701 Master
A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations. Which of the following actions should the cloud administrator take FIRST? Configure the network Perform a failback Initiate a failover Restore backups
B
A Chief Information Security Officer (CISO) is evaluating the company's security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements? A risk register An SLA document A DR plan SOC procedures
A
A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier. Which of the following access control rules should be changed? Role-based Attribute-based Mandatory-based Discretionary-based
A
A cloud administrator recently noticed that a number of files stored at a SaaS provider's file-sharing service were deleted. As part of the root cause analysis, the administrator noticed the parent folder permissions were modified last week. The administrator then used a test user account and determined the permissions on the files allowed everyone to have write access. Which of the following is the best step for the administrator to take NEXT? Define and configure the proper permissions for the file-sharing service Acquire a third-party DLP solution to implement and manage access Test the current access permissions to the file-sharing service Identify the changes to the file-sharing service and document
A
A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the only group allowed to modify files in the directory. Which of the following will accomplish the desired objective? Restrict the file write permissions to the development group only. Add access to the fileshare for the systems administrator's group. Remove the file write permissions for the application service account. Deny access to all development user accounts
A
A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections. Which of the following MOST likely needs to be analyzed before rehosting the ERP? Licensing Software Right-sizing The network
A
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider's environment that do not belong to the company. Which of the following BEST describes this attack? VM escape Directory traversal Buffer overflow Heap spraying
A
A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution. Which of the following will provide the data to measure business continuity? (Choose two.) A service-level agreement & A recovery time objective Playbooks & A recovery time objective Automation scripts A backup and restore & A network diagram
A
A systems administrator for an e-commerce company will be migrating the company's main website to a cloud provider. The principal requirement is that the website must be highly available. Which of the following will BEST address this requirement? A server cluster A next-generation firewall Redundant switches Vertical scaling
A
A systems administrator in a large enterprise needs to alter the configuration of one of the finance department's database servers. Which of the following should the administrator perform FIRST? Change management Backups Capacity planning Patching
A
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host. This is an example of: hyperconverged storage a storage area network a network file system thick-provisioned disks
A
A systems administrator is provisioning VMs in a cloud environment and has been told to select an OS build with the furthest end-of-life date. Which of the following OS builds would be BEST for the systems administrator to use? LTS Beta Open-source Canary Stable
A
A systems administrator would like to reduce the network delay between two servers. Which of the following will reduce the network delay without taxing other system resources? Decrease the MTU size on both servers Enable compression between the servers Configure a VPN tunnel between the servers Adjust the CPU resources on both servers
A
Alan is a systems administrator working in a corporate data center, and he has been tasked with hiding storage resources from a server that does not need access to the storage device hosting the storage resources. What can Alan configure on the storage controller to accomplish this task? LUN masking Zoning Port masking VLANs
A
An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations. Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers? DDoS protection Solutions to perform NAC and DLP QoS on the network A solution to achieve microsegmentation
A
An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources. Which of the following GPU configurations will be the MOST optimal for virtualizing this environment? Shared vGPU Dedicated Passthrough
A
An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations. Which of the following is the MOST efficient way to bring the block storage in the primary datacenter up to date with the DR site? Set up replication. Restore full backups. Restore incremental backups. Copy the data across both sites.
A
The system administrator has been pinging a new web server by its URL and getting strange and seemingly unexplainable responses from unrecognized systems. She recalls that the new web farm is on a reclaimed subnet that was no longer in use in their cloud server fleet. What would you recommend she investigate to resolve the issue? DNS Stale network access control lists Orphaned services DHCP
A
To make sure that all users are allowed to access only approved resources, the cloud administrator is auditing public cloud identity systems. The cloud administrator wants to control specific access and operations. What is the cloud administrator defining? Resource access definitions Federated access User permissions Access control lists
A
To meet regulatory requirements, the system administrator must store customer transaction records for seven years. The data will most likely never be accessed after the second year and can be stored offline if possible to reduce storage costs. What type of storage operation should be implemented to achieve this goal? Archive Replication Data store File transfer
A
Two cloud engineer are working together to combine two like systems into one. What type of activity would necessitate this? (Choose two.) Merger & Acquisition Divestiture HIPAA SARBOX Bursting
A
What RAID level would be used for a database file that requires minimum write requests to the database, a large amount of read requests to the database, and fault tolerance for the database? RAID 5 RAID 1 RAID 10 RAID 0
A
Which of the following service models would be used for a database in the cloud? PaaS CaaS IaaS SaaS
A
Which of the following would be considered an example of IaaS? Providing hardware resources over the Internet A multiuser program that is hosted by a third party A database that is hosted in the cloud Providing productivity software for use over the Internet
A
Which term is used to define the increasing number of services delivered over the Internet? XaaS C-MaaS CaaS MaaS
A
A company has decided to get multiple compliance and security certifications for its public cloud environment. However, the company has few staff members to handle the extra workload, and it has limited knowledge of the current infrastructure. Which of the following will help the company meet the compliance requirements as quickly as possible? FIM DLP CASB NAC
B
A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements. Which of the following solutions will be BEST to help the administrator achieve the requirements? Infrastructure as code Containers Virtual machines Desktop virtualization
B
A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible. Which of the following is the MOST important consideration to ensure a seamless migration? The I/O of the storage Feature compatibility Network utilization The cost of the environment
B
A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities. Which of the following testing techniques would be BEST to use? Usability testing Regression testing Vulnerability testing Penetration testing
B
A VDI administrator has received reports of poor application performance. Which of the following should the administrator troubleshoot FIRST? Container resources Server resources Client devices The network environment
B
A cloud administrator is designing a multiregion network within an IaaS provider. The business requirements for configuring the network are as follows: -- Use private networking in and between the multisites for data replication. -- Use low latency to avoid performance issues. Which of the following solutions should the network administrator use within the IaaS provider to connect multiregions? Gateways Peering VPN Hub and spoke
B
A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST? SAN power Switch power Server power Rack power
B
A company recently subscribed to a SaaS collaboration service for its business users. The company also has an on-premises collaboration solution and would like users to have a seamless experience regardless of the collaboration solution being used. Which of the following should the administrator implement? WAF SSO VDI LDAP
B
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement? Regression testing Vulnerability testing Performance testing Penetration testing
B
A marketing team is using a SaaS-based service to send emails to large groups of potential customers. The internally managed CRM system is configured to generate a list of target customers automatically on a weekly basis, and then use that list to send emails to each customer as part of a marketing campaign. Last week, the first email campaign sent emails successfully to 3,000 potential customers. This week, the email campaign attempted to send out 50,000 emails, but only 10,000 were sent. Which of the following is the MOST likely reason for not sending all the emails? Bandwidth limitation API request limit Incorrect billing account Misconfigured auto-scaling
B
A software development manager is looking for a solution that will allow a team of developers to work in isolated environments that can be spun up and torn down quickly. Which of the following is the MOST appropriate solution? File subscriptions Containers Software-defined storage Ballooning
B
A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the browsers are able to load the application home page. Which of the following is the MOST likely cause of the issue? A. The local firewall from older browsers is not allowing inbound connections B. The cloud web server is using strong ciphers that are not supported by older browsers C. The local firewall from older browsers is not allowing outbound connections D. The cloud web server is using a self-signed certificate that is not supported by older browsers
B
A systems administrator is configuring a storage array. Which of the following should the administrator configure to set up mirroring on this array? RAID 6 RAID 1 RAID 5 RAID 0
B
A systems administrator is using VMs to deploy a new solution that contains a number of application VMs. Which of the following would provide high availability to the application environment in case of hypervisor failure? Affinity rules Anti-affinity rules Cold migration Live migration
B
A systems administrator needs to configure SSO authentication in a hybrid cloud environment. Which of the following is the BEST technique to use? Certificate authentication Federation Multifactor authentication Access controls
B
A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task. Which of the following ports should the administrator open on the monitoring server's firewall? 123 161 139 53
B
A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance. Which of the following licensing models is the application MOST likely using? Per device Core-based Volume-based Per user
B
A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed. Which of the following actions will make the server fully operational? Restart the RAID resynchronization process Restore the server from backup Swap the failed hard drive with a fresh one Perform a P2V migration of the server
B
A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible. Which of the following will BEST achieve this goal? Increase instructions per cycle Oversubscribe CPU resources Enable simultaneous multithreading Switch from a Type 1 to a Type 2 hypervisor Configure CPU passthrough
B
A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet. Which of the following should the systems administrator implement to achieve this objective? DLP Network flows A stateful firewall DNSSEC
B
An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation: -- Production traffic (10.10.0.0/24)-- Network backup (10.20.0.0/25)-- Virtual IP network (10.20.0.128/25) The following configuration exists on the server: The backup administrator observes that the weekly backup is failing for this server. Which of the following commands should the administrator run to identify the issue? IPCONFIG /ALL ROUTE PRINT NET SM NETSTAT -A
B
The system administrator has noticed a slowdown in the response times of his SQL database and has been tasked to investigate the root cause of the delays. The administrator has decided to configure monitoring application to gather additional data on what may be the cause of the delays. What are some of the objects should be recommended to collect data on? (Choose three.) Machine image Network packet drops & Read replica I/O & CPU SLA Load balancer latency
B
Which of the following cloud deployment models allows a company to have full control over its IT infrastructure? Hybrid Private Cloud within a cloud Public
B
Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations? Implement whole-disk encryption Implement mandatory access control Deploy an anti-malware solution Deploy the latest OS patches
B
You company's primary application is critical to the power generation industry and must be highly available. When critical patches need to be installed, downtime is not an option that your customers can tolerate. You have designed a web architecture to take this into account and that allows you to have an exact copy of your production fleet that can be brought online to replace your existing deployment for patching and maintenance. What type of model did you implement? Rolling Blue-green DevOps Cluster
B
An administrator is performing an in-place upgrade on a guest VM operating system. Which of the following can be performed as a quick method to roll back to an earlier state, if necessary? A configuration file backup A differential backup A VM-level snapshot A full backup of the database
C
An organization is hosting a DNS domain with private and public IP ranges. Which of the following should be implemented to achieve ease of management? A CDN solution Network peering An IPAM solution A SDN solution
C
Due to a policy change, a few of a customer's application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%. Which of the following is the MOST likely cause? The application is not compatible with the new settings The memory of the VM is underallocated The new configuration is adding latency There is not enough vCPU assigned
C
A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information: -- The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.-- The cloud management console does not show an IP address for that server.-- A DNS lookup shows the hostname resolves to an IP address.-- The server is a member of the same security group as the others.-- The cloud administrator is able to log in remotely to the other servers without issue. Which of the following is the MOST likely cause of the server being unavailable? The ACL policy for the server was updated as part of the server reboot, preventing login access. The update caused an increase in the output to the logs, and the server is too busy to respond. The network driver updates did not apply successfully, and the interface is in a down state. The server was assigned a new IP address, and DNS entry for the server name was not updated.
C
A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies. Which of the following cloud service subscription types would BEST meet these requirements? DBaaS PaaS IaaS SaaS
C
A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior. Which of the following is MOST likely the cause? Invalid API request Depleted network bandwidth API provider rate limiting Invalid API token
C
A small clinic is moving its health and accounting systems to a SaaS solution. The clinic holds patient- and business-sensitive information. Which of the following is the company expected to do to protect its data? Harden the underlying infrastructure: servers, firewalls, and load balancers. Disable and document unneeded ports and protocols on the SaaS servers. Document, configure, and enforce strong account management policies. Install antivirus and disable unneeded services on all SaaS servers.
C
A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data. Which of the following migration methods would be the BEST to use? Use a storage vendor migration appliance Rsync the data between arrays Perform a storage live migration Conduct a V2V migration
C
A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set. Which of the following RAID levels satisfies this requirement? RAID 1 RAID 10 RAID 6 RAID 5 RAID 0
C
A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention. Which of the following will BEST resolve this issue? Ensure all database queries are encrypted Enable OS encryption Enable volume encryption on the storage Enable protocol encryption between the storage and the hypervisor Create an IPSec tunnel between the database server and its clients
C
A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations. Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment? Integrity Segmentation Classification Versioning
C
A systems administrator needs to convert ten physical servers to virtual. Which of the following would be the MOST efficient conversion method for the administrator to use? Clone the hard drive Restore from backup Use the vendor's conversion tool Rebuild the servers from scratch
C
After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? Remove the published plain-text password Notify users that a data breach has occurred Change the affected IAM user's password Delete the affected IAM user Identify the resources that are accessible to the affected IAM user
C
After analyzing a web server's logs, a systems administrator sees that users are connecting to the company's application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message. Which of the following should the administrator verify NEXT? The concurrent connection limit The TLS certificate The firewall rules The folder permissions
C
Lateral-moving malware has infected the server infrastructure. Which of the following network changes would MOST effectively prevent lateral movement in the future? Implement 802.1X in the network infrastructure Implement DNSSEC in all DNS servers Implement microsegmentation on the network Segment the physical network using a VLAN
C
The cloud administrator has been tasked to develop a cross-cloud provider migration plan as part of company's business continuity plan. As the cloud administrator assesses the feasibility of migrating applications from one public cloud provider to another, what is the service model that has the most lock-ins and is the most complex to migrate? XaaS IaaS SaaS PaaS
C
Which of the following cloud services is fully managed? GPU in the cloud Serverless compute SaaS IoT IaaS
C
A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it. Which of the following configuration options would BEST meet this requirement? Virtual GPU External GPU Shared GPU Passthrough GPU
D
A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal. Which of the following should the administrator do to fix this issue? Edit the DNS record at the DR site for the application servers Change the database application IP Create a database cluster between the primary site and the DR site Update the connection string
D
A systems administrator notices that a piece of networking equipment is about to reach its end of support. Which of the following actions should the administrator recommend? Update the OS Migrate the equipment to the cloud Update the firmware Replace the equipment
D
A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following: -- High availability-- Horizontal auto-scaling-- 60 nodes peak capacity per region-- Five reserved network IP addresses per subnet-- /24 range Which of the following would BEST meet the above requirements? Create two /26 subnets in different regions Create three /27 subnets in different regions Create two /27 subnets in different regions Create two /25 subnets in different regions
D
The human resources department was charged for a cloud service that belongs to another department. All other cloud costs seem to be correct. Which of the following is the MOST likely cause for this error? Misconfigured templates Misconfigured chargeback Incorrect security groups Misconfigured tags
D
A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment? Obtain a new IPAM subscription. Implement dynamic routing. Enable DHCP on the networks. Create a VPC and peer the networks.
D
A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure? Storage Memory CPU GPU
D
A VM was successfully tested in a lab environment. As part of the deployment preparation, the image needs to be backed up for use in the multi-rollout accompanied by orchestration templates. Which of the following should be used to create the image? Replica Full Snapshot Clone
D
A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error. Which of the following will MOST likely solve the issue? Enforcing TLS authentication Configuring QoS rules Checking user passwords Opening TCP port 3389
D
A company developed a product using a cloud provider's PaaS platform and many of the platform-based components within the application environment. Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider? Licensing Authentication providers Service-level agreement Vendor lock-in
D
A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site. Which of the following should be configured in between the cloud environment and the DR site? Playbook Failback Zoning Replication
D
A company has deployed a new cloud solution and is required to meet security compliance. Which of the following will MOST likely be executed in the cloud solution to meet security requirements? Performance testing Regression testing Usability testing Vulnerability testing
D
A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below: The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions. Which of the following solutions would help the company accommodate the new workload in the SHORTEST amount of time and with the maximum financial benefits? Add more capacity to the private cloud Configure auto-scaling within the private cloud Migrate all workloads to a public cloud provider Set up cloud bursting for the additional resources
D
A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content. Which of the following solutions will assist with the increased workload? WAF DoH IPS CDN
D
A system administrator is deploying a GPU-accelerated VDI solution. Upon requests from several users, the administrator installs an older version of the OS on their virtual workstations. The majority of the VMs run the latest LTS version of the OS. Which of the following types of drivers will MOST likely ensure compatibility with all virtual workstations? Alternative community drivers The drivers from the OS repository Legacy drivers The latest drivers from the vendor's website
D
A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well. Which of the following should the administrator recommend the user do FIRST? Disable antivirus/anti-malware software Turn off the software firewall Establish a VPN tunnel between the computer and the web server Update the web browser to the latest version
D
A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage. Which of the following RAID types should the administrator choose? 10 6 50 5
D
A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed. Which of the following will BEST identify the CPU with more computational power? L3 cache Bus speed Simultaneous multithreading Instructions per cycle
D
A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the work day, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? Affinity rule RAM usage CPU oversubscription Disk I/O limits
D
A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST? The gateway The services The subnet The firewall
D
A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times. Which of the following actions will MOST likely solve this issue? Add more vGPU licenses to the host Instruct users to access virtual workstations only on the VLAN Update the quest graphics drivers from the official repository Select vGPU profiles with higher video RAM
D
A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command, and notices the following relevant output: Which of the following actions should the cloud administrator take to resolve the issue? Modify the firewall on 72.135.10.100 to allow only UDP Assign a new IP address of 192.168.100.10 to the web server Update the gateway on the web server to use 72.135.10.1 Configure the WAF to filter requests from 17.3.130.3
D
After taking a new job at the state university, you are asked to recommend a network topology that best fits the large college campus. The network needs to span the entire campus. Which network topology would you recommend? LAN SAN WAN MAN
D
An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs. Which of the following should be verified NEXT? SAN Network VM GPU settings Application
D
An administrator deploys a new virtual machine. After logging on to the virtual machine, she notices that it has a different time setting than the host. What is most likely the cause of this issue? The VLAN tag is incorrect. The vNIC is not configured correctly. The virtual machine cannot communicate with the network. The guest tools are not installed.
D
An organization has the following requirements that need to be met when implementing cloud services: -- SSO to cloud infrastructure -- On-premises directory service -- RBAC for IT staff Which of the following cloud models would meet these requirements? Community Multitenant Public Hybrid
D
An organization has the following requirements that need to be met when implementing cloud services: -- SSO to cloud infrastructure -- On-premises directory service -- RBAC for IT staff Which of the following cloud models would meet these requirements? Community Multitenant Public Hybrid
D
An organization has two businesses that are developing different software products. They are using a single cloud provider with multiple IaaS instances. The organization identifies that the tracking of costs for each business are inaccurate. Which of the following is the BEST method for resolving this issue? Create a dedicated subscription for the businesses to manage the costs Split the total monthly invoice equally between the businesses Perform segregation of the VLAN and capture egress and ingress values of each network interface Tag each server with a dedicated cost and sum them based on the businesses
D
An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement? Implement an application container solution Implement SR-IOV on the server instances Implement auto-scaling of the compute resources Implement CDN for overall cloud application
D
An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time. Which of the following should be implemented to improve application performance? A. Increase the memory and network bandwidth B. Upgrade the application C. Increase disk capacity D. Upgrade the environment and use SSD drives
D
An organization requires the following to be achieved between the finance and marketing departments: -- Allow HTTPS/HTTP.-- Disable FTP and SMB traffic. Which of the following is the MOST suitable method to meet the requirements? Configure on-demand routing between the VLANs Implement an load balancing solution to load balance the VLAN traffic Implement 802.1X in these VLANs Configure an ACL between the VLANs
D
Performance issues are measured by the load on a system. Which of the following should the system administrator be concerned about as integrating new marketing group into PaaS cloud fleet? APIs Licensing Cores Users
D
Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps. Which of the following solutions will resolve the issue the FASTEST? Order a direct link to the provider Upgrade the link to 200Mbps Change the connection to point-to-site VPN Enable quality of service
D