Question 31

An administrator wants to configure key based SSH access for an AOS 5.5 Implementation Which three components can be secured using this method?
  • Question 32

    In the event of failed CVM, what happens to the physically attached storage for the node and the VMs running on it?
  • Question 33

    An administrator needs a deploy a Nutanix Cluster that hosts the following workloads
    1) 1000 persistent virtual Desktop VMs
    2) 100 Generic server VMs
    3) 5 Microsoft exchange server VMs
    4) 10 SQL server VMs
    Which container configuration should be deployed two maximize data efficiency?
  • Question 34

    An administrator needs to ensure that resource are reserved so that all VMs are able to restart in the event of a host failure.
    Which steps should the administrator take to ensure the cluster is configured and operating appropriately?
  • Question 35

    Where can an administrator change a CVM password?