Prepare for the Nutanix Certified Associate Exam with tailored resources, including multiple choice questions and detailed explanations. Hone your skills and master the exam content for success!

Practice this question and more.


Which three components can be secured using key-based SSH access in an AOS 5.5 Implementation?

  1. The Cluster

  2. The CVM

  3. The Hypervisor Host

  4. The Network Switch

The correct answer is: The Cluster

Key-based SSH access in an AOS 5.5 implementation is utilized to secure communication and management of specific components of the Nutanix infrastructure. In this context, the cluster represents the broader management entity that encompasses multiple components, including the individual Controller VMs (CVMs) and the underlying hypervisor hosts. When SSH access is secured via key-based authentication, it enables administrators to manage and interact with the cluster more efficiently and securely. This involves operations such as monitoring cluster health, deploying virtual machines, and performing maintenance tasks, all of which are crucial for the overall performance and reliability of the Nutanix environment. The other components, such as the CVM and hypervisor host, also benefit from SSH access but are typically managed through cluster-level access rather than secured independently. The network switch, while part of the infrastructure, is generally not managed through Nutanix's AOS interface and does not use the same SSH protocols for management, focusing instead on layer 2 and layer 3 protocols that may differ from key-based SSH access. Thus, securing the cluster through key-based SSH directly relates to the management capabilities and security posture of the entire Nutanix environment, making it the correct choice.