Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Nutanix NCP-US Exam - Topic 1 Question 14 Discussion

Actual exam question for Nutanix's NCP-US exam
Question #: 14
Topic #: 1
[All NCP-US Questions]

An administrator created a bucket for an upcoming project where internal users as well as an outside consultant .... Object Browser. The administrator needs to provide both internal and consultant access to the same bucket.

The organization would like to prevent internal access to the consultant, based on their security policy.

Which two items are requires to fulfill this requirement (Choose two.)

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Aileen
5 months ago
Surprised that internal users can't access the same bucket!
upvoted 0 times
...
Judy
5 months ago
Definitely A and B, we need to stick to our security policies.
upvoted 0 times
...
Jamey
5 months ago
Wait, why would we need third-party software at all?
upvoted 0 times
...
Devon
5 months ago
I disagree, C could be useful for broader access.
upvoted 0 times
...
Vesta
5 months ago
A and B seem like the right choices.
upvoted 0 times
...
Tasia
6 months ago
I think we discussed generating access keys, but I can't remember if it was for internal users only or if it included external ones too.
upvoted 0 times
...
Francesco
6 months ago
I’m a bit confused about the third-party software part. I don’t recall it being necessary for just bucket access.
upvoted 0 times
...
Felicidad
6 months ago
This question feels similar to one we practiced where we had to manage user permissions. I think options A and B might be the right choices.
upvoted 0 times
...
Leonard
6 months ago
I remember something about configuring access keys, but I'm not sure if it's specifically about directory services.
upvoted 0 times
...
Laura
6 months ago
I'm not sure about the third-party software options. That seems like an unnecessary complication when we can handle this directly through the directory services and access key management.
upvoted 0 times
...
Apolonia
6 months ago
Hmm, I'm a bit confused. The question mentions preventing internal access to the consultant, but the options don't seem to directly address that. I'll need to think this through carefully.
upvoted 0 times
...
Brittni
6 months ago
This seems straightforward - I think we need to configure directory services and generate access keys based on directory and email-based users to fulfill the requirement.
upvoted 0 times
...
Dana
6 months ago
Okay, I've got it. We need to use directory services to manage access and generate keys for the internal users and the consultant separately, so we can control their access levels independently.
upvoted 0 times
...
Belen
6 months ago
Okay, I've got it - font, navigation, and app logo. Those are the core elements that impact usability and user experience. I'm confident in those choices.
upvoted 0 times
...
Winifred
6 months ago
Okay, let's see. The error message says the connection was refused, so it's probably not a problem with the server itself. I'll focus on the network configuration and firewall settings.
upvoted 0 times
...
Taryn
6 months ago
Okay, let's see. The question says the hospital makes up 60% of hospitals in the US and is owned by religious or volunteer groups, not for profit. I'm thinking the answer is probably B, Volunteer.
upvoted 0 times
...
Joseph
11 months ago
Ah, the age-old battle of internal users vs. outside consultants. At least this question is keeping it simple and not throwing any curveballs.
upvoted 0 times
...
Basilia
11 months ago
I heard the consultant's password is 'consultant123'. Let's see how that works out for them, eh?
upvoted 0 times
Alexia
10 months ago
It's important to regularly review and update access controls to maintain security.
upvoted 0 times
...
Lyndia
10 months ago
Make sure to set up proper permissions to ensure the consultant cannot access internal data.
upvoted 0 times
...
Casie
10 months ago
You can also use bucket policies to control access to the bucket.
upvoted 0 times
...
Viola
10 months ago
You can use IAM policies to restrict access based on the user's identity.
upvoted 0 times
...
...
Chantay
11 months ago
Directory services and access keys, got it. This should do the trick and keep the consultant out of the internal stuff. Simple and effective.
upvoted 0 times
Cherry
10 months ago
Simple and effective solution to keep the consultant out of the internal stuff.
upvoted 0 times
...
Tawna
10 months ago
Yes, that should prevent internal access to the consultant.
upvoted 0 times
...
Whitley
10 months ago
Directory services and access keys are required to fulfill this requirement.
upvoted 0 times
...
...
Cory
12 months ago
Wait, so we can't let the internal users access the consultant's stuff? Sounds like a security nightmare waiting to happen. I'm all for keeping things locked down.
upvoted 0 times
Janine
10 months ago
It's important to follow security policies to prevent any potential breaches.
upvoted 0 times
...
Elise
10 months ago
That way we can ensure that internal users don't have access to the consultant's data.
upvoted 0 times
...
Lisbeth
11 months ago
We should also use bucket policies to control access to the bucket.
upvoted 0 times
...
Eladia
11 months ago
We can use IAM policies to restrict access to the consultant's data.
upvoted 0 times
...
...
Kerrie
12 months ago
I'm not sure about the third-party software option. Seems like that would just complicate things. Let's go with the directory services approach.
upvoted 0 times
Kristofer
11 months ago
I agree, that seems like the simpler option.
upvoted 0 times
...
Catalina
11 months ago
Let's go with the directory services approach.
upvoted 0 times
...
...
Tony
1 year ago
Hmm, looks like we need to use directory services and generate access keys based on that. Easy enough, right?
upvoted 0 times
Terrilyn
11 months ago
B) Generate access keys based on directory and email-based users.
upvoted 0 times
...
Maryann
11 months ago
A) Configure Directory Services under the Access Keys section
upvoted 0 times
...
...
Lynelle
1 year ago
I'm not sure about installing third-party software. I think A and B are the best options to fulfill the requirement.
upvoted 0 times
...
Luis
1 year ago
I agree with Naomi. That way we can provide access to both internal users and the consultant while preventing internal access to the consultant.
upvoted 0 times
...
Naomi
1 year ago
I think we need to configure Directory Services and generate access keys based on directory and email-based users.
upvoted 0 times
...

Save Cancel