File Analytics and use File Distribution View

D.

Go to Files select the share used by the application and point to Usage View

Full Access
Question # 14

An administrator wants to replicate an Objects bucket between two clusters, managed by

separate Prism Central instances.

Which step must the administrator take into account when planning to set up streaming

replication?

A.

The clusters must be defined on each Prism Central instance as an Availability Zone.

B.

The clusters must be defined on each Prism Central instance in a Protection Policy

C.

The dusters, managed by different Prism Central instances, do not allow replication of buckets

D.

The clusters must be defined on each Prism Central Instance in a Protection Domain.

Full Access
Question # 15

An administrator has received multiple trouble tickets from users who are unable to access a

particular Distributed share.

While troubleshooting the administrator observes that data located on FSVM 3 can be

accessed but the data located on FSVMs 1 and 2 is inaccessible. The administrator receives

this message when attempting to access data on FSVMS 1 and 2

Network object not found

Both FSVM 1 and 2 nodes successfully reply to pings and the administrator is able to access

data via the node IP

What must the administrator check as a next step?

A.

Check if user permissions are configured correctly

B.

Check if Kerberos_time_skew is logged on the client

C.

Check if SMB1 is enabled on FSVM node 1 and 2

D.

Check if all DNS records are created on the DNS server.

Full Access
Question # 16

A company’s Marketing department requires the ability to recover files hosted in a Files share.

They also require the ability to restore files with a timeframe of 14 days.

Which two configurations are required to meet these requirements? ( Choose Two)

A.

Enable Self service restore at share level.

B.

Install Nutanix Guest Tools on clients who need to perform Self service Restore.

C.

Change the Protection domain settings to keep at least 14 days of snapshots.

D.

Change Default settings in the protection configuration window

Full Access
Question # 17

An administrator is experiencing the following objects failure error message:

IAM service is not healthy

The object store domain entries appear grayed out in the user interface, as shown in the exhibit.

Which commands should the administrator execute to identify the failure source?

A.

A mspcli cluster_list

B mspcli status -u

B.

A mspctl cluster_objects

B mspctl status -u

C.

A mspcli cluster_objects

B mspcli status -u

D.

A mspctl cluster_list

B mspctl status -u

Full Access
Question # 18

A company decided to switch their existing windows file server to a new Files instance. After

successfully deploying Files, an administrator now needs to plan to reduce the impact of any

potential outage. As the source file server resides across the WAN from the destination file

server over an unreliable network connection.

The administrator needs to ensure there is minimal impact to data already copied, should a

network outage occur. How should the administrator meet this requirement?

A.

Use rsync in incremental Copy mode.

B.

Check where the data copy failed and restart from that location

C.

Use a method allowing files to be copied in restartable mode.

D.

Use Microsoft DFS-R to replicate the files.

Full Access
Question # 19

What are the three predefined resource profiles when deploying Objects?

A.

Small, Medium, and Heavy

B.

Light Medium, and Large

C.

Light Medium, and Heavy

D.

Small, Medium, and Large

Full Access
Question # 20

Recently, many important files were deleted from a specific folder within a Files share. The

administrator is asked to provide a list of were deleted.

Within File Analytics, how can the administrator determine which files have been deleted in

that specific timetrame!

A.

Select

B.

Use Audit Trails search for Users View Audit and filter by operations

C.

Use Anomalies Define Anomaly Rules and create a rule to warn when files are deleted

D.

Use Audit Trails search for Folders View Audit and enter a date range

Full Access
Question # 21

An administrator has been informed of a new project, which requires expanding the capacity

of the project team's Volume Group without disrupting availability or affecting performance

Which steps should the administrator take to achieve this?

A.

Clone the existing Volume Group to a larger instance and switch to the new Volume Group

B.

Add new dishes to the Volume Group and wait for the Volume Group to auto-resize

C.

Create a new larger Volume Group and migrate the files

D.

Add new data to the Volume Group and expand the Volume Group online

Full Access
Question # 22

Which two configuration items are mandatory for deploying a Files cluster? (Choose two.)

A.

Configure two networks

B.

Configure a DNS server

C.

Configure an NTP server

D.

Configure a AHV managed network

Full Access
Question # 23

An administrator is upgrading Files and receives the following error message:

Failed to reach FileServer

In which two ways should the administrator resolve this issue? (Choose two.)

A.

ssh into Minerva CVM Leader and execute command cluster start

B.

ssh into Minerva CVM Leader and execute command esis stop minerva_cvm

C.

ssh into the FSVM and execute command minerva stop fsvm

D.

ssh into the FSVM and execute command cluster restart

Full Access
Question # 24

The Files administrator has received reports from users in the accounting department that

they can see folders that they don't have permission to access. The accounting department

manager has requested that employees should only be able to see folders that they have

permission to access

How would a Files administrator ensure that users in the Accounting share can only see

folders they have permission to access?

A.

Remove File Blocking on the accounting shares

B.

Remove read-only access to shares users should not access

C.

Enable Access-Based Enumeration on the accounting share

D.

Enable Access-Based Enumeration on the File Server

Full Access
Question # 25

An existing Objects bucket was created for backups with these requirements:

• WORM policy of one year

• Versioning policy of one year

• Lifecycle policy of three years

A recent audit has reported a compliance failure. Data that should be retained for three years

has been deleted prematurely.

How should the administrator resolve the compliance failure within Objects?

A.

Modify the existing bucket versioning policy from one year to three years

B.

Modify the existing bucket WORM policy from one year to three years.

C.

Create a tiering policy to store deleted data on cold storage for three years

D.

Recreate a new bucket with the retention policy of three years.

Full Access
Question # 26

An administrator is upgrading Files and receives the following error

File Server preupgrade check failed with cause (s) FileServer in HA state

A FSVM was noted to be powered off and was successfully powered back on

Which command result will now enable the administrator to successfully reattempt the

upgrade?

A.

nutanix@FSVM$ afs ha.minerva check_ha_state The state of the HA should display True

B.

nutanix@FSVM$ afs ha.minerva check ha state The state of the HA should display false

C.

nutanix@FSVM$ afs ha. Isv_check_ha_state The state of the HA should display False

D.

nutanix@FSVM$ afs ha.fsVm check ha state The state of the HA should display True

Full Access
Question # 27

Which two statements are true about object counts in an object store?

A.

Upload counts are included in the object counts

B.

Each upload of a multipart upload is counted as a separate object until the object is finalized.

C.

Each upload of a multipart upload is counted as a separate object

D.

Upload Counts are not included in the object counts

Full Access
Question # 28

A company's IT security policy requires that all network traffic must be secure, and no web

browser certificate error warnings should be accepted by end users.

An administrator is tasked with configuring Objects so that it uses a certificate from an

internal Certificate Authority (CA).

How should the administrator configure Objects to meet the security policy?

A.

Import the Private key with a Subject Alternate Name of the company domain.

B.

Import the Private key and certificate files from the internal CA

C.

Regenerate the CSR and download certificates from the internal CA

D.

Regenerate the self-signed certificate with RSA 2048 as the bit type.

Full Access
Question # 29

An administrator receive a warning message concerning file server hosted in a 3 node cluster

The Prism management console recommends optimizing Files resources

How should the administrator resolve this issue

A.

Scale out by adding a new FSVM in the duster

B.

Apply the recommendation to rebalance

C.

Scale up the FSVMs resources

D.

Increase the CVM: CPU and RAM

Full Access