An administrator would like to create a VM template for reusability, to simplify VM management, and improve security.
When should the administrator apply a guest customization profile to simplify VM management?
A database server has a corrupt database after a VM was restored from a recovery point. The database VM is part of the VIP_VMS category that is protected by a Protection Policy with asynchronous schedule.
After checking the state of NGT tools, an administrator is investigating the Protection Policy looking for the root cause of the database corruption.
What is the most probably cause?
An administrator has configured CVM security hardening on a Nutanix cluster with the following settings:
IP Restriction State is set to enabled
Password-based SSH access is disabled via Cluster Lockdown
The administrator attempts to SSH into the CVM from a new jump box and the connection is refused.
What should the administrator do to restore SSH access to the CVM?