Given that the customer’s security policy prohibits connecting a consultant’s laptop within the
corporate datacenter, the consultant can complete the deployment using:
A . The Controller VM-based Foundation process, which allows the consultant to configure and
deploy the cluster using the software tools provided within the Controller VM itself. This method
does not require direct laptop connection to the network. C. Run the Network Crashcart Script to
manually configure IP addresses on the hosts and then proceed to create the cluster manually. This
approach involves using available scripts and utilities that can be executed from within the data
center's management interfaces without needing direct laptop access. Options B and D would
typically require direct network connection capabilities not permissible under the security
constraints.
Reference: Nutanix Foundation Documentation, Nutanix Deployment Best Practices.