New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Nutanix NCP-US Exam - Topic 1 Question 14 Discussion

Actual exam question for Nutanix's NCP-US exam
Question #: 14
Topic #: 1
[All NCP-US Questions]

An administrator created a bucket for an upcoming project where internal users as well as an outside consultant .... Object Browser. The administrator needs to provide both internal and consultant access to the same bucket.

The organization would like to prevent internal access to the consultant, based on their security policy.

Which two items are requires to fulfill this requirement (Choose two.)

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Aileen
3 months ago
Surprised that internal users can't access the same bucket!
upvoted 0 times
...
Judy
3 months ago
Definitely A and B, we need to stick to our security policies.
upvoted 0 times
...
Jamey
4 months ago
Wait, why would we need third-party software at all?
upvoted 0 times
...
Devon
4 months ago
I disagree, C could be useful for broader access.
upvoted 0 times
...
Vesta
4 months ago
A and B seem like the right choices.
upvoted 0 times
...
Tasia
4 months ago
I think we discussed generating access keys, but I can't remember if it was for internal users only or if it included external ones too.
upvoted 0 times
...
Francesco
4 months ago
I’m a bit confused about the third-party software part. I don’t recall it being necessary for just bucket access.
upvoted 0 times
...
Felicidad
4 months ago
This question feels similar to one we practiced where we had to manage user permissions. I think options A and B might be the right choices.
upvoted 0 times
...
Leonard
5 months ago
I remember something about configuring access keys, but I'm not sure if it's specifically about directory services.
upvoted 0 times
...
Laura
5 months ago
I'm not sure about the third-party software options. That seems like an unnecessary complication when we can handle this directly through the directory services and access key management.
upvoted 0 times
...
Apolonia
5 months ago
Hmm, I'm a bit confused. The question mentions preventing internal access to the consultant, but the options don't seem to directly address that. I'll need to think this through carefully.
upvoted 0 times
...
Brittni
5 months ago
This seems straightforward - I think we need to configure directory services and generate access keys based on directory and email-based users to fulfill the requirement.
upvoted 0 times
...
Dana
5 months ago
Okay, I've got it. We need to use directory services to manage access and generate keys for the internal users and the consultant separately, so we can control their access levels independently.
upvoted 0 times
...
Belen
5 months ago
Okay, I've got it - font, navigation, and app logo. Those are the core elements that impact usability and user experience. I'm confident in those choices.
upvoted 0 times
...
Winifred
5 months ago
Okay, let's see. The error message says the connection was refused, so it's probably not a problem with the server itself. I'll focus on the network configuration and firewall settings.
upvoted 0 times
...
Taryn
5 months ago
Okay, let's see. The question says the hospital makes up 60% of hospitals in the US and is owned by religious or volunteer groups, not for profit. I'm thinking the answer is probably B, Volunteer.
upvoted 0 times
...
Joseph
9 months ago
Ah, the age-old battle of internal users vs. outside consultants. At least this question is keeping it simple and not throwing any curveballs.
upvoted 0 times
...
Basilia
9 months ago
I heard the consultant's password is 'consultant123'. Let's see how that works out for them, eh?
upvoted 0 times
Alexia
8 months ago
It's important to regularly review and update access controls to maintain security.
upvoted 0 times
...
Lyndia
8 months ago
Make sure to set up proper permissions to ensure the consultant cannot access internal data.
upvoted 0 times
...
Casie
8 months ago
You can also use bucket policies to control access to the bucket.
upvoted 0 times
...
Viola
9 months ago
You can use IAM policies to restrict access based on the user's identity.
upvoted 0 times
...
...
Chantay
10 months ago
Directory services and access keys, got it. This should do the trick and keep the consultant out of the internal stuff. Simple and effective.
upvoted 0 times
Cherry
8 months ago
Simple and effective solution to keep the consultant out of the internal stuff.
upvoted 0 times
...
Tawna
8 months ago
Yes, that should prevent internal access to the consultant.
upvoted 0 times
...
Whitley
8 months ago
Directory services and access keys are required to fulfill this requirement.
upvoted 0 times
...
...
Cory
10 months ago
Wait, so we can't let the internal users access the consultant's stuff? Sounds like a security nightmare waiting to happen. I'm all for keeping things locked down.
upvoted 0 times
Janine
8 months ago
It's important to follow security policies to prevent any potential breaches.
upvoted 0 times
...
Elise
9 months ago
That way we can ensure that internal users don't have access to the consultant's data.
upvoted 0 times
...
Lisbeth
9 months ago
We should also use bucket policies to control access to the bucket.
upvoted 0 times
...
Eladia
10 months ago
We can use IAM policies to restrict access to the consultant's data.
upvoted 0 times
...
...
Kerrie
10 months ago
I'm not sure about the third-party software option. Seems like that would just complicate things. Let's go with the directory services approach.
upvoted 0 times
Kristofer
9 months ago
I agree, that seems like the simpler option.
upvoted 0 times
...
Catalina
9 months ago
Let's go with the directory services approach.
upvoted 0 times
...
...
Tony
11 months ago
Hmm, looks like we need to use directory services and generate access keys based on that. Easy enough, right?
upvoted 0 times
Terrilyn
10 months ago
B) Generate access keys based on directory and email-based users.
upvoted 0 times
...
Maryann
10 months ago
A) Configure Directory Services under the Access Keys section
upvoted 0 times
...
...
Lynelle
11 months ago
I'm not sure about installing third-party software. I think A and B are the best options to fulfill the requirement.
upvoted 0 times
...
Luis
11 months ago
I agree with Naomi. That way we can provide access to both internal users and the consultant while preventing internal access to the consultant.
upvoted 0 times
...
Naomi
11 months ago
I think we need to configure Directory Services and generate access keys based on directory and email-based users.
upvoted 0 times
...

Save Cancel