A company wants to use Nutanix NC2 to burst VDI resources to the AWS cloud. The VDI workloads requires GPU accelation.
Which solution meets the company's requirements?
For VDI workloads that require GPU acceleration, the g4dn.metal nodes are the appropriate choice. These instances are equipped with NVIDIA T4 GPUs, which are well-suited for graphics-intensive applications such as VDI workloads that need GPU acceleration. Other node types like AN36P, m6g.metal, or AN36 do not provide the necessary GPU capabilities.
A company wants to start using Nutanix Cloud Clusters (NC2) in AWS. The company has large spend commitments as part of an AWS Enterprise Discount Program (EDP) totaling $15 million.
What approach should the administrator take to ensure that Nutanix licensing costs to the EDP commitment?
Given the company's large spend commitments as part of an AWS Enterprise Discount Program (EDP) totaling $15 million, purchasing Nutanix licenses through the AWS Marketplace ensures that the costs contribute to the EDP commitment.
This approach integrates the Nutanix license costs into the overall AWS spend, thereby maximizing the benefits of the EDP.
Purchasing directly from Nutanix or leveraging existing licenses might not count towards the AWS EDP commitment, and trial licenses are typically for evaluation purposes and do not contribute to the committed spend.
Reference: Refer to the Nutanix and AWS documentation on licensing and marketplace purchases, and EDP program details.
An administrator needs to understand which of the services implemented on their NC2 AWS deployment will be protected with Cluster protect.
Which service of feature is Cluster Protect able to both protect and recover its associated metadata?
Cluster Protect in an NC2 environment can protect and recover the following services and their associated metadata:
VM Templates: Ensures that templates used for creating virtual machines are backed up and recoverable.
Files: Protects data stored in Nutanix Files, ensuring that file services are backed up and can be restored as needed.
An administrator is deploying a new NC2 cluster on AWS and needs to ensure full connectivity is established between the company's on-premises datacenter and the AWS cloud.
Which two AWS offering will satisfy this requirement? (Choose two.)
To establish full connectivity between the company's on-premises datacenter and the AWS cloud, the following AWS offerings will satisfy this requirement:
AWS VPN: This service allows you to create a secure connection between your on-premises network or other remote network and your AWS VPC using an IPsec VPN tunnel. It is suitable for low to moderate bandwidth requirements and provides secure, encrypted connections.
Direct Connect: AWS Direct Connect is a dedicated network connection from your premises to AWS. It provides a private, high-bandwidth, low-latency connection which is ideal for high-throughput applications and workloads that need consistent network performance.
An administrator has deployed an NC2 on AWS cluster that is running mixed workloads. Multiple SQL database are running on the NC2 cluster using a native subnet of 10.78.1.0/24.
The administrator wants to ensure only application servers from source subnet 10.79.1.0/24 that reside outside of the NC2 cluster can access the databases.
Which two actions will help the administrator most securely achieve this? (Choose two.)
A)
B)
C)
D)
To ensure that only application servers from the source subnet 10.79.1.0/24 can access the SQL databases running on the NC2 cluster in the subnet 10.78.1.0/24, the administrator can take the following actions:
Option A: Create a custom Security Group with the following rules:
Key = tag:nutanix:clusters
Key = tag:nutanix:clusters:external
and value = the clusters' UUID
Key = tag:nutanix:clusters:external
and value = 10.78.1.0/24
Option D: Create a custom Security Group with the following:
Key = nutanix:clusters
Key = nutanix:clusters:external
and value = the clusters' UUID
Key = nutanix:clusters:external
and value = 10.79.1.0/24
These actions help create security rules that restrict access to the databases only from the specified source subnet, ensuring secure and controlled access.
Julene
6 days agoDalene
8 days agoCarmen
20 days agoJerilyn
23 days agoDick
24 days agoJenise
1 months agoJacqueline
1 months agoOzell
2 months agoRosalind
2 months agoFrank
2 months agoLynda
2 months agoAlica
2 months agoGeraldo
3 months ago