NCP-US-6.5 Online Practice Questions

Home / Nutanix / NCP-US-6.5

Latest NCP-US-6.5 Exam Practice Questions

The practice questions for NCP-US-6.5 exam was last updated on 2025-06-03 .

Viewing page 1 out of 5 pages.

Viewing questions 1 out of 27 questions.

Question#1

An administrator is looking for a tool that includes these features:
• Permission Denials
• Top 5 Active Users
• Top 5 Accessed Files
• File Distribution by Type
Nutanix tool should the administrator choose?

A. File Server Manager
B. Prism Central
C. File Analytics
D. Files Console

Explanation:
The tool that includes these features is File Analytics. File Analytics is a feature that provides insights into the usage and activity of file data stored on Files. File Analytics consists of a File Analytics VM (FAVM) that runs on a Nutanix cluster and communicates with the File Server VMs (FSVMs) that host the file shares. File Analytics can display various reports and dashboards that include these features: Permission Denials: This report shows the number of permission denied events for file operations, such as read, write, delete, etc., along with the user, file, share, and server details.
Top 5 Active Users: This dashboard shows the top five users who performed the most file operations in a given time period, along with the number and type of operations.
Top 5 Accessed Files: This dashboard shows the top five files that were accessed the most in a given time period, along with the number of accesses and the file details.
File Distribution by Type: This dashboard shows the distribution of files by their type or extension, such as PDF, DOCX, JPG, etc., along with the number and size of files for each type.
Reference: Nutanix Files Administration Guide, page 93; Nutanix File Analytics User Guide

Question#2

After configuring Smart DR, an administrator is unable see the policy in the Policies tab. The administrator has confirmed that all FSVMs are able to connect to Prism Central via port 9440 bidirectional.
What is the possible reason for this issue?

A. The primary and recovery file servers do not have the same protocols.
B. Port 7575 should be open for all External/Client IPS of FSVMs on the Source and Target cluster.
C. The primary and recovery file servers do not have the same version.
D. Port 7575 should be open for all Internal/Storage IPs of FSVMs on the Source and Target.

Explanation:
Smart DR is a feature that allows share-level replication between active file server instances for disaster recovery. To configure Smart DR, one of the prerequisites is to open TCP port 7575 for all External/Client IPs of FSVMs on the Source and Target cluster. This port is used for communication between the FSVMs and Prism Central. If this port is not open, Smart DR policies will not be visible in the Policies tab in Prism Central.
Reference: Nutanix Files Administration Guide, page 79; Nutanix Files Solution Guide, page 9

Question#3

A Files administrator needs to generate a report listing the files matching those in the exhibit.
What is the most efficient way to complete this task?

A. Use Report Builder in File Analytics.
B. Create a custom report in Prism Central.
C. Use Report Builder in Files Console.
D. Create a custom report in Files Console.

Explanation:
The most efficient way to generate a report listing the files matching those in the exhibit is to use Report Builder in File Analytics. Report Builder is a feature that allows administrators to create custom reports based on various filters and criteria, such as file name, file type, file size, file owner, file age, file access time, file modification time, file permission change time, and so on. Report Builder can also export the reports in CSV format for further analysis or sharing.
Reference: Nutanix Files Administration Guide, page 97; Nutanix File Analytics User Guide

Question#4

An administrator created a bucket for an upcoming project where internal users as well as an outside consultant …. Object Browser. The administrator needs to provide both internal and consultant access to the same bucket.
The organization would like to prevent internal access to the consultant, based on their security policy.
Which two items are requires to fulfill this requirement (Choose two.)

A. Configure Directory Services under the Access Keys section
B. Generate access keys based on directory and email-based users.
C. Install third-party software for bucket access to all users.
D. Generate access keys using third-party software.

Explanation:
Nutanix Objects supports directory services integration, which allows administrators to configure access keys based on directory and email-based users. This enables granular access control and security for buckets and objects. The administrator can configure directory services under the Access Keys section in Prism Central, and then generate access keys for internal users from the directory service and for the consultant from an email address2.
Reference: Nutanix Objects Administration Guide2

Question#5

An administrator wants to monitor their Files environment for suspicious activities, such mass deletion or access denials.
How can the administrator be alerted to such activities?
How can the administrator be alerted to such activities?

A. Configure Alerts & Events in the Files Console, filtering for Warning severity.
B. Deploy the Files Analytics V
C. and configure anomaly rules.
D. Configure Files to use ICAP servers, with monitors for desired activities.
E. Create a data protection policy in the Files view in Prism Central.

Explanation:
The administrator can monitor their Files environment for suspicious activities, such as mass deletion or access denials, by deploying the File Analytics VM and configuring anomaly rules. File Analytics is a feature that provides insights into the usage and activity of file data stored on Files. File Analytics consists of a File Analytics VM (FAVM) that runs on a Nutanix cluster and communicates with the File Server VMs (FSVMs) that host the file shares. File Analytics can alert the administrator when there is an unusual or suspicious activity on file data, such as mass deletion, encryption, permission change, or access denial. The administrator can configure anomaly rules to define the threshold, time window, and notification settings for each type of anomaly.
Reference: Nutanix Files Administration Guide, page 93; Nutanix File Analytics User Guide

Exam Code: NCP-US-6.5Q & A: 76 Q&AsUpdated:  2025-06-03

 Get All NCP-US-6.5 Q&As