An administrator is planning to leverage NC2 on AWS for an elastic DR scenario where the initial cluster is using 13en.metal. Which two additional node types are supported for cluster expansion? (Choose two.)
An administrator needs to understand which of the services implemented on their NC2 AWS deployment will be protected with Cluster protect. Which service of feature is Cluster Protect able to both protect and recover its associated metadata?
HOTSPOT An administrator needs to recover a cluster protected using the Cluster Protect feature. The Prism Central instance was not on the failed cluster. Which steps, in order, should the administrator perform to recover the cluster? xplanation: The steps, in order, to recover a cluster protected using the Cluster Protect feature when the Prism Central instance was not on the failed cluster are as follows: Step 1: Set the cluster to the Failed state using the NC2 console to start the recovery workflow. Step 2: Redeploy the cluster using the NC2 console. Step 3: Redeploy the Multicloud Snapshot Technology. Step 4: Recover UVM data by running CLI commands. Set the cluster to the Failed state using the NC2 console to start the recovery workflow: This step involves marking the cluster as failed to initiate the recovery process. Redeploy the cluster using the NC2 console: Once the cluster is marked as failed, the next step is to redeploy it using the tools available in the NC2 console. Redeploy the Multicloud Snapshot Technology: After the cluster is redeployed, the Multicloud Snapshot Technology needs to be redeployed to ensure data consistency and availability. Recover UVM data by running CLI commands: The final step is to recover the User VM (UVM) data by executing the necessary CLI commands to restore the data from the snapshots or backups. Reference: Nutanix Documentation on Cluster Protect and Recovery Processes Nutanix Support & Insights Nutanix Cloud Clusters on AWS Administration
An administrator is deploying a new NC2 cluster on AWS and needs to ensure full connectivity is established between the company’s on-premises datacenter and the AWS cloud. Which two AWS offering will satisfy this requirement? (Choose two.)
An administrator has deployed an NC2 on AWS cluster that is running mixed workloads. Multiple SQL database are running on the NC2 cluster using a native subnet of 10.78.1.0/24. The administrator wants to ensure only application servers from source subnet 10.79.1.0/24 that reside outside of the NC2 cluster can access the databases. Which two actions will help the administrator most securely achieve this? (Choose two.) A) B) C) D)
An administrator has been tasked with performing a test migrating from an NC2 environment to a Nutanix on-premises environment. Where should the administrator perform this task?