Study Guide

Which two types of granular RBAC does Nutanix provide for AHV hosts?

Homework Help: Questions and Answers: Which two types of granular RBAC does Nutanix provide for AHV hosts? (CHOOSE TWO)

Which two types of granular RBAC does Nutanix provide for AHV hosts

a) Category based
b) Disk based
c) Project based
d) Cluster base

Answer:

First, let’s understand what RBAC and Nutanix AHV means:

RBAC stands for Role-Based Access Control. It’s a method of regulating access to computer or network resources based on the roles of individual users within an organization.

Nutanix AHV (Acropolis Hypervisor) is a hypervisor that’s part of the Nutanix Enterprise Cloud Platform.

To solve this question about the types of granular Role-Based Access Control (RBAC) provided by Nutanix for AHV hosts, we need to understand the specific RBAC features offered by Nutanix.

Nutanix RBAC for AHV typically provides fine-grained control over who can access and perform operations on various resources.

Given Options: Step by Step Answering

a) Category based

  • This is a valid type of granular RBAC in Nutanix. Categories allow for grouping and organizing entities, which can then be used for access control.

b) Disk based

  • Nutanix does not typically provide RBAC based specifically on disks. RBAC is usually more concerned with broader resources and operations rather than individual disks.

c) Project based

  • This is another valid type of granular RBAC in Nutanix. Projects are used to group and manage resources, and access can be controlled at the project level.

d) Cluster base

  • While clusters are important in Nutanix architecture, “cluster based” is not typically listed as a specific type of granular RBAC for AHV hosts.

Final Answer:

Based on the above analysis, the two types of granular RBAC that Nutanix provides for AHV hosts are:

a) Category based
c) Project based

The two types of granular RBAC that Nutanix provides for AHV hosts are Category based and Project based.

Learn More: Homework Help

Q. The following algorithms were given for computing the nth power of a positive integer a. Use induction to prove that each of these algorithms is correct.

Q. If antivirus, gray ware and AI scans are enabled, in what order are they performed?

Q. In cryptography what does the term “secret” refer to?

Q. What is a top data security challenge?

Q. What is important to understand about how generative Al models work?

Comments