Which feature in Pulse helps secure a customer's private information?
Which feature in Pulse helps secure a customer's private information?A . Security Central B. Cluster Lockdown C. Data-at-rest Encryption D. Data ObfuscationView AnswerAnswer: D Explanation: Data Obfuscation is a feature in Pulse that helps secure a customer's private information by obfuscating the data before it is sent to Nutanix. This...
What Nutanix product would meet this requirement?
A customer requires the ability to block all network traffic between their VDI VMs and their application VMs running on their Nutanix AHV clusters. What Nutanix product would meet this requirement?A . Beam B. Calm C. Era D. FlowView AnswerAnswer: D
What is the most efficient way the administrator can perform this?
An administrator has defined a security policy that needs to be applied to dozens of VMs. What is the most efficient way the administrator can perform this?A . Within the policy, select all the VMs it should be applied to. B. Apply a category to the VMs. and associate the...
Which directory should the LCM Framework Bundle be extracted to on a dark site web server in order to update the LCM Framework?
Which directory should the LCM Framework Bundle be extracted to on a dark site web server in order to update the LCM Framework?A . release B. upgrade C. software D. installView AnswerAnswer: A Explanation: When updating the LCM Framework on a dark site web server, the LCM Framework Bundle should...
Where can an administrator configure role-based access control (RBAC)?
Where can an administrator configure role-based access control (RBAC)?A . Self-Service Restore B. Prism Element C. Foundation D. Prism CentralView AnswerAnswer: D Explanation: Role-based access control (RBAC) allows administrators to configure access control for different users and groups in the Nutanix cluster. This feature is available through Prism Central, where...
Which Windows technology does AHV support to prevent authentication theft?
Which Windows technology does AHV support to prevent authentication theft?A . Endpoint Manager B. Azure AD Multi-Factor C. Windwos Defender Credential Guard D. Active Directory federation ServicesView AnswerAnswer: C
What will happen to VMs during the AOS upgrade?
An administrator needs to upgrade AOS in a vSphere-based NutaniSJve-node cluster with no automatic live migration. VMs have neither affinity nor anti-affinity rules configured. What will happen to VMs during the AOS upgrade?A . VMs will be rebooted on other hosts. B. VMs will continue to run on the same...
Which Prism Central option should the administrator use to satisfy this task?
An administrator needs to do a manual VM in-place restore of a mission-critical VM. Which Prism Central option should the administrator use to satisfy this task?A . Snapshot B. Clone C. Backup D. Recovery PointView AnswerAnswer: D Explanation: A manual VM in-place restore can be performed using the Recovery Point...
What type of failure is most likely the cause of this issue?
Refer to the exhibit. An administrator notices that the Data Resiliency Statue of some components has been reduced to 0. making it impossible to support a node failure in the cluster. What type of failure is most likely the cause of this issue?A . Block B. Disk C. CVM D....
What is Nutanix's scale-out storage technology that makes its hyperconverged platform possible?
What is Nutanix's scale-out storage technology that makes its hyperconverged platform possible?A . Distributed File Services B. Distributed Storage Fabric C. HDD/SDD Storage Tiers D. Hot swappable NVMe/SSDView AnswerAnswer: B Explanation: Nutanix's scale-out storage technology, the Distributed Storage Fabric, makes its hyperconverged platform possible. It provides a single, unified layer...