option
Questions
ayuda
daypo
search.php

ERASED TEST, YOU MAY BE INTERESTED ON Cloud+ B

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Cloud+ B

Description:
CompTia Cloud+

Author:
TheShed
Other tests from this author

Creation Date: 25/07/2024

Category: Computers

Number of questions: 70
Share the Test:
New CommentNuevo Comentario
No comments about this test.
Content:
A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations. Which of the following should the administrator implement to ensure DLP efficiency prevents the exposure of sensitive data in a cloud environment? Integrity Versioning Classification Segmentation.
Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue? Perform a memory dump of the OS. Analyze the memory dump. Upgrade the host CPU to a higher clock speed CPU. Perform a packet capture during authentication. Validate the load-balancing configuration. Analyze the network throughput of the load balancer. Analyze the storage system IOPS. Increase the storage system capacity. Replace the storage system disks to SSD. Evaluate the OS ACLs. Upgrade the router firmware. Increase the memory on the router.
A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance. Which of the following licensing models is the application MOST likely using? Per device Per user Core-based Volume-based.
A company is currently running a website on site. However, because of a business requirement to reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the company is considering operating in a hybrid environment. The website uses mostly static files and a small relational database. Which of the following should the cloud architect implement to achieve the objective at the LOWEST cost possible? Implement a load-balanced environment in the cloud that is equivalent to the current on-premises setup and use DNS to shift the load from on premises to cloud. Implement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is down. Restore the data from the backups Implement a website replica in the cloud with auto-scaling using the smallest possible footprint. Use DNS to shift the load from on premises to the cloud. Implement a CDN that caches all requests with a higher TTL and deploy the IaaS instances manually in case of disaster. Upload the backup on demand to the cloud to restore on the new instances.
After analyzing a web server's log, a systems administrator sees that users are connecting to the company's application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message. Which of the following should the administrator verify NEXT? The TLS certificate The firewall rules The concurrent connection limit The folder permissions.
A company needs to access the cloud administration console using its corporate identity. Which of the following actions would MOST likely meet the requirements? Implement SSH key-based authentication. Implement cloud authentication with local LDAP. Implement multifactor authentication. Implement client-based certificate authentication.
A cloud administrator is planning to migrate a globally accessed application to the cloud. Which of the following should the cloud administrator implement to BEST reduce latency for all users? Region Auto-scaling Clustering Clode bursting.
A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution? Internet of Things Digital transformation Artificial intelligence DNS over TLS.
An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective? Deploy web servers into an IaaS provider. Implement a cloud-based VDI solution. Provision web servers in a container environment. Use PaaS components in the cloud to implement the product.
IaaS provides the most suitable option for managing the OS while hosting an external website, as it offers the necessary control and flexibility for the systems administrator. Open-source LTS Canary Beta Stable.
A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective? 22, 53, 445 22, 443, 445 25, 123, 443 137, 139, 445.
A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols should the company use? (Choose two.) CIFS FTP iSCSI RAID 10 NFS FC.
A cloud administrator is working in a secure government environment. The administrator needs to implement corrective action due to recently identified security issue on the OS of a VM that is running a facility-management application in a cloud environment. The administrator needs to consult the application vendor, so it might take some time to resolve the issue. Which of the following is the FIRST action the administrator should take while working on the resolution? Shut down the server. Upgrade the OS Update the risk register. Raise a problem ticket.
A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements? Virtual machines Software as a service Serverless computing Containers.
A cloud administrator wants to have a central repository for all the logs in the company's private cloud. Which of the following should be implemented to BEST meet this requirement? SNMP Log scrubbing CMDB A syslog server.
A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections. Which of the following MOST likely needs to be analyzed before rehosting the ERP? Software Licensing Right-sizing The network.
An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would be MOST useful to accomplish this task? VLAN NIPS WAF NAC.
An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort. Which of the following ports needs to be opened to fulfill this requirement? 53 67 123 161.
A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows: Which of the following actions should the analyst take to accomplish the objective? Remove rules 1, 2, and 5. Remove rules 1, 3, and 4. Remove rules 2, 3, and 4. Remove rules 3, 4, and 5.
Which of the following definitions of serverless computing BEST explains how it is different from using VMs? Serverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP. Serverless computing uses predictable billing and offers lower costs than VM compute services. Serverless computing is a scalable, highly available cloud service that uses SDN technologies. Serverless computing allows developers to focus on writing code and organizations to focus on business.
A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.) Install TLS certificates on the server. Forward port 80 traffic to port 443. Disable TLS 1.0/1.1 and SSL. Disable password authentication. Enable SSH key access only Provision the server in a separate VPC. Disable the superuser/administrator account. Restrict access on port 22 to the IP address of the administrator's workstation.
A technician needs to deploy two virtual machines in preparation for the configuration of a financial application next week. Which of the following cloud deployment models should the technician use? XaaS IaaS Paas SaaS.
A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements: * No downtime * Instant switch to a new version using traffic control for all users Which of the following deployment strategies would be the BEST solution? Hot site Blue-green Canary Rolling.
A cloud security analyst is implementing a vulnerability scan of the web server in the DMZ, which is running in an IaaS compute instance. The default inbound firewall settings are as follows: Which of the following will provide the analyst with the MOST accurate report? An agent-based scan A network vulnerability scan A default and common credentialed scan A network credentialed vulnerability scan.
A systems administrator needs to configure SSO authentication in a hybrid cloud environment. Which of the following is the BEST technique to use? Access controls Federation Multifactor authentication Certificate authentication.
A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal? A service availability scan An agent-based vulnerability scan A default and common credentialed scan A network port scan.
An administrator has been informed that some requests are taking a longer time to respond than other requests of the same type. The cloud consumer is using multiple network service providers and is performing link load balancing for bandwidth aggregation. Which of the following commands will help the administrator understand the possible latency issues? ping ipconfig traceroute netstat.
A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies. Which of the following cloud service subscription types would BEST meet these requirements? PaaS SaaS DBaaS IaaS.
A systems administrator notices that a piece of networking equipment is about to reach its end of support. Which of the following actions should the administrator recommend? Update the firmware. Migrate the equipment to the cloud. Update the OS. Replace the equipment.
All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST? Peer all the networks from each cloud environment. Migrate the servers. Create a VPN tunnel. Configure network access control lists.
A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command, and notices the following relevant output: Which of the following actions should the cloud administrator take to resolve the issue? Assign a new IP address of 192.168.100.10 to the web server. Modify the firewall on 72.135.10.100 to allow only UDP. Configure the WAF to filter requests from 17.3.130.3 Update the gateway on the web server to use 72.135.10.1.
A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure? Incorrect encryption ciphers Broken trust relationship Invalid certificates Expired password.
A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other. Which of the following should an administrator perform to comply with the security requirement? ✑ Create separate virtual networks for production, QA, and development servers. ✑ Move the servers to the appropriate virtual network. ✑ Apply a network security group to each virtual network that denies all traffic except for the firewal ✑ Create separate network security groups for production, QA, and development servers. ✑ Apply the network security groups on the appropriate production, QA, and development servers. ✑ Peer the networks together. ✑ Create separate virtual networks for production, QA, and development servers. ✑ Move the servers to the appropriate virtual network. ✑ Peer the networks together. ✑ Create separate network security groups for production, QA, and development servers. ✑ Peer the networks together. ✑ Create static routes for each network to the firewall.
A cloud administrator is upgrading a cloud environment and needs to update the automation script to use a new feature from the cloud provider. After executing the script, the deployment fails. Which of the following is the MOST likely cause? API incompatibility Location changes Account permissions Network failure.
Due to a policy change, a few of a customer's application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%. Which of the following is the MOST likely cause? There is not enough vCPU assigned. The application is not compatible with the new settings. The new configuration is adding latency. The memory of the VM is underallocated.
A systems administrator wants to ensure two VMs remain together on the same host. Which of the following must be set up to enable this functionality? Affinity Zones Regions A cluster.
An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement? Implement CDN for overall cloud application. Implement auto-scaling of the compute resources. Implement SR-IOV on the server instances. Implement an application container solution.
A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content. Which of the following solutions will assist with the increased workload? DoH WAF IPS CDN.
A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution. Which of the following will provide the data to measure business continuity? (Choose two.) A service-level agreement Automation scripts Playbooks A network diagram A backup and restore A recovery time objective.
A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM? CDN DNS NTP IPAM.
A SAN that holds VM files is running out of storage space. Which of the following will BEST increase the amount of effective storage on the SAN? Enable encryption. Increase IOPS. Convert the SAN from RAID 50 to RAID 60. Configure deduplication.
A system administrator supports an application in the cloud, which includes a restful API that receives an encrypted message that is passed to a calculator system. The administrator needs to ensure the proper function of the API using a new automation tool. Which of the following techniques would be BEST for the administrator to use to accomplish this requirement? Functional testing Performance testing Integration testing Unit testing .
An organization will be deploying a web application in a public cloud with two web servers, two database servers, and a load balancer that is accessible over a single public IP. Taking into account the gateway for this subnet and the potential to add two more web servers, which of the following will meet the minimum IP requirement? 192.168.1.0/26 192.168.1.0/27 192.168.1.0/28 192.168.1.0/29 .
A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario? Alternate location Rolling Storage live migration In-place.
After a few new web servers were deployed, the storage team began receiving incidents in their queue about the web servers. The storage administrator wants to verify the incident tickets that should have gone to the web server team. Which of the following is the MOST likely cause ofthe issue? Incorrect assignment group in service management Incorrect IP address configuration Incorrect syslog configuration on the web servers Incorrect SNMP settings.
A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low- latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements? SR-IOV GENEVE SDN VLAN.
An organization is hosting a DNS domain with private and public IP ranges. Which of the following should be implemented to achieve ease of management? Network peering A CDN solution A SDN solution An IPAM solution.
A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.) The fabric interconnects The virtual appliances The firmware The virtual machines The baselines The operating system.
A SAN that holds VM files is running out of storage space. Which of the following will BEST increase the amount of effective storage on the SAN? Enable encryption. Increase IOPS. Convert the SAN from RAID 50 to RAID 60. Configure deduplication.
Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud? Deploy a new instance using a known-good base image. Configure a firewall rule to block the traffic on the affected instance. Perform a forensic analysis of the affected instance. Conduct a tabletop exercise involving developers and systems administrators.
A systems administrator has migrated a web application to the cloud with a synchronous uplink speed of 100Mbps. After the migration, the administrator receives reports of slow connectivity to the web application. The administrator logs into the firewall and notices the WAN port is transmitting at a constant 12.5MBps. Which of the following BEST explains the reason for the issue? Misconfigured subnetting Insufficient compute Firewall issues Not enough upload bandwidth.
A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue? Check the FAQ section of the vendor's documentation. Ask the user if the client device or access location has changed. Reboot the user's virtual desktop. Request permission to log in to the device remotely.
A systems administrator is examining a managed hosting agreement and wants to determine how much data would be lost if a server had to be restored from backups. To which of the following metrics should the administrator refer? RTO MTBF RPO MTTR.
A systems administrator for an e-commerce company will be migrating the company's main website to a cloud provider. The principal requirement is that the website must be highly available. Which of the following will BEST address this requirement? Vertical scaling A server cluster Redudant switches A next-generation firewall.
A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these. CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying the. CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue? Modify the deployment script to delete and recreate the database whenever the CMS application is deployed. Modify the ACL to allow the staging environment to access the database in the sandbox environment. Modify the CMS application deployment to use the previous version and redeploy the application. Modify the configuration settings of the CMS application to connect to the database in the current environment.
A cloud administrator is responsible for managing a cloud-based content management solution. According to the security policy, any data that is hosted in the cloud must be protected against data exfiltration. Which of the following solutions should the administrator implement? HIDS FIM DLP WAF.
Lateral-moving malware has infected the server infrastructure. Which of the following network changes would MOST effectively prevent lateral movement in the future? Implement DNSSEC in all DNS servers. Segment the physical network using a VLAN. Implement microsegmentation on the network. Implement 802.1X in the network infrastructure.
A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook? Use the server's root credentials. Hard-code the password within the playbook. Create a service account on the server. Use the administrator's SSO credentials.
Which of the following should be considered for capacity planning? Requirements, licensing, and trend analysis Laws and regulations Regions, clusters, and containers Hypervisors and scalability.
A cloud administrator is setting up a new coworker for API access to a public cloud environment. The administrator creates a new user and gives the coworker access to a collection of automation scripts. When the coworker attempts to use a deployment script, a 403 error is returned. Which of the following is the MOST likely cause of the error? Connectivity to the public cloud is down. User permissions are not correct. The script has a configuration error. Oversubscription limits have been exceeded.
A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue? Upgrade the virtual database server. Move the virtual machine to flash storage and test again. Check if other machines on the same storage are having issues. Document the findings and place them in a shared knowledge base.
In an existing IaaS instance, it is required to deploy a single application that has different versions. Which of the following should be recommended to meet this requirement? Deploy using containers. Install a Type 2 hypervisor. Enable SR-IOV on the host. Create snapshots.
An organization is using multiple SaaS-based business applications, and the systems administrator is unable to monitor and control the use of these subscriptions. The administrator needs to implement a solution that will help the organization apply security policies and monitor each individual SaaS subscription. Which of the following should be deployed to achieve these requirements? DLP CASB IPS HIDS.
A cloud administrator needs to reduce the cost of cloud services by using the company's off-peak period. Which of the following would be the BEST way to achieve this with minimal effort? Create a separate subscription. Create tags. Create an auto-shutdown group. Create an auto-scaling group.
A media company has made the decision to migrate a physical, internal file server to the cloud and use a web-based interface to access and manage the files. The users must be able to use their current corporate logins. Which of the following is the MOST efficient way to achieve this goal? Deploy a VM in a cloud, attach storage, and copy the files across. Use a SaaS service with a directory service federation. Deploy a fileshare in a public cloud and copy the files across. Copy the files to the object storage location in a public cloud.
A systems administrator is configuring a storage array. Which of the following should the administrator configure to set up mirroring on this array? RAID 0 RAID 1 RAID 5 RAID 6.
A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting Network latency Network connectivity Network switch Network peering.
A systems administrator adds servers to a round-robin, load-balanced pool, and then starts receiving reports of the website being intermittently unavailable. Which of the following is the MOST likely cause of the issue? The network is being saturated. The load balancer is being overwhelmed. New web nodes are not operational. The API version is incompatible. There are time synchronization issues.
A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site. Which of the following should be configured in between the cloud environment and the DR site? Fallback Playbook Zoning Replication.
A cloud administrator is building a new VM for a network security appliance. The security appliance installer says the CPU clock speed does not meet the requirements. Which of the following will MOST likely solve the issue? Move the VM to a host with a faster CPU. Add more vCPUs to the VM. Enable CPU masking on the VM. Enable hyperthreading on the virtual host.
Report abuse