Which two configuration actions should the administrator take to ensure there are no configuration issues?
An administrator has deployed an NC2 cluster on AWS to an existing environment for VDI. Afterwards, the corporate security teams direct the administrator to reuse an existing AWS subnet, 10.79.4.0/24 that has two EC2 instances: EC2-1 (10.79.4.200) and EC2-2 (10.79.4.201). The security team indicates that this directive is to avoid...
Which interface must be used to deploy NC2?
Which interface must be used to deploy NC2?A . Cloud Provider portalB . NC2 Tile within the my.nutanix.com portalC . Prism Central DashboardD . Foundation running in a Cloud Virtual MachineView AnswerAnswer: B Explanation: The NC2 Tile within the my.nutanix.com portal is the correct interface to deploy NC2. This portal...
in which two ways would the administrator achieve this?
An administrator has been tasked with ensuring NC2 VMs are able to access AWS resources. The NC2 VM traffic must not traverse the internet. in which two ways would the administrator achieve this? (Choose two.)A . By using a Gateway EndpointB . By using a NAT Gateway.C . By using...
Which pcdr-cli command parameters is needed to satisfy this task?
An administrator needs to backup Prism Central configuration data to an Amazon S3 bucket. Which pcdr-cli command parameters is needed to satisfy this task?A . deployment-infoB . protectC . list-protection-targetsD . recoverView AnswerAnswer: B Explanation: To backup Prism Central configuration data to an Amazon S3 bucket, the pcdr-cli command with...
What is the proper Custom Security Group formatting to satisfy this task?
An administrator needs to allow wide open access to one particular NC2 AWS cluster from an on-premises subnet of 10.19.160.0/24. What is the proper Custom Security Group formatting to satisfy this task? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer:...
What would be the best approach to take?
An administrator needs to create user VM subnets for multiple NC2 clusters in AWS. What would be the best approach to take?A . Create guest-VM VNets for each cluster.B . Use the cluster management subnet dedicated to each cluster.C . Create guest-VM subnets to be shared by all clusters.D ....
Which two subnets would be able to receive inbound traffic from AWS instances on a 10.0.0.0/22 network segment"?
An administrator has recently deployed an NC2 on AWS cluster in the North Virginia region in availability zone us-east-1z. The clusters UUID is 0005F487-4962-91EA-4C98-C4284D123835. The cluster is consuming IPs from a 10.78.2.0/24 range. The AWS VPC has these available CIDR ranges: • 70.73.0.0/16 • 10.79.107.0/24 • 10.0.0.0/22 The following subnets...
Which two subnets would be able to receive inbound traffic from AWS instances on a 10.0.0.0/22 network segment"?
An administrator has recently deployed an NC2 on AWS cluster in the North Virginia region in availability zone us-east-1z. The clusters UUID is 0005F487-4962-91EA-4C98-C4284D123835. The cluster is consuming IPs from a 10.78.2.0/24 range. The AWS VPC has these available CIDR ranges: • 70.73.0.0/16 • 10.79.107.0/24 • 10.0.0.0/22 The following subnets...
Which two subnets would be able to receive inbound traffic from AWS instances on a 10.0.0.0/22 network segment"?
An administrator has recently deployed an NC2 on AWS cluster in the North Virginia region in availability zone us-east-1z. The clusters UUID is 0005F487-4962-91EA-4C98-C4284D123835. The cluster is consuming IPs from a 10.78.2.0/24 range. The AWS VPC has these available CIDR ranges: • 70.73.0.0/16 • 10.79.107.0/24 • 10.0.0.0/22 The following subnets...
Which action will help achieve this goal?
An organization wants to control network traffic at the individual User VM (UVM) subnet level. Which action will help achieve this goal?A . Create a custom security group.B . Modify the default UVM security group.C . Modify the user management security group.D . Modify the internal management security group.View AnswerAnswer:...