ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 66 - NCP-CI-AWS discussion

Report
Export

An administrator is creating and destroying multiple clusters daily for a test/dev environment. The administrator wants ensure that every NC2 on AWS cluster deployed will allow full access from the on-premises CVM subnet.

What is most-efficient way to achive this?

A.
Modify the UVM Network Security Group of each cluster by setting the inbound allow address of the on-premises subnet.
Answers
A.
Modify the UVM Network Security Group of each cluster by setting the inbound allow address of the on-premises subnet.
B.
Modify the UVM Network Security Group of each cluster by setting the outbound allow address of the on-premises subnet.
Answers
B.
Modify the UVM Network Security Group of each cluster by setting the outbound allow address of the on-premises subnet.
C.
Create a Custom AWS Network Security Group using a key value of tag:nutanix:clusters:external and set the inbound allow address of the on-premises subnet.
Answers
C.
Create a Custom AWS Network Security Group using a key value of tag:nutanix:clusters:external and set the inbound allow address of the on-premises subnet.
D.
Create a Custom AWS Network Security Group using a key of tag:nutanix: clusters:external:cluster-uuid and set the value of the UUID for each deployed cluster. Set the inbound allow address of the on-premises subnet.
Answers
D.
Create a Custom AWS Network Security Group using a key of tag:nutanix: clusters:external:cluster-uuid and set the value of the UUID for each deployed cluster. Set the inbound allow address of the on-premises subnet.
Suggested answer: C

Explanation:

To ensure that every NC2 on AWS cluster deployed allows full access from the on-premises CVM subnet efficiently, the administrator should create a custom AWS Network Security Group.

Use a key value of tag:nutanix:clusters:external for the security group, and set the inbound allow address to the on-premises subnet.

This approach leverages AWS tags to manage security group rules dynamically and ensures that the necessary access permissions are applied automatically to all clusters with the specified tag.

This method reduces the need for manual configuration of each cluster's security group, streamlining the process for a test/dev environment where clusters are frequently created and destroyed.

Reference: Refer to the AWS documentation on Network Security Groups and Nutanix documentation on best practices for securing NC2 clusters.

asked 23/09/2024
Tu Nguyen
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first