An administrator wants to configure key based SSH access for an AOS 5.5 Implementation. Which three components can be secured using this method? (Choose three)
Two HDDs fail simultaneously on a single AHV host.
What are the chances of data loss?
An administrator is configuring protection domains to support a business-critical application. The business can sustain a maximum of 40 minutes of data loss for this application.
Which value should the administrator configure for the snapshot frequency of the protection domain?