Nutanix NCP-US-6.5 Online Practice
Questions and Exam Preparation
NCP-US-6.5 Exam Details
Exam Code
:NCP-US-6.5
Exam Name
:Nutanix Certified Professional - Unified Storage (NCP-US) v6.5
Certification
:Nutanix Certifications
Vendor
:Nutanix
Total Questions
:76 Q&As
Last Updated
:Jan 11, 2026
Nutanix NCP-US-6.5 Online Questions &
Answers
Question 1:
An administrator wants to provide security against ransomware attacks in Files. The administrator wants to configure the environment to scan files for ransomware in real time and provide notification in the event of a ransomware attack.
Which component should the administrator use to meet this requirement?
A. File Analytics B. Syslog Server C. Files Console D. Protection Domain
A. File Analytics explanation:
Explanation/Reference:
File Analytics is a feature that provides insights into the data stored in Files, such as file types, sizes, owners, permissions, and access patterns. File Analytics also provides security against ransomware attacks by scanning files for ransomware in real time and providing notification in the event of a ransomware attack. File Analytics can detect ransomware based on file extensions, file signatures, or third-party solutions2. References: Nutanix File Analytics Administration Guide2
Question 2:
An administrator is able to review and modify objects in a registered ESXI cluster from a PE instance, but when the administrator attempts to deploy an Objects cluster to the same ESXi cluster, the error that is shown in the exhibit is shown.
What is the appropriate configuration to verify to allow successful Objects cluster deployment to this ESXi cluster?
A. Ensure that vCenter in PE cluster is registered using FQDN and that vCenter details in Objects UI are using FQDN. B. Replace the expired self-signed SSL certificate for the Object Store with a non-expired ' signed by a valid Certificate Authority. C. Replace the expired self-signed SSL certificate for the Object Store with a non-expired self signed SSL certificate. D. Ensure that vCenter in PE cluster is registered using FQDN and that vCenter details in Objects UI are using IP address.
A. Ensure that vCenter in PE cluster is registered using FQDN and that vCenter details in Objects UI are using FQDN. explanation:
Explanation/Reference:
The appropriate configuration to verify to allow successful Objects cluster deployment to this ESXi cluster is to ensure that vCenter in PE cluster is registered using FQDN (Fully Qualified Domain Name) and that vCenter details in Objects UI are using FQDN. FQDN is a domain name that specifies the exact location of a host in the domain hierarchy. For example, esxi01.nutanix.com is an FQDN for an ESXi host. Using FQDN instead of IP addresses can avoid certificate validation errors when deploying Objects clusters to ESXi clusters. References: Nutanix Objects User Guide, page 9; Nutanix Objects Troubleshooting Guide, page 5
Question 3:
An administrator is upgrading Files from version 3.7 to 4.1 in the highly secured environment the pre-upgrade check fail with below error:
FileServer preupgrade check failed with cause (s) Sub task poll timed out
What initial troubleshooting step should the administrator take?
A. Examine the failed tasks on the FSVMs B. Check the there is enough disk space on FSVMs. C. Verify connectivity between the FSVMs. D. Increase upgrades timeout from ecli
C. Verify connectivity between the FSVMs. explanation:
Explanation/Reference:
One of the possible causes of a failed pre-upgrade check for Files is network connectivity issues between the FSVMs. The administrator should verify that there are no firewall rules or network policies that block the communication between the FSVMs on ports 22 (SSH), 9440 (HTTPS), and 2009 (RPC). The administrator can use tools such as ping, traceroute, and telnet to test the connectivity between the FSVMs. References: Nutanix Support Portal - Troubleshooting Nutanix Files Upgrade Issues
Question 4:
An administrator needs to scale out an existing Files instance. Based on the Company's requirements, File instance has four FSVMs configured and needs to expand to six.
How many additional Client IP addresses and Storage IP addresses does the administrator require to complete this task?
A. 3 Client IPs and 2 Storage IPs B. 2 Client IPs and 2 Storage IPs C. 3 Client IPs and 3 Storage IPs D. 2 Client IPs and 3 Storage IPs
B. 2 Client IPs and 2 Storage IPs explanation:
Explanation/Reference:
To scale out an existing Files instance, the administrator needs to add one Client IP and one Storage IP for each additional FSVM. Since the Files instance needs to expand from four FSVMs to six FSVMs, the administrator needs to add two Client IPs and two Storage IPs in total. The Client IPs are used for communication between the FSVMs and the clients, while the Storage IPs are used for communication between the FSVMs and the CVMs. References: Nutanix Files Administration Guide, page 28; Nutanix Files Solution Guide, page 7
Question 5:
An administrator has been tasked with creating a distributed share on a single-node cluster, but has been unable to successfully complete the task.
Why is this task failing?
A. File server version should be greater than 3.8.0 B. AOS version should be greater than 6.0. C. Number of distributed shares limit reached. D. Distributed shares require multiple nodes.
D. Distributed shares require multiple nodes. explanation:
Explanation/Reference:
A distributed share is a type of SMB share or NFS export that distributes the hosting of top-level directories across multiple FSVMs, which improves load balancing and performance. A distributed share cannot be created on a single-node cluster, because there is only one FSVM available. A distributed share requires at least two nodes in the cluster to distribute the directories. Therefore, the task of creating a distributed share on a single-node cluster will fail. References: Nutanix Files Administration Guide, page 33; Nutanix Files Solution Guide, page 8
Question 6:
An administrator wants to monitor their Files environment for suspicious activities, such mass deletion or access denials.
How can the administrator be alerted to such activities?
A. Configure Alerts and Events in the Files Console, filtering for Warning severity. B. Deploy the Files Analytics VM. and configure anomaly rules. C. Configure Files to use ICAP servers, with monitors for desired activities. D. Create a data protection policy in the Files view in Prism Central.
B. Deploy the Files Analytics VM. and configure anomaly rules. explanation:
Explanation/Reference:
The administrator can monitor their Files environment for suspicious activities, such as mass deletion or access denials, by deploying the File Analytics VM and configuring anomaly rules. File Analytics is a feature that provides insights into the usage and activity of file data stored on Files. File Analytics consists of a File Analytics VM (FAVM) that runs on a Nutanix cluster and communicates with the File Server VMs (FSVMs) that host the file shares. File Analytics can alert the administrator when there is an unusual or suspicious activity on file data, such as mass deletion, encryption, permission change, or access denial. The administrator can configure anomaly rules to define the threshold, time window, and notification settings for each type of anomaly. References: Nutanix Files Administration Guide, page 93; Nutanix File Analytics User Guide
Question 7:
An administrator needs to protect a Files cluster unique policies for different shares.
How should the administrator meet this requirement?
A. Create a protection domain in the Data Protection view in Prism Element. B. Configure data protection polices in File Server view in Prism Element C. Create a protection domain in the Data Protection view in Prism Central. D. Configure data protection polices in the Files view in Prism Central.
D. Configure data protection polices in the Files view in Prism Central. explanation:
Explanation/Reference:
The administrator can meet this requirement by configuring data protection policies in the Files view in Prism Central. Data protection policies are policies that define how file data is protected by taking snapshots, replicating them to another site, or tiering them to cloud storage. Data protection policies can be configured for each share or export in a file server in the Files view in Prism Central. The administrator can create different data protection policies for different shares or exports based on their protection needs and requirements. References: Nutanix Files Administration Guide, page 79; Nutanix Files Solution Guide, page 9
Question 8:
An administrator is planning to upgrade all ESXi hypervisors in a cluster hosting Files.
When performing one-click hypervisor upgrades, what prerequisite must be performed?
A. Enable the anti-affinity rules on all FSVMs. B. Manually migrate the FSVMs. C. Shutdown the FSVMs. D. Disable the anti-affinity rules on all FSVMs.
D. Disable the anti-affinity rules on all FSVMs. explanation:
Explanation/Reference:
The prerequisite that must be performed before performing one-click hypervisor upgrades is to disable the anti-affinity rules on all FSVMs. Anti-affinity rules are rules that prevent two or more VMs from running on the same host at the same time. Anti- affinity rules can improve the availability and performance of FSVMs by distributing them across different hosts in a cluster. However, anti-affinity rules can interfere with one-click hypervisor upgrades, which require all VMs on a host to be migrated to another host before upgrading the host. Therefore, the administrator must disable the anti-affinity rules on all FSVMs before performing one-click hypervisor upgrades, and re-enable them after the upgrades are completed. References: Nutanix Files Administration Guide, page 22; Nutanix Files Upgrade Guide
Question 9:
Which two prerequisites are needed when deploying Objects to a Nutanix cluster? (Choose two.)
A. Microsegmentation is enabled. B. Data Services IP is configured on the PI C. DNS is configured on the PE. D. AHV IPAM is disabled on the VLAN used for Objects.
A. Microsegmentation is enabled. B. Data Services IP is configured on the PI explanation:
Explanation/Reference:
References: Nutanix Objects Administration Guide1
Question 10:
What is a mandatory criterion for configuring Smart Tier?
A. VPC name B. Target URL over HTTP C. Certificate D. Access and secret keys
D. Access and secret keys explanation:
Explanation/Reference:
Smart Tier requires access and secret keys to authenticate with the target storage tier, which can be Nutanix Objects or any S3-compatible storage service. The access and secret keys are generated by the target storage service and must be provided when configuring Smart Tier3. References: Nutanix Files Administration Guide3
Nowadays, the certification exams become more and more important and required by more and more
enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare
for the exam in a short time with less efforts? How to get a ideal result and how to find the
most reliable resources? Here on Vcedump.com, you will find all the answers.
Vcedump.com provide not only Nutanix exam questions,
answers and explanations but also complete assistance on your exam preparation and certification
application. If you are confused on your NCP-US-6.5 exam preparations
and Nutanix certification application, do not hesitate to visit our
Vcedump.com to find your solutions here.