Question 21

An administrator is working with sensitive data and wants to encrypt that data by Nutanix Software Encryption.
Which three types of information and components are required to enable this configuration? (Choose three)
  • Question 22

    An administrator wants to configure key based SSH access for an AOS 5.5 Implementation Which three components can be secured using this method?
  • Question 23

    An administrator wants to secure an application running on an AHV cluster by limiting incoming and outgoing traffic destinations. The administrator creates a security policy for the application.
    What is the next step?
  • Question 24

    Where are Leap Availability Zones configured?
  • Question 25

    What are two minimum prerequisites for live migration to succeed? (Choose two.)