Loading questions...
Updated
Create a free account to unlock all questions for this exam.
Log In / Sign UpIn an RF2 cluster, what is the minimum number of nodes required to allow a host removal?
An administrator recently attempted to enable Data-in-Transit Encryption on a Scale-Out Prism Central cluster to ensure service level traffic is encrypted between the cluster nodes. After attempting to enable this feature, the administrator noticed that it was not working correctly due to a firewall restriction.
Which CVM-specific port should be allowed through the firewall for Data-in-Transit Encryption?
A consultant is configuring syslog monitoring and wants to receive CRITICAL logs from the Audit module.
Which severity level setting should be configured to get the desired output?