ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 239 - NCS-Core discussion

Report
Export

A customer's security team has a policy prohibiting a consultant's laptop from connecting within the corporate datacenter.

In which two ways should the consultant complete the customer deployment on the factory-prepared nodes? (Choose two.)

A.
Use the Controller VM-based Foundation process.
Answers
A.
Use the Controller VM-based Foundation process.
B.
Configure IPs on hosts and create the cluster.
Answers
B.
Configure IPs on hosts and create the cluster.
C.
Run the Network Crashcart Script, provide IPs, and create the cluster manually.
Answers
C.
Run the Network Crashcart Script, provide IPs, and create the cluster manually.
D.
Manually edit ifcfg-etho file on CVM, restart networking, and create the cluster.
Answers
D.
Manually edit ifcfg-etho file on CVM, restart networking, and create the cluster.
Suggested answer: A, C

Explanation:

Given that the customer's security policy prohibits connecting a consultant's laptop within the corporate datacenter, the consultant can complete the deployment using:

A . The Controller VM-based Foundation process, which allows the consultant to configure and deploy the cluster using the software tools provided within the Controller VM itself. This method does not require direct laptop connection to the network. C. Run the Network Crashcart Script to manually configure IP addresses on the hosts and then proceed to create the cluster manually. This approach involves using available scripts and utilities that can be executed from within the data center's management interfaces without needing direct laptop access. Options B and D would typically require direct network connection capabilities not permissible under the security constraints.

Reference: Nutanix Foundation Documentation, Nutanix Deployment Best Practices.

asked 23/09/2024
Vivek Nandey
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first