PdfPrep.com

Which three components can be secured using this method?

An administrator wants to configure key based SSH access for an AOS 5.5 Implementation

Which three components can be secured using this method?
A . The cluster
B . the CVM
C . The hypervisor host
D . Guest virtual machine
E . prism element

Answer: A,B,C

Exit mobile version