Cloud+
SMTP
Which e-mail transfer protocol is commonly used to send notifications?
Integrity
Which function ensures data is correct and has not been tampered with?
Run through each test case.
Which functional testing step is best suited for automation?
Balloon driver
Which hypervisor component communicates to the hypervisor to reclaim memory inside a virtual machine guest?
L2TP/IPSec
Which of the following is considered a secure protocol or protocol pair for tunneling?
Cloud service provider outage
Which of the following is most likely to be addressed by an SLA?
Lack of virtual machine guest tools
Which of the following is most likely to result in problematic network time synchronization?
Incorrect RBAC permissions
Which of the following is most likely to result in problematic runbook automation?
NAS
Which of the following is not a hard disk drive (HDD) interface?
OS update history
Which of the following is not a statistic that you would typically find in a server performance baseline?
Business continuity management
Which of the following puts the business continuity plan guidelines into motion?
Change manager
Which organizational role determines whether IT changes get approved or rejected?
Paged pool
Which performance metric represents the amount of data that has been paged to disk?
Disable network connectivity for the host.
Which plan of action best addresses an infected corporate desktop computer?
22
Which port is used for SSH administration?
25
Which port is used for standard SMTP mail transfer?
WMI
Which protocol does Microsoft System Center Configuration Manager (SCCM) use to gather hardware inventory?
They withstand vibrations better than hard disk drives. They are quieter than hard disk drives.
Which statements regarding SSDs are true? Choose two.
Availability
Which term best relates to an SLA?
Availability
Which term is best associated with data backups?
Multilevel SLA
Which type of cloud provider document provides a similar solution to different customer types?
Geo-clustering
Which type of redundancy allows nodes to reside on different sides of a WAN?
Synchronous
Which type of replication does not notify the application of a successful write until all replicas have acknowledged the change?
Vulnerability testing
Which type of testing identifies weaknesses but does not exploit them?
White-box
Which type of testing is executed by developers who wrote the code?
The server certificate is untrusted.
Using an internal CA, you have issued a new TLS certificate for a custom website and configured the server to use it. Users complain that they cannot successfully connect to the website. What is the most likely cause of the problem?
Content addressed storage
Regulations dictate that specific types of documents be stored permanently. Metadata must be added to each stored item to facilitate retrieval. Which term best describes this storage system?
RDP
Nick is setting up a new fleet of IIS web servers in his IaaS e-commerce site. The company has elected to use a hybrid approach and desires graphical connections to the Windows bastion hosts. What traffic must he permit through the external-facing firewall to the host?
CaaS
Outsourcing VoIP IT systems to public cloud providers is a form of ____________.
Assessment
Port scanning falls under which vulnerability testing phase?
Add project name metadata to cloud-stored files
Project managers complain that storing files in the cloud for a variety of projects makes it difficult to locate files related to a single project. Which solution involves the least amount of administrative effort?
Cloud management and monitoring application
Reports are generated where?
Marketing Management Accounting Internal operation centers
Reports are often provided to which interested parties? (Choose four.)
Network Storage Compute
Robert has been tasked to create a security implementation that segments his employer's e-commerce design to allow for policy enforcement. What are some of the areas that he is investigating? (Choose three.)
FC switch
Where is storage zoning configured?
Security
Which of the following is not a valid pooled resource?
Each cloud service has its own SLA.
While assessing public cloud providers, you decide to review SLAs. Which of the following statements accurately describes SLAs?
RTO = 3 hours
While creating a DRP, you are concerned with how long the restoration of data files will take. You conclude the restoration cannot exceed three hours. What is another way of stating this?
Virtualization host
____________ is another name for a hypervisor.
Heartbeat
What do cluster nodes use to conclude that a member is no longer available?
Block suspicious activity
What does an IPS do that an IDS does not?
Deployments Upgrades Migrations Retirements
What does the application life cycle include?
Federations
What identity system gives multiple discrete organizations access to your NoSQL community cloud database via your cloud-based application server?
Available bandwidth
What increases as compression reduces the size of transmitted data?
Dashboard
What is a common cloud-based GUI used to get an overview of your security operations?
DIACAP
What is a compliance requirement to be certified to meet the U.S. Department of Defense security requirements for contractors working with the U.S. Department of Defense?
Online backup
What is another name for a cloud backup?
Code backup
What is required for code rollback to work?
FIPS 140-2
What is the National Institute of Standards and Technology publication that coordinates the requirements and standards for cryptography modules?
Hypervisor
A ____________ is a piece of software that runs virtual machines.
Any port above 1024
A client web browser connects to an HTTPS web server. Which port does the server use to communicate back to the client?
MFA
A constantly changing six-digit numerical token is used in what type of cloud service?
Community
A medical records company wants to take advantage of a complex application but wants to realize the cost savings by accessing a shared instance of the application hosted in the cloud. Because of regulatory requirements, what type of cloud delivery model would you recommend they use?
SAN
A medium-sized corporation requires the fastest solution for reading and writing database transactions to shared storage. Which solution should be used?
Load balancing
A newly developed application is being tested under a large volume of client requests. What could increase application performance?
API
What is used by software developers to hook into cloud-provided programmatic libraries?
Document the solution.
After a development team solves bugs within a web application, what should it do next?
Ethernet
All of the following use LUN identifiers except ____________.
Web
Allison is in the process of migrating graphical vendor management utilities away from locally installed applications on her desktop and to an approach that does not require any local installations and will be easier to implement and use. What approach would meet these requirements?
Install a newer version of Visual Studio.
As a developer, you plan to use Microsoft Visual Studio to manage cloud resources through cloud APIs. When you begin testing cloud connectivity in Visual Studio, you realize cloud options are not supported. What should you do?
Submit an RFC.
As the department head for the Marketing team, you would like Android smartphones used by team members to have VPN access to corporate networks. What should you do?
Application failure Latency Request drops
Capacity boundaries can cause which of the following? (Choose three.)
Baseline
Cloud capacity can be measured by comparing current usage to what?
RAM CPU Storage
Common cloud resources in your deployment that may saturate over time include which of the following? (Choose three.)
IDS/IPS DNS
Connie is documenting different methods that her remote operations center can use to access the Calgary fleet of servers operating in a community cloud. Which of the following are not viable methods? (Choose two.)
Asynchronous
Data replication is often used to store copies of real-time data in remote zones. When there is a need to have the master data immediately updated, and then on the backend, update the remote zones, what type of replication would you recommend your operations department to configure?
True
Databases capacity can be added by scaling horizontally.
SaaS
Dimitry has been tasked to develop a cross-cloud provider migration plan as part of his company's business continuity plan. As he assesses the feasibility of migrating applications from one public cloud provider to another, what does he find is the service model that has the most lock-ins and is the most complex to migrate?
Orchestration
Developers in your organization make improvements to various web applications regularly. Currently, the process involves the manual deployment of cloud-based virtual machines, web server configurations, and back-end databases. What should be used to streamline this workflow?
Cloud templates
Developers in your organization need a quick, consistent method of creating cloud-based software testing environments with specific operating system and application software configurations. What should you configure?
Blue-green
Developers use multiple cloud staging slots, or environments, for testing and production versions of an application. What type of testing model is this?
Confidentiality
Encryption provides which service?
Two-factor
Hank goes to his local bank and inserts his card into the ATM and then enters his PIN on the keypad. What type of authentication is he participating in?
The DRP is specific to a system.
How is the DRP different from the BCP?
Three
It is generally safe to allocate up to ____________ vCPU(s) for each physical CPU.
Databases
Large batch processing jobs are common for which type of application?
Separation of duties
Laura is a Linux server administrator. Your company runs an HR payroll system on the Linux servers. At a recent IT meeting, Laura suggested being granted permissions to clear Linux server logs as their size reaches a specific size. Which security principle is violated if Laura is given the ability to clear Linux server logs?
PaaS
Liza is reviewing the maintenance responsibilities between her company and its public cloud service provider. She notices that the cloud provider takes responsibility for the operating system, and she needs to assume responsibility for any applications or services running on the operating system. What type of service model is she operating under?
.vhdx
Microsoft Hyper-V virtual disks use a file extension of ____________.
Gray-box
Penetration testers have performed reconnaissance on a target through web scraping, where publicly accessible information has been compiled. What type of testing is this?
Users
Performance issues are measured by the load on a system. Which of the following should Jane be concerned about as she integrates her new marketing group into her PaaS cloud fleet?
NAT
Petaire is a cloud network sysadmin. Cloud-based virtual machines hosting a custom web application have been deployed to a single cloud virtual network that currently has no Internet access. Each virtual machine must have Internet access, while incoming connections initiated from the Internet must be blocked. Which solution should Petaire deploy?
Asynchronous
Pete is concerned about stored data that is replicated to a standby zone but not immediately. The delay means there is going to be a short period of time where the data is not consistent. What storage replication service ensures eventual consistency?
Firewalls Load balancers Virtual machines DNS servers Durable storage volumes
RESTful APIs using XML and JSON on southbound interfaces can be used to orchestrate and automate what cloud-based services? (Chose all that apply.)
CPU RAM Network I/O
Rebecca is writing a change management plan to increase the processing abilities of one of her middleware servers. What components can she upgrade to increase server performance? (Choose three.)
Demilitarized zone
Sensitive cloud virtual machines are grouped together on a cloud network called HQApp. Two public websites will be deployed. One of the websites will require access to resources on the HQApp network. What strategy should be employed?
HBA
Servers require a(n) ____________ to connect to a SAN.
Peak capacity Bandwidth starvation
Sharon is a network engineer for your firm and is investigating the WAN connection into the hot site. In the event of operations being moved to the backup location, she wants to make sure that the load capacity is available. What should she be most concerned about? (Choose two.)
traceroute
Sharon is unable to reach her Linux-based web server hosted in the Singapore zone of the cloud. She is located in Austin, Texas. What utility can she use to verify the connection path?
Block
Storage area networks support which type of storage? (Choose the best answer.)
Ephemeral Nondurable
Storage that does not survive a virtual machine removal is referred to as what classification? (Choose two.)
RAID
Terri is planning on implementing physical disk redudenacy on her SQL database in the public cloud. She is creating specifications for her virtual machine image that will become the template for the database servers. What time of disk redundancy options could she implement to meet the needs of a SQL deployment?
Terminal server
The remote disaster recovery location follows the warm site model. To configure the network switches, routers, and firewalls remotely, Mark will need serial port access from his company's operations center. He has 14 serial ports currently but needs to be prepared for any unplanned expansion requirements during a disaster recover cutover. What device would you recommend he implement at the warm site?
Edge location
These cloud facilities provide the ability to connect locally for fast, low-latency connections to the DR location. They can also store, or cache, data at these locations for very fast responses to local user requests.
Orchestration
These cloud-based systems abstract and hide much of the complexity of modern cloud systems and also reduce operational errors by executing tested cloud systems, scripts, workflows, or runbooks to make sure the systems are configured correctly.
UDP 123
Time synchronization traffic needs to traverse a firewall. Which port must be opened?
Disable the accounts.
To increase TipoftheHat.com's security posture, Allison is reviewing her company's user accounts that access the fleet cloud resources. Allison notices that the summer interns have left to go back to school but their accounts are still active. She knows they will return for the winter corporate announcements and new products rollouts to assist in the project over winter break. What would you suggest Allison do with these accounts?
Baseline
Upgrading to a newer operating system may require that you update what?
Thin Thick
Virtual machine disks can be provisioned using ____________ or ____________ provisioning. Choose two.
Subnet
What determines the size of a group of servers sharing the same network range?
VMs cannot access host memory directly.
Why are shadow page tables necessary?
Synchronous replication
Will is running his backup DR site in a DNS load balancing rotation for testing. He needs to ensure that the database in the DR facility is updated in real time and current with the production replica in the primary data center. What type of updates should he define in his primary data center servers prior to enabling DNS load balancing?
Offline P2V
A busy on-premises file server needs to be migrated to the cloud as a virtual machine. Which migration strategy should you employ?
Storage migration
A busy virtual machine's storage needs to be moved to a faster storage array. Which process should you employ?
RTO
A cloud SLA specifies that the maximum yearly downtime is approximately 6 minutes. Which term best describes this downtime?
Resource pooling
A cloud service provider allocates resources into a group. These resources are then dynamically allocated and reallocated as the demand requires. What is this referred to as?
RTO
A company has concluded based on past website downtime events that two hours is as long as its website can be down before the company suffers irreparably. What does this timeframe apply to?
Distributed processing, jumbo frames
A custom application draws insights from big data analytics. Due to the large volume of data transmitted between application components, you need to minimize computational and network latency. Which pair of options should you consider?
HIDS
A customer service tracking application runs on an internal web server. You need to ensure any suspicious activity related to the server and the app are logged, and administrators are notified. Which solution should you deploy?
Shared storage
A high availability cluster of hypervisors allows virtual machine failover and migration with minimal to zero downtime. Which configuration makes this possible?
Create subordinate CAs, delegate to other admins.
A large corporation has a single PKI administrator. What should be done to ensure the PKI administrator is not overwhelmed?
Divide and conquer
A middleware application running in the cloud is reporting session drops in its log files. You need to quickly resolve the issue and get the server back online. You decide to run ping and traceroute tests on the server as your first line of troubleshooting. What approach are you using?
Community
A national tax preparation firm is accessing industry-specific productivity applications in the cloud; many other tax preparation companies are also subscribing to the same service. What model of cloud are they accessing?
Enter maintenance mode.
A new HBA has arrived for a physical cluster node server. You need to install the HBA while ensuring clustered apps continue to run. What is the first thing that you should do on the server?
Auto-scaling
A public website experiences unpredictable usage spikes that have historically slowed down the application to unacceptable levels. What should be configured to ensure performance is optimal during usage spikes?
There has been a change in the runbook workflow.
A runbook that previously ran without issues is no longer functioning. The runbook uses cloud APIs to query cloud service log entries. What is the most likely cause of the failure?
LUN
A storage administrator has configured iSCSI storage on host storage1.fakedomain.local. You need to configure a virtual machine that will use some of that shared storage. What piece of information is required?
MAN
A university campus consists of many buildings populating a large property. All buildings are linked together through underground fiber-optic cables, creating a private network infrastructure. What type of network is this?
Acceptable use
A user sends jokes to a large number of users through the organization's cloud mail system. What type of policy violation is this?
The certificate has expired.
A user, Pete, complains that his smartphone no longer authenticates to the company VPN when he is traveling for work. The company issues a unique PKI certificate to each smartphone for VPN access. What is the most likely cause of Pete's problem?
Incremental
A virtual machine file server's virtual hard disks are corrupt and cannot be repaired. Which type of tape backup takes the most amount of time to restore?
Full
A virtual machine file server's virtual hard disks are corrupt and cannot be repaired. Which type of tape backup will take the least amount of time to restore?
Optimized database read settings
A web application is experiencing slow performance when running back-end database queries. Which configuration would most likely improve query performance?
Change the outdated firewall rule.
A web server administrator has changed the listening port from 80 to 81 to increase security and restarted the web server daemon. External traffic must be able to reach the server. What is the next task that should be performed by the web server administrator?
API
A web-based dashboard is being deployed by your company. Hank has been tasked to develop the application but is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for him to use to meet his requirements?
Network latency Storage I/O operations per second Swap file utilization Scalability
A well-architected framework includes which of the following cloud performance components? (Choose four.)
Connections per second
API request capacity is measured with what metric?
IP address Subnet
API request limits are normally applied to which of the following items? Choose two.
Speed or duplex mismatch
Adan has configured an isolated network infrastructure for a private cloud. After starting multiple hypervisors on the network for the first time, he notices unacceptable network latency for one specific hypervisor. What is the most likely cause of the problem?
Establish a log retention policy.
Administrators in your organization complain that some cloud virtual machine log files are being deleted to free up disk space. You are responsible for cloud virtual machine maintenance. What should you do?
Implement application containers.
After deploying a custom web application to an existing application server, you determine the change has negatively affected the stability of both servers. Performance metrics indicate the server is not overwhelmed. You need to ensure the stability of both servers while minimizing resource utilization. What should you do?
dig nslookup
After deploying a new public website, your validation steps ask you to check the domain name to IP address mappings. What utility can you use for validation? (Choose two.)
The DHCP configuration has run out of IP addresses.
After deploying a new virtual machine in the cloud, you notice that although it has received a public IP address, it has not received a private IP address. What is the most likely cause of the problem?
Allow TCP port 3389 traffic into the cloud network.
After performing multiple P2V migrations of Windows and Linux on-premises servers to the public cloud, you notice that only the Linux servers are reachable over SSH. What should you do to ensure the Windows servers are reachable for remote administration?
Document the solution.
After solving a unique user connectivity issue to the Internet, you move on to the next helpdesk ticket. Which troubleshooting step did you miss?
Change management
Allison is preparing to modify a network access control list and add three firewall rules to her private cloud HR systems. She is planning on submitting a detailed plan to accomplish these tasks. What process is Allison following?
8
An HBA World Wide Name consists of ____________ bytes.
Add process IOPS read values together.
An application uses multiple background processes to read data from a cloud MySQL database. You need to determine the average application read IOPS for performance adjustments. What should you do?
Resize the virtual machine.
An existing cloud virtual machine does not have the computing power to properly serve an application. What should you do?
Application replacement
An existing on-premises application will no longer be used in your company's public cloud implementation. Instead, a functional cloud equivalent will be used. To which aspect of the application life cycle does this apply?
dig
An intern at your company is asking about the mappings between the layer 2 MAC address and the gateway router. He wants to verify that the VM has the correct network mapping information. Which utility would you tell him to use to gather this information?
Update device trusted authority lists.
An internal CA-issued certificate has been configured for an internal website. What is the next task that should be completed?
Multipathing
An intranet website uses a backend SQL database stored on the SAN. You need to ensure that the website can access the SQL database at all times. What should you configure?
RDP
An on-premises Microsoft Windows Server Core installation provides Hyper-V virtualization without a GUI. What should be used to remotely manage virtual machines at the command line?
P2V
An on-premises database server needs to be migrated to the cloud as a virtual machine. What type of migration should be done?
Deployment
At which application life cycle phase are breakpoints removed by developers?
Maintenance
At which application life cycle phase is software performance tweaked?
Deployment
At which application life cycle phase is the software installed and configured?
Add capacity. Configure time-of-day capacity. Remove capacity. Maintain a minimum number of servers.
Autoscaling can be configured to which of the following? (Choose four.)
Not enough time to complete backup
Batch jobs handling on-premises backups to the cloud are failing on some occasions. What is the most likely reason for this?
QA
Before a new patch is released to the public, the release manager at a large software development house has requested a report that shows the pass/fail data to verify that the fix does, in fact, work. He is requesting data about the issue it was intended to fix and the results of the tests done to make sure that the fix does not interfere with other processes and that there are no memory or buffer issues experienced with the patched version of software. What process is he verifying?
Baseline
Before determining that performance levels are out of the norm, what is required?
Install antivirus protection software on public-facing servers. Shut down unused services. Implement a host-based firewall or security groups. Disable all default accounts.
Bob is compiling a list of security tasks to implement to harden his public cloud posture. What are four recommendations you would suggest? (Choose four.)
Windows OS Android APIs Service queues Launch scripts
Bob is configuring an event notification service and notices that there are many different devices and services that can be subscribers to the notification system's published events queue. The notification services offer each event to be sent to a fan-out of multiple devices that can act upon the received information. What are examples of the notification server's receivers? (Choose all that apply.)
SSL
Brad has been tasked with encrypting data in flight into his e-commerce presence in a community cloud. He is investigating a standards-based secure solution that web customers can easily implement to ensure secure transactions. What is a good solution that you would recommend to Brad?
CPU RAM Network
Capacity and utilization reporting often contains data on which of the following objects? (Choose three.)
DNS
Carl has been investigating stale records in his database that were added by other applications but never deleted or timed out after they were no longer in use. This mappings application is now causing issues with the server addressing and troubleshooting. What system is he looking at?
Read replica I/O CPU Network packet drops
Carl has noticed a slowdown in the response times of his SQL database and has been tasked to investigate the root cause of the delays. He has decided to configure his monitoring application to gather additional data on what may be the cause of the delays. What are some of the objects you would recommend he collect data on? (Choose three.)
Private
Carl is documenting his employers cloud deployments and needs to label the cloud delivery model is used by his single organization. As a Cloud+ consultant, what would you suggest he name his internal cloud?
Storage Database
Carl is planning his cloud migration and must meet HIPPA requirements for confidential storage of cloud data at rest and in use in the cloud. What services must be addressed by Carl? (Choose two.)
Availability Instance initialization time Task runtime Total storage capacity MTBF
Carol is collecting information on objects to monitor in her community cloud deployment. She is interested in establishing a baseline to produce a trend analysis report. What are some objects that she could natively monitor? (Choose all that apply.)
SSH
Carrie is researching various remote access options to access her Linux servers in a public cloud. She has been asked to provide a standardized and secure solution that protects against snooping. As a Cloud+ architect, you have been asked to assist. What protocol would you advise she implement?
HTTPS SSH FTPS
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent network analyzers from being able to read data in flight. Which of the following are considered secure network protocols that she recommend using? (Choose three.)
DNS
Christina has been pinging a new web server by its URL and getting strange and seemingly unexplainable responses from unrecognized systems. She recalls that the new web farm is on a reclaimed subnet that was no longer in use in their cloud server fleet. What would you recommend she investigate to resolve the issue?
Access control list authorization
Christina is configuring her public cloud object storage bucket for granular access from a new Linux VM. She wants to set the permissions on the storage system. What would you recommend?
FedRAMP
Christina is investigating obtaining compliance for her employer, which is a large public cloud company. She has been asked to provide a report on the process to enable her company to host a large U.S. federal government database. Which compliance certification is she investigating?
Automation
Cloud dashboards allow for monitoring and sometimes configuring maintenance operations with the cloud provider. If you have regularly scheduled backups for your cloud storage volumes, you can configure the cloud provider to perform specific operations for you using what backend systems?
IaaS
Cloud data replication falls under which type of cloud model?
Shared responsibility
Cloud operations are the responsibility of both your organization and the cloud service provider. What model defines what you are responsible for and the responsibility of the provider?
Uptime Network performance
Cloud provider SLAs outline which of the following? (Choose two.)
Object storage
Cloud providers allow the storage of files of almost any size using ____________.
Compute
Cloud segmentation enhances security for cloud-based applications. What services is it a best practice to segment?
Regions
Cloud service providers will often segment their operations to allow for resiliency, survivability, and geographic proximity. What are these geographical segmentations referred to as?
PDF Excel
Cloud-based reports can be generated in which formats? (Choose two.)
Access control
Computer operating systems have mechanisms that grant rights to users for access to system objects like storage volume directories and files, administrator rights, and so on. What should you monitor to make sure that old or unused entries are deleted?
Storage
Connie has noticed an increase in the response time of the SQL database application she runs in her IaaS deployment. When comparing current results against her baseline measurements that she recorded when the database was deployed, she verified that there has been a steady increase in the number of read requests. What should she focus her troubleshooting on?
Enable the runbook to run on multiple runbook servers.
Currently your automation environment consists of one runbook server. You need to ensure a critical weekly runbook executes on schedule. What should you do?
DHCP relay agent
DHCP functionality across subnets is configured using a ____________.
Elasticity
Dale has been monitoring storage volume utilization and is writing a change request to add capacity. He has decided to automate the volume allocation size. What cloud feature can he take advantage of?
Event correlation
Dawn has been working in the NOC and has been tasked with performing a root-cause analysis on a recent outage that affected the middle tier web stack in a private cloud. She is looking at the log files generated and notices that there are more than 430 logs that were generated around the time the site failed. What function does Dawn need to perform to distill all of these log files into a meaningful report?
Private
Digital signatures are created with the ____________ key.
Public
Digital signatures are verified with the ____________ key.
Data integrity Authentication
Digital signatures provide which services? Choose two.
Lockout
Donald has been tasked by the IT security group in his company to prevent dictionary login attacks to the company's VMs running in a private cloud at a remote data center. You have been brought in to offer him advice to deter the random but steady login attacks. What would you recommend be enabled to help prevent this type of cyber-attack?
ifconfig
Donna logged into her cloud bastion host by making an SSH connection from her operations center desktop. She uses the Linux host to connect to other systems in the private cloud. She needs to add an access control list rule to allow the bastion server to access a new subnet. She needs the source IP address of her host. What command can she run on the server to collect this information?
Mirrored site
Due to a short RTO of five minutes, you need to ensure a mission-critical website is available in the event of a regional disaster. What should you configure?
3389, 22
Due to regulatory compliance, your organization's security policies require firewall rules on all cloud networks. You need to allow inbound Windows and Linux management traffic. Which ports must be opened in the firewall?
RADIUS TACACS DHCP FTP DNS Active Directory
During a disaster recovery switchover, what network services may need to be modified as part of a multisite failover to the backup site? (Choose all that apply.)
Change management
During a recent downtime window, the server team was applying patches to an application, and the networking team was upgrading a router's interface to 10Gbps. When the network was down for the upgrade, the server team complained that they could not download the needed software patches. During a post-downtime status meeting, it was determined that which process should be modified to prevent this from happening in the future?
Service strategy
During which ITIL phase are business requirements documented?
Complexity
Elaine works in IT security and is reviewing user count policies. She needs to strengthen passwords by enforcing a mandatory minimum of a nondictionary word that is six or more characters in length, contains at least one uppercase letter, and contains a special character. What is she defining?
Bursting
Ethel is the network architect for a hybrid cloud operation and has interconnected her private cloud to a community cloud in another province. She is investigating using the community cloud to supplement her private cloud operations during end-of-month processing. What operation is she going to perform?
Merger Acquisition
George and Wendy are working together as cloud engineers to combine two like systems into one. What type of activity would necessitate this? (Choose two.)
Default gateway DNS NTP
Hank designed an application tier for his company's new e-commerce site. He decided on using an IP subnet that uses a /28 IPv4 subnet. He is planning for a maximum of 14 servers. You are brought in as a cloud architect to validate his design. What other devices may be on this subnet other than the servers that would also require IP address assignments? (Choose three.)
Warm site
Hank is preparing a disaster recovery test drill in advance of the upcoming hurricane season along the Gulf of Mexico. His plan is to create a DR location in the Midwest and have a database server running at that location with a synchronously refreshed data replica. His DR plan calls for activating all other services in the event of a hurricane causing an outage at his primary data center. What model is Hank going to deploy to meet his requirements?
CPU
Hank just completed running some security automation scripts on his new fleet of application virtual machines. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his management dashboard?
SSL/TLS
Hank works in his e-commerce company's IT security group and has been tasked to investigate options that will allow customers to securely access their personal records stored on the cloud deployment from their smartphones. What is the most common in-flight e-commerce security posture on the market?
Certificates
Harold is getting alarms from the public cloud's application load balancer about security failures. Harold reviews his problem resolution documentation to investigate, and there have been no troubles reported in the past year. The load balancer has been configured to offload port 443 web traffic from the backend fleet of web servers. As a Cloud+ consultant brought in to assist, what should be the focus of the investigation?
PaaS
Harry is investigating cloud service models and wants to outsource the security responsibility to the cloud company and not have to take responsibility for maintaining and patching the operating systems. Which service model will meet his requirements?
Mandatory access control
Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies?
Availability zone Identity group Hypervisor
High-performance network clusters should share which the following? (Choose two.)
Deviation from baseline
Historical log data for your users shows normal cloud storage usage increases by an average of 9 percent annually. Over the past year, however, usage has increased by 18 percent. How is this change best described?
Scavenging
Host DNS records for devices no longer on the network still exist in DNS. Which option should you enable to remove stale DNS entries?
White-box
IT administrators within the organization are conducting penetration tests against the organization's cloud IT systems. What type of testing is this?
Public
In a PKI, network data is normally encrypted with the recipient's ____________ key.
MAC
In which access control model does the operating system determine who has access to a resource?
SaaS PaaS
In which cloud computing model does virtual machine operating system patching fall under the cloud provider's responsibility? Choose two.
Dedicated compute
In which type of computing environment does a single tenant lease equipment?
Trouble tickets Support engagements Outages
Incident reports include which of the following? (Choose three.)
Eight hours
Incremental cloud database backups occur three times daily. What is the RPO?
CaaS
Instead of hosting an on-premises PBX telephony solution, your organization has chosen to outsource this to a public cloud provider. Which category of cloud services does this apply to?
Cold site
Jack is preparing to update his company's business continuity with details on its DR backup site. His plan is to have a facility ready with floor space, power, and cooling that has facilities for him to load in his server racks to restore service. What type of DR implementation is Jack deploying?
RPO
James has been directed by his employer's finance department that they cannot afford to lose any more than 30 minutes of data in the case of a database failure or other catastrophic event. James has updated his corporate business continuity plan and has had his cloud provider update its SLA. What was the metric that was changed?
tcpdump
James is troubleshooting a DNS issue and wants to look at DNS frames being sent and received from his network adapter card on a web server. What utility would he use to collect the traces?
Autoscaling
Jeff has been monitoring resource usage increases in his web server farm. Based on trending data he has collected, there will be regular requirements to increase CPU capacity for his web servers as usage increases. Jeff wants to use the automation capabilities of his private cloud to automatically use the orchestration software to add CPU cores as required. What can he implement to automate this?
Create a custom dashboard.
Jenny is responsible for a subset of cloud-based virtual machines. She needs a way of quickly viewing key performance indicators for the servers. What should Jenny do?
File transfer
Jerry is doing a test cutover to his hot site as part of his company's ongoing disaster recovery preparedness. He notices on his WAN monitoring dashboard that there are peaks of traffic flow from the primary to his hot site. What is he seeing take place?
DNS
Jerry is expanding a public subnet in his company's e-commerce site. After performing the address change for all of his public-facing web servers, he tested connecting from a bastion host located offshore. He was unable to connect. What does he need to change to allow the remote site to connect to the web server?
SAN
Jerry is learning about cloud storage systems, she is interested in learning about high-speed network storage solutions, What would you recommend she focus her research on?
SSO
Jill is planning on optimizing and controlling user access by implementing a technology that will allow access to all allowed systems at the time of user authentication. She is implementing the LDAP protocol to enable this service. What is she planning on deploying?
SLA
Jill is reviewing a document form her secondary community cloud provider, what is the document that outlines specific metrics and the minimum performance that is offered by the cloud provider?
ping
Jill logs into her NoSQL database server residing in a private subnet on a public cloud. She needs to verify network connectivity with the application tier. What utility can she use as a quick connectivity test?
HIDS
Jim has a critical server in the application tier of his cloud-based deployment. He is looking at a device-specific security solution to add defense-in-depth capabilities to his currently deployed network-based security defenses. He has been researching ways to mitigate potential hacking attempts. What is a good solution for him?
Total connections Named users Current connections Usage metrics
Jim has added a new group of users to his IaaS-based NoSQL database. What license requirements does he need to investigate to ensure compliance? (Choose all that apply.)
P2V
Judy is migrating a Linux OS from running on a dual-slot, eight-core server in a private cloud to a VMware-based server in the public cloud, what type of migration would she perform?
VPN
Kelly has picked up a trouble ticket that shows the connection between the Toledo field office and the Detroit cloud edge location has dropped. She confirms it is a secure Internet-based access solution. What type of connection is this?
Smartphone app Keyfob
MFA tokens can be obtained where? (Choose two.)
Community
Marcia is an IT consultant for a medium-sized medical practice. She has been asked to determine which outsourced cloud solutions would best meet regulatory requirements for the health industry. Which type of cloud is best suited for this scenario?
RTO
Mark has been reviewing disaster recovery planning, and after receiving direction from his company's board of directors, it has been determined that they can only withstand a maximum of 36 hours of downtime. Mark is updating his DR plan with this new metric. What part of the plan should he modify?
VSAN LUN masking
Martha is learning about storage access control to secure her cloud storage assets. She wants to know what low-level security methods the cloud provider is using on its storage area network and storage head end controllers. What two technologies is she learning about? (Choose two.)
Multifactor
Mary is a Cloud+ certified security consultant for her company. She is researching enhanced security access systems. What could she suggest that requires something you have and something you know?
HIPAA
Mary's boss has asked her to investigate moving the company's medical records to the cloud. What compliance mandate must the cloud provider meet for Mary to recommend deploying her company's operations to the cloud?
Vertical scaling Horizontal scaling Cloud bursting
Matt is preparing for an upcoming promotion his company is offering during a major soccer game. He needs to determine his options to add capacity to his company's web server farm so it can handle the anticipated additional workload. You are brought in to consult with him on his options. What do you recommend as possible solutions? (Choose three.)
IPS
Mike has been investigating multiple hacking attempts on his cloud e-commerce web servers. He wants to add a front end with a service that actively takes countermeasures to shut down the hacking attempts. What application would you suggest that Mike deploy?
Vertical scaling
Mindy has a SQL database back end that runs on a multi-CPU instance that has reached 100 percent utilization. The database supports a single server. What options does she have to support the requirements of this database?
Authentication
Multiple users are complaining that they cannot access a cloud-based collaboration system. The operations center has been investigating and has, so far, verified that the MFA applications are operational. What user system are they troubleshooting?
Trends Peak usage Anomalies
Object tracking can be helpful in identifying which of the following? (Choose three.)
SLA
Object tracking should be aligned with which of the following?
Two
RAID 1 requires a minimum of how many disks?
Three
RAID 5 requires a minimum of how many disks?
Four
RAID 6 requires a minimum of how many disks?
Roles
Robert has been tasked with creating an access control solution for his company's fleet of servers in a hybrid cloud configuration. He has been asked to define the required tasks and then to put users, groups, and servers into this task-based implementation. What type of access control should Robert deploy?
Roman's user account permissions have been changed.
Roman is a user in the HelpDesk_East group. Roman complains that he no longer has access to a restricted file server share on a Windows server. You verify that HelpDesk_East has the necessary permissions. What is the most likely cause of the problem?
Provider
SaaS orchestration systems are whose responsibility in the public cloud?
Variance
Samantha has been monitoring her cloud web server dashboard and notices that the CPU utilization on her company's database servers has been consistently at more than 80 percent utilization. She checked her baselines and reported that 57 percent utilization is normal. What is she noticing?
Design Implementation Planning Validation
Samantha has been tasked to meet FedRamp compliance for her customer's new contract. Where should she integrate compliance in her project? (Choose four.)
Multifactor
Sarah has been tasked to implement a strong user authentication strategy to secure dashboard access to her SaaS cloud services. She wants to use temporarily issued tokens to prevent unauthorized users from accessing her cloud administrator's account. What type of authentication would you recommend that Sarah implement?
Authorization
Sarah manages user accounts for her company's cloud presence. She has a trouble ticket open with Jill to assist her in accessing an SSD storage volume in the San Paulo region of the public cloud. What kind of user issue is she investigating?
Online Offline
Scott is planning his company's upload of stored data to the cloud. What are two common storage migration types? (Choose two.)
Virtual switch
Server interfaces are grouped together or aggregated into channel groups for additional throughput and fault tolerance. The LAN interfaces in the server are connected to what device in a hypervisor?
Hot site
Sharon has been directed to put together a disaster recovery plan based on directives from her company's executive management team. The company's core business is operating an e-commerce website selling winter apparel with 85 percent of its revenue received during the holiday season. If there was a prolonged outage, it would put the company's ability to continue as a financially viable operation in peril. Sharon has been instructed to create a plan that will restore operations in the shortest amount of time possible. What DR model should she implement?
XML JSON
Sharon is investigating a standards-based construct to enable automation on her load balancers. What is a good lightweight data-interchange format standard that is easily readable and for computing systems to parse and to generate? (Choose two.)
Network bandwidth
Sharon posted a new software update to her company's popular smartphone application. After announcing the release, she has been monitoring her dashboard information and has noticed a large spike in activity. What cloud resource should she focus on?
LDAP AD
Single sign-on services allow a user to log into the system one time and be granted device access without having to perform multiple system authentications. What two technologies enable SSO systems? (Choose two.)
PaaS
Software developers are most likely to consume which type of cloud service model?
Type 2 hypervisor
Software developers in your organization currently use Windows 10 desktops. Custom apps are being built and tested using test servers. Developers have asked for an operating system virtualization solution they can run on their desktops. What would you recommend?
Firewalls Load balancers DHCP
Sue is preparing a change management process to harden various services running in her cloud fleet. What are common services that she is preparing to harden? (Choose three.)
Change proposal
The IT director in your organization suggests the gradual adoption of public cloud computing for selected IT workloads. What formal process should be followed to make this modification organization-wide?
Subnet mask
The ____________ determines which portion of the IPv4 address identifies the network.
1
The archive bit for files modified since the last backup will be set to which value?
0
The archive bit for unmodified files that have been backed up will be set to which value?
Top down
The backend fleet of web servers is intermittently failing load balancer health checks and dropping out of the pool. You are involved in troubleshooting and begin your investigation by making sure the web application is operational. What approach are you undertaking?
Baseline
TipoftheHat.com's IT department wants to know what its normal day-to-day web hit count is so it can plan for the upcoming holiday selling season. Jim's job is to measure the incoming web requests and graph them against delay and missed connection counts. What type of data set is Jim producing?
Objects
To collect metrics, you set up your management application to measure what?
Resource access definitions
To make sure that all users are allowed to access only approved resources, Marie is auditing her public cloud identity systems. She wants to control specific access and operations. What is Marie defining?
Archive
To meet regulatory requirements, Jill must store customer transaction records for seven years. The data will most likely never be accessed after the second year and can be stored offline if possible to reduce storage costs. What type of storage operation can Jill implement to achieve her goal?
Remote
To meet regulatory requirements, your company must provide geographical separation between active and backup data of certain medical records your company collects and processes in Germany. The requirements stipulate that the data cannot leave the country and must be in two or more data centers. As the cloud professional for your company, what recommendations would you offer to meet these requirements?
Scaling in
To optimize costs, you need to ensure minimal virtual machine instances are used except during peak requests. Which option should you configure?
Collection
To promote consistent cloud monitoring and to reduce configuration overhead, Lisa has created a number of policies to obtain baseline data. What type of polices is Lisa creating?
Orphaned resources
Tom has been performing an ongoing inventory of his public cloud assets and has found a number of storage volumes, CPU allocations, VMs, and firewall instances that are not connected to any project and are not being used. What services is Tom collecting data on?
Verify full system functionality.
Trinity is a developer in your organization. A custom application has not been functioning properly and Trinity has been assigned to the support request. After applying code changes and checking in the code, she runs a series of regression tests using a script called regtest.sh. To which troubleshooting step does regtest.sh apply?
Deploy a new cloud virtual network.
Users complain about the poor performance of a newly deployed internal web application that has been deployed to the public cloud. After investigating the issue, you notice that three other busy web applications are also being used in the cloud with excessive network traffic. You need to improve application performance. What should you do?
The DHCP server cannot be reached.
Users complain that Internet access has been intermittent. You check the configuration of a user system and discover it has an IP address beginning with 169.254. What is the problem?
Identify the problem.
Users complain they do not have access to search a database server. You connect to the database host and set user read permissions to all database tables. Which troubleshooting step did you miss?
Enable block-level deduplication
Users in the marketing department normally share an original document that then gets saved with a different name for each user that modifies the file. You need to conserve disk space. What should you do to minimize consumed disk space?
Soft quota
Users in your company use a web portal in a private cloud to deploy new virtual machines. The underlying resource usage for all virtual machines is logged, but users are not prevented from creating new virtual machines. What type of configuration logs this type of data?
Clone it.
Users report stability issues with a custom web application deployed in a cloud virtual machine. Your team needs to address and test these concerns in a sandboxed environment. What is the next thing you should do to the virtual machine?
Virtual RAM Virtual CPUs Memory pools
VMs running on a hypervisor consume which of the following resources? (Choose three.)
.vmdk
VMware virtual disks use a file extension of ____________.
Edge
What DR location can be used to cache data close to your customer and ease access to your fleet of web servers?
Workflow
What application tracks a process from start to finish?
Chef Ansible Puppet
What are common automation systems that are used for patch management? (Choose three.)
Web console API CLI
What are common management interfaces that are used to migrate and manage cloud-based resources? (Choose three.)
Gather information Distill the issue Research Create a plan of action Test and verify
What are common troubleshooting steps? (Choose all that apply.)
Orchestration
What are complex software systems that automate cloud operations and are offered by companies such as Chef and Puppet called?
Baselines Capacity requirements Documentation
What are critical steps to take prior to performing a migration to the cloud? (Choose three.)
Runbooks
What are orchestration workflow automations called?
Configuration backups Documentation Diagrams
What are recommended procedures to take when preparing an outage response plan? (Choose three.)
Templates
What are software representations of a cloud network?
CPU Memory Storage
What are three examples of cloud elements? (Choose three.)
Development networks Production networks Quality assurance
What are three organizational uses commonly found in the cloud? (Choose three.)
Cluster
What are tightly coupled computers that allow for software patching without incurring downtime called?
Snapshot
What backup method creates a file-based image of the current state of a VM including the complete operating system and all applications that are stored on it?
Clone
What backup method is used to create a master copy of an image that can be used as a template to create additional systems?
Offline
What backup solution requires an administrator or tape jukebox to make it available by inserting a tape or other media into a storage system for retrieval?
Full
What backup type offers the advantage of a complete and up-to-date copy of your data in one operation?
Increase backup frequency.
What can be done to adhere to the RPO?
PaaS
What cloud model delivers all services except the application?
SaaS
What cloud model delivers all services, including the application?
IaaS
What cloud model delivers server hardware with no operating system?
Workflow
What deployment system offers a structured process for a series of actions that should be taken in order to complete a process?
Private IP address and port
What does PAT use to track individual outbound connections?
CLI
What is a long-standing text-based interface that is used to configure network services both locally and remotely?
SOC 3
What is a report for the public disclosure of financial controls and security reporting that does not contain sensitive and technical information called?
Dashboard
What is a visual representation of your current cloud operations?
Caching server
What is another name for a forward proxy server?
SDLC
What is another name for the application life cycle?
VXLAN
What is commonly used in cloud environments to separate network traffic between cloud tenants?
Ciphertext
What is encrypted plaintext called?
Operating system
What is required before installing a type 2 hypervisor?
Elasticity
What is the ability to automatically and dynamically add additional resources such as storage, CPUs, memory, and even servers referred to as?
Identify the problem.
What is the first step in a troubleshooting methodology?
128GB
What is the maximum amount of RAM supported by Citrix XenServer 6.1?
Two-factor Authentication
What is the name of the process when a cloud administrator uses his token, username, and password to log into the cloud console? (Choose two.)
Security policy
What is the process document that outlines your company's responsibilities in safely deploying your fleet of servers in the public cloud?
Obfuscation
What is the process of complicating the ability to read stored data?
Authentication
What is the process of determining the identity of a client usually by a login process?
Penetration testing
What is the process of testing your cloud access to determine whether there is any vulnerability that an attacker could exploit?
It is an index of the data on backup media.
What is the purpose of a backup catalog?
Cost
What of the following is not a benefit of using a Fibre Channel network compared to SCSI?
Runbooks
What reduces the amount of time spent on administrative tasks?
Firewalls
What service provides permit and deny polices that require regular review to delete unused entries?
They are more expensive than hard disk drives.
What statement relates to a disadvantage of using SSDs?
Tiering
What system was developed to address the different types of storage needs a cloud consumer may require for availability, response times, backups, and economics?
Orchestration
What systems do cloud providers implement for rapid deployment of customer-requested services?
Intrusion detection system
What systems monitor the network and report security issues?
Automation Virtualization
What technologies are used to enable on-demand computing? (Choose two.)
Automation
What technology was instrumental in the growth of cloud services?
Seek time
What term describes the time it takes for a hard disk actuator arm to move to the correct location?
APIPA
What type of IP address is given to a device when a DHCP server is unreachable?
Incremental
What type of backup operation is based on the change of the source data since the last backup was performed?
Online
What type of backup system is intended to provide quick restore access if needed?
Asynchronous
What type of replication notifies an application that data has been written before replica servers verify data has been committed to disk?
Horizontal
What type of scaling involves adding servers to a pool?
Vertical
What type of scaling involves replacing an existing server with another that has more capabilities?
Hotfix
What type of software change is designed for rapid deployment and to correct a specific and critical issue?
Patch
What type of software change is designed to address a known bug or issue and to bring a system up-to-date with previous bug fixes?
Version update
What type of software update may offer new features and benefits in addition to bug fixes?
SSD
What type of storage drive has no moving parts?
Social engineering
What type of testing involves user deception?
Put the system into maintenance mode. Disable system alerts.
When a server is undergoing updates, it may be in a state that it will not respond to health checks, API calls, SNMP, or any other means used to monitor its health by network management systems. This may cause false alarms and trigger automated troubleshooting systems. What can be done to prevent false alarms? (Choose two.)
Shutdown Restart
When applying a series of patches to your fleet of middleware servers in the cloud, you are concerned about the monitoring systems generating invalid alerts. What part of the server maintenance process would cause this? (Choose two.)
nslookup resolution of linux1.fakedomain.net to the correct IP address Firewall ACLs
When attempting an SSH connection to a newly deployed Linux virtual machine called linux1.fakedomain.net in the cloud, you are unable to make a connection. What should you verify? Choose two.
Cores Clock speed
When configuring a machine image, what compute resources do you define? (Choose two.)
Install a second network adapter.
When monitoring performance metrics on one of your servers, you notice that the server is utilizing 100 percent of the network bandwidth available to it. What modification could you make to the server that will most likely address the problem?
VM file format Online migration bandwidth
When performing a migration from your on-site private cloud to a new community cloud data center, which of the following are project management pre-migrations action items? (Choose two.)
Elasticity On-demand computing Pay-as-you grow
When you migrate your operations to the cloud and you decide to match computing resources with your current requirements, what can you take advantage of to expand your compute capacity in the future? (Choose three.)
TTL
Which IP header field value is decremented each time the packet goes through a router?
Service design
Which ITIL phase is related to support documentation such as service level agreements?
Continual service improvement
Which ITIL phase seeks flaws and fixes any that are found to make services more effective?
Sysprep
Which Microsoft tool is used to prepare an operating system for placement on a different hardware platform?
SCVMM
Which Microsoft tool provides hypervisor and virtual machine management capabilities?
Jumbo frames
Which NIC feature allows for a larger individual Ethernet packet size?
Restart-Computer
Which PowerShell command restarts a host?
Get-EventLog -ComputerName Charlee1
Which PowerShell command retrieves log information from a remote computer named Charlee1?
RAID 6
Which RAID level can tolerate the loss of two disks in the array?
RAID 10
Which RAID level combines striping with mirroring?
RAID 0
Which RAID level provides no redundancy?
RAID 1
Which RAID level uses mirroring to duplicate data?
VSAN
Which SAN configuration groups Fibre Channel switch ports together to form a virtual fabric?
netstat
Which Windows command shows current network port connections?
tracert
Which Windows command shows the path a packet takes as it traverses routers?
DAC
Which access control model places permission configuration in the hands of the data owner?
MAC
Which access control model uses resource labeling for granular access control?
Sizing
Which attribute applies to both hypervisor hosts and virtual machine guests?
Reduced routing table size
Which benefit is derived from supernetting?
Quicker time to market
Which benefit is realized by developers using public cloud PaaS?
Reduced rack space usage Reduced power consumption
Which benefits are normally realized through virtualization? Choose two.
Increased performance Data availability
Which benefits are realized by using a content delivery network? Choose two.
Security Performance
Which benefits can be realized from the use of VLANs? Choose two.
Quality assurance team
Which body decides upon effective tests for a specific application?
/E
Which cacls command-line switch allows changing new user file permissions without changing other user permissions?
Reservations
Which capacity setting ensures a guaranteed amount of resources for a hypervisor?
Security
Which category does SIEM primarily relate to?
Elasticity
Which cloud characteristic allows IT resources to dynamically meet changing IT workloads?
On-demand
Which cloud characteristic allows you to access a self-service portal to instantly create additional servers, storage, or other services?
Pay-as-you-grow
Which cloud characteristic allows you to pay for only the services used?
Replicas
Which cloud data option provides high availability?
BYOL
Which cloud option allows customers to use existing software licenses for new cloud deployments?
IaaS
Which cloud service model provides the most flexibility in assigning cloud resource permissions?
tcpdump
Which command captures all types of network traffic?
netsh advfirewall reset
Which command resets the Windows Firewall to default settings?
cacls j:/budget_eastregion.xls
Which command shows permissions for a file named budget_eastregion.xls?
Heartbeat
Which communication method is used for inter-node cluster communication?
FC switch
Which component normally lies between an HBA and a storage array?
Multipathing
Which configuration ensures continued SAN connectivity in the event of an HBA failure?
Resource pools
Which configuration separates physical compute resources into groups for higher-level management?
Tier 1
Which data tier has the best performance?
RTO RPO
Which disaster recovery metrics are used to create a measurable SLA that outlines to you when you can expect your systems to be back online and how much data loss you sustained after an outage? (Choose all that apply.)
IOPS
Which disk performance unit of measurement is best suited for use in establishing a performance baseline?
Network bandwidth
Which factor determines how long a P2V from on premises to the cloud will take?
Regulations
Which factor is most likely to influence a data retention policy?
Access list
Which firewall configuration item controls access to network resources?
Define test input.
Which functional testing step occurs immediately before defining expected output?
Change advisory board
Which group or role provides input to the change manager?
Hyperthreading
Which hardware option allows for higher overcommitment ratios of vCPUs to physical CPUs?
UEFI
Which hardware standard supersedes BIOS?
Common Vulnerabilities and Exposures
Which industry standard is used to rank IT security weaknesses?
Latency
Which item indicates a delay in service response time?
Private
Which key is used during SSH authentication for decryption?
Private
Which key is used to create a digital signature?
Symmetric
Which key is used to encrypt an SSH session?
SNMP
Which management and monitoring protocol uses "traps," otherwise called "notifications"?
Digital signature
Which mechanism can detect whether a network packet has been tampered with?
Ballooning
Which memory management technique takes unused memory from virtual machines and allocates it where it is needed by other virtual machines?
CPU ready
Which metric measures the amount of time a virtual machine has to wait for physical CPU to become available?
Syslog
Which monitoring and reporting protocol uses port 514?
SMART
Which monitoring technique uses hard disk metrics to predict hard disk imminent failure?
Star
Which network topology has a potential central point of failure?
Bus
Which network topology uses a central cable to which network nodes are attached?
Extranet
Which network type allows authorized external users to access a controlled set of internal resources?
NAS uses network sharing protocols such as CIFS.
Which of the following NAS and SAN statements is correct?
Adding a regular Windows user account to the Administrators group
Which of the following actions violates the principle of least privilege?
Increased security Less required public IP addresses
Which of the following are benefits of using PAT? Choose two.
Tracking the amount of hours a virtual machine has been running Automatically adding virtual machines to meet application workload demands
Which of the following are cloud computing characteristics? Choose two.
ITIL MOF
Which of the following are examples of application life cycle management models? Choose two.
Baselines Software licenses
Which of the following are examples of items stored in a configuration management database? Choose two.
SOX PCI DSS
Which of the following are industry-specific regulatory frameworks? Choose two.
NIC teaming RAID 1
Which of the following are related to fault tolerance? Choose two.
SSH IPMI
Which of the following are remote host management protocols? Choose two.
Delegated permissions for resource provisioning Tracking usage of IT resources
Which of the following benefits result from the use of public cloud computing? Choose two.
Key performance indicators
Which of the following can help technicians identify cloud performance issues?
3DES AES
Which of the following ciphers are symmetric? Choose two.
API
Which of the following exposes programmatic functionality to developers?
Additional vCPUs
Which of the following factors is most likely to improve the performance of a slow virtual machine?
Xen KVM
Which of the following hypervisor products are open source? Choose two.
Symmetric key
Which of the following is NOT stored in a PKI certificate?
Multipathing
Which of the following is a common SAN redundancy configuration?
Higher compute requirements
Which of the following is a disadvantage of network compression?
HBA
Which of the following is a storage component containing firmware that should be updated in an iSCSI environment?
172.16.0.0-172.31.255.255
Which of the following is a valid class B private IP address range?
IPMI
Which of the following is an out-of-band management protocol?
X.509 certificate
Which of the following is another term for PKI certificate?
Port scanning
Which of the following is commonly performed as part of a vulnerability assessment?
Virtual machine template
Which of the following is related to auto-scaling?
Data classification
Which of the following is the most likely to determine whether quick or slow cloud storage is used for files?
Runbooks Increased network bandwidth
Which of the following items can reduce the RTO? Choose two.
Virtual machine settings Load balancing
Which of the following items normally have a large influence on cloud-based web application performance? Choose two.
Network latency
Which of the following metrics is directly related to CDN testing?
Fibre Channel
Which of the following network types is designed solely for storage traffic?
Shared storage
Which of the following options ensures an effective failover cluster?
Local storage
Which of the following phrases best describes DAS?
IPS
Which of the following solutions can shut down detected malicious traffic to prevent further damage?
Cloud bursting relates to private and public cloud IT solutions. Elasticity allows for rapid resource provisioning.
Which of the following statements are correct? Choose two.
Cloud computing requires virtualization.
Which of the following statements is true?
Resource labeling Data classification
Which of the following terms are related to mandatory access control (MAC)? Choose two.
Replication
Which of the following terms best relates to high availability?
Storage tier
Which of the following terms is associated with hierarchical storage management?
dig nslookup
Which of the following tools can be used specifically to verify DNS functionality? Choose two.
Scaling out
Which option should be exercised when adding more underlying computer power is no longer available?
Standard operating procedure
Which organizational documentation ensures that tasks are performed consistently?
SSH
Which protocol is used to secure SFTP sessions?
NTP
Which protocol is used to synchronize system clocks over a network?
ARP
Which protocol resolves IP addresses to MAC addresses?
RTO
Which recovery factor has the largest influence on the selection of the type of alternate site?
Rolling updates
Which software development methodology has continuous software improvements being developed?
SSO
Which solution requires users to sign in only once to access multiple resources?
OVF
Which standard allows virtual machine migration between vendors?
FCoE
Which standard places Fibre Channel frames within Ethernet frames?
Internet Storage Name Service
Which standard provides the automated discovery of iSCSI and Fibre Channel storage devices?
SSH can be used to remotely manage hypervisors and virtual machines.
Which statement regarding SSH is correct?
Each cloud tenant runs an instance of the same application.
Which statement regarding a single SaaS offering is true?
It does not scale well.
Which statement regarding symmetric encryption is correct?
Different types of data could require different RPOs.
Which statement regarding the RPO is correct?
Changes made to the clone do not affect the source virtual machine.
Which statement regarding virtual machine clones is correct?
Testing is proactive. Troubleshooting is reactive.
Which statements are correct? Choose two.
Block ciphers work well with consistent packet sizes. Stream ciphers are generally faster than block ciphers.
Which statements regarding block and stream ciphers are correct? Choose two.
SATA SAS
Which storage protocols are used with DAS? Choose two.
Tier 4
Which storage tier should be used for long-term data archiving?
RAID 5
Which storage type stripes file data and performs a parity check of data over multiple disks that can recover from a hard disk failure?
Follow the sun
Which strategy ensures 24×7 IT support across time zones?
Capacity planning
Which strategy ensures adequate resources are available for future service provisioning?
Change management
Which strategy uses a structured, centralized approach to applying IT modifications?
Shadow page tables
Which technique is used by the hypervisor to map host memory to virtual machines?
Paravirtualization
Which term describes a virtual machine that is aware it is virtualized?
Orphaned resources
Which term describes child artifacts left behind by software that did not properly clean up after itself?
Load balancing
Which term describes distributing incoming application requests across multiple back-end servers?
Storage virtualization
Which term describes grouping multiple network storage devices into a single storage unit?
Scaling up
Which term describes increasing the number of vCPUs for a virtual machine?
MTTR
Which term describes the average time that it takes to repair a failed hardware component?
Sizing
Which term describes the selection of computing power for a virtual machine?
Rotational latency
Which term describes the time it takes for a hard disk platter to spin to the correct location?
CPU wait time
Which term describes the timeframe where a CPU cannot perform computations because it is waiting for I/O operations?
Hop count
Which term describes the total number of routers and switches a packet passes through to reach its destination?
Showback
Which term is closely related to chargeback?
Authorization
Which term is most closely associated with ACLs?
Activity
Which term is used to describe a specific runbook task?
WWN
Which term is used to describe a unique storage identifier?
Orchestration
Which term is used to describe the automated execution of cloud actions based on performance metrics?
User acceptance testing
Which test ultimately determines whether an application meets functional design requirements?
Intelligence gathering, assessment, validation
Which three phases constitute the vulnerability scanning process?
Management dashboard
Which tool provides a visual representation of performance metrics?
Establish a theory of probable cause.
Which troubleshooting step follows problem identification?
Bandwidth Network latency
Which two factors are related to network performance?
Quotas Limits
Which two items are used to control compute resource usage by cloud consumers?
Differencing
Which type of Microsoft Hyper-V disk reduces disk space consumption?
Cold
Which type of alternative business site is the cheapest?
Hot
Which type of alternative business site is the most expensive?
Warm site
Which type of alternative disaster recovery site contains equipment but lacks up-to-date data?
Differential
Which type of backup contains only those files modified since the last full backup?
Differential
Which type of backup does not modify the archive bit?
Network isolation
Which type of configuration allows multiple identical copies of a custom application to be tested at the same time?
SLA
Which type of document details baseline performance measurements for cloud resource performance?
SLA
Which type of document specifies the level of uptime that will be supported by the service provider?
SLA
Which type of document states how service providers will compensate service consumers if specific conditions are not met?
Asymmetric
Which type of encryption scheme uses mathematically related keys?
Symmetric
Which type of encryption uses the same key for encryption and decryption?
Type 1
Which type of hypervisor does not require an existing operating system?
Hotfix
Which type of patch addresses a single small issue?
Lockout
Which type of policy dictates that user accounts be temporarily disabled after too many incorrect login attempts?
Hard
Which type of quota, when reached, prevents additional resource use?
Redirect-on-write
Which type of snapshot technology has the least computational requirements?
Black-box
Which type of testing best simulates external malicious users?
Penetration testing
Which type of testing identifies weaknesses and actively exploits them?
Black-box
Which type of testing is executed with no knowledge of how systems have been implemented?
Penetration
Which type of testing is most likely to require written permission from the system owner?
Private
Which user key decrypts EFS data?
Rollback
While creating a runbook to automate the deployment and verification of server software patches, you decided to build more resilience into the workflow. In the event of the failed application of patches, you would like the system to return to its prior state. What type of activity should you build into your runbook?
Processor utilization
While network compression to the cloud reduces the size of transmitted data, what is increased?
Take a snapshot.
You are about to apply a new batch of updates to a Linux virtual machine. What should you do before performing this task?
GUID
You are automating cloud resource deployment through a template. You need to ensure that cloud resource changes do not prevent services from running. Which of the following attributes is the least likely to change?
Use a cloud service account.
You are configuring RBAC permissions used by a cloud template. What should you configure to ensure the future success of template deployments?
ICMP
You are configuring a cloud network firewall. The firewall must permit ping traffic from your administrative on-premises station. What type of traffic should you allow?
WWN
You are configuring a failover cluster that will use SAN shared storage. What type of address should be added to a storage group on the shared disk array?
All virtual machines running on one host
You are configuring a hypervisor clustered solution consisting of three hypervisors using shared storage: Hv1, Hv2, and Hv3. Hv1 hosts three virtual machines, Hv2 hosts two virtual machines, and Hv3 hosts four virtual machines that all have network connectivity. Assuming the cluster will continue running with two failed nodes, what consideration must you account for?
DAS
You are configuring an on-premises hypervisor host with storage connected locally to the server. What type of storage is this?
MTBF
You are configuring the storage subsystem for an on-premises cloud hypervisor. Dependability is paramount for the server. Which phrase refers to the average amount of time before potential hard disk failures?
BYOL
You are deploying a cloud-based Microsoft SQL Server relational database for which you have existing licenses. Which cloud deployment option should you choose?
Containerization software
You are deploying secure Linux application containers to a cloud network called VNet1. What is required on each virtual machine in VNet1?
Peak memory usage
You are determining the maximum dynamic memory limit for a new virtual machine. Which metric should you consult?
Public
You are enabling identity federation with a partner organization. Trust is established between the two organizations through digitally signed tokens that result from successful user authentication. Which key is used to verify the digital signatures?
Public
You are encrypting an e-mail addressed to your colleague Roman. Which key is used to encrypt?
Incident response
You are negotiating SLA support details with a public cloud provider. Which type of policy should you consult during negotiations?
Containerization
You are planning a new testing strategy for your software development team. The ideal solution will be portable, allow the app to be isolated from other software, and provide the fastest possible startup time. Which testing solution should you select for your team?
Bursting
You are planning cross-regional replication between public cloud provider sites and your on-premises network. Periodic spikes in the amounts of transmitted data must be accommodated over the connection. What must you consider?
Baseline
You are planning load tests against a cloud web application. What do you use to determine normal activity levels for the application?
50 percent
You are planning the storage requirements for a two-disk mirror of a server operating system disk partition. How much disk space is usable in the mirrored volume?
Federation
You are planning user authentication between your on-premises network and the public cloud. User identities must exist only once. What should you configure?
Hardware-assisted virtualization
You are preparing a host's hardware settings so that it can be a hypervisor. Which setting are you most likely to enable?
Load balancing
You are responsible for a web application running in the public cloud. Recent performance metrics indicate that the average user wait time for page loads is four seconds due to the high number of HTTP requests. What should you configure?
RAID 0
You are responsible for the configuration of a storage array for a private cloud. Performance is the highest priority in order to support a heavily used database transaction system. Which level of RAID should you configure in the array?
Identify source hosts Identify target hosts
You are responsible for the migration of an on-premises Human Resources department web application to the public cloud. Which of the following must you do? Choose two.
There are 22 bits in the subnet mask.
You are reviewing a network diagram for a client. The diagram has numerous references to /22. What does this mean?
Elasticity
You are reviewing charges from your public cloud provider. The past month indicates that cloud storage provisioning has increased 50 percent from the previous month. Which term best describes this scenario?
Data integrity
You are scripting the testing of a load-balanced, cloud-based web application that uses a backend MySQL data store. You need to verify the quality of rows stored in MySQL database tables. What type of testing will the script perform?
ipconfig /flushdns
You are testing cloud-provided DNS name resolution. You need to clear the local DNS cache for a cloud-based virtual machine. Which command should you issue?
Replication
You are the IT director for a law enforcement agency. The agency IT system must remain running at all times. An alternate location to house mission-critical servers, data, and personnel has been acquired. What else is needed for this hot site?
Make user public keys available to everybody.
You are the e-mail administrator for your organization. Currently, a cloud-based e-mail solution is being used. Users must be able to encrypt e-mail messages to one another. What should you do?
LUN masking
You are the storage administrator for a large enterprise. You need to implement granular security to separate shared storage between servers over the SAN. What should you configure?
Dynamically expanding
You are the virtualization administrator for a specific hypervisor host. There is limited disk space and you do not know how much disk space each virtual machine will require over time. Which virtual disk type should you employ?
Take a virtual machine snapshot.
You are the virtualization administrator for a specific on-premises hypervisor host. You need to configure new software on a virtual machine. What should you do to ensure changes can be rolled back as quickly as possible?
Verify system functionality.
You are troubleshooting a scheduled runbook that is not executing. You discover that NTP traffic is blocked on the affected host. After allowing NTP traffic, you move on to the next helpdesk ticket. Which troubleshooting step did you miss?
Default gateway
You are troubleshooting network connectivity from a user desktop to a remote website. What is the first device you should ping?
Add RAM.
You are troubleshooting performance problems on a development virtual machine. Based on the following metrics, which solution would best improve performance? % CPU utilization - 70 % Average IOPS - 90 Page faults/sec - 1425
Escalate. Establish another theory.
You are troubleshooting the installation of an app on a user smartphone. After testing the first solution theory, you realize the problem has not been solved. What options are available for your next action? Choose two.
Failback
You are updating hypervisor cluster nodes one at a time. You have moved virtual machines running on Hypervisor1 to Hypervisor2. What should you do to place the virtual machines on the original cluster node?
BIOS settings
You are using IPMI to remotely monitor a host whose operating system has crashed and is unresponsive. What type of items would you be monitoring?
Install the Azure integration pack.
You are using Microsoft System Center Orchestrator for workflow automation. You notice that support for Microsoft Azure cloud computing is missing. What should you do?
New-NetFirewallRule -DisplayName "RDP Allowed" -Direction Inbound -Protocol TCP -LocalPort 3389 -Action allow
You are using PowerShell to configure a host-based firewall on a Windows server. RDP administrative traffic must be allowed to reach the host. Which command should you issue?
Stress testing
You are using testing automation software to send excessive data loads to an application. What type of testing is this?
Load testing
You are using testing automation software to send normal data loads to an application. What type of testing is this?
Console port
You are working in a server room and need to connect your laptop directly to a hypervisor for management purposes. What should you plug your laptop into?
Blue-green
You company's primary application is critical to the power generation industry and must be highly available. When critical patches need to be installed, downtime is not an option that your customers can tolerate. You have designed a web architecture to take this into account and that allows you to have an exact copy of your production fleet that can be brought online to replace your existing deployment for patching and maintenance. What type of model did you implement?
IPSec
You have been asked to investigate cloud-based VPN access from your corporate data center that offers data integrity and confidentiality. Your manager does not want to incur the costs of a dedicated circuit to the cloud provider. What connection protocol would you suggest be implemented that can offer a secure connection across the unsecure Internet?
Rolling
You have been asked to update your entire fleet of Internet-facing web servers to remediate a critical bug. Your supervisor has agreed to operate under reduced computing capacity during the process but stipulates that there can be no downtime. What upgrade approach should you recommend your company follow to meet these requirements?
Document the solution.
You have been troubleshooting startup issues related to a cloud virtual machine. After investigating server log files, you determine the problem was due to a misconfiguration by an assistant administrator. After you fix the configuration, the server starts up without issues. You implement stricter controls to limit server configuration access. What should you do next?
Workflow execution
You have created a runbook to orchestrate the maintenance of a cluster node. Which term best describes starting the runbook?
Penetration
You have deployed a custom web application to the cloud for testing. The IT security team plans to simulate malicious user attacks against the app. What type of testing is this?
A DNS entry for appserv1.acme.net must be configured.
You have performed a P2V migration of an on-premises server named appserv1.acme.net to the public cloud. appserv1.acme.net is up and running on a cloud virtual network with other virtual machines that are reachable. Upon attempting to connect to appserv1.acme.net after the migration, you receive an error stating the server is not reachable. What is the most likely cause of the problem?
Export contacts to a standard format.
You have selected a new public cloud provider for e-mail services. The current provider does not have an API that supports the migration of user contact lists. What should you do?
SMS
You manage a team of 12 cloud consultants whose smartphones do not use a mobile data plan. The consultants travel to customer locations and currently do not have Wi-Fi access on their smartphones. You need to ensure your cloud consultants receive alerts when crucial virtual machines go down regardless of their location. Which notification method should you configure?
Syslog forwarding
You need a central location to view log data gathered from 50 Linux servers. What should you configure?
NIDS
You need a security appliance that can detect abnormal activity on the network and send administrative alerts when it is detected. What should you implement?
Compare test results to the baseline.
You need a way to verify that tested applications are performing well under normal load conditions. How can you do this?
Event correlation
You need software that can associate network firewall activity with Windows and Linux server activity within the same time frame. What feature must the software support?
Compress the virtual machines.
You need to archive six virtual machines that were used for product development. The total consumed disk space is 3TB. What should you do to minimize consumed archival disk space?
Enable table-specific read auditing for the Help Desk group.
You need to audit Help Desk user's cloud MySQL database searches for a particular table. Security and performance levels must be maintained while conducting the audit. What should you do?
cacls
You need to automate file system permission management. Which Windows command should you use?
Virtual switch
You need to configure a virtual machine so that it can communicate on the physical corporate LAN. Which hypervisor component sits between the virtual NIC and the physical network?
TCP 3389
You need to connect through a firewall to remotely administer a Windows server using RDP. Which firewall allowance must be configured?
Private
You need to decrypt an e-mail message sent to your mail account. Which key is required to decrypt the message?
I/O throttling
You need to define limits for virtual machine disk resource utilization. What should you configure?
Establish a performance baseline.
You need to determine if future cloud network performance values are acceptable. What should you do first?
QoS
You need to ensure VoIP traffic is sent over the network before other types of traffic. What should you configure?
Cloud failover
You need to ensure that critical on-premises virtual machines are immediately available in the event of a regional disaster. What should you configure?
During maintenance windows
You need to ensure that server backups have a minimal impact on user productivity. When should you schedule backups to occur?
Disable unnecessary services. Deactivate default accounts.
You need to harden Linux cloud-based virtual machines. What should you do? Choose two.
ifconfig
You need to view network interface settings for a cloud-based Linux virtual machine. Which command should you issue?
Monitor outbound network traffic for each virtual machine vNIC.
You notice excessive network traffic initiated from a server named Hypervisor1. Traffic destined for Hypervisor1 falls within normal limits. Hypervisor1 hosts two database servers and a virtual machine load balancer for virtual machine web applications all running on Hypervisor1. The source of the excessive network traffic must be identified. What should you do?
Enable USB pass-through.
You plan to use a Linux virtual machine guest to conduct wireless network penetration tests. The virtual NICs will not support this functionality. The hypervisor has a supported USB adapter plugged in. What should you do?
Update the CLI.
You plan to use a cloud provider CLI to automate monthly management tasks. What is the first thing you should do prior to running these tasks?
DDoS
You receive an alert notification that one of your cloud servers has been receiving excessive amounts of network traffic from hosts with different IP addresses for the past hour. What type of attack is most likely taking place?
AES-256
You work in the financial services industry and are required to encrypt your data at rest in the public cloud to comply with securities regulations. You want to implement a strong encryption protocol that is widely approved by industry best practices. Which one of the following meets your requirements?
Shared storage
You would like the ability to migrate virtual machines from one hypervisor to another with zero downtime. What is required for this?
Load balancer Hypervisor Router
Your IaaS cloud company has announced that there will be a brief outage for regularly scheduled maintenance over the weekend to apply a critical hotfix to vital infrastructure. What are the systems they may be applying patches to? (Choose three.)
Volume shadow copies
Your Windows server holds contract documents on an NTFS disk volume. Users make revisions to documents before they are finalized. You need to ensure previous versions of files are available to users. What should you configure?
Change management failure
Your centralized cloud policy configuration prohibits the installation of mobile device apps. Some smartphones are unable to apply the policy settings. Which term best describes the scenario?
Enable auto-scaling.
Your cloud load balancer has recently experienced excessive requests for a web application. What should you do to ensure the capacity exists to handle peak requests?
Storage tiers
Your cloud provider allows frequently accessed data to reside on fast storage while less utilized data is migrated to slower storage. What type of configuration is this?
Infrastructure
Your cloud provider's data center is in an industrial park with no company signage, extensive video cameras in the parking lot, and biometrics at the guard shack. What type of security is the provider implementing?
Scale out
Your cloud-based web application has recently experienced usage spikes. Additional web servers are needed to handle these demands. What should you do?
A content delivery network
Your cloud-based website is hosted in a cloud provider data center in California. Website visitors in Europe are experiencing delays when loading web pages and downloading files. You need to reduce network latency for European users. What should you configure?
A system whereby access to sensitive data is gained by providing a placeholder token to a tokenization system
Your colleague, Lain, mentions a new app being developed in-house that uses a storage tokenization system. What is Lain talking about?
SLA
Your company IT director asks you to check into running the company's public website in a public cloud provider environment. Uptime is of the utmost importance. Which document should you refer to?
Hybrid
Your company has decided to interconnect its cloud services with three different service providers. What type of cloud delivery model is it creating?
Vendor based
Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network microsegmentation deployments. When reading the documentation, Sam notices a link to download a Java-based application to monitor and configure the IPS. What kind of automation system is this?
VTL emulation
Your company is migrating on-premises services to the public cloud. In the interim, you need a way to use existing backup solutions while backing up data to the public cloud. Which on-premises backup functionality is required?
Low average utilization
Your company is planning the virtualization of selected on-premises physical servers. Which criteria represents a good virtualization candidate?
Smartcard, PIN
Your company plans to implement multifactor authentication for office desktops. Which of the following could be used?
Hybrid
Your company stores budget forecasting data on a local file server at headquarters. An on-premises virtual machine periodically replicates file server data to the public cloud as an off-site backup. What type of cloud is used for this scenario?
aws iam attach-group-policy
Your company uses Amazon Web Services (AWS) as a public cloud provider. Using the AWS CLI, how can you associate role-based administrative policies to groups?
Nothing.
Your company uses IPSec to secure IP traffic in a cloud virtual network named East1Net. A new cloud virtual machine named Web1 is deployed into East1Net along with a second virtual machine named Db1 that will host a MySQL database. Web1 will host a new custom web application to communicate with MySQL. You need to ensure communication between Web1 and Web2. What should you do?
Let the provider apply the updates.
Your company uses SaaS office productivity tools from a public cloud provider. You need the latest updates applied to the tools. What should you do?
Add the directory as a scanning exception.
Your development server antimalware solution generates false positives when developers compile code in a temporary directory. What should you do?
Stateful packet inspection
Your firewall ensures that incoming and outgoing packets are a part of an established session. Which feature does your firewall support?
Transparent page sharing
Your hypervisor has the ability to deduplicate virtual machine memory pages for optimal memory usage. What is this called?
SIEM
Your network consists of industrial computer systems along with standard office productivity tools running on desktop computers. You need a threat detection solution that will examine all device log file entries to identify correlations. What should you use?
Set-NetFirewallProfile -DefaultInboundAction Block -DefaultOutboundAction Block
Your network has recently experienced a spike in spam activity where user stations have been used as SMTP relay hosts. Which of the following partial configurations should be used?
Block-level backup
Your network link to the public cloud is 80 percent utilized by other services. On-premises files must be replicated to the public cloud while minimizing bandwidth usage. What type of replication method should you use?
Cloud bursting
Your on-premises network has been experiencing more IT resource demands than usual. As a result, storage capacity has been depleted. You need to ensure that future storage demands are met despite having exhausted on-premises resources. What should you enable?
SIEM
Your on-premises network has grown over the years to hundreds of devices. A VPN connection to a public cloud provider has extended the network into the cloud. You need a way to have device logs analyzed in real time against correlation rules to identify possible threats or problems. Which type of system should you invest in?
V2V
Your on-premises private cloud uses virtualization. The newest version of the current hypervisor will be available on new upgraded hardware. Which type of migration should you use to ensure existing virtual machines continue running on the new hypervisor?
EFS
Your on-premises users synchronize cloud files to their Windows laptops. Corporate security policies dictate that locally stored files must be encrypted for the user. What should be configured on user laptops?
Notify affected users prior to the restoration.
Your on-premises virtual machine mail server is in the process of being migrated to the cloud, but some users are still using it. You need to restore the virtual machine to a previous state and then restore messages. What should you do prior to the restoration?
Tunneling
Your organization has adopted public cloud computing and is in the process of migrating on-premises IT services. Which solution can extend an on-premises network into the public cloud?
IaaS
Your organization has decided to use cloud storage for long-term archiving of financial records. Which type of cloud service model is this?
Virtual machine antivirus extension
Your organization has numerous newly deployed virtual machines (VMs) in a public cloud. You are responsible for ensuring the VMs are malware free. What is the FIRST item you should configure?
VLANs
Your organization plans to use iSCSI for shared network storage. Which technique should be used to ensure that iSCSI traffic is kept separate from other IP traffic?
Private
Your organization tracks internal IT resource usage by department for billing purposes. What type of cloud is this?
Chargeback
Your organization tracks private cloud usage by department for billing purposes. What type of model is this?
Chargeback
Your organization uses a private cloud for various departments. Resource usage is tracked for each department for the purpose of ____________.
keyword = isolation.tool.copy.disable
Your organizational data loss prevention policy has recently been amended to include virtual machine management. Which VMware setting should be configured to remain compliant with organization security policies?
Virtual appliance
Your organizational security policies require a proxy server for cloud-initiated traffic destined for the Internet. What should you deploy?
Overcommitting
Your private cloud consists of a server containing a total of 6TB of local storage. Each of the seven departments in the region require 1TB of space. Additional storage will not be purchased. Which option allows seven 1TB disk volumes to be created on the local storage?
Thin provisioning
Your virtual machine has 2TB of available storage. In the VM, you have created three 1TB disk volumes. Which option was used in this configuration?
Bottom up
Your web servers have lost communications to the SQL backend database on your e-commerce public website. You have been brought in to assist in resolving the problem. After reviewing the log files and the monitoring system, you suspect it may be a network-related issue. You devise a series of tests that starts with checking the server's connection to the database. What troubleshooting approach are you implementing?
Enable a web application firewall. Reduce web server session timeout values.
Your website has experienced numerous DoS attacks over the past month. What should you do to mitigate future attacks? Choose two.
Rapid deployment of IT resources Focus on using technology instead of configuring it
Zoey, an executive, asks the IT team to provide a list of pros and cons related to the use of cloud computing. Which of the following are benefits of cloud computing? Choose two.