An administrator needs to create user VM subnets for multiple NC2 clusters in AWS. What would be the best approach to take?
An administrator has been tasked with deploying an NC2 cluster on AWS with the requirement to protect workloads. Which two options are valid to protect the workloads on this cluster? (Choose two.)
Exhibit. An administrator is attempting, but failing to create an NC2 cluster in AWS. The administrator checks the configuration in the NC and notices the configuration shown in the exhibit. What action should the administrator take to resolve the issue?
An administrator has been tasked with ensuring NC2 VMs are able to access AWS resources. The NC2 VM traffic must not traverse the internet. in which two ways would the administrator achieve this? (Choose two.)
During the recovery of entities protected by Cluster Project, an administrator discovers that the recovery plan is not executing correctly because it exceeds the number of supported entities. How many entities can be recovered using a Single recovery plan?
An administrator has recently deployed an NC2 on AWS cluster in the North Virginia region in availability zone us-east-1z. The clusters UUID is 0005F487 -4962 -91EA -4C98 -C4284D123835. The cluster is consuming IPs from a 10.78.2.0/24 range. The AWS VPC has these available CIDR ranges: • 70.73.0.0/16 • 10.79.107.0/24 • 10.0.0.0/22 The following subnets have been configured in the NC2 AWS VPC: The following tags have been applied to a Custom Network Security Group: The Custom Network Security Group is allowing all inbound traffic from the 10.0.0.0/22 network. Which two subnets would be able to receive inbound traffic from AWS instances on a 10.0.0.0/22 network segment"? (Choose two.)