A consultant has been tasked with increasing security on a Nutanix cluster by disabling password authentication when accessing the CVM and AHV hosts and instead moving to key-based SSH.
What is the easiest way for the consultant to meet these requirements?
A customer has a four-node cluster and is using Volume Groups to provide storage services to a SQL cluster.
In the event of a CVM failure in the cluster, what is the expected IO path of the volume group’s iSCSI targets?
A customer is considering increasing the Redundancy Factor from 2 to 3 for a Nutanix cluster in their existing environment.
Which option would provide the company with the optimal solution?
In a 20-node ESXi deployment, the customer needs additional resiliency to survive the loss of two nodes concurrently.
Which configuration should the consultant use to ensure that the appropriate resources are available?