Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A corporate security policy mandates strict protection against boot-level rootkits and requires the isolation of NTLM password hashes from the running operating system to prevent " pass-the-hash " attacks.

During the initial testing phase, the administrator deploys a test VM using the standard AHV creation workflow. While configuring the guest operating system, administrator attempts to enable Windows Defender Credential Guard via Group Policy. However, the feature fails to start, and the system logs indicate that the underlying virtualization platform does not meet the necessary hardware security requirements.

Which specific configuration change must the administrator apply to the VM to satisfy the security policy requirements?

A.

Enable UEFI firmware, configure the disk controller to use the IDE bus, and add a vTPM device.

B.

Enable Generation 2 firmware, check the VBS flag, and add a vTPM device.

C.

Enable Legacy BIOS firmware, check the Secure Boot option, and add a vTPM device.

D.

Enable UEFI firmware, check the Secure Boot option, and add a Virtual Trusted Platform Module (vTPM) device.

The administrator expanded a Nutanix cluster repurposed nodes from a decommissioned cluster. The administrator has validated the following:

    Same number of cores, amount of memory and storage

    The nodes are on the same subnet

    The nodes are running the same version of AOS and AHV

After the nodes were added the administrator discovered that VMs cannot be migrated to the recently added nodes.

What would be the reason for this issue?

A.

The nodes firmware needs to be updated using LCM before the VMs will be able to migrate.

B.

An Acropolis Dynamic Scheduler (ADS) task is running and the VMs will migrate when it completes.

C.

The VMs were created on new generation of CPU and must be power-cycled to renegotiate new features.

D.

The VMs have VM-VM affinity rules and cannot migrate until affinity rules are updated.

An administrator is tasked with moving a workload from one cluster to another cluster utilizing PD-Based DR because the source side is currently having intermittent network issues.

How would the administrator accomplish the unplanned failover?

A.

Activate on the destination

B.

Migrate on the destination

C.

Activate on the source

D.

Migrate on the source

An administrator wants to adjust how often the platform checks for security drift without modifying controls that run at fixed intervals.

Which setting should the administrator modify?

A.

The AIDE schedule

B.

The SCMA schedule

C.

The list of security entities inspected by SCMA

D.

The SCMA baseline enforcement behavior

An administrator needs to configure OpenLDAP in Prism Central.

Which type of account should the administrator use?

A.

Nutanix Account

B.

Root Account

C.

Admin Account

D.

Service Account

An administrator detects suspicious outbound connections from a single VM that hosts a web tier component.

The incident response requirement is to immediately quarantine the VM so it cannot communicate with any other workload, but still allow connectivity from a designated forensic tooling group so investigators can collect evidence.

The organization uses categories for policy scope and wants a change that can be applied quickly during an incident without redesigning existing policies.

Which action best meets the requirement?

A.

Assign the VM to the built-in Quarantine category with the Forensic value so quarantine behavior blocks traffic except to and from forensic tools.

B.

Assign the VM to the built-in Quarantine category with the Strict value and separately create a shared service policy to allow forensic access.

C.

Create an application policy that only allows outbound traffic to forensic tools, leaving inbound traffic as allow all for faster investigation.

D.

Create an isolation environment policy between the VM and all other categories to block traffic and manually add exceptions for forensic tools.

An administrator is running Nutanix Cluster Check (NCC) in the Prism Element web console. The administrator is not able to collect the logs.

What could be causing this?

A.

Log collection can only be done from the command line.

B.

Nutanix cannot collect logs within Prism Element.

C.

Logs can only be collected via a Syslog collector.

D.

Nutanix cannot collect the logs while running NCC.

An administrator is trying to move an asynchronous PD workload from one cluster to another by taking advantage of PD-Based DR when an error message is displayed in Prism.

Error updating protection domain. Protection domain is already active on source site " cluster name " . Please trigger migrate from source site to activate the protection domain.

What would cause this error to appear?

A.

Must " Promote " the secondary site first before activating

B.

Must " disable " first before trying to activate a PD

C.

VMs must be migrated from the VM page instead of using DR

D.

Trying to " activate " the PD while the primary cluster is reachable

An administrator added an SSH public key and verified connectivity to CVMs and AHV hosts. What is the recommended next step to reduce interactive access risk?

A.

Enable core dumps on AHV hosts for post-incident analysis.

B.

Disable password authentication for all CVMs and AHV hosts.

C.

Enable a login banner on Prism Central to acknowledge access terms.

D.

Increase the number of concurrent Prism Central UI sessions.

An administrator is using Nutanix Move to migrate 10 VMs and has manually changed the preparation mode for two of the VMs.

What preparation mode will be used within the migration plan?

A.

Manual

B.

Automatic

C.

Hybrid

D.

Mixed