Cloud+

¡Supera tus tareas y exámenes ahora con Quizwiz!

A cloud administrator receives a "Suspicious activity" alert from Microsoft Azure for alerts. What are the next steps the administrator should take?

"Suspicious activity" alert indicates that the administrator needs to complete further investigation to determine the cause of the alert. Azure will provide recommendations on how to investigate and remediate threats.

0.0% complete Question A cloud administrator is reviewing the results of a network vulnerability scan. What kind of results should the administrator NOT expect to see?

- Patched systems (The administrator should not expect to see a list of patched systems. The network vulnerability scan would return a list of unpatched systems that the administrator should address instead.)

An organization has learned that it may be competing with other organizations for access to the cloud service provider's (CSPs) resources. Which of the following CSP resources might the organization's be competing for? (Select all that apply.)

- The organizations may be competing for storage as CSPs may oversell storage capacity. Storage is easy for CSPs to add but competing for the overall read/write speed for storage may be an issue. - The organizations may be competing for CPU and memory, or compute resources, which may be overallocated to VMs. - The organizations may be competing for network bandwidth with CSPs offering more network bandwidth than is actually available. However, virtual private networks do not allow overallocation.

Which of the following represents a single point of failure? (Select all that apply.)

- cloud direct connection is a dedicated connection between a cloud service provider and an on-premises network. Having only one cloud direct connection represents a single point of failure. - load balancer distributes work among servers and represents a single point failure when it becomes unavailable and traffic cannot reach any of the servers that the load balancers service.

Which of the following scenarios represents a cloud-to-cloud migration? (Select all that apply.)

-An administrator migrating an organization's data from a VPC to a community cloud. -An administrator migrating an organization's data from a CSP to a VPC. -An administrator migrating an organization's data from GCP to AWS.

Which of the following is NOT a compute resource that can affect performance on a network?

-Applications

The performance of an organization's cloud network is degrading, and the administrator is troubleshooting possible causes. What are some items the administrator should investigate? (Select all that apply.)

-Auto-scaling configurations -Storage capacity and type -Network bandwidth

A colleague reported that the Virtual Machine migration to the cloud failed immediately after starting the process. A pop-up window showed a failed connectivity status. What can the team check on to troubleshoot this issue? (Select all that apply.)

-Check ISP -Check logs (Check logs to determine other issues related to networking. Review the logs at the source environment since there is no connection to the destination or CSP.)

If a cloud virtual instance is over-utilizing its CPU, what can a cloud administrator check to confirm it? (Select all that apply.)

-Check OS performance metrics. -Check cloud management utilization reports.

A developer is experiencing memory issues with their application on cloud based servers. Which of the following steps would assist the developer in identifying and fixing the problem? (Select all that apply.)

-Check for memory leaks -Check host operating system logs

An administrator has configured backup jobs for new cloud instances. What methods can the administrator use to verify that the backup data is valid? (Select all that apply

-Check the backup logs for errors and completion status. -Perform a test restore of the data

An automation task failed to make a change to a Linux virtual instance. The job log recorded an error stating that the account did not have privileges to the remote server. What can the cloud developer check to resolve this problem? (Select all that apply.)

-Check to ensure the local secure shell (SSH) private key is unchanged. If the key has changed, generate a new set of keys and update the remote Linux server with the public key. -Verify that the automation task uses the correct service account with appropriate permissions to make a change on the remote virtual instance.

An administrator inadvertently discovered an unsecured device on the cloud network. What should the administrator check? (Select all that apply.)

-Configuration management settings on the NAC -Which network entry points are being checked

An administrator migrating services from the on-premises network to the cloud network falls under the maintenance phase of the lifecycle roadmap. The deployment phase of the lifecycle roadmap documents when the administrator places a system into service. This phase of the lifecycle also includes staging

-Deployment Personnel

An organization is currently testing a cloud solution that will allow developers to create their own development environments, transitioning away from the current on-premises approach where developers have to request the IT department to set up environments for them. What step of the change management process does the testing of this cloud solution represent?

-Develop (This scenario represents the develop phase of the change management process. This is where the organization develops and tests new applications, services, or other features in preparation for deployment. The propose phase of the change management process involves the organization understanding the business's need and proposing a solution to meet it. The approve phase of the change management process involves the organization making a decision on the resources for a proposed solution. The deploy phase of the change management process is when the organization rolls out a developed and tested solution for use.)

About 70% of the company's customers are based on the east coast of the United States, while the company's headquarters is on the west coast. The company has resources in both a west and east coast region. What reasons may have influenced the company's decision to set up two regional cloud locations? (Select all that apply.)

-Disaster recovery (DR) playbooks provide specific actionable procedures to address particular events. In the event a cloud service becomes unavailable on the west coast, services may continue with cloud resources on the east coast. -VMs can replicate from region to region to increase availability times in the case when the main site becomes unavailable.

A security architect is setting up solutions for a medium sized company. The company wants security products that will actively block. Which of the following solutions should the architect recommend? (Select all that apply.)

-Endpoint detection and response (EDR) systems take a somewhat different approach. EDRs continually monitor the system for changes that indicate threats or exploits. Data is centralized for more accuracy. -There are two kinds of firewalls: Network (perimeter) and host-based (local). Network firewalls filter traffic in and out of a network segment or between two independent networks.

An administrator has configured a cluster of web servers to ensure that if one server becomes unavailable, the other will continue to serve traffic. What does the cluster represent?

-High Availability

A solutions architect has performed a risk analysis for disaster recovery and has determined that the likelihood of needing to recover is very low. They also determined that needing some time to bring another center up is acceptable, but not too much time. Which of the following backup solutions would meet the company's needs? (Select all that apply.)

-Hot site -Cloud site

A cloud administrator is reviewing a list of necessary patches, hotfixes, feature updates, and rollups. Which of the following will the administrator most likely test and implement first?

-Hotpatches (*The administrator would most likely test and implement the hotfixes first since hotfixes address a specific issue and are more urgent than patches and updates. *The administrator would probably not test and implement the patches first. Vendors typically release patches, and administrators test and implement them, on a specific schedule. *The administrator would probably not test and implement the feature updates first as feature updates provide new functionality and are not urgent. *The administrator would probably not test and implement the rollups first as rollups are a combination of multiple patches deployed to new systems all at once.)

A cloud architect establishes a Data Loss Prevention (DLP) program for their companies' cloud infrastructure. Which of the following are goals the architect should work towards? (Select all that apply.)

-Identify confidential data in use -Apply protection automatically -Monitor for exfiltration

An administrator is receiving complaints from users that the network is too slow. What steps should the cloud administrator take to reduce network latency? (Select all that apply.)

-Implement segmentation to separate network traffic and keep traffic from clogging up other parts of the network. -implement an edge network, or content delivery network, to place the systems and data closer to the users who are using it. -implement a Network Packet Broker (NPB) to monitor network traffic and send it to the appropriate tool to eliminate the strain of each tool monitoring network traffic individually.

A server administrator was recently assigned the role of disaster recovery planning. They have developed a plan but are not quite ready for full scale testing. They do, however, want to include other people in the process. Which of the following will help the administrator at this point? (Select all that apply.)

-In a parallel recovery using a non-production test environment, the disaster recovery procedures are implemented in a non-production environment. Virtual machines work especially well for this kind of test. -In a walk through, the disaster recovery procedures are stepped through to confirm their viability. No changes are made, and no data is restored. -In a table-top or simulated failover, the disaster recovery procedures are implemented on a limited scale. Participants engage in role-playing to ensure comprehension and realism.

An organization is using a configuration management database (CMDB). What items can the administrator expect the CMDB to be tracking on the organization's cloud deployment? (Select all that apply.)

-Interrelated microservices -Configuration items (The administrator can expect the CMDB to be tracking the interrelated microservices that make up a larger application on the cloud deployment. The administrator can expect the CMDB to be tracking the relationship of configuration items on the cloud deployment.)

A systems technician is enabling drive encryption for devices in the enterprise. What are the tools available for the technician to achieve this? (Select all that apply.)

-Linux Unified Key Setup (LUKS) is also another tool for drive encryption. For drive encryption, the data is protected while the server is offline. If the drive is stolen, the contents are encrypted. -Bitlocker is a tool for drive encryption. For drive encryption, the entire drive (or partition) is encrypted during the shutdown process and decrypted during startup. (Encrypting File System is an example of file encryption, not drive encryption. Specified folders and files are encrypted. If multiple users share the computer, only the authorized user can access the file contents)

A security technician is setting up multi-factor authentication to cloud solutions. Which of the following are authentication factors that could be used? (Select all that apply.)

-Location -Current time -One-time passwords

A cloud administrator is migrating services from the on-premises network to the cloud network. What phase of the lifecycle roadmap does this activity fall in?

-Maintenance (An administrator migrating services from the on-premises network to the cloud network falls under the maintenance phase of the lifecycle roadmap. The deployment phase of the lifecycle roadmap documents when the administrator places a system into service. This phase of the lifecycle also includes staging)

Users are complaining that they cannot reach a cloud-hosted application. Which of the following items should the administrator check? (Select all that apply.)

-Network connectivity -Application is running -Users have permissions

An employee sent a digitally signed resignation email to the HR department. Which goal of encryption proves that the employee sent the email?

-Non-repudiation The goal of encryption that proves the employee sent the email is non-repudiation. In non-repudiation, the author encrypts the message using a method that nobody else could have used.

A solutions architect is updating their companies' lifecycle roadmap. Which of the following should the architect include? (Select all that apply.)

-Old hardware -New services -Current applications

Which of the following would NOT be an example of appropriate consumer responsibility when patching cloud resources running on an infrastructure as a service (IaaS) solution?

-Patch virtual host hypervisor. (A cloud service provider (CSP) provides hardware infrastructure for an infrastructure as a service (IaaS) solution and is responsible for all layers starting from the virtual hosts and below. The CSP manages hardware failures, firmware updates, and hypervisor patches, for example.)

An organization has determined that they cannot lose more than 12 hours of data. What does this number represent?

-Recovery Point Objective (RPO). RPO measures the amount of data an organization can acceptably lose and defines the frequency of backups.

What cloud records management feature or solution would be most beneficial in a use case where lawyers may want to go through years of data to convict a person suspected of money laundering? (Select all that apply.)

-Retention -Write once read many

A hybrid cloud solution with virtual hosts on-premises and in the cloud needs to avoid a single point of failure across both platforms. How can a cloud administrator force distribution of regular virtual machine (VM) instances across both platforms?

-Set up anti-affinity rules (Anti-affinity deliberately distributes virtual machine (VM) instances across multiple hosts to avoid single points of failure. Affinity settings are configured on the hypervisor for a group of VM instances.)

An organization is planning to implement Multifactor Authentication (MFA). Currently, users must enter a password to access resources. What other valid forms of authentication can the organization implement to successfully achieve MFA? (Select all that apply.)

-Smart cards -Fingerprint scanners

What process improvement benefits would an organization realize by allowing developers to create their own development environments from templates in the cloud, rather than having to wait for on-premises administrators to create the environments for them? (Select all that apply.)

-Streamlined processes for greater efficiency -Faster deployments

A database administrator works for a critical financial institution which requires the client machines to be informed after multiple servers have a copy of the transaction. What type of replication should the administrator set up?

-Synchronous

A server administrator for a small company is running a handful of servers on older equipment that hasn't been allocated budgeting for maintenance. The administrator is worried about file corruption affecting system files or configurations. Which of the following backups is most suited for the administrator's concerns?

-System state backups duplicate the essential OS configurations. These configurations can then be restored quickly to the same machine in the event of corrupted system files or misconfigurations.

In preparation for patching the operating systems on a cloud network, the administrator double-checked to make sure the correct patch was queued for the operating system, that it was the correct version, and that it tested successfully in the test environment. However, the patch still failed to install in production. What are some reasons why the patch installation may have failed? (Select all that apply.)

-The administrator failed to ensure that there was sufficient drive space available for the patch process. -The administrator failed to disable antivirus during the patching process.

An administrator updated the device driver for a network adapter on a production system, but now the machine will not connect to the network. What are some reasons this could happen? (Select all that apply.)

-The administrator installed a generic driver. -The administrator installed an untested driver.

A cloud administrator extended the on-premises network to a public cloud solution in AWS. Instead of using Amazon Inspector, the administrator opted to use Burp Suite with the AWS cloud. What are some possible reasons why the administrator made this decision? (Select all that apply.).

-The administrator wanted to use the same tool for both the on-premises and cloud solutions. -Burp Suite's integration into CI/CD pipelines. -The administrator wanted to centralize the scanning results for auditing purposes

A cloud administrator is implementing a configuration management solution to ensure all nodes on the network meet requirements. However, when the administrator tests the solution, the control node is unable to reach the managed nodes. What are some possible reasons why? (Select all that apply.)

-The control node obtained an IP address from the DHCP (Dynamic Host Configuration Protocol) server. -The administrator has not allowed traffic from the control node through the firewalls. -The administrator moved the managed nodes to a different environment.

A newly hired cloud administrator assigned an engineer to manage several virtual machine instances, but when the engineer attempts to log in to any of the instances as an administrator, the login fails. What are the most likely reasons why the engineer cannot log in? (Select all that apply.)

-The engineer does not need to log in to the VM instances as an administrator. -The engineer is using an incorrect login. -The engineer's role assignment does not allow logging in to the VMs as an administrator.

An organization has a cloud deployment in an availability zone with redundant server hardware, redundant power supplies, and redundant network connectivity. What is the next step that represents the best solution for the organization to mitigate a single point of failure?

-The next step the organization should take is to configure the cloud deployment to replicate to another availability zone, within the same region, to eliminate the availability zone as the single point of failure.

An organization is testing the cloud disaster recovery plan. The goal is to implement the recovery without disrupting production. What kind of test is the organization running?

-The organization is running a parallel recovery test by implementing the disaster recovery procedures in a non-production environment.

An organization is reviewing options for backup management and determines that a disk solution better suits the needs of the organization than a cloud solution. What are some reasons why the organization may have made this decision? (Select all that apply.)

-The organization must retain complete control of the data. -The organization already owns the disks.

21.4% Complete Review Answer On Off 21.4% complete Question What kind of documentation should an organization have on hand to respond to an incident in the cloud? (Select all that apply

-The organization should have the DR (Disaster Recovery) playbook on hand. The DR playbook will provide specific, actionable procedures to address the incident. -The organization should have the call tree on hand. A call tree is a notification system that outlines whom employees should call next to notify of an incident. -The organization should have the network flow diagram on hand. This can help administrators visualize how data moves through the network to respond to and contain the incident.

An IT education institution recently experienced an issue where a student logged into the institution's Windows server that houses student records and changed some of the grades. How was the student most likely able to do this?

-The student logged in with the server's local administrator account. (The student most likely logged in with the server's administrator account, which has full access to everything on the server. The local administrator account should not be enabled on Windows systems)

A cloud administrator needs to troubleshoot a sales application that is no longer pulling information from the customer database. What should the administrator initially consider for the troubleshooting? (Select all that apply.)

-Verify connectivity to the API endpoint. -Verify connectivity to the customer database.

A cloud administrator needs to estimate the performance and stability of the cloud network's instances housing the big data databases. What process can the administrator perform to discover this information?

-monitoring baseline. The monitoring baseline uses vendor guidance and historical information to estimate performance and stability.

An administrator needs to restore data to a server, but the data owner wants to compare the files that are on the server to the restored files, to determine which version of the data to keep. What kind of restore should the administrator perform?

-side-by-side restoral, which will restore data to the original production server without overwriting the existing data. It will allow the data owner to compare the files.

An organization had to evacuate their primary location due to approaching wildfires. As outlined in the business continuity plan, the organization moved all business operations to another location that they had previously set up with most of the equipment they needed. The organization acquired the rest of the needed equipment, restored data backups to the new location, and resumed operations within a day. What kind of disaster recovery site did the organization use?

-warm site to recover operations in the face of the wildfires. A warm site is set up with the space and most of the needed equipment to resume operations.

An incident handler investigates logs on a Linux web server to determine if an attacker successfully breached the server. Which of the logs should the incident handler investigate to review the web logs?

/var/log/apache is where Linux would store Apache log files. The question specified that the server was a Linux web server, and Apache is the only service listed.

A technical team is updating its storage arrangement by moving to a network solution. The team is less concerned about maximum capacity and more concerned about speed. Which of the following options would produce the greatest throughput?

150 MiB/s, or mebibytes per second, would produce the fastest throughput. Throughput refers to the data transfer speed, or the number of bits read or written per second.

An AWS technician is provisioning six virtual servers to assist with an anticipated increase in workload. Each server's processor possesses eight cores. Using standard vCPU provisioning and multi-threading, how many total threads will the technician utilize in this effort?

96

What will a cloud administrator most likely create before uploading individual files to a cloud storage?

A bucket

What type of operating system (OS) build is due for retirement and may no longer have active support?

A deprecated operating system (OS) is due for retirement and may no longer be actively supported. This may contain unaddressed bugs or vulnerabilities. Microsoft stops selling older operating systems, but it is easy to obtain old Linux versions.

An administrator is using the ping command to test connectivity between the on-premises network and the cloud network. The response from the ping command is "Fail: DESTINATION HOST UNREACHABLE". What does this response indicate?

A ping response of "Fail: DESTINATION HOST UNREACHABLE" indicates that the on-premises computer was not able to send the ping request since the connection is down.

What type of backup job is not created from the original data but is aggregated from other backup jobs?

A synthetic full backup job is created by combining the most recent full backup and the subsequent incremental backups. The result is a single aggregated backup job. Synthetic full backups are not generated directly from the original data but instead assembled from other backup jobs.

An administrator is investigating why an application within a container isn't operational. Which of the following options is NOT a likely cause that the administrator needs to investigate?

An oversubscription of compute resources

A cloud technician is attempting to look for pre-configured automated tasks that are already built. The technician finds some useful YAML files. Which of the following tools is the best option for the technician to use?

Ansible

Which configuration management tool is appropriate for automating cloud tasks using the concept of "playbooks?

Ansible

A cloud administrator is researching tools that will ensure the configuration of servers, devices, and services. The administrator is responsible for both Windows and Linux operating systems and does not want to rely on a client-server structure. The administrator also does not want to install agents or enable special services on managed devices. What is the cloud administrator's best option?

Ansible---The cloud administrator's best option is Ansible. Ansible is an agentless configuration management tool that connects to devices over Secure Shell (SSH) to manage nodes and configurations and supports both Windows and Linux.

An organization has concerns about single points of failure for their VMs. What can the cloud administrator use to ensure all the VMs do not fail at the same time?

Anti-affinity

The finance director recently learned how easy it is to intercept data and has concerns about someone tapping into the network to get the financial data. The cloud administrator assures the director that the financial data is encrypted before it leaves the program and that it stays encrypted unless being used by the program. What kind of encryption is the financial data using?

Application (The financial data is using application encryption, which encrypts the data before it leaves the application and protects the data on the network, in storage, and in databases.)

An HR supervisor has asked the cloud administrator to check the log files to find out when a particular employee logged off the system on the previous day. Which goal of IAM does this satisfy?

Auditing (Recording all user actions in log files or keeping a record of what an identity did and when it occurred, satisfies the IAM (Identity and Access Management) goal of auditing.)

An administrator has configured access permissions for the organization's cloud network such that users can only log in between 6 a.m. and 6 p.m., and only if they are in the headquarters building. What security mechanism is this an example of?

Authorization

A cloud administrator is developing a scalability strategy for servers that are expected to anticipate change frequently. Which strategy should the administrator utilize?

Auto-scaling

A virtual machine fails to utilize memory resources it normally uses during a certain time of day, and as a result, initiates a memory swap. What is most likely causing this remedial action?

Ballooning

A cloud administrator is migrating a significant amount of server data from company-controlled premises to a cloud environment. As such, capacity is a primary concern, but the company will access the data very infrequently and so, a specific data model will not be required. Which storage type would be best for this requirement?

Blob storage is most useful for storing very large amounts of data in an unstructured manner. As the data remains massive and would not require frequent access, cool or archive-tiered blob storage makes the most sense.

A cloud architect is designing a solution for a development company that makes mobile games. The games reach out to dedicated cloud gaming servers. Which of the following AWS instances would be best suited for this situation?

C6g

An organization was unable to relocate all on-premises resources to the cloud and now has concerns about the potential for data loss between the on-premises and cloud networks. What solution can the cloud administrator implement to mitigate this risk?

CASB The administrator can implement a Cloud Access Security Broker (CASB) software. This software monitors the data flow between the cloud and on-premises networks specifically searching for potential data loss incidents.

A website in Asia that sells inexpensive electronics and clothing has become quite popular with teenagers in the United States. What can the cloud administrator configure to ensure that network latency doesn't cause the website to load too slowly for users in the US?

CDN

A Windows technician is configuring a new customer relationship management application. To complete the setup, the technician must push all necessary folders to a remote team. Which of the following systems would the technician most likely use to complete this task?

CIFS

A cloud administrator wants to use a network share to store files in the common Windows sharing format, which a web server will create but does not want to use a traditional file server. The administrator prefers using a serverless option so there are fewer cloud instances to manage. What storage protocol can the administrator use for this purpose?

CIFS

When logging in to a cloud service provider (CSP) web interface using a smart card, the authentication fails. What can a user or administrator do to troubleshoot this issue? (Select all that apply.)

Check certificate status. Check the smart card.

A newly configured Ansible workflow job fails midway when trying to reconfigure a virtual instance in the cloud. Other single automation tasks targeting other instances are completing successfully. What can an IT administrator troubleshoot to resolve this issue? (Select all that apply.)

Check configuration sequence. Check target's startup processes.

A cloud administrator is troubleshooting insufficient capacity and performance degradation. Which of the following troubleshooting steps should be part of the process? (Select all that apply.)

Check oversubscription of computing resources Check if correct templates are used to create instances

A user logs in to the cloud platform but cannot see the team's virtual instance. What troubleshooting steps can a cloud administrator perform? (Select all that apply.)

Check security group inheritance. Check security group misconfiguration.

A technical department has stood up a new server that will utilize virtualization to support a small team of specialists. Following the configuration of the VM's baseline settings and specifications, the team will eventually require further virtualization capabilities as they add more servers to form a cluster. What would be the most efficient means of configuring the virtualization capabilities as the technical department adds more servers?

Clones

An on-premises cloud network usually has enough resources to handle all the online traffic for a busy department store. However, when the department store has special sales, the on-premises network becomes oversaturated with traffic. To mitigate this issue, the administrator configured the network to add virtual machines from a public cloud network as necessary. What type of right-sizing model does this represent?

Cloud Bursting

The company's datacenter is set up to work with a cloud service provider (CSP) as a hybrid cloud environment. IT management wants to leverage cloud resources to support on-premises web servers during peak hours. What cloud feature or service can the company take advantage of to fulfill this requirement?

Cloud Bursting

In which instance would an organization NOT employ the disaster recovery playbook?

Cloud admin quits

A small marketing firm is preparing a business continuity plan and needs to select the right kind of disaster recovery site. The firm's business relies on created and approved marketing campaign files to run daily campaigns and internet connectivity to run the business on the front end. The firm also uses customer relationship management software, as well as the website, for sales. The firm is in a tornado-prone area, but the firm's customers reside all across the country. One day of being unable to post a customer's campaign can cause the firm to lose business. What is the best disaster recovery solution for the marketing firm?

Cloud site

A cloud administrator receives a request to create a virtual instance on the Amazon Web Services (AWS) platform. The request explains that the virtual instance will perform various machine learning tasks for a new web application. What type of instance would the cloud administrator most likely create for this request?

Compute Optinmized

A storage administrator is architecting a solution that will provide quicker access to users. Which of the following replication strategies will support this? (Select all that apply.)

Content delivery network (CDN) replication replicates cloud-stored data to datacenters near users to provide quick access. This is a common strategy to enhance the user experience. Distributed file system replication replicates server-stored data to servers near the anticipated users to provide quick access.

Recently, an attacker successfully obtained PII from multiple employees at a company by intercepting plain text traffic on the web. Aside from better monitoring practices, which of the following would use digital signatures and encryption to aid in mitigating an attack like this in the future?

DNSSEC

A server technician wants to set up a configuration manager for their server environment through Powershell. Which of the following will help enable them to do this? (Select all that apply.)

DSC--PowerShell can also be used as a configuration manager by enabling and using PowerShell Desired State Configuration (DSC). Using DSC requires that destination systems use PowerShell 4.0 and have remote PowerShell execution enabled. MOF--DSC is a declarative configuration management implementation that relies on a Managed Object Format (MOF) file that holds the configurations.

A cloud administrator needs an overall view of the cloud network's service availability, instance and network performance, capacity planning, and incident management. What can the administrator configure to get a centralized view of all the information?

Dashboards

A backup administrator is researching options to store backup data in the cloud. Other than the cloud's potential to become an offsite storage solution in a disaster recovery scenario, what would not benefit from using a Storage as a Service (STaaS) cloud subscription? (Select all that apply.)

Data control Vendor lock-in

When deploying a virtual appliance onto the Microsoft Azure platform, what action can prevent an unauthorized person from signing on to the system with elevated privileges?

Deactivate default account (Default settings and accounts are a particular vulnerability for newly deployed servers and network devices. It is critical to change or reset the passwords for these accounts or completely disable the accounts, if possible)

A cloud administrator managing company resources wants to maximize storage efficiency while preserving the quality of graphic design archives. Which method could be used to achieve this goal?

Deduplication

At which phase of the lifecycle roadmap would a cloud application serve as a reference for upcoming services to an organization?

Developments

An organization needs to migrate a number of large databases from an Amazon Web Services (AWS) cloud to an Azure cloud. The databases use tables to store the data and keys to link the data information. What solution will the organization use to migrate the data?

Direct -Relational databases use tables to store the data and keys to link the data information. While the databases, in this case, are relational, relational is not a database migration method.

An administrator is using Active Directory (AD) to manage permissions for users, permitting file and folder owners to manage other users' access to those resources. What kind of access control is this

Discretionary access control (Windows New Technology File System (NTFS) permissions allow users to manage access levels for other users on resources they own. This is an example of discretionary access control.)

A company has asked an administrator to configure a new fleet of high storage, high-performance servers for a remote team of technicians. The team currently utilizes the same servers as the local office team, and the company would like the team to be able to rapidly respond during times of peak traffic and activity. Which of the following would allow the team to quickly increase memory and performance during these periods?

Dynamic allocations

A startup company requires a cheap cloud storage solution to accommodate its initially low overhead. The company only uses a few basic servers and primarily operates off of basic workstations. Which of the following storage options would make the most sense for the company right now?

File

Which of the following are examples of block storage? (Select all that apply.)

GCP Persistent Disk AWS EBS

An organization recently acquired a new company. The organization has an on-premises network extended to the Azure cloud, and the newly acquired company is using an Amazon Web Service (AWS) cloud deployment. What can the network administrator implement to allow the organization's network to communicate with the new company's network?

GENEVE GEneric NEtwork Virtualization Encapsulation

The Family Educational Rights and Privacy Act (FERPA) requires a college to keep all students' permanent records for at least 60 years, however, the college rarely needs to access a student's record 5 years after a student completes a degree. What AWS S3 storage tier should the cloud administrator select to house the records for students who completed a degree over 5 years ago?

Glacier

A cloud administrator has received an automated email alert from software that has detected an anomaly in the normal system behavior. What type of software alerted the administrator?

HIDS

A network administrator reviews protocols in their companies' cloud environment to search for insecure protocols that should be removed. Which of the following protocols should not be used by themselves? (Select all that apply.)

HTTP FTP file transfer protocol Generic Routing Encapsulation GRE

An administrator is reviewing the roles and features installed on the organization's servers, comparing them to what each server's purpose is, and removing the roles and features that are unnecessary. What practice is the administrator engaged in?

Hardening (The administrator is engaged in the practice of hardening. Hardening is removing everything unnecessary on the server and using the most current version of everything necessary for the server.)

An organization would like to add a new storage system to house its array of graphics productions and marketing materials. Leadership prefers a solution that would provide high performance and fault tolerance, with rebuild times minimized in case of a data loss scenario. Which of the following would best suit this need?

Hardware RAID 10

Which of the following provides additional servers, either virtual or physical, to support increased workloads? (Select all that apply.)

Horizontal scaling Scaling out

A Microsoft administrator must reconfigure storage by access requirements for a company. Which of the following tiers are potential options for the administrator to utilize as storage segments? (Select all that apply.)

Hot Archive

A Microsoft cloud technician has configured a VPC for a large group project and would now like to connect different, smaller projects to the VPC. What kind of network is the technician setting up?

Hub-and-spoke

A cloud architect establishes a software defined network policy for tightly controlled integration between on-premises and cloud services. Which of the following architectural designs should they implement?

Hybrid

What type of virtual system tightly integrates central processing unit (CPU), memory, storage, and network subsystems to operate as a unified entity?

Hyperconverged

If a user purchases a CPU that houses 8 cores but is capable of managing up to 16 tasks at a time, which technology is the user leveraging? (Select all that apply.)

Hyperthreading SMT

A server technician is testing new processing hardware to use in a private cloud deployment. What is the technician measuring to determine overall performance? (Select all that apply.)

IPC (Instruction Per Cycle) GHz

A company is currently switching its network protocols after a successful breach. Attackers stole a small amount of PII resulting from a packet sniffing attack. Which solution will help the company prevent this attack moving forward?

IPsec

Which of the following is a rule-based, lower-level security method generally seen as a highly secure means of communication encryption?

IPsec

An administrator is updating the routers in the cloud environment by making the changes in the code and then applying the changes to all the routers. What is this approach known as?

IaC-- (Infrastructure as Code) is the term used when administrators configure resources by scripting the configuration in code and deploying it through automation.

On the most fundamental level, every network allows access to system resources based on what?

Identity

A cloud administrator can manage permissions for users or groups to access cloud resources using which of the following?

Identity and Access Management (IAM)

An organization is responding to a data breach in the cloud network. The organization has completely restored normal operations to the production environment and has isolated the breach on a specific segment of the network to further investigate and collect evidence. What negative action will eliminate the organization's chances of taking legal action against the threat actors?

If the investigators fail to properly track the chain of custody of all evidence collected during the breach investigation, it can eliminate the organization's chances of prosecuting the threat actors.

A systems administrator is troubleshooting a newly launched database that cannot access its storage. The database drew its original configuration from a similar database, using the same base image file. Which of the following is the most likely reason the database is experiencing these issues?

Improperly configured variebles

An employee saved a file to the cloud network and then made a hash of the file. Two weeks later, the employee ran another hash on the same file. When the employee compared the values of the two hashes, they were exactly the same. Which goal of encryption has the employee demonstrated?

Integrity

Users are reporting that they are unable to connect with the organization's cloud resources. What items should the administrator check? (Select all that apply.)

Is the CSP experiencing a network outage? Is the organization's ISP experiencing a network outage?

How does a host machine recognize memory used by virtual machines?

It doesn't perceive it

A cloud administrator is implementing Ansible to manage the configuration of remote systems on the cloud network. What type of authentication should the administrator implement with Ansible to ensure that automated processes do not stop while waiting for authentication to complete?

Key-based authentication

An organization has received formal notice that it must not allow any modifications to specific information within the organization. What kind of process is this?

Legal hold

An administrator is standing up a new website and wants to prevent the instances hosting the website from becoming overwhelmed while also ensuring good performance and redundancy. How can the administrator accomplish this?

Load Balancer

A cloud administrator is creating instances for databases that data scientists will use to manage big data analytics. What is the best type of optimization the administrator should consider for these instances?

Memory Optimized

A security administrator wants to enhance security by creating a flexible and scalable policy that separates infrastructure at the workload level. Which of the following solutions is best applicable to the administrator?

Microsegmentation

A user is unable to reach a cloud resource by name, but general Internet access is available. What would be an immediate cause of this issue?

Misconfigured DNS record

A security architect is working with administrators and developers to develop a patching policy which balances security with availability. What is a good policy which will suit the business needs?

N-1

To detect unwanted or dangerous network traffic, an administrator is collecting and analyzing data from the network through the web application firewalls, the intrusion prevention systems, and the protocol analyzers. Network traffic has to travel through all of these devices, and all of these layers of monitoring are taking a toll on system resources and slowing down network traffic. What can the administrator implement to mitigate this issue?

NPB (Network Packet Broker

A cloud administrator is extending the use of virtual local area networks in their Azure cloud environment. Which solution should the administrator use?

NVGRE. Microsoft primarily relies on network virtualization using generic routing encapsulation (NVGRE) to extend VLANs.

Which of the following statements are false concerning network flow diagrams? (Select all that apply.)

Network flow diagrams are the same as data flow diagrams. Network flow diagrams do not assist with security

An administrator scripted all the steps needed to create and deploy new database servers for the organization's applications. After the administrator tested the scripts to ensure they worked properly, the administrator then created a workflow to start and run all the automated steps in order. What is this an example of?

Orchestration

Which of the following is NOT a motivator for a cloud administrator to apply patches?

Patching is scheduled

An administrator created three virtual networks for an organization and then connected them together so that employees on any of the networks can seamlessly use the resources in any of the other networks. What type of software-defined networking is this?

Peering

The company purchased a cloud-based application that all employees can access from a web browser. The application will be able to support new employees as the company grows. What type of licensing structure did the company most likely purchase for this application?

Per user licensing

A hybrid cloud environment hosts web services on both on-premises and the cloud. A similar network is set up in an isolated environment for testing disaster recovery scenarios. If IT management wants to test their disaster recovery procedures with the participation of a limited amount of real user accounts, what type of test would be most appropriate to carry out?

Pilot test

An AWS VM instance must have its memory reconfigured to meet current demand. What must a user do prior to changing the instance type?

Power off the instance

A virtual instance on the Amazon Web Services (AWS) platform has 64 virtual central processing units (vCPUs) and 432 (Gibibyte) GiB of memory. What can a cloud administrator do to make the virtual instance memory-optimized? (Select all that apply.)

Power off the virtual instance Change virtual instance type

A server administrator is troubleshooting connectivity between two servers with the ping command but receives a message "REQUEST TIMED OUT." What is most likely going on?

Problem on the destination device

An organization recently experienced a data breach in the cloud network while a new cloud administrator was on call. The organization had all the necessary documentation to respond to the incident, but the response time was extremely slow compared to average incident response times. What can the organization do to decrease incident response times in the future?

Provide Training

An administrator is installing a vulnerability scanner. In which instances can the administrator use the standard administrative console provided by the CSP? (Select all that apply.)

Public cloud instance Hybrid cloud instance

A server administrator is attempting to look for pre-configured automated tasks that are already built and finds some Ruby scripts, support common operating systems and can be used with physical machines, VM's, and cloud instances. Which of the following tools will the administrator need to use?

Puppet files are written with Ruby. Puppet supports all of the common operating systems and may be used with physical machines, virtual machines (VMs), and cloud instances.

If a company requires a storage solution that possesses both redundancy and maximum storage efficiency (to keep costs down), which of the following options would make the most sense?

RAID 5 is a striping with parity configuration. It supports redundancy and utilizes less total hardware. File blocks striped across multiple drives also allows certain performance advantages. Organizations use these to make more efficient storage use

The web developers are decommissioning a legacy web server on Amazon Web Services (AWS) and want to stand up a newly configured web server in the same location. The developers have not yet configured the new server's network configuration but are requesting that the cloud administrators switch over the same network settings to the new server. What should the cloud administrator do to fulfill the request?

Re-attach vNIC to the new server

What term describes policies that are set to control the entire lifecycle of data, from creation through destruction?

Records management refers to the policies that control data throughout its lifecycle and includes the creation of data, the use of data, the modification of data, and the deletion of data.

A cloud architect has a migration contract for a company who wants to keep the migration fast and simple. Which type of migration would work best for the company?

Rehosting

A backup administrator on the team requested more storage capacity for backup media. Instead of increasing storage capacity, another backup administrator on the team enabled the deduplication feature. How will this feature benefit the team's storage needs?

Removes duplicate data blocks

An administrator is evaluating an application for migration to the cloud and determines that before migrating the application, the organization must first send it back to the developers to remove hard-coded IP addresses and make other minor modifications. What cloud migration type does this represent?

Replatform

A security architect wants to set up permissions dynamically based on assigned functions within the company. What type of permissions structure would best suit their objective?

Role-based Access Control (RBAC)

An administrator is practicing security hardening. Which of the following software-based solutions will the administrator take to reduce the vulnerability of the network? (Select all that apply.)

Run systemd start sshd and systemd enable sshd on a machine used for remote administration. Use the Nmap tool to scan the network.

85.7% complete Question An organization's cloud service provider (CSP) recently experienced an outage, which caused the organization's cloud instances to be down for 30 minutes. Where can the organization look to see if this is longer than the CSP's guaranteed percent availability?

SLA

To improve a system's performance during virtualization, the VMs installed should have direct access to network hardware within the system. Which component facilitates this access?

SR-IOV

A small company would like to minimize excess hardware maintenance expenditures during its growth stage. The company currently maintains physical drives for its entire operation, which throughout the growth process, has become increasingly expensive. When considering a cloud solution, what should the company consider for its storage needs?

STaaS

What type of cloud service is Microsoft Office 365?

SaaS

An organization has a hybrid cloud environment with several virtual instances in the Microsoft Azure cloud and would like to ensure backup solutions are ran in the cloud entirely. If the organization prefers using the latest, compatible third-party backup application for these cloud instances, what could cloud administrators do to fulfill this requirement?

Search the cloud marketplace

An application developer would like to work on new versions for a recent gaming app release. To streamline operations, the developer will use a separate workstation from their primary workstation due to better sound and graphics quality. Which of the following options would facilitate better performance while remaining at a relatively cheap price?

Shared vGPU

IT technicians installed environmental sensors connected to power distribution units (PDUs) throughout a large datacenter. A network design shows an intermediary application receiving sensor logs that are then pushed to a centralized monitoring application in the cloud. How is the data getting to the monitoring solution?

Simple Network Management Protocol (SNMP) allows network nodes to forward performance utilization information to a central monitor for further analysis. This information enables network administrators to understand devices that are over-or under-utilized, unavailable network paths, and devices that have failed.

An organization has both Windows and Linux instances running and collecting log file information. What protocol will send the information to the centralized management information base (MIB)?

Simple Network Management Protocol (SNMP) will send the log file information to the MIB. Systems use SNMP for monitoring and managing network devices and it utilizes UDP ports 161 and 162 by default.

The IT team is setting up a hybrid cloud environment that requires secure communication between the company's datacenter and the cloud service provider (CSP). What type of network configuration will provide tunneled connection between the company and the CSP that require less work for administrators and users?

Site-to-site

A company has dispatched one of its information technology teams to begin the initial setup for a new office location in a different state. The team will begin by building networking and architectural diagrams, as well as migrating data from the home office to the new location. What should the team utilize to secure this connection?

Site-to-site VPN

What type of tasks can a cloud administrator automate? (Select all that apply.)

Software updates Scaling Restarts

An organization has asked a network administrator to configure a departmental network that includes both storage and virtualization capabilities. The department maintains its own internal IT staff capable of managing the configuration, but it should come ready to deploy immediately across the entire department. What is the organization asking the administrator to configure?

Solution templet

An administrator created a build and tested it extensively to correct the bugs and other issues, and then released it for use. What kind of build did the administrator create?

Stable

The administrator can expect the CMDB to be tracking the interrelated microservices that make up a larger application on the cloud deployment. The administrator can expect the CMDB to be tracking the relationship of configuration items on the cloud deployment.

Standard infrequent

A department utilizing a large file system for its storage would like to avoid running out of space and subsequently necessitating the need for additional storage. Of the units within the department, the development team requires the most storage for projects, while the other teams can utilize much less with proper storage management. What would be an ideal option to ensure that the other departments do not overuse their space allocation?

Storage filesystem quota

An administrator is configuring a SAN. Which of the following would permit the fastest possible performance while also providing redundancy?

Switched Fibre Channel

An administrator is reviewing logs in Event Viewer. Which of the following is NOT a primary log the administrator will see here?

Syslog (Linux uses the Syslog logging service, a protocol that allows appliances and applications to send logs or event records to a central server. This is not a primary log in Windows Event Viewer.)

Following a storage configuration upgrade, a number of applications have begun performing slower than expected. A technician tests the read/write performance, and the results show up to 20% slower speeds than projected. Which of the following is most likely the culprit of this performance degradation?

The IOPS is exceeding its cap

An administrator applied an operating system patch to a cloud VM instance, but the patch broke some of the system's functionality. How can the administrator return the system back to pre-patch configuration?

The administrator can revert to the snapshot taken before patching.

One of the VMs that houses an organization's big data analytics database has become corrupted from an operating system misconfiguration. What kind of backup can the administrator use to quickly restore it to the previous state?

The administrator can use a system-state backup to restore the VM. Although the server houses a database, the misconfiguration corrupted the VMs operating system files.

An administrator manually configured four new VM (Virtual Machine) instances in the public cloud. Three of the VM instances work, but the administrator is unable to connect to the fourth instance from the on-premises network. What might the administrator have done to cause the connection to the fourth instance to fail? (Select all that apply.)

The administrator did not follow the correct procedures. The administrator applied inaccurate instance tags.

An administrator is evaluating the infrastructure and services provided by an organization's datacenter for a P2V migration. What reasons might the administrator be doing this? (Select all that apply.)

The administrator is preparing the organization to move from on-premises to a cloud solution. The administrator is preparing the organization to move from on-premises to a virtualized solution.

An administrator upgraded the hardware in a server. After the administrator put the server back in service, the system failed. The administrator never received an alert, although alerting worked properly before the administrator upgraded the hardware. What is the most likely reason why the administrator did not receive an alert when the system failed?

The administrator most likely failed to take alerting out of maintenance mode, which prevents sending alerts while administrators are working on systems, after the hardware upgrade.

An organization has several VMs in their public cloud configured as web servers. However, when the administrator attempts to access the secure website, the browser times out. What must the administrator configure to correct this error and allow customers to access the website?

The administrator must configure an inbound rule in the ACL (Access Control List) to allow traffic on port 443

An organization initially manually assigned random static IP addresses within the organization's range to network devices. Now that the organization is growing, an administrator is installing a Dynamic Host Configuration Protocol (DHCP) server to automatically assign IP addresses to client devices but needs to free up a contiguous address range in order to provide the DHCP server with a block of available IP addresses to assign. The organization's file servers are currently using IP addresses in the range the administrator wants to use for DHCP, so the administrator assigns new IP addresses outside of that range to the file servers. Shortly after, the helpdesk begins receiving calls from employees who are unable to access the file servers. What must the administrator do to correct this issue?

The administrator must update the DNS records with the new IP addresses.

A cloud administrator needs to apply an emergency hotfix to one of the instances. What type of backup should the administrator capture before applying the hotfix to the system?

The administrator should capture a snapshot backup of the system before applying the hotfix. The snapshot will capture all the system settings for an easy restore if the hotfix isn't successful.

An administrator is troubleshooting a failed orchestration job. Where should the administrator check for clues as to why the workflow failed and where to begin troubleshooting efforts?

The administrator should check the last successful automation job.

A cloud administrator is configuring a load balancer to manage traffic to an organization's web servers that house a catalog of products for customers to buy online. What load balancer scheduling type should the cloud administrator configure to ensure that all customers can place orders at all times?

The administrator should configure the most recently used scheduling type. This will ensure that if there are not enough connections on the existing machines, it will create new VMs to accommodate all customer orders

An organization hired a new administrator to upgrade the VPN (Virtual Private Network) that employees use for off-site connections to the organization's network. The VPN is currently using PPTP (Point-to-Point Tunneling Protocol) to encapsulate the data packets and provide encryption. What tunneling protocol will the administrator implement for the upgraded VPN?

The administrator will implement L2TP/IPsec (Layer 2 Tunneling Protocol/ Internet Protocol Security) for the upgraded VPN. This provides a secure connection that is easy to configure.

An administrator only allows specific physical devices to connect to the organization's Virtual Private Cloud (VPC). What command can the administrator use to monitor device connections to the VPC by physical address?

The arp (Address Resolution Protocol) command is the correct command that will show the administrator the MAC addresses of all devices on the network mapped to the corresponding IP address. The ipconfig /all command will show the administrator the MAC (Media Access Control) address or physical address of the device but will not show the mac addresses of all the devices connected to the network. The nslookup command will show the administrator the domain name that corresponds to an IP address. It does not show MAC addresses. The curl command will allow the administrator to automate file transfers to servers. It does not show MAC addresses.

An organization has recently recovered from a data breach and is working to identify what created the circumstances that allowed the breach to occur. What is the best way for the organization to understand the root cause?

The best way for the organization to understand the root cause of the breach is to ask a series of "Why" questions to uncover what created the circumstances that allowed the breach to occur.

An administrator is troubleshooting a cloud client that is unable to communicate with other devices on the same subnet. The administrator opens a command prompt on the client, enters ipconfig, and sees that the client's IPv4 address is 169.254.0.0 and the subnet mask is 255.255.0.0. Why isn't the client communicating?

The client did not receive an IP address assignment. An IP address of 169.254.0.0 is an APIPA (Automatic Private IP Addressing) configuration indicating that the client did not receive a valid IP address configuration either manually or through DHCP (Dynamic Host Configuration Protocol).

A user in the marketing department is unable to access a folder containing campaign files. The administrator views the folder properties and observes that the user is a member of a group that is inheriting read permissions to the folder. Why might the user not be able to access the folder?

The folder owner has explicitly denied the user access to it.

If a host begins claiming memory normally reserved for virtual machines, what is the likely indication

The host is running out of memory

An organization is evaluating options for migrating millions of medical records to a community cloud. The organization needs to migrate the records as quickly as possible and without any downtime. What are the best solutions for migrating the data? (Select all that apply.)

The organization should migrate the data using a CSP's proprietary solution that avoids the public Internet. The organization should migrate the data using a storage transfer service.

A new user cannot access Microsoft Office 365, but no other users in the organization are having any issues. What is the most likely reason why the user cannot access it?

The organization's subscription is out of licenses.

The helpdesk receives a call from a frustrated user. The system has required the user to change their password and the user has tried several different ones, but the system will not accept them. Why won't the system accept the user's passwords?

The passwords do not meet the password policy requirements.

A cloud administrator implemented a change management orchestration workflow for updating systems on the cloud network, but the orchestration workflow failed. The system did not report any authentication errors. What are some possible reasons why the orchestration workflow failed? (Select all that apply.)

The sequencing of the automated steps was incorrect. The systems required a reboot and had not completed the startup process before automation proceeded.

An administrator upgraded the operating system on several servers and then ran the configuration management tool to ensure the nodes meet the established requirements. However, the configuration management process failed, even though it ran fine earlier that same day. What is a valid reason why the configuration management process may have failed?

The version of the operating system is now incorrect.--Since the administrator updated the servers, the version of the operating system is now incorrect and is causing the configuration management process to fail.

An organization is upgrading all of its systems in the environment. When the upgrade is complete, the organization will promote the upgraded environment to production, and later, upgrade all of the systems in the demoted environment. What kind of upgrade process does this represent?

This process represents a blue-green upgrade where there are two identical environments. The organization updates the passive environment and makes it active, and then later updates the other environment. A canary upgrade is an upgrade process where the organization upgrades a small number of systems and then measures the impact of the upgrade before deploying it to the rest of the environment. A rolling upgrade is an upgrade process where the organization upgrades a few systems at a time, over a longer time period, to gradually implement the changes. A system upgrade is an upgrade process where the organization upgrades the hardware, firmware, or operating system on one machine.

An administrator is viewing the performance monitor on an instance and notices that the operating system has unusually low utilization. What does this indicate?

Too much memory

An administrator is installing Linux to test the new version of an operating system on their desktop. What will the administrator most likely deploy?

Type 2 Hypervisor

VPC connectivity issue Network Admin

Update DNS Misconfiguration of Security Groups

A cloud administrator is troubleshooting connectivity issues between Virtual Private Clouds (VPCs). Which of the following steps should the administrator perform? (Select all that apply.)

Update security group memberships Update name resolution

An organization is using a public cloud to host sensitive information. The organization must ensure that the data is secure and private. What can the organization implement to provide greater security within the public cloud?

VPC

An organization currently has a cloud network subnetted using Layer 2 technology to isolate separate networks. However, the organization is rapidly growing and will soon need to accommodate over 5000 separate networks, which is more than the current subnetting technology can handle. What can the organization do to manage the growth? (Select all that apply.)

VRF VXLANs

An organization has configured a VPC (Virtual Private Cloud) but is often unable to access it due to repeated CSP (Cloud Service Provider) outages. The administrator checks the VPC downtime against the Service Level Agreement (SLA) and verifies the downtime is over the acceptable limits. What kind of issue does this represent?

Vendor-related

A company sets up a hybrid cloud environment to take advantage of cloud virtual instances to increase resources during peak hours for a set of load-balanced web servers. The on-premises load balancers need secure and accessible communication with the web servers in the cloud. How can a cloud administrator set up the network to stretch from on-premises to the cloud?

Virtual extensible LAN (VXLAN) provides greater scalability than VLAN. For example, VXLAN stretches a network deployment between the existing on-premises network and a newly created cloud network using a bi-directional tunnel. This requires virtual machines (VMs) on both environments to be members of the same VLAN.

An administrator is securing the organization's cloud-based network resources from potential connections by configuring rules in the Access Control List (ACL). The rules will either accept or block the connections to the network based on predetermined criteria. What cloud appliance is the administrator configuring?

WAF

A cloud administrator is setting up security measures for a publicly available web service. Which of the following is the most suited solution for this scenario, understanding that security is a defense in depth approach?

Web application firewall WAF

In which of the following circumstances would a hub-and-spoke SDN (Software Defined Networking) design be an appropriate choice? (Select all that apply.)

When the organization needs to isolate workloads When the organization needs to centralize the management and analysis of traffic

A company has asked an administrator to suggest options that would allow the company to have an almost entirely logical solution from the current physical hardware in place. The company has already procured a host of virtualization resources, including VMs, hypervisors, vCPUs, and vNICs. Which method would permit the company to add a virtual storage option to the entire solution?

With hyperconvergence, compute, storage, and network resources are inseparable and managed as a single unit. This is in contrast to converged resources, which an administrator can separate into their constituent parts. Hyperconverged storage allows the company to accomplish its intent of combined logical storage.

An AWS technician is utilizing a remote desktop to investigate a company's internal application that is experiencing bug-like symptoms. Which tool would allow workstations used by the app users to accept any patches or updates, following the technician fixing any discovered issues?

Workspaces

A cloud server administrator is configuring NetIQ eDirectory for directory services. Given the system's design, which protocol would be most suitable to ensure seamless operation and standard compliance?

X.500 is a set of protocols that define how global directories should be structured. Enabling it would ensure the seamless operation of NetIQ eDirectory with compliant systems.

djfkj

dkj

A cloud technician is analyzing storage tiers for a critical Structured Query Language (SQL) instance which requires high performance. Which of the following would best suit the technician's needs?

io2


Conjuntos de estudio relacionados

The Reformation Unit - MCQ and Terms

View Set

Prep U - Qs / Chapter 47: Lipid-Lowering Agents

View Set

Final for ADS 105 Chapter 9 & 10

View Set

PED 116 FINAL EXAM (CHAPTER 10 )

View Set

Anatomy and Physiology Chapter 4

View Set

Health Insurance Policy Provisions - Chapter Exam Answers

View Set