Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Nutanix Exam NCP-US Topic 7 Question 33 Discussion

Actual exam question for Nutanix's NCP-US exam
Question #: 33
Topic #: 7
[All NCP-US Questions]

An administrator wants to monitor their Files environment for suspicious activities, such mass deletion or access denials.

How can the administrator be alerted to such activities?

How can the administrator be alerted to such activities?

Show Suggested Answer Hide Answer
Suggested Answer: B

Data Lens can provide a centralized management solution for Files deployments in multiple sites, including different geographical locations. Data Lens can also automate archiving tier policies for compliance purposes, by allowing administrators to create policies based on file attributes, such as age, size, type, or owner, and move files to a lower-cost tier or delete them after a specified period. Data Lens can also protect the data against ransomware, by allowing administrators to block malicious file signatures from being written to the file system. Reference: Nutanix Data Lens Administration Guide


Contribute your Thoughts:

Aliza
2 days ago
Hmm, Option D might be the easiest route. Creating a data protection policy in Prism Central could be a simple solution. Just hope the files don't accidentally protect themselves into oblivion!
upvoted 0 times
...
Roslyn
4 days ago
I'd go with Option C. Integrating ICAP servers is a great way to monitor file access and modifications. It's like having a security guard for your files, you know?
upvoted 0 times
...
Altha
23 days ago
Option B seems like the way to go. The Files Analytics VM can really give you a comprehensive view of suspicious activities. Plus, you can configure custom anomaly rules to catch anything out of the ordinary.
upvoted 0 times
Cordelia
6 days ago
You can configure custom anomaly rules to catch anything out of the ordinary.
upvoted 0 times
...
Lynelle
8 days ago
Option B seems like the way to go. The Files Analytics VM can really give you a comprehensive view of suspicious activities.
upvoted 0 times
...
...
Elvera
1 months ago
I personally think configuring Files to use ICAP servers with monitors for desired activities is the way to go.
upvoted 0 times
...
Leota
1 months ago
I disagree, I believe deploying the Files Analytics VM and configuring anomaly rules is more effective.
upvoted 0 times
...
Garry
1 months ago
I think the best way to be alerted to suspicious activities is by configuring Alerts & Events in the Files Console.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77