Question 21
An administrator is working with sensitive data and wants to encrypt that data by Nutanix Software Encryption.
Which three types of information and components are required to enable this configuration? (Choose three)
Which three types of information and components are required to enable this configuration? (Choose three)
Question 22
An administrator wants to configure key based SSH access for an AOS 5.5 Implementation Which three components can be secured using this method?
Question 23
An administrator wants to secure an application running on an AHV cluster by limiting incoming and outgoing traffic destinations. The administrator creates a security policy for the application.
What is the next step?
What is the next step?
Question 24
Where are Leap Availability Zones configured?
Question 25
What are two minimum prerequisites for live migration to succeed? (Choose two.)