A corporate security policy mandates strict protection against boot-level rootkits and requires the isolation of NTLM password hashes from the running operating system to prevent " pass-the-hash " attacks.
During the initial testing phase, the administrator deploys a test VM using the standard AHV creation workflow. While configuring the guest operating system, administrator attempts to enable Windows Defender Credential Guard via Group Policy. However, the feature fails to start, and the system logs indicate that the underlying virtualization platform does not meet the necessary hardware security requirements.
Which specific configuration change must the administrator apply to the VM to satisfy the security policy requirements?
The administrator expanded a Nutanix cluster repurposed nodes from a decommissioned cluster. The administrator has validated the following:
Same number of cores, amount of memory and storage
The nodes are on the same subnet
The nodes are running the same version of AOS and AHV
After the nodes were added the administrator discovered that VMs cannot be migrated to the recently added nodes.
What would be the reason for this issue?
An administrator is tasked with moving a workload from one cluster to another cluster utilizing PD-Based DR because the source side is currently having intermittent network issues.
How would the administrator accomplish the unplanned failover?
An administrator wants to adjust how often the platform checks for security drift without modifying controls that run at fixed intervals.
Which setting should the administrator modify?
An administrator needs to configure OpenLDAP in Prism Central.
Which type of account should the administrator use?
An administrator detects suspicious outbound connections from a single VM that hosts a web tier component.
The incident response requirement is to immediately quarantine the VM so it cannot communicate with any other workload, but still allow connectivity from a designated forensic tooling group so investigators can collect evidence.
The organization uses categories for policy scope and wants a change that can be applied quickly during an incident without redesigning existing policies.
Which action best meets the requirement?
An administrator is running Nutanix Cluster Check (NCC) in the Prism Element web console. The administrator is not able to collect the logs.
What could be causing this?
An administrator is trying to move an asynchronous PD workload from one cluster to another by taking advantage of PD-Based DR when an error message is displayed in Prism.
Error updating protection domain. Protection domain is already active on source site " cluster name " . Please trigger migrate from source site to activate the protection domain.
What would cause this error to appear?
An administrator added an SSH public key and verified connectivity to CVMs and AHV hosts. What is the recommended next step to reduce interactive access risk?
An administrator is using Nutanix Move to migrate 10 VMs and has manually changed the preparation mode for two of the VMs.
What preparation mode will be used within the migration plan?