Exhibit. An administrator is attempting, but failing to create an NC2 cluster in AWS. The administrator checks the configuration in the NC and notices the configuration shown in the exhibit. What action should the administrator take to resolve the issue?
An administrator has been tasked with ensuring NC2 VMs are able to access AWS resources. The NC2 VM traffic must not traverse the internet. in which two ways would the administrator achieve this? (Choose two.)
During the recovery of entities protected by Cluster Project, an administrator discovers that the recovery plan is not executing correctly because it exceeds the number of supported entities. How many entities can be recovered using a Single recovery plan?
An administrator needs to allow wide open access to one particular NC2 AWS cluster from an on- premises subnet of 10.19.160.0/24. What is the proper Custom Security Group formatting to satisfy this task? A) B) C) D)
Which interface must be used to deploy NC2?
An administrator has recently deployed an NC2 on AWS cluster in the North Virginia region in availability zone us-east-1z. The clusters UUID is 0005F487 -4962 -91EA -4C98 -C4284D123835. The cluster is consuming IPs from a 10.78.2.0/24 range. The AWS VPC has these available CIDR ranges: • 70.73.0.0/16 • 10.79.107.0/24 • 10.0.0.0/22 The following subnets have been configured in the NC2 AWS VPC: The following tags have been applied to a Custom Network Security Group: The Custom Network Security Group is allowing all inbound traffic from the 10.0.0.0/22 network. Which two subnets would be able to receive inbound traffic from AWS instances on a 10.0.0.0/22 network segment"? (Choose two.)