option
Questions
ayuda
daypo
search.php

Cloud+ A

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Cloud+ A

Description:
testi i cloud plus 300 plus pytje

Creation Date: 2024/09/17

Category: Others

Number of questions: 374

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations. Which of the following is the MOST efficient way to bring the block storage in the primary datacenter up to date with the DR site?. Set up replication. Copy the data across both sites. Restore incremental backups. Restore full backups.

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it. Which of the following configuration options would BEST meet this requirement?. Virtual GPU. External GPU. Passthrough GPU. Shared GPU.

Which of the following service models would be used for a database in the cloud?. PaaS. IaaS. CaaS. SaaS.

A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure?. GPU. CPU. Storage. Memory.

A Chief Information Security Officer (CISO) is evaluating the company's security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?. An SLA document. A DR plan. SOC procedures. A risk register.

A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?. Create a VPC and peer the networks. Implement dynamic routing. Enable DHCP on the networks. Obtain a new IPAM subscription.

A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?. V2V. V2P. P2P. P2V.

A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below: The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions. Which of the following solutions would help to company accommodate the new workload in the SHORTEST amount of time and with the maximum financial benefits?. Configure auto-scaling within the private cloud. Set up cloud bursting for the additional resources. Migrate all workloads to a public cloud provider. Add more capacity to the private cloud.

A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier. Which of the following access control rules should be changed?. Discretionary-based. Attribute-based. Mandatory-based. Role-based.

A company developed a product using a cloud provider's PaaS platform and many of the platform-based components within the application environment. Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider?. Licensing. Authentication providers. Service-level agreement. Vendor lock-in.

A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST?. The firewall. The subnet. The gateway. The services.

Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?. A business continuity plan. Incident response/disaster recovery documentation. A tabletop exercise. A root cause analysis.

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page. Which of the following is the MOST likely cause of the issue?. The local firewall from older OSs is not allowing outbound connections. The local firewall from older OSs is not allowing inbound connections. The cloud web server is using a self-signed certificate that is not supported by older browsers. The cloud web server is using strong ciphers that are not supported by older browsers.

A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage. Which of the following RAID types should the administrator choose?. 5. 6. 10. 50.

A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following: ✑ High availability ✑ Horizontal auto-scaling ✑ 60 nodes peak capacity per region ✑ Five reserved network IP addresses per subnet ✑ /24 range Which of the following would BEST meet the above requirements?. Create two /25 subnets in different regions. Create three /25 subnets in different regions. Create two /26 subnets in different regions. Create three /26 subnets in different regions. Create two /27 subnets in different regions. Create three /27 subnets in different regions.

A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST?. Server power. Rack power. Switch power. SAN power.

A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers' activity?. Patch management. Hardening. Scaling. Log and event monitoring.

A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would allow for the maximum number of two-core machines with equal memory?. 30 VMs, 3GB of memory. 40 VMs, 1,5GB of memory. 45 VMs, 2 GB of memory. 60 VMs, 1 GB of memory.

A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider's environment that do not belong to the company. Which of the following BEST describes this attack?. VM escape. Directory traversal. Buffer overflow. Heap spraying.

A systems administrator is troubleshooting network throughput issues following a deployment. The network is currently being overwhelmed by the amount of traffic between the database and the web servers in the environment. Which of the following should the administrator do to resolve this issue?. Set up affinity rules to keep web and database servers on the same hypervisor. Enable jumbo frames on the gateway. Move the web and database servers onto the same VXLAN. Move the servers onto thick-provisioned storage.

An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?. Logs on the VM. Firewall on the VM. Memory on the VM. vGPU performance on the VM.

A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?. DLP. WAF. FIM. ADC.

An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?. Two load balancers behind a single firewall. Firewalls in a blue-green configuration. Two firewalls in a HA configuration. A web application firewall.

After a hardware upgrade on a private cloud system, the systems administrator notices a considerable drop in network performance. Which of the following is MOST likely the cause?. The driver. The memory. The cluster placement. The CPU.

A systems administrator is trying to reduce storage consumption. Which of the following file types would benefit the MOST from compression?. System files. User backups. Relational database. Mail database.

A technician just received the lessons learned from some recent data that was lost due to an on-premises file-server crash. The action point is to change the backup strategy to minimize manual intervention. Which of the following is the BEST approach for the technician to implement?. Backup as a service. RAID 1. Long-term storage. New backup devices.

A marketing team is using a SaaS-based service to send emails to large groups of potential customers. The internally managed CRM system is configured to generate a list of target customers automatically on a weekly basis, and then use that list to send emails to each customer as part of a marketing campaign. Last week, the first email campaign sent emails successfully to 3,000 potential customers. This week, the email campaign attempted to send out 50,000 emails, but only 10,000 were sent. Which of the following is the MOST likely reason for not sending all the emails?. API request limit. Incorrect billing account. Misconfigured auto-scaling. Bandwidth limitation.

A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior. Which of the following is MOST likely the cause?. API provider rate limiting. Invalid API token. Depleted network bandwidth. Invalid API request.

A support engineer wants to prevent users from running malware on several IaaS compute instances. Which of the following will BEST achieve this objective?. Encrypt all applications that users should not access. Set the execute filesystem permissions on the desired applications only. Implement an application whitelisting policy. Disable file sharing on the instance.

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?. Service-level agreement. Vendor lock-in. Memorandum of understanding. Encrypted data.

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure this?. Deduplication. Thin provisioning. Software-defined storage. iSCSI storage.

After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.). Identify the resources that are accessible to the affected IAM user. Remove the published plain-text password. Notify users that a data breach has occurred. Change the affected IAM user's password. Delete the affected IAM user.

A missing static route. A duplicate IP on the network. Firewall issues. The wrong gateway.

A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible. Which of the following is the MOST important consideration to ensure a seamless migration?. The cost of the environment. The I/O of the storage. Feature compatibility. Network utilization.

A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well. Which of the following should the administrator recommend the user to do FIRST?. Disable antivirus/anti-malware software. Turn off the software firewall. Establish a VPN tunnel between the computer and the web server. Update the web browser to the latest version.

A cloud administrator has nished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error. Which of the following will MOST likely solve the issue?. Checking user passwords. Con guring QoS rules. Enforcing TLS authentication. Opening TCP port 3389.

A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations. Which of the following actions should the cloud administrator take FIRST?. Initiate a failover. Restore backups. Configure the network. Perform a failback.

An IaaS application has a two-hour RTO and four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy. Which of the following should the administrator configure to achieve the application requirements with the LEAST cost?. Back up to object storage every three hours. Back up to long-term storage every night. Back up to long-term storage every four hours. Back up to object storage every hour.

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance has been slow since the images were upgraded from Windows 7 to Windows 10. This VDI environment is used to run simple tasks, such as Microsoft Office. The administrator investigates the virtual machines and finds the following settings: ✑ 4 vCPU ✑ 16GB RAM ✑ 10Gb networking ✑ 256MB frame buffer Which of the following MOST likely needs to be upgraded?. vRAM. vCPU. vGPU. vNIC.

An IaaS provider has numerous devices and services that are commissioned and decommissioned automatically on an ongoing basis. The cloud administrator needs to implement a solution that will help reduce administrative overhead. Which of the following will accomplish this task?. IPAM. NAC. NTP. DNS.

An organization's web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization's web server infrastructure. Which of the following should be implemented to prevent this in the future as a mitigation method?. Enable DLP. Configure microsegmentation. Enable DNSSEC. Deploy a vADC appliance.

A vendor is installing a new retail store management application for a customer. The application license ensures software costs are low when the application is not being used, but costs go up when use is higher. Which of the following licensing models is MOST likely being used?. Socket-based. Core-based. Subscription. Volume-based.

A systems administrator in a large enterprise needs to alter the configuration of one of the finance department's database servers. Which of the following should the administrator perform FIRST?. Capacity planning. Change management. Backups. Patching.

A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?. The IaaS compute configurations, the capacity trend analysis reports, and the storage IOPS. The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor. The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule. Migrating from IaaS to on premises, the network traffic between on-premises users and the IaaS instance, and the CPU utilization of the hypervisor host.

A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed. Which of the following will BEST identify the CPU with more computational power?. Simultaneous multithreading. Bus speed. L3 cache. Instructions per cycle.

A systems administrator is building a new visualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host. This is an example of: a storage area network. a network file system. hyperconverged storage. thick-provisioned disks.

A VDI administrator has received reports of poor application performance. Which of the following should the administrator troubleshoot FIRST?. The network environment. Container resources. Client devices. Server resources.

A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements. Which of the following solutions will be BEST to help the administrator achieve the requirements?. Containers. Infrastructure as a code. Desktop virtualization. Virtual machines.

A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring the VM uses only the storage if needs. Which of the following will BEST achieve this goal?. Compression. Deduplication. RAID. Thin provisioning.

An organization requires the following to be achieved between the finance and marketing departments: ✑ Allow HTTPS/HTTP. ✑ Disable FTP and SMB traffic. Which of the following is the MOST suitable method to meet the requirements?. Implement an ADC solution to load balance the VLAN traffic. Configure an ACL between the VLANs. Implement 802.1X in these VLANs. Configure on-demand routing between the VLANs.

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?. Performance testing. Penetration testing. Vulnerability testing. Regression testing.

A systems administrator is analyzing a report of slow performance in a cloud application. This application is working behind a network load balancer with two VMs, and each VM has its own digital certificate configured. Currently, each VM is consuming 85% CPU on average. Due to cost restrictions, the administrator cannot scale vertically or horizontally in the environment. Which of the following actions should the administrator take to decrease the CPU utilization? (Choose two.). Configure the communication between the load balancer and the VMs to use a VPN. Move the digital certificate to the load balancer. Configure the communication between the load balancer and the VMs to use HTTP. Reissue digital certificates on the VMs. Configure the communication between the load balancer and the VMs to use HTTPS. Keep the digital certificates on the VMs.

A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?. API version incompatibility. Misconfigured script account. Wrong template selection. Incorrect provisioning script indentation.

A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled. Which of the following techniques would BEST help the administrator assess these business requirements?. Performance testing. Usability testing. Vulnerability testing. Regression testing.

A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities. Which of the following testing techniques would be BEST to use?. Usability testing. Regression testing. Vulnerability testing. Penetration testing.

Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization?. Auto-scaling of compute. Oversubscription. Dynamic memory allocations on guests. Affinity rules in the hypervisor.

A systems administrator would like to reduce the network delay between two servers. Which of the following will reduce the network delay without taxing other system resources?. Decrease the MTU size on both servers. Adjust the CPU resources on both servers. Enable compression between the servers. Configure a VPN tunnel between the servers.

An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team. Which of the following controls will BEST mitigate the risk of exploitation?. DLP. HIDS. NAC. WAF.

To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public DBaaS solution. Which of the following would be the BEST technique?. Live migration. Physical-to-virtual. Storage-level mirroring. Database replication.

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed. Which of the following actions will make the server fully operational?. Restart the RAID resynchronization process. Perform a P2V migration of the server. Swap the failed hard drive with a fresh one. Restore the server from backup.

A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information: ✑ The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%. ✑ The cloud management console does not show an IP address for that server. ✑ A DNS lookup shows the hostname resolves to an IP address. ✑ The server is a member of the same security group as the others. ✑ The cloud administrator is able to log in remotely to the other servers without issue. Which of the following is the MOST likely cause of the server being unavailable?. The network driver updates did not apply successfully, and the interface is in a down state. The ACL policy for the server was updated as part of the server reboot, preventing login access. The server was assigned a new IP address, and DNS entry for the server name was not updated. The update caused an increase in the output to the logs, and the server is too busy to respond.

A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit?. An SLA report. Tagging. Quotas. Showback.

A cloud administrator would like to deploy a cloud solution to its provider using automation techniques. Which of the following must be used? (Choose two.). Serverless. Containers. Templates. Playbook. Tagging. Auto-scaling.

A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task. Which of the following ports should the administrator open on the monitoring server's firewall?. 53. 123. 139. 161.

A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found. Which of the following is the MOST likely cause of the script failure?. Account mismatches. IP address changes. API version incompatibility. Server name changes.

A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?. SNMPv3. Community strings. IPSec tunnels. ACLs.

Which of the following will provide a systems administrator with the MOST information about potential attacks on a cloud IaaS instance?. Network flows. FIM. Software firewall. HIDS.

A cloud administrator is designing a multiregion network within an IaaS provider. The business requirements for configuring the network are as follows: ✑ Use private networking in and between the multisites for data replication. ✑ Use low latency to avoid performance issues. Which of the following solutions should the network administrator use within the IaaS provider to connect multiregions?. Peering. Gateways. VPN. Hub and spoke.

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations. Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?. Solutions to perform NAC and DLP. DDoS protection. QoS on the network. A solution to achieve microsegmentation.

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations. Which of the following should the administrator implement to ensure DLP efficiency prevents the exposure of sensitive data in a cloud environment?. Integrity. Versioning. Classification. Segmentation.

Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be doneto troubleshoot the issue?. Perform a memory dump of the OS. Analyze the memory dump. Upgrade the host CPU to a higher clock speed CPU. Perform a packet capture during authentication.Validate the load-balancing configuration. Analyze the network throughput of the load balancer. Analyze the storage system IOPS.Increase the storage system capacity.Replace the storage system disks to SSD. Evaluate the OS ACLs.Upgrade the router firmware.Increase the memory on the router.

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance. Which of the following licensing models is the application MOST likely using?. Per device. Per user. Core-based. Volume-based.

A company is currently running a website on site. However, because of a business requirement to reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the company is considering operating in a hybrid environment. The website uses mostly static files and a small relational database. Which of the following should the cloud architect implement to achieve the objective at the LOWEST cost possible?. Implement a CDN that caches all requests with a higher TTL and deploy the IaaS instances manually in case of disaster. Upload the backup on demand to the cloud to restore on the new instances. Implement a load-balanced environment in the cloud that is equivalent to the current on-premises setup and use DNS to shift the load from on premises to cloud. Implement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is down. Restore the data from the backups. Implement a website replica in the cloud with auto-scaling using the smallest possible footprint. Use DNS to shift the load from on premises to the cloud.

After analyzing a web server's log, a systems administrator sees that users are connecting to the company's application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection timeout message. Which of the following should the administrator verify NEXT?. The TLS certificate. The firewall rules. The concurrent connection limit. The folder permissions.

A company needs to access the cloud administration console using its corporate identity. Which of the following actions would MOST likely meet the requirements?. Implement SSH key-based authentication. Implement cloud authentication with local LDAP. Implement multifactor authentication. Implement client-based certificate authentication.

A cloud administrator is planning to migrate a globally accessed application to the cloud. Which of the following should the cloud administrator implement to BEST reduce latency for all users?. Regions. Auto-scaling. Clustering. Cloud bursting.

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?. Internet of Things. Digital transformation. Artificial intelligence. DNS over TLS.

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?. Deploy web servers into an IaaS provider. Implement a cloud-based VDI solution. Provision web servers in a container environment. Use PaaS components in the cloud to implement the product.

A systems administrator is provisioning VMs in a cloud environment and has been told to select an OS build with the furthest end-of-life date. Which of the following OS builds would be BEST for the systems administrator to use?. Stable. Beta. Canary. LTS. Open-source.

A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective?. 137, 139, 445. 25, 123, 443. 22, 443, 445. 22, 53, 445.

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols should the company use? (Choose two.). FC. NFS. RAID 10. iSCSI. FTP. CIFS.

A cloud administrator is working in a secure government environment. The administrator needs to implement corrective action due to recently identified security issue on the OS of a VM that is running a facility-management application in a cloud environment. The administrator needs to consult the application vendor, so it might take some time to resolve the issue. Which of the following is the FIRST action the administrator should take while working on the resolution?. Raise a problem ticket. Update the risk register. Upgrade the OS. Shut down the server.

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?. Containers. Serverless computing. Software as a service. Virtual machines.

A cloud administrator wants to have a central repository for all the logs in the company's private cloud. Which of the following should be implemented to BEST meet this requirement?. A syslog server. CMDB. Log scrubbing. SNMP.

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections. Which of the following MOST likely needs to be analyzed before rehosting the ERP?. The network. Right-sizing. Licensing. Software.

An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would be MOST useful to accomplish this task?. VLAN. NIPS. WAF. NAC.

An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort. Which of the following ports needs to be opened to fulfill this requirement?. 123. 161. 67. 53.

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows: Which of the following actions should the analyst take to accomplish the objective?. Remove rules 3, 4, and 5. Remove rules 2, 3, and 4. Remove rules 1, 3, and 4. . Remove rules 1, 2, and 5.

Which of the following definitions of serverless computing BEST explains how it is different from using VMs?. Serverless computing allows developers to focus on writing code and organizations to focus on business. Serverless computing is a scalable, highly available cloud service that uses SDN technologies. Serverless computing uses predictable billing and offers lower costs than VM compute services. Serverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP.

A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.). Install TLS certificates on the server. Forward port 80 traffic to port 443. Disable TLS 1.0/1.1 and SSL. Disable password authentication. Enable SSH key access only. Restrict access on port 22 to the IP address of the administrator's workstation. Provision the server in a separate VPC.

A technician needs to deploy two virtual machines in preparation for the configuration of a financial application next week. Which of the following cloud deployment models should the technician use?. SaaS. PaaS. IaaS. XaaS.

A system administrator supports an application in the cloud, which includes a restful API that receives an encrypted message that is passed to a calculator system. The administrator needs to ensure the proper function of the API using a new automation tool. Which of the following techniques would be BEST for the administrator to use to accomplish this requirement?. Functional testing. Performance testing. Integration testing. Unit testing.

A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements: * No downtime * Instant switch to a new version using traffic control for all users Which of the following deployment strategies would be the BEST solution?. Rolling. Canary. Blue-green. Hot site.

A cloud security analyst is implementing a vulnerability scan of the web server in the DMZ, which is running in an IaaS compute instance. The default inbound firewall settings are as follows: Which of the following will provide the analyst with the MOST accurate report?. A network credentialed vulnerability scan. An agent-based scan. A network vulnerability scan. A default and common credentialed scan.

A systems administrator needs to configure SSO authentication in a hybrid cloud environment. Which of the following is the BEST technique to use?. Access controls. Certificate authentication. Multifactor authentication. Federation.

A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?. A default and common credentialed scan. A network port scan. An agent-based vulnerability scan. A service availability scan.

An administrator has been informed that some requests are taking a longer time to respond than other requests of the same type. The cloud consumer is using multiple network service providers and is performing link load balancing for bandwidth aggregation. Which of the following commands will help the administrator understand the possible latency issues?. netstat. traceroute. ipconfig. ping.

A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies. Which of the following cloud service subscription types would BEST meet these requirements?. IaaS. DBaaS. SaaS. PaaS.

A systems administrator notices that a piece of networking equipment is about to reach its end of support. Which of the following actions should the administrator recommend?. Update the OS. Replace the equipment. Migrate the equipment to the cloud. Update the firmware.

An organization will be deploying a web application in a public cloud with two web servers, two database servers, and a load balancer that is accessible over a single public IP. Taking into account the gateway for this subnet and the potential to add two more web servers, which of the following will meet the minimum IP requirement?. 192.168.1.0/28. 192.168.1.0/29. 192.168.1.0/27. 192.168.1.0/26.

All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST?. Configure network access control lists. Create a VPN tunnel. Migrate the servers. Peer all the networks from each cloud environment.

A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command, and notices the following relevant output: Which of the following actions should the cloud administrator take to resolve the issue?. Assign a new IP address of 192.168.100.10 to the web server. Modify the firewall on 72.135.10.100 to allow only UDP. Configure the WAF to filter requests from 17.3.130.3. Update the gateway on the web server to use 72.135.10.1.

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?. Expired password. Invalid certificates. Broken trust relationship. Incorrect encryption ciphers.

A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other. Which of the following should an administrator perform to comply with the security requirement?. ✑ Create separate virtual networks for production, QA, and development servers. ✑ Move the servers to the appropriate virtual network. ✑ Apply a network security group to each virtual network that denies all traffic except for the firewall. ✑ Create separate network security groups for production, QA, and development servers. ✑ Peer the networks together. ✑ Create static routes for each network to the firewall. ✑ Create separate virtual networks for production, QA, and development servers. ✑ Move the servers to the appropriate virtual network. ✑ Peer the networks together. ✑ Create separate network security groups for production, QA, and development servers. ✑ Apply the network security groups on the appropriate production, QA, and development servers. ✑ Peer the networks together.

A cloud administrator is upgrading a cloud environment and needs to update the automation script to use a new feature from the cloud provider. After executing the script, the deployment fails. Which of the following is the MOST likely cause?. Network failure. Account permissions. Location changes. API incompatibility.

A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?. In-place. Storage live migration. Rolling. Alternate location.

Due to a policy change, a few of a customer's application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%. Which of the following is the MOST likely cause?. The memory of the VM is underallocated. The new configuration is adding latency. The application is not compatible with the new settings. There is not enough vCPU assigned.

A systems administrator wants to ensure two VMs remain together on the same host. Which of the following must be set up to enable this functionality?. A cluster. Regions. Zones. Affinity.

An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?. Implement CDN for overall cloud application. Implement auto-scaling of the compute resources. Implement SR-IOV on the server instances. Implement an application container solution.

After a few new web servers were deployed, the storage team began receiving incidents in their queue about the web servers. The storage administrator wants to verify the incident tickets that should have gone to the web server team. Which of the following is the MOST likely cause of the issue?. Incorrect SNMP settings. Incorrect syslog configuration on the web servers. Incorrect IP address configuration. Incorrect assignment group in service management.

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low- latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?. VLAN. SDN. GENEVE. SR-IOV.

A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content. Which of the following solutions will assist with the increased workload?. CDN. IPS. WAF. DoH.

A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution. Which of the following will provide the data to measure business continuity? (Choose two.). A recovery time objective. A backup and restore. A network diagram. Playbooks. Automation scripts. A service-level agreement.

A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM?. IPAM. NTP. DNS. CDN.

Which of the following is relevant to capacity planning in a SaaS environment?. Scalability. Clustering. A hypervisor. Licensing.

An organization is hosting a DNS domain with private and public IP ranges. Which of the following should be implemented to achieve ease of management?. An IPAM solution. A SDN solution. A CDN solution. Network peering.

A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.). The operating system. The baselines. The virtual machines. The firmware. The virtual appliances. The fabric interconnects.

A SAN that holds VM files is running out of storage space. Which of the following will BEST increase the amount of effective storage on the SAN?. Configure deduplication. Convert the SAN from RAID 50 to RAID 60. Increase IOPS. Enable encryption.

Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud?. Conduct a tabletop exercise involving developers and systems administrators. Perform a forensic analysis of the affected instance. Configure a firewall rule to block the traffic on the affected instance. Deploy a new instance using a known-good base image.

A systems administrator has migrated a web application to the cloud with a synchronous uplink speed of 100Mbps. After the migration, the administrator receives reports of slow connectivity to the web application. The administrator logs into the firewall and notices the WAN port is transmitting at a constant 12.5MBps. Which of the following BEST explains the reason for the issue?. Firewall issues. Not enough upload bandwidth. Insufficient compute. Misconfigured subnetting.

A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue?. Request permission to log in to the device remotely. Reboot the user's virtual desktop. Ask the user if the client device or access location has changed. Check the FAQ section of the vendor's documentation.

A systems administrator is examining a managed hosting agreement and wants to determine how much data would be lost if a server had to be restored from backups. To which of the following metrics should the administrator refer?. MTTR. RPO. MTBF. RTO.

A systems administrator for an e-commerce company will be migrating the company's main website to a cloud provider. The principal requirement is that the website must be highly available. Which of the following will BEST address this requirement?. A next-generation firewall. Redundant switches. A server cluster. Vertical scaling.

A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment wsuccessful, but after deploying the CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue?. Modify the configuration settings of the CMS application to connect to the database in the current environment. Modify the CMS application deployment to use the previous version and redeploy the application. Modify the ACL to allow the staging environment to access the database in the sandbox environment. Modify the deployment script to delete and recreate the database whenever the CMS application is deployed.

A cloud administrator is responsible for managing a cloud-based content management solution. According to the security policy, any data that is hosted in the cloud must be protected against data exfiltration. Which of the following solutions should the administrator implement?. WAF. DLP. FIM. HIDS.

Lateral-moving malware has infected the server infrastructure. Which of the following network changes would MOST effectively prevent lateral movement in the future?. Implement 802.1X in the network infrastructure. Implement microsegmentation on the network. Segment the physical network using a VLAN. Implement DNSSEC in all DNS servers.

A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook?. Use the administrator's SSO credentials. Create a service account on the server. Hard-code the password within the playbook. Use the server's root credentials.

Which of the following should be considered for capacity planning?. Hypervisors and scalability. Regions, clusters, and containers. Laws and regulations. Requirements, licensing, and trend analysis.

A cloud administrator is setting up a new coworker for API access to a public cloud environment. The administrator creates a new user and gives the coworker access to a collection of automation scripts. When the coworker attempts to use a deployment script, a 403 error is returned. Which of the following is the MOST likely cause of the error?. Oversubscription limits have been exceeded. The script has a configuration error. User permissions are not correct. Connectivity to the public cloud is down.

A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue?. Upgrade the virtual database server. Move the virtual machine to flash storage and test again. Check if other machines on the same storage are having issues. Document the findings and place them in a shared knowledge base.

In an existing IaaS instance, it is required to deploy a single application that has different versions. Which of the following should be recommended to meet this requirement?. Create snapshots. Enable SR-IOV on the host. Install a Type 2 hypervisor. Deploy using containers.

An organization is using multiple SaaS-based business applications, and the systems administrator is unable to monitor and control the use of these subscriptions. The administrator needs to implement a solution that will help the organization apply security policies and monitor each individual SaaS subscription. Which of the following should be deployed to achieve these requirements?. HIDS. IPS. CASB. DLP.

A cloud administrator needs to reduce the cost of cloud services by using the company's off-peak period. Which of the following would be the BEST way to achieve this with minimal effort?. Create an auto-scaling group. Create an auto-shutdown group. Create tags. Create a separate subscription.

A media company has made the decision to migrate a physical, internal file server to the cloud and use a web-based interface to access and manage the files. The users must be able to use their current corporate logins. Which of the following is the MOST efficient way to achieve this goal?. Copy the files to the object storage location in a public cloud. Deploy a fileshare in a public cloud and copy the files across. Use a SaaS service with a directory service federation. Deploy a VM in a cloud, attach storage, and copy the files across.

A systems administrator is configuring a storage array. Which of the following should the administrator configure to set up mirroring on this array?. RAID 6. RAID 5. RAID 1. RAID 0.

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?. Network peering. Network switch. Network connectivity. Network latency.

A systems administrator adds servers to a round-robin, load-balanced pool, and then starts receiving reports of the website being intermittently unavailable. Which of the following is the MOST likely cause of the issue?. There are time synchronization issues. The API version is incompatible. New web nodes are not operational. The load balancer is being overwhelmed. The network is being saturated.

A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site. Which of the following should be configured in between the cloud environment and the DR site?. Replication. Zoning. Playbook. Fallback.

A cloud administrator is building a new VM for a network security appliance. The security appliance installer says the CPU clock speed does not meet the requirements. Which of the following will MOST likely solve the issue?. Enable hyperthreading on the virtual host. Enable CPU masking on the VM. Add more vCPUs to the VM. Move the VM to a host with a faster CPU.

A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency. Which of the following services should the technician deploy to eliminate the latency issue?. A content delivery network. A new cloud provider. Cloud bursting. Auto-scaling.

A systems administrator has received an email from the virtualized environment's alarms indicating the memory was reaching full utilization. When logging in, the administrator notices that one out of a five-host cluster has a utilization of 500GB out of 512GB of RAM. The baseline utilization has been 300GB for that host. Which of the following should the administrator check NEXT?. Allocated guest resources. VM integrity. Running applications. Storage array.

Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A's cloud resources while retaining its 1AM solution. Which of the following should be implemented?. Directory service. Identity federation. Single sign-on. Multifactor authentication.

A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet. Which of the following should the systems administrator implement to achieve this objective?. DLP. DNSSEC. Network flows. A stateful firewall.

A company had a system compromise, and the engineering team resolved the issue after 12 hours. Which of the following information will MOST likely be requested by the Chief Information Officer (CIO) to understand the issue and its resolution?. Application logs. Acquired evidence. Application documentation. A root cause analysis.

A company needs to migrate the storage system and batch jobs from the local storage system to a public cloud provider. Which of the following accounts will MOST likely be created to run the batch processes?. Service. Role-based. LDAP. User.

A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error. Which of the following will MOST likely solve the issue?. Opening TCP port 3389. Enforcing TLS authentication. Configuring QoS rules. Checking user passwords.

A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data. Which of the following migration methods would be the BEST to use?. Use a storage vendor migration appliance. Rsync the data between arrays. Perform a storage live migration. Conduct a V2V migration.

A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web-based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer. The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment. Which of the following is the MOST likely reason for this issue?. The application load balancer exceeded the maximum number of servers it could use. The new server images were incompatible with the application load-balancer configuration. The license limit on the number of server deployments allowed per month was exceeded. The deployment script changes made by the first administrator were not checked in and committed.

A systems administrator is configuring updates on a system. Which of the following update branches should the administrator choose to ensure the system receives updates that are maintained for at least four years?. Stable. Beta. Canary. LTS.

A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way?. Take a snapshot of the system. Test the upgrade in a preproduction environment. Perform a full backup. Submit the upgrade to the CAB.

Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps. Which of the following solutions will resolve the issue the FASTEST?. Upgrade the link to 200Mbps. Enable quality of service. Order a direct link to the provider. Change the connection to point-to-site VPN.

A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?. A site-to-site VPN between datacenters. A DNS round robin. A CDN solution. An MPLS connection between datacenters.

An administrator receives a ticket indicating the accounting application is not working. Which of the following should the administrator check FIRST?. System logs. DNS. DHCP. Service-level agreement.

A company recently adjusted its load-balancer encryption policies to support only TLSv1.3. Soon after the change was made, several customers began reporting they could not access their website. Which of the following is the MOST likely cause of the issue?. The load balancer was misconfigured. The customers are using an unsupported OS. There is a mismatch between the key and the certificate. The certificate is expired.

A cloud architect is reviewing the design for a new cloud-based ERP solution. The solution consists of eight servers with a single network interface. The allocated IP range is 172.16.0.0/28. One of the requirements of the solution is that it must be able to handle the potential addition of 16 new servers to the environment. Because of the complexity of the firewall and related ACL requirements, these new servers will need to be in the same network range. Which of the following changes would allow for the potential server addition?. Change the server scaling configuration to increase the maximum limit. Change the subnet mask to use a 255.255.255.128 range. Change the server template to add network interfaces. Change the IP address range to use a 10.0.0.0 address.

An organization is required to set a custom registry key on the guest operating system. Which of the following should the organization implement to facilitate this requirement?. An operating system ACL. A file integrity check solution. A log and event monitoring solution. A configuration management solution.

A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible. Which of the following will BEST achieve this goal?. Enable simultaneous multithreading. Increase instructions per cycle. Switch from a Type 1 to a Type 2 hypervisor. Oversubscribe CPU resources. Configure CPU passthrough.

A systems administrator needs to implement a security control that will prevent unknown malware from infecting a system in case the antivirus solution fails. Which of the following should the administrator implement?. Hardened baselines. A host-based IDS. File integrity monitoring. A software whitelist.

A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal. Which of the following should the administrator do to fix this issue?. Edit the DNS record at the DR site for the application servers. Update the connection string. Create a database cluster between the primary site and the DR site. Change the database application IP.

A company recently subscribed to a SaaS collaboration service for its business users. The company also has an on-premises collaboration solution and would like users to have a seamless experience regardless of the collaboration solution being used. Which of the following should the administrator implement?. SSO. VDI. WAF. LDAP.

A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues. Which of the following is the MOST likely cause of this issue?. Deprecated features. Job validation issues. Patching failure. Service overload. Change management failure.

A systems administrator notices several VMs are constantly ballooning, while the memory usage of several other VMs is significantly lower than their resource allocation. Which of the following will MOST likely solve the issue?. Storage tiers. Cluster placement. Bandwidth increase. Right-sizing.

The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other's work. Which of the following did the team MOST likely forget to implement?. Roles and responsibilities. Change management. A calling tree. Incident type categories.

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments. Which of the following network topology solutions should the cloud engineer implement to reduce longterm maintenance?. Hub and spoke. Mesh. Star. Chain.

A systems administrator is using VMs to deploy a new solution that contains a number of application VMs. Which of the following would provide high availability to the application environment in case of hypervisor failure?. Affinity rules. Live migration. Cold migration. Anti-affinity rules.

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?. HTTPS. SSH. IPSec. TLS.

A company still has several dedicated servers and wants to migrate them to its private cloud. Which of the following migration methods would be BEST to accomplish this goal?. Physical-to-virtual. Storage. Cloud-to-cloud. Virtual-to-virtual.

A systems administrator is securing a new email system for a large corporation. The administrator wants to ensure private corporate information is not emailed to external users. Which of the following would be MOST useful to accomplish this task?. SPF. DLP. DNSSEC. EDR.

A cloud administrator is looking at the company's cloud services bill for the previous month. The administrator notices on the billing dashboard that certain resources are not being billed to any particular department. Which of the following actions will help correct this billing issue?. Check the utilization of the resources. Modify the chargeback details of the consumer. Add the resources to the consumer monitoring group. Modify the tags for all the unmapped resources.

A cloud architect is deploying a web application that contains many large images and will be accessed on two containers. Which of the following will MOST improve the user experience while keeping costs low?. Implement a replica of the entire solution on every continent. Implement a CDN and offload the images to an object storage. Implement web servers on both continents and peer the VPCs. Implement web servers in both continents and set up a VPN between the VPCs.

Once a year, a company's private cloud experiences increased activity. The company has a disaster recovery site that is hosted in a public cloud. To avoid investment in additional hardware, which of the following actions would BEST address this issue?. Manually add memory and CPU to existing VMs, and remove them when usage is back to normal. Create a new backup site and decommission it when usage is back to normal. Activate the disaster recovery site, and deactivate it when usage is back to normal. Configure cloud bursting to spin up new VMs automatically and terminate them when usage is back to normal.

A systems administrator is troubleshooting issues with network slowness. Traffic analysis shows that uplink bandwidth on the core switch is often sustained at 125Mbps due to a combination of production traffic from other sources. Which of the following would BEST resolve the issue?. Reboot the core switch. Increase the buffer size on the core switch. Enable QoS to prioritize production traffic. Turn off the servers that use the most bandwidth.

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?. Dynamic memory allocation. Memory mismatch error. Operating system memory limit. Insufficient memory on the hypervisor.

A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?. Scripts. Licensing. Storage. Compute.

A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement?. Create /25 subnets in two regions and run 80 instances on each one. Create /26 subnets in two regions and run 40 instances on each one. Create /26 subnets in three regions and run 40 instances on each one. Create /26 subnets in three regions and run 80 instances on each one.

A web application has been configured to use auto-scaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new Cl/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now, the auto-scaling configuration is creating a new VM every five minutes. Which of the following actions will MOST likely resolve the issue?. Modifying the script to shut down the VM after five minutes. Changing the automation tool because it is incompatible. Debugging the script and redeploying it. Reducing the maximum threshold in the auto-scaling configuration.

A systems administrator is troubleshooting an application that is configured to auto-scale with a minimum of two nodes and a maximum of four. The application will scale out if the CPU utilization of one of the nodes exceeds 80% for more than five minutes and will scale in if the CPU utilization of one of the nodes drops under 20% for more than ten minutes. There is a reverse proxy in front of the application. The systems administrator notices two of the nodes are often running over 80% for a long period of time, which is triggering the creation of the other two nodes; however, they are being created and terminated while the load in the first two remains over 50% all the time. Which of the following should the administrator configure to fix this issue?. Increase the scale-in rule to 50%. Reduce the scale-out rule to 50%. Disable TLS tickets. Reduce the minimum node count to one. Disable DNS caching in the reverse proxy.

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?. SDN. VLAN. IPAM. DoH.

A financial industry services firm was the victim of an internal data breach, and the perpetrator was a member of the company's development team. During the investigation. one of the security administrators accidentally deleted the perpetrator’s user data. Even though the data is recoverable, which of the following has been violated?. Root cause analysis. Containment. Evidence acquisition. Chain of custody.

After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?. Four 8 vCPU nodes with DNS round robin. Three to six 8 vCPU nodes autoscaling group. Two 8 vCPU nodes with load balancing. One 32 vCPU node with CDN caching.

A company has hired a security firm to perform a vulnerability assessment of its environment. In the first phase, an engineer needs to scan the network services exposed by the hosts. Which of the following will help achieve this with the LEAST privileges?. An application scan. A network-based scan. A credentialed scan. An agent-based scan.

A local bank has all of its infrastructure in the cloud. An update was applied to the main database server at 5:00 a.m. on Monday morning, and the database was then corrupted and unusable. It had to be restored from backup. The last backup was taken the night before at 10:00 p.m. The database was then restored successfully, but seven hours' worth of data was lost, which is deemed unacceptable. Which of the following needs to be updated in the DR plan?. Recovery point objective. Statement of work. Service-level agreement. Recovery time objective.

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?. DBaaS. SaaS. IaaS. PaaS.

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?. IPSec. Encryption. Hardening. IAM.

A cloud administrator is monitoring a database system and notices an unusual increase in the read operations, which is causing a heavy load in the system. The system is using a relational database and is running in a VM. Which of the following should the administrator do to resolve the issue with minimal architectural changes?. Implement the database system using a DBaaS. Create a secondary standby database instance. Migrate the relational database to a NoSQL database. Use a cache system to store reading operations.

A financial services company is considering its options for moving its infrastructure to the cloud. The company runs its critical database on a proprietary legacy mainframe, which cannot be hosted anywhere but in the data center. However, the company would like to migrate portions of the infrastructure to an external provider. Which of the following cloud deployment models would be the BEST option?. Hybrid. Community. Public. Private.

A storage administrator is reviewing the storage consumption of a SAN appliance that is running a VDI environment. Which of the following Features should the administrator implement to BEST reduce the storage consumption of the SAN?. SDS. Compression. Thick provisioning. Deduplication.

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Choose two.). A VPN. Storage replication. SR-IOV. A firewall. SDN. A load balancer.

A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured?. Container. Oversubscription. Anti-affinity. Regions.

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?. Store the credentials using the orchestrator secret manager. Store the credentials in a configuration file using SHA-256 inside the container image. Store the credentials in a variable on every worker node. Store the credentials on a shared volume using whole-disk encryption.

An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection?. SSL. HIPS. IDS. EDR. WAF.

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?. Inadequate memory allocation. Incorrect VLAN assignment. Overwhelmed vCPU. A storage error on the guest. Insufficient guest bandwidth.

A cloud engineer is performing updates to an application and needs to gracefully stop any new transactions from processing before the updates can be applied. Which of the following steps should the engineer take?. Use a load balancer to redirect traffic to other systems serving the application. Run a kill command on the system to stop the application services. Wait until after business hours to conduct the change when the system is not in use. Enable maintenance mode from the application dashboard.

A company wants to move to a multicloud environment and utilize the technology that provides the most portability. Which of the following technology solutions would BEST meet the company's needs?. Containers. Clusters. Virtual machines. Bootstrap.

A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality?. NAC. IDS. DLP. EDR.

An administrator needs to back up all the data from each VM daily while also saving space. Which of the following backup types will BEST fit this scenario?. Full. Synthetic full. Incremental. Differential.

A systems administrator is setting up a backup solution to follow the 3-2-1 policy. Currently, the solution is set to back up from the servers to an on-site storage server. Which of the following should the administrator configure to comply with the 3-2-1 policy?. An off-site storage server for backups. Storage snapshots. A second on-site storage server for backups. Weekly lull backups, with daily incremental backups.

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?. Troubleshoot and resolve the application issues. Restore from backups. Failback to the blue stack. Reboot all the servers in the green stack.

A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows: Three public cloud hosts with four cores • 120GB of RAM • 100GB of storage • 1Gbps. Four public cloud hosts with four cores • 140GB of RAM • 200GB of storage. Three public cloud hosts with six cores • 80GB of RAM • 1TB of storage • 200Mbps. Three public cloud hosts with six cores • 80GB of RAM • 180GB of storage • 150Mbps.

A technician is trying to delete six decommissioned VMs. Four VMs were deleted without issue. However, two of the VMs cannot be deleted due to an error. Which of the following would MOST likely enable the technician to delete the VMs?. Remove the lock from the two VMs. Remove the VMs from the resource group. Remove the VMs' IP addresses. Remove the snapshots.

A cloud administrator is assigned to establish a connection between the on-premises data center and the new CSP infrastructure. The connection between the two locations must be secure at all times and provide service for all users inside the organization. Low latency is also required to improve performance during data transfer operations. Which of the following would BEST meet these requirements?. A point-to-site VPN. An MPLS connection. An IPSec tunnel. A VPC peering configuration.

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL https://www.comptiasite.com. Which of the following would MOST likely resolve the issue?. Renewing the expired certificate. Updating the web-server software. Changing the crypto settings on the web server. Upgrading the users' browser to the latest version.

A company is considering consolidating a number of physical machines into a virtual infrastructure that will be located at its main office. The company has the following requirements • High-performance VMs • More secure • Has system independence Which of the following is the BEST platform for the company to use?. Type 1 hypervisor. Type 2 hypervisor. Software application virtualization. Remote dedicated hosting.

A cloud architect is reviewing four deployment options for a new application that will be hosted by a public cloud provider. The application must meet an SLA that allows for no more than five hours of downtime annually. The cloud architect is reviewing the SLAs for the services each option will use: Based on the information above, which of the following minimally complies with the SLA requirements?. Option A. Option B. Option C. Option D.

A systems administrator is deploying a new cloud application and needs to provision cloud services with minimal effort. The administrator wants to reduce the tasks required for maintenance, such as OS patching, VM and volume provisioning, and autoscaling configurations. Which of the following would be the BEST option to deploy the new application?. Serverless. OS templates. Containers. A VM cluster.

A company wants to move its environment from on premises to the cloud without vendor lock-in. Which of the following would BEST meet this requirement?. PaaS. IaaS. SaaS. DBaaS.

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.). License issues. Insufficient GPU resources. RAM usage. CPU oversubscription. Affinity rule. Disk I/O limits.

An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used?. Network file system. User quotas. Software-defined storage. Thick provisioning.

After announcing a big sales promotion, an e-commerce company starts to experience a slow response on its platform that is hosted in a public cloud. When checking the resources involved, the systems administrator sees the following consumption: Considering all VMs were built from the same templates, which of the following actions should the administrator perform FIRST to speed up the response of the e-commerce platform?. Spin up a new web server. Spin up a new application server. Spin up a new database server. Add more memory to the web server.

A disaster situation has occurred, and the entire team needs to be informed about the situation. Which of the following documents will help the administrator find the details of the relevant team members for escalation?. Call tree. Playbook. Root cause analysis. Chain of custody.

A systems administrator is troubleshooting performance issues with a VDI environment. The administrator determines the issue is GPU related. and then increases the frame buffer on the virtual machines. Testing confirms the issue is solved, and everything is now working correctly. Which of the following should the administrator do NEXT?. Establish a plan of action to resolve the issue. Document the solution and place it in a shared knowledge base. Conduct internal and external research based on the symptoms. Consult corporate policies to ensure the fix is allowed.

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?. Consult the cloud services provider's policies and guidelines. Consult the law for the country where the cloud services provider is located. Consult the regulatory requirements for the company’s industry. Consult the law for the country where the company’s headquarters is located.

A systems administrator wants to restrict access to a set of sensitive files to a specific group of users. Which of the following will achieve the objective?. Implement a HIPS solution on the host. Change tine permissions and ownership of the files. Configure data loss prevention in the environment. Add audit rules on the server.

A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.). Disabled autoscaling. Expired API token. No connectivity to the public cloud. Billing issues with the cloud provider. Insufficient storage. Incorrect permissions.

A systems administrator has verified that a physical switchport that is connected to a virtualization host is using all available bandwidth. Which of the following would BEST address this issue?. Microsegmentation. Spanning tree. Link aggregation. Port mirroring.

A piece of software applies licensing fees on a socket-based model. Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?. The number of customers who will be using the software. The type of cloud in which the software is deployed. The number of CPUs in the server. The amount of memory in the server.

A highly regulated business is required to work remotely and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following: • secure connectivity that minimizes user login • tracks user activity and monitors for anomalous activity • requires secondary authentication. SSO , MFA , SIEM. SSO , BGP, DATABASE. SSO , VPN CLIENT , DATABASE. SSO , NAC , Object Storage server.

A cloud administrator is evaluating a solution that will limit access to authorized individuals. The solution also needs to ensure the system that connects to the environment meets patching, antivirus and configuration requirements. Which of the following technologies would BEST meet these requirements?. HIPS. IDS. EDR. NAC.

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public IaaS The team identifies the following rule as a potential issue: A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IP." Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: Connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the server from their locations?. Modify the outbound rule to allow the company’s external IP address as a source. Add an inbound rule to use the IP address for the company's main office as a source. Modify the inbound rule to allow the company’s external IP address as a source. Delete the inbound rule to allow the company’s external IP address as a source.

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?. .etcd. .conf. .txt. .yaml.

An organization is conducting a performance test of a public application. The following actions have already been completed: • The baseline performance has been established • A load test has passed. • A benchmark report has been generated Which of the following needs to be done to conclude the performance test?. Conduct a test with the end users and collect feedback. Test how well the application can resist a DDoS attack. Assess the application against vulnerabilities and/or misconfiguration exploitation. Verify the application works well under an unexpected volume of requests.

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?. There is a local firewall policy restriction on the syslog server. The application administrators have not performed any activity in those servers. There is a configuration failure in the syslog solution. The application servers were migrated to the cloud as IaaS instances.

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?. Create a network security group. Create separate VLANs. Create a resource group. Create a directory security group.

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?. There is a local firewall policy restriction on the syslog server. The application administrators have not performed any activity in those servers. The application servers were migrated to the cloud as IaaS instances. There is a configuration failure in the syslog solution.

A large pharmaceutical company needs to ensure it is in compliance with the following requirements: • An application must run on its own virtual machine. • The hardware the application is hosted on does not change. Which of the following will BEST ensure compliance?. Load balancers. Affinity rules. A firewall. Containers.

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?. Autoscaling. Cloud bursting. Vertical. Horizontal.

A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?. RAID 5. RAID 6. RAID 10. RAID 50.

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?. MTTF. SLA. RTO. RPO.

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?. Point-to-point. Point-to-site. Client-to-site. Site-to-site.

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?. Deploy a CMDB tool. Develop CI/CD tools. Create autoscaling capabilities. Implement a secret management solution.

A company is using an IaaS environment. Which of the following licensing models would BEST suit the organization from a financial perspective to implement scaling?. Socket-based. Per user. Volume-based. Subscription.

A cloud security engineer needs to ensure authentication to the cloud provider console is secure. Which of the following would BEST achieve this objective?. Require the password to be ten characters long. Require the use of a password and a physical token. Require the password to contain uppercase letters, lowercase letters, numbers, and symbols. Require the user's source IP to be an RFC1918 address.

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator MOST likely use?. A WAF. A reverse proxy. An IPS/IDS. An API gateway.

An administrator manages a file server that has a lot of users accessing and creating many files. As a result, the storage consumption is growing quickly. Which of the following would BEST control storage usage?. Access policies. User quotas. File permissions. Compression.

A systems administrator is writing a script for provisioning nodes in the environment. Which of the following would be BEST for the administrator to use to provision the authentication credentials to the script?. password="MyS3cretP4sswordIsVeryL0ng". password=$(cat /opt/app/credentials). password=$env_password. password='curl https://10.2.3.4/api/sytemops?op=provision'.

A cloud administrator is configuring several security appliances hosted in the private IaaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?. Allow UDP 161 outbound from the web servers to the log collector. Allow TCP 514 outbound from the web servers to the log collector. Allow UDP 161 inbound from the log collector to the web servers. Allow TCP 514 inbound from the log collector to the web servers.

A company has two identical environments (X and Y) running its core business application. As part of an upgrade, the X environment is patched/upgraded and tested while the Y environment is still serving the consumer workloads. Upon successful testing of the X environment, all workload is sent to this environment, and the Y environment is then upgraded before both environments start to manage the workloads. Which of the following upgrade methods is being used?. Blue-green. Development/production. Canary. Active-passive.

A systems administrator received an email from a cloud provider stating that storage is 80% full on the volume that stores VDI desktops. Which of the following is the MOST efficient way to mitigate the situation?. Storage migration. Replication. Deduplication. Compression.

During a security incident, an IaaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?. Replace the instance with another from the baseline. Create a snapshot of the volumes attached to the instance. Perform a memory acquisition in the affected instance. Isolate the instance from the network into quarantine.

A cloud administrator is responsible for managing a VDI environment that provides end users with access to limited applications. Which of the following should the administrator make changes to when a new application needs to be provided?. Application testing policy. Application hardening policy. Application whitelisting policy. Application security policy.

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?. The target system has failed after the updates. The IP addresses of the target system have changed. The password for the service account has expired. The target system's API functionality has been deprecated.

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?. DoH. DDoS protection. Network overlay using GENEVE. NIPS.

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?. WAF transaction throttling. Load balancer stickiness. Load balancer certificates. Firewall inbound rules. Firewall outbound rules.

A cloud solutions architect has received guidance to migrate an application from on premises to a public cloud. Which of the following requirements will help predict the operational expenditures in the cloud?. Actual hardware configuration. Minimum resource consumption. Maximum resource consumption. Average resource consumption.

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?. RTO. SLA. MTTR. RPO.

A systems administrator is helping to develop a disaster recovery solution. The solution must ensure all production capabilities are available within two hours. Which of the following will BEST meet this requirement?. A cold site. A backup site. A warm site. A hot site.

A security audit related to confidentiality controls found the following transactions occurring in the system: GET http://gateway.securetransaction.com/privileged/api/v1/changeResource?id=123&user=277 Which of the following solutions will solve the audit finding?. Implementing a Layer 4 load balancer. Deploying a HIDS on each system. Using a TLS-protected API endpoint. Implementing a software firewall.

A cloud administrator needs to coordinate and automate the management of a company's secrets and keys for all its cloud services with minimal effort and low cost. Which of the following is the BEST option to achieve the goal?. Configure Key Vault. Implement database as a service. Use password as a service. Implement KeePass.

A systems administrator needs to implement a service to protect a web application from external attacks. The administrator must have session-based granular control of all HTTP traffic. Which of the following should the administrator configure?. NAC. DLP. WAF. IDS.

A systems administrator is diagnosing performance issues on a web application. The web application sends thousands of extremely complex SQL queries to a database server, which has trouble retrieving the information in time. The administrator checks the database server and notes the following resource utilization: • CPU: 64% • RAM: 97% • Network throughput: 384,100Kbps. • Disk throughput: 382,700Kbps The administrator also looks at the storage for the database server and notices it is consistently near its OPS limit. Which of the following will BEST resolve these performance issues?. Enable deduplication on the storage appliance. Enable compression on storage traffic. Put the storage and the database on the same VLAN. Increase caching on the database server. Increase CPU resources on the database server.

A systems administrator needs to deploy a solution to automate new application releases that come from the development team. The administrator is responsible for provisioning resources at the infrastructure layer without modifying any configurations in the application code. Which of the following would BEST accomplish this task?. Employing DevOps methodology. Configuring infrastructure as code. Deploying an orchestration tool. Implementing a CI/CD tool.

An organization is hosting its dedicated email infrastructure with unlimited mailbox creation capability. The management team would like to migrate to a SaaS-based solution. Which of the following must be considered before the migration?. The number of network links the SaaS provider has. The SaaS provider's reputation. The SaaS provider's licensing model. The number of servers the SaaS provider has.

An organization recently deployed a private cloud on a cluster of systems that delivers compute, network, and storage resources in a single hardware, managed by an intelligent software. Which of the following BEST describes this type of deployment?. Dynamic allocations. Stand-alone computing. Hyperconverged infrastructure. High-performance computing.

In an IaaS platform, which of the following actions would a systems administrator take FIRST to identify the scope of an incident?. Perform a traffic capture. Retrieve data from a backup. Snapshot all volumes attached to an instance. Conduct a memory acquisition.

A cloud administrator needs to deploy a security virtual appliance in a private cloud environment, but this appliance will not be part of the standard catalog of items for other users to request. Which of the following is the BEST way to accomplish this task?. Convert the virtual appliance to a template and deploy a new VM using the template. Import the virtual appliance into the environment and deploy it as a VM. Acquire the build scripts from the vendor and recreate the appliance using the baseline templates. Create an empty VM, import the hard disk of the virtual appliance, and configure the CPU and memory.

A company has a web application that is accessed around the world. An administrator has been notified of performance issues regarding the application. Which of the following will BEST improve performance?. CDN. IPAM. VPN. SDN.

A cloud administrator needs to verify domain ownership with a third party. The third party has provided a secret that must be added to the DNS server. Which of the following DNS records does the administrator need to update to include the secret?. SOA. AAAA. TXT. NS.

Different healthcare organizations have agreed to collaborate and build a cloud infrastructure that should minimize compliance costs and provide a high degree of security and privacy, as per regulatory requirements. This is an example of a: public cloud. hybrid cloud. community cloud. private cloud.

An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time. Which of the following should be implemented to improve application performance?. Upgrade the environment and use SSD drives. Upgrade the application. Increase the memory and network bandwidth. Increase disk capacity.

An organization was preparing to harden an environment before granting access to external auditors. Vulnerability testing was completed, and only one low-priority, informational vulnerability remained outstanding: Two weeks later, the auditors review the system on a new machine without an existing browser cache. Credentials are not required when accessing the application login page. Which of the following tests were skipped, causing this issue?. Usability testing. Functionality testing. Penetration testing. Regression testing.

Which of the following are advantages of a public cloud? (Choose two.). More secure data. Availability of self-service. Pay as you use. Decreased network latency. Full control of hardware. Reduced monthly costs.

A systems administrator has been notified of possible illegal activities taking place on the network and has been directed to ensure any relevant emails are preserved for court use. Which of the following is this MOST likely an example of?. File integrity monitoring. Legal hold. Version control. Email archiving.

A cloud administrator deployed new hosts in a private cloud. After a few months elapsed, some of the hypervisor features did not seem to be working. Which of the following was MOST likely causing the issue?. Oversubscription. Incorrect tags. Missing license. Incorrect permissions.

When designing a three-node, load-balanced application, a systems administrator must ensure each node runs on a different physical server for HA purposes. Which of the following does the systems administrator need to configure?. Priority queues. Anti-affinity rule. Live migration. Round-robin methods.

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the MOST likely cause of the issue?. Misconfiguration in the firewall. Misconfiguration in the network ACL. Misconfiguration in the routing traffic. Misconfiguration in the user permissions.

Based on the shared responsibility model, which of the following solutions passes the responsibility of patching the OS to the customer?. PaaS. IaaS. DBaaS. SaaS.

An engineer is investigating potential performance issues in a hypervisor platform. When comparing the allocated versus actual resources, the engineer notices the platform is oversubscribed. Which of the following is MOST likely the immediate cause of the performance issues?. Transparent page sharing. Ballooning. Dynamic allocation. Oversubscription.

A cloud administrator recently noticed that a number of files stored at a SaaS provider’s file-sharing service were deleted. As part of the root cause analysis, the administrator noticed the parent folder permissions were modified last week. The administrator then used a test user account and determined the permissions on the files allowed everyone to have write access. Which of the following is the best step for the administrator to take NEXT?. Identify the changes to the file-sharing service and document. Acquire a third-party DLP solution to implement and manage access. Test the current access permissions to the file-sharing service. Define and configure the proper permissions for the file-sharing service.

A company is using an IaC deployment model to a public cloud IaaS. The automation runs partially and then fails to build a VM in the IaaS environment. Upon further assessment, the connectivity to the IaaS is confirmed. Which of the following are the MOST likely causes of the failure? (Choose two.). Inadequate storage. Insufficient account balance. Network settings. Resource tagging. API request limits. Administrator access.

A cloud administrator is investigating slow VM performance. The administrator has checked the physical server performance and has identified the host is under stress due to a peak usage workload. Which of the following is the NEXT step the administrator should complete?. Perform a system restart. Document the findings. Migrate the VM to a different host. Perform a root cause analysis.

A cloud administrator must ensure all servers are in compliance with the company’s security policy. Which of the following should the administrator check FIRST?. Password policies. Hardened baselines. The OS version. The application version.

A systems administrator needs to implement a way for users to verify software integrity. Which of the following tools would BEST meet the administrator’s needs?. SHA-512. AES-256. TLS 1.3. CRC32.

A cloud administrator would like to maintain file integrity checks through hashing on a cloud object store. Which of the following is MOST suitable from a performance perspective?. AES. MD5. SHA-512. SHA-256.

Which of the following enables CSPs to offer unlimited capacity to customers?. Agile project management. Economies of scale. Global data center distribution. Adequate budget.

A company has two primary offices, one in the United States and one in Europe. The company uses a public IaaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?. Migrate the applications to a region hosted in Europe. Upgrade the bandwidth of the dedicated connection to the IaaS provider. Integrate a CDN solution to distribute web content globally. Add an application load balancer to the applications to spread workloads.

A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention. Which of the following will BEST resolve this issue?. Enable OS encryption. Enable volume encryption on the storage. Enable protocol encryption between the storage and the hypervisor. Create an IPSec tunnel between the database server and its clients. Ensure all database queries are encrypted.

A company’s marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?. An additional CPU core. Converged infrastructure. Increased memory. GPU passthrough.

A cloud administrator is supporting an application that has several reliability issues. The administrator needs visibility into the performance characteristics of the application. Which of the following will MOST likely be used in a reporting dashboard?. Metrics and time-series data measuring key performance indicators. Detail log data from syslog files of the application. Results from the last performance and workload testing. Data from files containing error messages from the application.

An organization provides integration services for finance companies that use web services. A new company that sends and receives more than 100,000 transactions per second has been integrated using the web service. The other integrated companies are now reporting slowness with regard to the integration service. Which of the following is the cause of the issue?. Incorrect configuration in the authentication process. Incorrect configuration in the message queue length. Incorrect configuration in user access permissions. Incorrect configuration in the SAN storage pool.

A company uses multiple SaaS-based cloud applications. All the applications require authentication upon access. An administrator has been asked to address this issue and enhance security. Which of the following technologies would be the BEST solution?. Single sign-on. Certificate authentication. Federation. Multifactor authentication.

An enterprise is considering a cost model for a DBaaS. Which of the following is BEST for a cloud solution?. Per device. Per user. Per seat. Per gigabyte.

A company is using a hybrid cloud environment. The private cloud is hosting the business applications, and the cloud services are being used to replicate for availability purposes. The cloud services are also being used to accommodate the additional resource requirements to provide continued services. Which of the following scalability models is the company utilizing?. Horizontal scaling. Cloud bursting. Autoscaling. Vertical scaling.

A developer wants to use an environment that has two sets of servers, with one active and one passive at any time. When a new version of the application is ready, it will be installed to the passive servers, which will then become active. Which of the following environment types BEST describes these two sets of servers?. Staging. Development. Blue-green. Disaster recovery.

A security analyst is investigating a recurring alert. The alert is reporting an insecure firewall configuration state after every cloud application deployment. The process of identifying the issue, requesting a fix, and waiting for the developers to manually patch the environment is being repeated multiple times. In an effort to identify the root issue, the following logs were collected: Which of the following options will provide a permanent fix for the issue?. Validate the IaC code used during the deployment. Avoid the use of a vault to store database passwords. Rotate the access keys that were created during deployment. Recommend that the developers do not create multiple resources at once.

A cloud administrator is reviewing the current private cloud and public law environment, and is building an optimization plan. Portability is of great concern for the administrator so resources can be easily moved from one environment to another. Which of the following should the administrator implement?. Serverless. CDN. Containers. Deduplication.

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?. System hardening. Vulnerability scanning. Patch management. Log monitoring.

A DevOps team needs to provide a solution that offers isolation, portability, and scalability. Which of the following would BEST meet these requirements?. Clusters. Appliances. Containers. Virtual machines.

A systems administrator is responsible for upgrading operating systems on VMs that are hosted in a cloud environment. The systems administrator wants to ensure the VMs receive updates for as long as possible. Which of the following should the systems administrator choose?. EDR. Canary. LTS. Nightly. Stable.

A cloud administrator has deployed several VM instances that are running the same applications on VDI nodes. Users are reporting that a role instance is looping between STARTED, INITIALIZING, BUSY, and STOP. Upon investigation, the cloud administrator can see the status changing every few minutes. Which of the following should be done to resolve the issue?. Disable memory swap. Configure service healing. Review the package and configuration file. Reboot the hypervisor.

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?. Increasing the VM swap/paging size. Enabling SR-IOV capability. Adding more vCPU. Upgrading the physical server NICs to support 10Gbps.

A cloud administrator receives an email stating the following: “Clients are receiving emails from our web application with non-encrypted links.” The administrator notices that links generated from the web application are opening in http://. Which of the following should be configured to redirect the traffic to https://?. Load balancer setting. Web server configuration. Programming code. User account access.

A systems administrator strictly followed a CSP’s documentation to federate identity for the company’s users; however, even when using the correct credentials, the users receive an error message indicating their tokens are expired. Which of the following is MOST likely the cause of the error?. MFA was enforced on the CSP. There is a connection issue between the company and the CSP’s networks. The CSP’s documentation is incorrect. The date on the company’s identity server is configured incorrectly.

A cloud administrator is responsible for managing a public cloud environment. The administrator needs to deploy new servers that will be domain controllers to authenticate 500,000 users and computer objects. Which of the following storage types would be BEST to select when deploying the servers to achieve the lowest cost per I/O?. SSD. Flash. Hybrid. SAS.

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs. Which of the following should be verified NEXT?. Network. VM GPU settings. SAN. Application.

A company is comparing an application environment to be hosted on site versus a SaaS model of the same application. Which of the following SaaS-based licensing models should the administrator consider?. Per user. Per instance. Per core. Per socket.

A cloud administrator is performing automated deployment of cloud infrastructure for clients. The administrator notices discrepancies from the baseline in the configuration of infrastructure that was deployed to a new client. Which of the following is MOST likely the cause?. The deployment template was modified. The deployment was done by a different cloud administrator. The deployment user account changed. The deployment was done to a different resource group.

A systems administrator is implementing a new file storage service that has been deployed in the company’s private cloud instance. The key requirement is fast read/write times for the targeted users, and the budget for this project is not a concern. Which of the following storage types should the administrator deploy?. NVMe. SSD. Spinning disks. Hybrid.

A cloud engineer, who manages workloads in a public cloud environment, uses autoscaling to maintain availability of a critical application. During a recent burst in demands, the engineer received the following error alert: LimitedInstanceCapacity - Which of the following is MOST likely cause of the error?. The autoscaling feature does not have permissions to create instances. The cloud account has had rights revoked to create instances. The cloud account has exhausted the number of instances quota. The cloud account has a misconfigured security group.

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly. Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?. Feature compatibility. Estimated consumption. Licensing. Tier pricing.

A non-critical file on a database server was deleted and needs to be recovered. A cloud administrator must use the least disruptive restoration process to retrieve the file, as the database server cannot be stopped during the business day. Which of the following restoration methods would BEST accomplish this goal?. In-place restoration. Revert to snapshot. Restore from image. Alternate location.

A company has entered into a business relationship with another organization and needs to provide access to internal resources through directory services. Which of the following should a systems administrator implement?. SAML. SSH. VPN. SSO.

A SaaS provider wants to maintain maximum availability for its service. Which of the following should be implemented to attain the maximum SLA?. A cold site. A warm site. An active-active site. A hot site.

An organization has decided to implement the following network segregation: The application team is unable to establish connectivity to another server, which has the IP address 10.10.10.180. Which of the following is the MOST likely reason for the issue?. Incorrect routing configuration. Incorrect NIC1 configuration. Incorrect gateway in NIC 1. Incorrect subnet mask in NIC2.

A company that requires full administrative control at the OS level is considering the use of public cloud services. Which of the following service models would BEST fit the company's requirements?. IaaS. PaaS. DBaaS. SaaS.

A systems administrator must ensure confidential company information is not leaked to competitors. Which of the following services will BEST accomplish this goal?. EDR. DLP. CASB. IDS. FIM.

An organization is developing a new online product. The product must: • Minimize organizational infrastructure and comply with security standards. • Minimize organizational compliance efforts. • Focus on application development and increase speed to market. Which of the following should the organization consider, given the requirements listed above?. Deploy compliance linters in the CI/CD pipeline. Harden servers using repeatable compliance templates. Implement automated compliance scanning tools. Use cloud-native serverless services.

A VDI administrator is deploying 512 desktops for remote workers. Which of the following would meet the minimum number of IP addresses needed for the desktops?. /25. /24. /23. /22.

A company plans to publish a new application and must conform with security standards. Which of the following types of testing are MOST important for the systems administrator to run to assure the security and compliance of the application before publishing? (Choose two.). Load testing. Penetration testing. Functional testing. Usability testing. Vulnerability testing. Regression testing.

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?. Autoscaling. Ballooning. Switches. A firewall.

Users currently access SaaS email with five-character passwords that use only letters and numbers. An administrator needs to make access more secure without changing the password policy. Which of the following will provide a more secure way of accessing email at the lowest cost?. Institute certificate-based authentication. Implement SSO for all users. Enable MFA with a one-time password. Change the email service provider.

A startup online gaming company is designing the optimal graphical user experience for multiplayer scenarios. However, online players have reported latency issues. Which of the following should the company configure as a remediation?. Dynamic allocations. Additional CPU cores. Faster clock speed. Additional GPU memory.

Which of the following cloud services is fully managed?. SaaS. IoT. GPU in the cloud. IaaS. Serverless compute.

A company’s website is continuously being brute forced, and its users have reported multiple account intrusions in the last few months. All users are using passwords that are at least 12 characters long. The systems administrator needs to implement a control that will mitigate this issue without negatively affecting the user experience. Which of the following should the administrator implement to achieve the objective?. Increased password length. Progressive login delay. Reduced password complexity. Account lockout.

A company is planning its cloud architecture and wants to use a VPC for each of its three products per environment in two regions, totaling 18 VPCs. The products have interdependencies, consuming services between VPCs. Which of the following should the cloud architect use to connect all the VPCs?. VPN connections. Hub and spoke. MPLS connections. VPC peering.

An organization has a web-server farm. Which of the following solutions should be implemented to obtain efficient distribution of requests to the servers?. Distribution of web servers across different regions and zones. A containerized application. A clustered web server infrastructure. A load-balancing appliance.

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company’s security posture?. MFA. Certificates. Federation. SSH.

A cloud administrator is choosing a backup schedule for a new application platform that creates many small files. The backup process impacts the performance of the application, and backup times should be minimized during weekdays. Which of the following backup types BEST meets the weekday requirements?. Full. Incremental. Differential. Database dump.

A systems administrator is trying to connect to a remote KVM host. The command line appears as follows: After logging in to the remote server, the administrator verifies the daemon is running. Which of the following should the administrator try NEXT?. Ensuring the private key was properly imported. Checking if the SSH password is correct. Running the command with elevated privileges. Opening port 22 on the firewall.

A company is concerned it will run out of VLANs on its private cloud platform in the next couple months, and the product currently offered to customers requires the company to allocate three dedicated, segmented tiers. Which of the following can the company implement to continue adding new customers and to maintain the required level of isolation from other tenants?. IPsec. VXLAN. SR-IOV. GRE.

A cloud solutions architect is working on a private cloud environment in which storage consumption is increasing daily, resulting in high costs. Which of the following can the architect use to provide more space without adding more capacity? (Choose two.). NVMe. Flash optimization. Compression. RAID provisioning. Deduplication. Tiering.

A systems administrator needs to connect the company’s network to a public cloud services provider. Which of the following BEST ensure encryption in transit for data transfers?. Identity federation. A VPN tunnel. A proxy solution. A web application firewall.

A system administrator is troubleshooting issues with audio lag during phone conferences . when looking at the core switch the administrator notices its buffers are consistently full , and packets are being dropped due to the large number being sent and received . there is no room in the budget for new hardware , but it is critical that the audio lag be fixed immediately . which of the following most likely resolve the issue ?. Enable compression fo audio traffic . Add an exception to IPS for voice traffic. Configure QoS rules for VoIP traffic. Verify that the gateway uplink is not saturated.

An environment has a dual-stack infrastructure in an active-active configuration in two separate data centes . Which of the following best describes replication between the two sites?. Data is moved twice a day from site A to site B and then from site B to site A. Data is moved frome one site to the other once per day. Data is replicated every 15 minutes from one site to the other. Data is moved constantly from the hot site to the warm site. Data is synchronized in real time across the sites.

A system administrator wants to be notified every time an application's configuration files are updated. Which of the following should the administrator implement to achieve the objective?. ZFC. DLP. FIM. MAC.

A cloud administrator needs to implement a new system within the current CSP. The system requires a storage service to allocate a large number of digital files and images. The storage service must keep files for distributed access and serve images directly to the user's browser . Which of the following solutions would best meet these requirements ?. Object storage. File Storage. Block Storage. NAS Storage.

A system administrator wants to ensure a system can adjust its resources based on usage. Which of the following will best accomplish this goal ?. Right-sizing. Oversubscription. Autoscaling. Anti-affinity.

A company that performs passive vulnerability scanning at its transit VPS has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the company use to verify if this is true positive with the least effort and cost ? (Choose two.). A network-based scan. A credentialed scan. A blue-team exercise. A port scan. An agent-based scan. Unknown environment penetration testing. A red-team exercise.

During a security incident on an IaaS platform , which of the following actions will a system adminsitrator most likely take as part of the containment procedure ?. Add a deny rule to the network ACL. Connect to an instance for triage. Mirror the traffic to perform a traffic capture. Perform a memory acquistion.

The web firewall is blocking legitimate traffic. Autoscaling events are too high. The web servers are not responding properly. The CDN should not be used during high loads.

A company is using a method of tests and upgrades in which a small set of end users are explosed to new services before the majority of other users . Which of the following deployment methods is being used ?. Blue-Green. Rolling. Canary. Big Bang.

A company would like to move all its on-premises platforms to the cloud . The company has enough skilled Linux and web-server engineers but only a couple of skilled database administrators. It also has little expertise in managing email services. Which of the following solutions would best match the skill sets of avaliable personnel ?. Run the web servers in PaaS , and run the databases and email in SaaS. Run the web servers in IaaS , the databses in Paas , and the email in SaaS. Run the web servers , databasees, and email in SaaS. Run the web servers , databasees, and email in Iaas.

A system administrator recently deployed a VDI solution in a cloud environment ; howevers ,users are now experiencing poor rendering performance when trying to display 3D content on their virtual desktops , especially at peak times . Which of the following actions will most likey solve this issue ?. Select vGPU profiles with higher video RAM. Instruct users to acces virtual workstations only one the LAN. Add more vGPU licenses to the host. Update the guest graphics drivers from the official repository.

A small marketing company recently moved all of its storage to a cloud provider . The budget for storage has limited the ocmpany to buying a small amount of SSD storage and a lot of spinning disks . The storage administraotr needs to find a way to optimize this environment to realize maximum speed . Which of the following would best achieve this ?. Autoscaling. Automated storage tiering. Deduplication. Compression.

A public cloud administrator need to implement a mechanism to monitor the expense of the company's cloud resources . Which of the following options will allow the administrator to execute this task fastest way and with minimal effort?. Implement a financial tool to monitor cloud resource expenses. Set up dail expense reports with the cloud provider. Use the API to collect expense information from cloud resources. Enable custom notification for exceeding budged thresholds.

A company's website development team made some code changes to impement a new feature . The development team published the changes via a code pipeline and verified that the feature is in the development environment. However the testing team is unable to see the new feature when executing the test plan . Which of the following steps should the cloud adminsitrator take first to identify the cause of the issure ?. Update the policies on the CASB to allow access to the test environment. Confirm that the deployment has been completed in the QA environment. Roll back the development pipeline to revert and reapply the changes. Switch the application load balancer to use the blue environment.

A cloud engineer needs to perform a database migration. The database has a restricted SLA and cannot be offline for more than ten minutes per month . The database stores 800 GB of data , and the network brandwidth to the CSP is 100MBps . Which of the following is the best option to perform the migration ?. Use the database import/export method and copy the exported file. Utilize a third-party tool to back up and restore the data to the new database. Create a replica database synchronize the data , and the switch to the new instance. Copy the databse to an external device and ship the device to the CSP.

A systems administrator is planning to migrate to a cloud solution with volume-based licensing . Which of the following is most important when considering licensing costs ?. The number of machines. The number of sockets. The number of cores. The number of threads.

Connectivity from APAC to all regions Connectivity from Americas to all regions. Connectivity from APAC to APAC regions Connectivity from APAC to EMEA and US - North. Connectivity from EMEA to all regions Connectivity from APAC to APAC and EMEA regions. Connectivity from APAC to EMEA and Americas regions Connectivity from Emea to all regions.

A system administrator notices the host filesystem is running out of storage space. Which of the following reduce the storage space on the system ?. Deduplication. Compression. Thin provisioning. Adaptive optimization.

A cloud architect is receiving complaints from VDI users ovverseas about slowness even though the remote office has Gigabit Internet . which of the following will most likely solve the issue ?. Adding redundancy. Enabling compression. Lowering latency. Increasing bandwidth.

A systems administrator is deploying a new version of a website . The website is deployed in the cloud using a VM cluster. The administrator must then deploy the new version into one VM first. After a period of time , if there are no issues detected , a second VM will be updated. This process must continue until all the VMs are updated. Which of the following upgrade methods is being implemented ?. Rolling. Blue-green. Staging. Canary.

An organization hosts an ERP database in on-premises infrastructure . A recommendation has been made to migrate the ERP solution to reduce operational overhead in the maintenance of the data center. Which of the following should be considered when migrating this on-premises database to DBaaS ?. Database total user count Database total number of tables Database total number of storage procedures. Database application version compatibility Database IOPS values Database storage utilization. Physical database server CPU cache value Physical database server DAS type Physical database server network I/O. Physical database server operating system Physical database server memory configuration Physical database server CPU frequency.

A corporate jump server located in he public cloud was terminated overnight because the underlying hardware failed. Next morning developers were unable to reach environments . Which of the following is the best way to remediate the issue ?. Provisioning and configuring a new jump server via a cloud console. Configuring autoscaling with a minimum number of jump servers set to one. Setting up a virtual load balancer in front of a jump server. Recommending developers use their laptops for development.

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled ? ( choose two ) . LDAP. Telnet. DHCP. DNS. Remote login. FTP.

A company has a web application running in an on-premises environment that needs to be migrated to the cloud . The company wantes to implement a solution that maximizes scalability , avalibity and security , while requrining no infrastructure administration. Which of the following services would be best to meet this goal ?. A hybrid solution. A SaaS solution. A Paas solution. An IaaS solution.

Migrating the database to be on premises. Forbidding the use of API calls to retrieve data. Rotating the account credentials. Implementing a new database service account.

A system administrator needs to integrate authentication with a partner so t he employees of two companies can access the environment with control and management. Which of the following configuration types should the administrator execute in the authentication system ?. Federation Services. Key management. Single sign-on. Multifactor authentication.

Acloud engineer has deployed a virtual storage appliance into a public cloud environment . The storage sappliance has a NAT to a public IP address. An administrator later notices there are some strange files on the storage appliance and a large spike in network traffic on the machine . Which of the following is the most likely cuase ?. The default password is still configured on the appliance. Data encryption is enabled , and the files are hashed. The storage appliance has no firewall. The appliance's certificate has expired.

A systems administrator has a redundant backup system in place. Which of the following should the systems administrator perform to maintain efficient operation and comply with the global standard in the corporate backup policies ?. Modify RTO policies. Test the backups. Confirm completion of the backups. Modify RPO policies.

An organization's executives would like to allow access to devices that meet the corporate security compliance levels. Which of the following criteria are most important the organization to consider ? ( choose two). Firmware. Serial Number. Antivirus version and definition. CPU architecture. OS patch level. Manufacturer.

A systems administrator is implementing a new version of a company's primary human-resources application. An upgrade will be performed on the productuion server , as there is no development environment . The administrator needs to have a plan in case something goes wrong with the upgrade . Which of the following will work best to ensure a quick rollback in case an issue arises?. An application-level backup. A differential backup. A full backup. A production snapshot.

A web application server farm has the following configuration : - 16vCPU - 128GB of memory - 512GB of local storage The performance-testing team reports the web application farm is unable to process requests beyound 5,000 concurrent connections. Which of the following should be performed ?. Review the memory capacity parameters in the web server. Restart and redeploy the application. Restart the performance-testing tool. Review the application configuration.

A systems administrator is attempting to gather information about services and resource utilization on VMs in a cloud environment. Which of the following will best accomplish this objective ?. CMDB. Service management. Syslog. Performance monitoring. SNMP.

Which of the following design factors would an MSP use to build cloud service offerings ?. Private. Public. Multitenancy. Community.

A cloud administrator needs to reduce storage costs. Which of the following would best help the administrator reach that goal ?. Using containers. Enabling compression. Rightsizing in VMs. Implementing deduplication.

A web consultancy group currently works in an isolated development environment . The group uses this environment for the creation of the final solution but also for showcasing it to costumers . Recently customers of newly commissioned sites have reported they are not receiving the final product shown by the group and the website is performing in unexpected ways . Which of the followin additional environments should the group adopt and include in its process?. Require each customer to have a blue-green environment. Provide each web consultant a local environment on their device. Initiate a disaster recovery environment to fail to in the event of reported issues. Leverage a staging environment that is tightly controlled for showcasing .

A cloud solutions architect has an environment that must only be accessed during work hours . which of the following processes should be automated to best reduce cost?. Implementing access control after work hours. Scaling of the environment after work hours. Blocking external access t the environment after work hours. Shutting down the environment after work hours.

A cloud administrator has received a physical disk that was analyzed by the incident response team . Which of the following documents should the cloud administrator update ?. Incident taxonomy. Risk register. Incident playbook. Chain of custody.

A new development team requires workstations hosted in a PaaS to develop a new website . Members of the team also require remote access to the workstations using their corporate email addresses . Which of the following solutions will best meet these requirements ? ( choose two ) . Deploy new virtual machines. Configure email account replication. Migrate local VHD workstations. Implement VDI solution. Integrate Identity services. Create a new directory service.

Incorrect cluster IP. Incorrect IP route. Offline cluster node. Incorrent DNS entry. Incorrect proxy entry.

The human resources department was charged for a cloud service that belongs to another department. All other cloud costs seem to be correct. Which of the following is the most likely cause for this errorr?. Misconfigured templates. Misconfigured chargeback. Misconfigured tags. Incorrect security groups.

A systems administrator wants to ensure a system can adjust its resources based on usage . Which of the following will best accomplish this goal ?. Autoscaling. Oversubscription. Right-sizing. Anti-affinity.

A systems administrator deplyed a new web application in a public cloud and would like to test it but the company network firewall is onl allowing outside connections to the cloud provider network using TCP port 22. While waiting for the network administrator to open the required ports which of the following actions should the systems administrator take to test the new application ( choose two ). Open a browser using the localhost IP address. Create a GRE tunnel. Open a browser using the default gateway IP address. Create an IPSec tunnel. Create a SSH tunnel. Create a VPN tunnel.

Open port 21 access for 0.0.0.0/0 CIDR. Open port 21 access for the computer's public IP address. Open port 22 access for 0.0.0.0/0 CIDR. Open port 22 access for computer's public IP address. Fix the permissions with read-only access to the owner of the file. Fix the file permissions with execute permissions to the owner of the file.

A corporate jump server located in the public cloud was terminated overnight because the underlying hardware failed . The next morning developers were unable to reach environments . Which of the following is the best way to remediate the issue ?. Provisionin and configuring a new jump server via a cloud console. Setting up a virtual load balancer in front of a jump server. Recommending developers use their laptops for development. Configuring autoscaling with a minimum number of jjump servers set to one.

A systems administrator is implementing a file storage solution that stores files using integrity verification . Which of the followin algorithms is most resistant to collisions ?. RIPEMD-160. CRC32. MD5. SHA-2.

A company has a large environment with multiple VPCs across three regions in a public cloud . The company is concerned about connectivity within the regions . Which of the following should the cloud administrator implement?. Network access control. A firewall. A load balance. Peering.

A development team needs to be able to make frequent code changes and fix bugs without maintaining the OS laer ? Which of the following cloud models meets the team's requirements?. DBaaS. IaaS. SaaS. PaaS.

A systems administrator is planning to deploy a database cluster in a virtualization environment. The administrator needs to ensure the database nodes do nto exist on the same physical host . Which of the following would best meet this requirement ?. A seperate cluster. Oversubscription. Anti-affinity. A firewall.

The chief information officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud . The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information . Which of the following should be configure during the migration ?. VDI. P2V. ACL. VPN.

Allocate more RAM in the VM template. Configure the GPU to run in compute mode. Configure the GPU to run in graphics mode. Select a higher vGPU profile.

A technician deployed a VM with NL-SAS storage to host a critical application . Two weeks later , users have begun to report high application latency. Which of the followin is the best action to correct the latency issue ?. Migrate the data to SAS storage. Increase the CPU of the VM. Migrate the data to flash storage. Increase the capacity of the data storage.

A systems adminsitrator is deploying a new storage array for backups . The array provides 1 PB of raw disk space and uses 14 TB nearline SAS drives . The solution must tolerate at least two failed drives in a single RAID set . Which of the following RAID levels satisfies this requirement?. RAID 0. RAID 1. RAID 6. RAID 10. RAID 5.

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment ?. The regional area. Lower costs. Scalability. Cloud bursting.

Report abuse