Question 61
An administrator wants to secure an application running on an AHV cluster by limiting incoming and outgoing traffic destinations. The administrator creates a security policy for the application.
What is the next step?
What is the next step?
Question 62
In which two scenarios is Nutanix Key Management Server supported?
Question 63
Which feature must be enabled in order to ensure that VMs are restarted on other hosts in the event of a host failure?
Question 64
A customer has a newly-deployed AHV cluster with nodes that have 2.x 10 GBE and 2.x interface. The customer wants to use all available network interfaces to provide connectivity to the VMs.
Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?
Which option should the administrator use to achieve this while remaining consistent with Nutanix recommendations?
Question 65
An organization has a 3-node cluster, with utilization rates as follows:
* 35% CPU
* 40% RAM
* 20% SSD
* 35% HDD
A node in this cluster fails.
Which type of degradation will the client experience due to this node failure?
* 35% CPU
* 40% RAM
* 20% SSD
* 35% HDD
A node in this cluster fails.
Which type of degradation will the client experience due to this node failure?