An administrator needs an account for automation that can be granted granular permissions and being authenticated without an interactive user password.
Which statement best describes how a Prism Central service account authenticates?
An organization uses on-premises AHV-based clusters and also has workloads in public cloud environments.
The security team wants a single place to review security posture and compliance across the multi-cloud footprint, and they want the analysis to support security operations workflows rather than only showing cluster-level posture.
The administrator needs to pick the most appropriate Nutanix capability for this requirement.
Which option best aligns to the requirement?
An administrator would like to create a VM template for reusability, to simplify VM management, and improve security.
When should the administrator apply a guest customization profile to simplify VM management?
An administrator detects suspicious outbound connections from a single VM that hosts a web tier component.
The incident response requirement is to immediately quarantine the VM so it cannot communicate with any other workload, but still allow connectivity from a designated forensic tooling group so investigators can collect evidence.
The organization uses categories for policy scope and wants a change that can be applied quickly during an incident without redesigning existing policies.
Which action best meets the requirement?