CompTIA Cloud+ CV0-002 Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following are benefits of virtualization in a cloud environment? (Select two.) A. Application virtualization B. Presentation Virtualization C. Rapid deployment D. Server virtualization E. Reduce number of physical servers

A. Application virtualization E. Reduce number of physical servers

A company that provides a cloud-based storage solution for consumers needs to ensure that users' data is encrypted while it is stored on its premises. Which of the following should be used to accomplish this task? A. SSL B. HMAC C. SHA D. RC4

A. SSL

Which of the following is commonly the MAIN concern in public cloud implementations? A. Security B. Flexible Billing C. Scalability D. Availability

A. Security

A cloud administrator is provisioning several user accounts that have administrator rights to assets using JSON within an IaaS cloud platform. The administrator is required to configure "alternate" settings using the API. Given this scenario, which of the following elements would allow the administrator to meet these requirements in the JSON file? A. Statement B. Effect C. Resource D. Condition

A. Statement

An administrator deploys a new virtual machine. After logging on to the virtual machine, she notices that it has a different time setting than the host. What is most likely the cause of this issue? A_ The virtual machine cannot communicate with the network. B. The guest tools are not installed. C. The vNIC is not configured correctly. D. The VLAN tag is incorrect.

B. The guest tools are not installed.

An administrator is tasked with the virtualization of all database management applications. Which of the following should the administrator do FIRST to ensure that database performance will be optimal? A. Follow the recommendations of the database management application vendor. B. Design a physical to virtual migration plan of the application. C. Adhere to the recommendations of the virtualization software vendor. D. Develop a migration plan to the new environment, ensuring maximum uptime.

C. Adhere to the recommendations of the virtualization software vendor.

What is the desired end result of ITIL? A. CAB B. Continual service improvement C. Service strategy D. Service operation

B. Continual service improvement

Host A and B can both access LUNs one to ten in a single SAN LUN 11 has been created and Host A can access it but Host B cannot. Which of the following will likely be the cause of this issue? A. Faulty fiber HBA B. Incorrect HBA WWPN C. Incorrect HBA software version D. Defective HBA

B. Incorrect HBA WWPN

The CASB report indicates several unsanctioned SaaS applications are being used in an organization. Which of the following is the MOST likely cause? A. VPN bypass B. Shadow IT C. Web proxy bypass D. CAB approval

B. Shadow IT

Which of following file systems was the first to be designed specifically for Linux? A. FAT B. NTFS C. UFS D. EXT

D. EXT

The legal department requires eDiscovery of hosted file shares. To set up access, which of the following is the BEST method to ensure the eDiscovery analyst only has the ability to search but not change configuration or settings? A. PKI B. SSO C. MFA D. RBAC

D. RBAC

Which of the following storage device interface types is the most difficult to configure? A. IDE B. SAS C. SATA D. SCSI

D. SCSI

Which of the following backup methods is MOST used by VM users? A. Tape backups B. Cloning C. Image backups D. Snapshots

D. Snapshots

Which of the following protocols allows Fibre Channel to be transmitted over Ethernet? A. HBA B. FCoE C. iSCSI D. SAN

B. FCoE

Which of the following connects a server and a SAN and improves performance? A. Network interface card B. Host bus adapter C. Ethernet D. SCSI

B. Host bus adapter

A company wants to be sure their cloud infrastructure is secure but fully available. To ensure this, the company wants to observe and be alerted in the event of a security breach, but chose a response for each alert. Which of the following solutions would meet these requirements? A. XaaS B. IDS C. PaaS D. IPS

B. IDS

A Chief Information Officer (CIO) has summoned an administrator due to the datacenter power bill being significantly higher than normal. The administrator explains that a new array was installed for a 20TB CRM application. Which of the following solutions would provide a new performance benefit and also reduce power consumption? A. SSD B. SAS C. SATA D. FC

A. SSD

After monthly patching, a large number of users who are logged onto the network report that application links from a company's intranet site, which previously opened directly into the website, are now prompting for logon information. Application administrators confirm that the websites in question are working properly. Which of the following is the MOST likely cause of the new behavior? A. SSO issues B. Password expiration C. Account lockout D. Certificate expiration

A. SSO issues

A company wants to take advantage of cloud benefits while retaining control of and maintaining compliance with all its security policy obligations. Based on the non-functional requirements, which of the following should the company use? A. Hybrid cloud, as use is restricted to trusted customers. B. IaaS, as the cloud provider has a minimal level of security responsibility. C. PaaS, as the cloud customer has the most security responsibility. D. SaaS, as the cloud provider has less security responsibility.

B. IaaS, as the cloud provider has a minimal level of security responsibility.

A cloud service administrator is consuming PaaS services and is performing baseline configuration tests. Which of the following is part of the PaaS consumer's responsibility with respect to the baseline confirmation tests? A. Application versions B. CPU utilization C. RAM utilization D. Operating system versions

B. CPU utilization

Every quarter, technicians perform a UPS and generator test at the datacenter. During the test, the diesel generators did not function correctly resulting in a datacenter black out. After the engineers restore power, they quickly turn on each device and go home for the day. The next morning, clients start reporting they are not receiving email. After investigation, the engineers find that not all VMs are online and it is determined that some VMs did not start up in a correct sequence. Which of the following policies might need to be reviewed to help remediate the above scenario? A. Monitoring policy B. Change management policy C. Service level agreement policy D. Boot sequence policy

B. Change management policy

A hosted file share was infected with CryptoLocker and now root cause analysis needs to be performed. What's the correct order of the troubleshooting methodology? -Establish a plan of actions to resolve the problem and implement remediation -Establish a theory of probable cause -Document findings and outcomes -Identify the problem -Test the theory to determine cause -Verify full system functionality

1) Identify the problem 2) Establish a theory of probably cause 3) Test the theory to determine cause 4) Establish a plan of action to resolve the problem and implement remediation 5) Verify full system functionality 6) Document findings and outcomes

The InfoSec team has directed compliance database activity monitoring without agents on a hosted database server in the public IaaS. Which of the following configurations is needed to ensure this requirement is achieved? A. Configure the agent configuration file to log to the syslog server. B. Configure sniffing mode on database traffic. C. Implement built-in database tracking functionality. D. Implement database encryption and secure copy to the NAS.

B. Configure sniffing mode on database traffic.

Which of the following is a benefit of virtualization in a cloud environment? A. Decrease in the scalability of services B. Decrease in the time to implement certain services C. Decrease in the amount of resource pooling for services D. Increase in the time to service for certain services

B. Decrease in the time to implement certain services

A business is planning to migrate from a private cloud to a public cloud. To document business continuity, which of the following should be done FIRST? A. Develop a disaster recovery plan with partners/third parties. B. Define the set of application-based SLAs. C. Identify HA technology to provide failover. D. Define the scope of requirements.

B. Define the set of application-based SLAs.

A company is seeking a new backup solution for its virtualized file servers that fits the following characteristics: - The files stored on the servers are extremely large. Existing files receive multiple small changes per day. - New files are only created once per month. - All backups are being sent to a cloud repository. Which of the following would BEST minimize backup size? A. Local snapshots B. Differential backups C. File-based replication D. Change block tracking

B. Differential backups

An administrator is responsible for managing a host that is part of a private cloud. The host has one physical quad core CPU. The administrator is tasked with creating a new guest that requires a single CPU. Which of the following actions should the administrator do? A. Assign 1 virtual CPU to the Guest B. Assign 1 virtual CPU to the Host C. Assign 1 physical CPU to the Guest D. Assign 1 physical CPU to the Host

A. Assign 1 virtual CPU to the Guest

A storage administrator must choose the best replication methodology for storage. The datacenters are on opposite sides of the country. The RPO is 24 hours. Replication and customer access use the same connections. Replication should not impact customer access during the day. Which of the following solutions would BEST meet these requirements? A. Asynchronous B. Regional C. Multiregional D. Synchronous

A. Asynchronous

An administrator, who operates a public cloud, has been tasked with implementing a secondary datacenter for failover purposes. Immediate replication has too much of an impact on the WAN link during production hours. Which of the following is the BEST option? A. Asynchronous replication B. Storage deduplication C. Cold site failover with offsite archiving D. Site mirroring

A. Asynchronous replication

A website administrator is storing a large amount of multimedia objects in binary format for the corporate website. What type of storage object is this considered to be? A. BLOB B. Replica C. Metadata D. Object ID

A. BLOB

A cloud administrator configures a new web server for the site https://companyname.com. The administrator installs a wildcard SSL certificate for *.companyname.com. When users attempt to access the site, a certificate error is received. Which of the following is the MOST likely cause of the error? A. Certificate misconfigured B. Certificate expired C. Certificate revoked D. Certificate not signed

A. Certificate misconfigured

A cloud administrator is required to implement a solution to handle data-at-rest encryption requirements for a database. Which of the following would BEST satisfy the requirements? A. Install an SSL certificate and only allow secure connections to the server. B. Enable two-factor authentication on connections to the database server and log activities. C. Activate memory encryption on the virtual server and store the certificates remotely. D. Create a virtual encrypted disk, add it to the virtual server, and have the database write to it.

A. Install an SSL certificate and only allow secure connections to the server.

A small clinic is moving its health and accounting systems to a SaaS solution. The clinic holds patient-specific and business-sensitive information. Which of the following is the company expected to do to protect its data? A. Document, configure, and enforce strong account management policies. B. Disable and document unneeded ports and protocols on the SaaS servers. C. Install antivirus and disable unneeded services on all SaaS servers. D. Harden the underlying infrastructure: servers, firewalls, and load balancers.

B. Disable and document unneeded ports and protocols on the SaaS servers.

A manufacturing company's current security policy mandates PII is not stored in the SaaS solution. Which of the following configuration controls should be used to block sensitive information from being stored in the SaaS solution? A. Implement file-level encryption. B. Implement a network ACL. C. Implement an IPS. D. Implement content filtering.

B. Implement a network ACL.

An administrator is no longer receiving alerting messages from the web server platform that recently failed over to a new secondary datacenter due to a power failure. Which of the following is the cause of the problem? A. Port 21 in only allowed inbound at the primary datacenter. B. Port 22 to the log server is blocked outbound. C. Port 162 in DMZ is blocked inbound. D. Port 162 in DMZ is blocked outbound.

B. Port 22 to the log server is blocked outbound.

Which of the following can be used to assign priority to specific network traffic? A. Load balancing B. QoS C. NIC teaming D. Jumbo frames

B. QoS

An organization is replacing its internal human resources system with a SaaS-based application. The solution is multi-tenant, and the organization wants to ensure ubiquitous access while preventing password replay attacks. Which of the following would BEST help to mitigate the risk? A. Implement destination resources authentication. B. Require and implement two-factor authentication. C. Remove administrator privileges from users' laptops. D. Combine network authentication and physical security in one card/token.

B. Require and implement two-factor authentication.

Which of the following generally has better performance when accessing larger databases? A. NAS B. SAN C. CIFS D. NFS

B. SAN

A(n) __________ is a storage device that has no moving parts. A. HDD B. SDD C. Tape D. SCSI

B. SDD

Which of the following are types of storage media? (Select two.) A. SCSI B. SSD C. Tape D. SATA E. USB

B. SSD C. Tape

You receive an alert that a virtual machine is down. The server does not respond to a ping. What tool should you use to troubleshoot the server if you are off-site? A. Console port B. SSH C. Hypervisor console D. SMTP

B. SSH

A public cloud provider recently updated one of its services to provide a new type of application load balancer. The cloud administrator is tasked with building out a proof-of-concept using this new service type. The administrator sets out to update the scripts and notices the cloud provider does not list the load balancer as an available option type for deploying this service. Which of the following is the MOST likely reason? A. The administrator can deploy the new load balancer via the cloud provider's web console. B. The administrator needs to update the version of the CLI tool. C. The administrator needs to write a new script function to call this service. D. The administrator is not using the correct cloud provider account.

B. The administrator needs to update the version of the CLI tool.

Which of the following statements would be used to explain a private cloud but not a public cloud? A. used as a service via the Internet B. dedicated to a single organization C. requires users to pay a monthly fee to access services D. provides incremental scability

B. dedicated to a single organization

A company security policy mandates education and training for new employees. The policy must outline acceptable use policies for SaaS applications. Given these requirements, which of the following security controls is BEST suited? A. Preventive B. Detective C. Corrective D. Physical

C. Corrective

An administrator needs to monitor server applications in the company's data center. Which of the following tools would the administrator need to accomplish this objective? A. SMS B. SMTP C. IPMI D. SNMP

C. IPMI

Which network type is not accessible from outside the organization by default? A. Internet B. Extranet C. Intranet D. LAN

C. Intranet

Which of the following statements can be considered a benefit of using RAID for storage solutions? A. It is more expensive than other storage solutions that do not include RAID. B. It provides degraded performance, scalability, and reliability. C. It provides superior performance, improved resiliency, and lower costs. D. It is complex to set up and maintain.

C. It provides superior performance, improved resiliency, and lower costs.

A cloud administrator is securing access to a VM using an IaaS cloud platform. The administrator must perform this task using an automated method, allow administrators to perform any method and expose any property of the VM, deny access for everyone else, and allow only read-only access to everyone else. Given this scenario, which of the following should the administrator use to BEST meet these requirements? A. jQuery B. JavaScript C. Java D. JSON

C. Java

Which of the following server types would be an ideal candidate for virtualization? (Select two.) A. Hypervisor B. Terminal server C. Mail server D. Enterprise database server E. Domain controller

C. Mail server D. Enterprise database server

Which data tier would you recommend for data that is financial in nature, is not accessed on a daily basis, and is archived for tax purposes? A. Tier 1 B. Tier 2 C. Tier 3 D. Tier 4

C. Tier 3

You are deploying two virtual servers. One of the virtual servers is a heavily used database server and the other is a lightly used printer server. What virtual CPU configuration would you recommend? A. One virtual CPU for the database server and two virtual CPUs for the print server B. Two virtual CPUs for the database server and two virtual CPUs for the print server C. Two virtual CPUs for the database server and one virtual CPU for the print server 0. Three virtual CPUs for the print server and two virtual CPUs for the database server

C. Two virtual CPUs for the database server and one virtual CPU for the print server

Which of the following would be used to directly connect to a hypervisor host remotely to modify operating system settings on the hypervisor host? a. RDP b. Console port c. SMTP d. HTTPS

a. RDP

Which of the following alerting methods can be configured to send an e-mail when a certain alert is triggered? a. SMTP b. SMS c. SNMP d. Syslog

a. SMTP

Which of the following can be used to create scripts that can be run against target computers to perform simple administrative tasks? a. WMI b. SMTP c. SMS d. IMAP

a. WMI

Which of the following can be used to identify which operating system version is installed on a virtual machine? a. WMI b. SMTP c. SMS d. IMAP

a. WMI

You have been tasked with gathering a list of software installed on all the computers in your environment. You want to gather this information remotely. Which of the following would you use to gather this information? a. WMI b. SNMP c. HTTP d. Syslog

a. WMI

A cloud administrator notices one of the servers is using the wrong set of NTP servers. The administrator needs to avoid the same issue in the future but needs to minimize administration resources. Which of the following tools should a cloud administrator deploy to meet this requirement? A. Patching tools B. Monitoring tools C. Configuration tools D. Deployment tools

D. Deployment tools

A software development company is building cloud-ready applications and needs to determine the best approach for releasing software. Which of the following approaches should be used? A. Perform QA, develop, test, and release to production B. Test, perform QA, develop, and release to production C. Develop, perform QA, test, and release to production D. Develop, test, perform QA, and release to production

D. Develop, test, perform QA, and release to production

Which type of memory allows a virtual machine to start with a smaller amount of memory and increase it based on the workload of the virtual machine? A. Startup RAM B. Static memory C. Virtual memory D. Dynamic memory

D. Dynamic memory

If price is not a factor, which type of storage device interface would you recommend for connecting to a corporate SAN? A. IDE B. SCSI C. SATA D. FC

D. FC

Which of the following is the BEST choice for a clustered host interconnect? A. Infiniband B. 1Gb Ethernet C. 10Gb Ethernet D. Fibre Channel

D. Fibre Channel

A consultant is helping a large company migrate its development environment to a public cloud provider. The developers are working on a VDI solution. The development tools that employees utilize require greater control of the OS environment. Which of the following cloud types should the consultant implement? A. SaaS B. PaaS C. Bare metal service D. IaaS

D. IaaS

Which of the following cloud solutions provides only hardware and network resources to make up a cloud environment? A. SaaS B. CaaS C. PaaS D. IaaS

D. IaaS

A newly established CSP allows for drive shipping to upload new data into the environment. Sensitive data on 40TB of storage needs to be transferred within one week. Which of the following is the MOST efficient and secure method for shipment of the data to the CSP with minimal downtime? A. Create a VPN between the sites and schedule data transfer during non-business hours. B. Copy the data to encrypted drives and use the CSP-certified shipping provider. C. Compress and SFTP the data to the CSP. D. Move the data to encrypted drives and use the CSP-certified shipping provider.

D. Move the data to encrypted drives and use the CSP-certified shipping provider.

Which of the following should be implemented to ensure email continuity is not disrupted if one of multiple datacenters experiences an outage? A. Geo-clustering B. Offsite backup C. Local load balancing D. Multipathing

D. Multipathing

Which of the following cloud service models would be recommended to a company for hardware capacity to host a production database application? A. CaaS B. XaaS C. IaaS D. PaaS

D. PaaS

Which of the following characteristics describe a network attached storage (NAS) deployment? A. Requires expensive equipment to support B. Requires specialized skill sets for administrators to support C. Delivers the best performance of any networked storage technologies D. Provides great value by utilizing existing infrastructure

D. Provides great value by utilizing existing infrastructure

Which of the following would a company implement to provide authentication to multiple websites that are delivered through PaaS? A. Federation services B. MAC C. Multi-factor authentication D. RBAC

D. RBAC

Which of the following is a benefit of having a virtual versus physical server environment? A. Improved security B. IPSec tunnel C. Data scraping D. Redundancy

D. Redundancy

When designing a new private cloud platform, a cloud engineer wants to make sure the new hypervisor can be configured as fast as possible by cloning the OS from the other hypervisor. The engineer does not want to use local drives for the hypervisors. Which of the following storage types would BEST suit the engineer's needs? A. CAS B. NAS C. DAS D. SAN

D. SAN

A storage appliance has lost all network access. Which of the following network access methods could a storage engineer use to investigate and correct the issue? A. HTTP B. Console port C. RDP D. SSH

D. SSH

Which of the following groups multiple network storage devices into a single storage unit that can be managed from a central console and used by a virtual machine or host computer? A. Virtual switch B. virtual HBA C. Virtual NIC D. Storage virtualization

D. Storage virtualization

A company is implementing a launchpad within an existing application that will point to an existing SaaS provider. One of the requirements is the user should not have to log on multiple times. SSO is in place. When the launchpad is used, the user is redirected to SaaS providers as designed, but is asked for login credentials. Which of the following is the MOST likely cause of this issue? A. Users do not exist within the SaaS provider. B. Group permissions are incorrect. C. Users do not exist in directory services. D. The federation is failing.

D. The federation is failing.

Ann. a user, has tried to connect to a VM hosted in a private cloud using her directory services credentials. After three attempts, she realizes the keyboard was set to German instead of English, and she was typing "z" instead of "y". After fixing this issue, Ann is still unable to log in; however, other users can access the VM. Which of the following is the MOST likely cause? A. The default language on Ann's computer is German. B. The account was locked. C. Directory services are offline. D. There is an account mismatch. E. The account localization settings are incorrect.

E. The account localization settings are incorrect.

A company is interested in a DRP. The purpose of the plan is to recover business as soon as possible. The MOST effective technique is what? A. archiving B. network clustering C. site mirroring D. active/active

D. active/active

Which of the following is considered a SAN protocol? A. FCP B. IDE C. SSD D. DTE

A. FCP

The following file system was designed to replace the FAT file system: A. NTFS B. ZFS C. EXT D. UFS

A. NTFS

Voice over IP (VoIP) is an example of what type of cloud service? A. IaaS B. PaaS C. MaaS D. CaaS

D. CaaS

Which of the following tools would an administrator use to test connectivity of a server in the cloud? A. ping B. FTP C. nslookup D. netstat

A. ping

A technician needs to configure a virtual NIC on a Class A IP address network. Which of the following is the default subnet mask for this network? A. /8 B. /16 C. /24 D. /28

A. /8

A new application with availability SLA requirements of 99.99% has been deployed in a cloud. For a test spanning a month, which of the following unavailability times would mean the test was successful? (Select two.) A. 1 minute B. 4 minutes C. 10 minutes D. 30 minutes E. 60 minutes

A. 1 minute B. 4 minutes

A company is migrating their physical servers to virtual. The administrator is tasked with migrating three servers: - One application server with a dual-core 3.2GHz processor that reaches 50% CPU utilization at peak time. - Two web servers, each with a dual-core 3.2GHz processor, both reaching 70% CPU utilization at peak time. Currently, the administrator only has two hosts available, so resources will need to be set for the new VMs. Each host has two 2.4GHz quad-core processors. One host is already near maximum capacity, and the second host is at 30% CPU utilization. Which of the following would be the BEST minimum CPU resources set on the second host for the new VMs? A. 1,600 MHz for the application server and 2,300 MHz for each web server. B. 3,300 MHz for the application server and 4,600 MHz for each web server. C. 3,300 MHz for the application server and 5,250 MHz for each web server. D. 5,250 MHz for the application server and 7,080 MHZ for each web server.

A. 1,600 MHz for the application server and 2,300 MHz for each web server.

A cloud architect created a new delivery controller for a large VM farm to scale up according to organizational needs. The old and new delivery controllers now form a cluster. However, the new delivery controller returns an error when entering the license code. Which of the following is the MOST likely cause? A. A firewall is blocking the port on the license server. B. The existing license is for a lower version. C. The existing license is not supported for clusters. D. The existing license has expired.

A. A firewall is blocking the port on the license server.

During peak times, users are unable to access their online wealth management applications in a timely fashion. The online banking application resides in a community cloud environment. Which of the following explains how the cloud systems administrator should start to resolve this issue? A. Access the cloud services portal and ensure memory ballooning is enabled. B. Access the cloud services portal and ensure there is adequate disk space available. C. Access the cloud services portal and ensure all users are accessing it through the same web service. D. Access the cloud services portal and ensure the ACLs are set correctly for the user community.

A. Access the cloud services portal and ensure memory ballooning is enabled.

A cloud administrator is integrating account logins with Facebook, LinkedIn, and Twitter for marketing and to increase market presence using social media platforms. Given this scenario, which of the following components are needed to match these requirements? (Select three.) A. SOAP B. SAML assertion C. Security token D. Identity provider E. Session state

A. SOAP B. SAML assertion E. Session state

A cloud administrator reports a problem with the maximum number of users reached in one of the pools. There are ten VMs in the pool, each with a software capacity to handle ten users. Based on the dashboard metrics, 15% of the incoming new service requests are failing. Which of the following is the BEST approach to resolve the issue? A. Check compute, storage, and networking utilization in the dashboard and increase capacity by adding more resources. B. Check current licensed capacity and purchase additional licenses to add more users. C. Check the DHCP scope and increase the number of available IP addresses by extending the pool. D. Check the rate-of-load increase to determine if the cloud capacity boundary has been exceeded and enable bursting to the pubic cloud.

A. Check compute, storage, and networking utilization in the dashboard and increase capacity by adding more resources.

A private cloud customer is considering using the public cloud to accommodate the peak utilization workload. Which of the following would be considered the ideal scaling solution? A. Cloud bursting B. Load balancing C. Horizontal scaling D. Vertical scaling

A. Cloud bursting

A cloud architect is tasked with isolating traffic between subnets in an IaaS platform. The networks should be able to statefully communicate with each other. Given this scenario, which of the following should the architect implement? A. Configure security groups. B. Configure HIPS policies. C. Configure IDS policies. D. Configure a network ACL.

A. Configure security groups.

A cloud engineer deployed an email server in a public cloud. Users can access the email server, but the emails they send cannot reach their destinations. Which of the following should the cloud engineer do FIRST? A. Confirm the email server configuration and reinstall the email server software. B. Validate the security certificate for the email domain. C. Confirm email encryption service. D. Consult the cloud vendor's anti-spam policy.

A. Confirm the email server configuration and reinstall the email server software.

Before doing a change on a VM, a systems administrator wants to ensure there is an easy and fast way to rollback if needed. The change and testing should take approximately two hours. Which of the following is the EASIEST way to meet this requirement? A. Create a snapshot on the hypervisor. B. Make an on-demand, incremental backup to a VTL. C. Make an on-demand, full backup to a secondary location. D. Create a snapshot on a remote storage array.

A. Create a snapshot on the hypervisor.

An administrator is implementing a private cloud that will be used as a test environment. To limit the number of guests per subnet to a maximum of 14, the administrator implemented a /20 network. Which of the following should the administrator use to assign the networks? A. DHCP B. Subnet C. VLAN D. Gateway

A. DHCP

A customer wants to schedule a backup job that compares and saves changes from the last full backup. Which of the following backup types should be used? A. Differential B. Full C. Clone D. Incremental

A. Differential

A cloud service provider wants to offer hardened virtual server images for provisioning purposes. This will enable users to use only the operating system services that are allowed by the provider. Which of the following tasks are MOST appropriate for the hardening process? (Select two.) A. Disable automatic updates. B. Disable the command prompt. C. Disable unneeded ports and services. D. Disable the local administrator account. E. Disable the remote desktop connection. F. Disable complex passwords.

A. Disable automatic updates. C. Disable unneeded ports and services.

A business is demanding faster IT services turnaround from its IT groups. The current lead time between request and delivery is three weeks for a task that would take a competitor two days. An architect is asked to develop a solution to reduce the lead time of the request while ensuring adherence to the company policies. Which of the following is the BEST approach to achieve the stated objective? A. Document the desired state, complete a root cause analysis, and execute the flow. B. Revise the schedule, implement a waterfall methodology, and flatten the network. C. Identify deficiencies, optimize change management, and automate the workflow. D. Follow the company policies, execute the flow, and document results.

A. Document the desired state, complete a root cause analysis, and execute the flow.

An administrator has recently added a new host server to a private cloud environment. The host has two quad-core processors and 128GB of RAM. The server will have ten guest servers that require a minimum of 1 CPU and 8GB of RAM per server. Four of the servers will only be used during off hours. Which of the following should the administrator implement to ensure that the guest servers have the proper resources? A. Dynamic CPU B. Redundancy C. NIC Teaming D. Dynamic RAM

A. Dynamic CPU

A company is implementing a SaaS solution with a large user base. SaaS solution licensing is user based, and user management is critical to keep the cost in check. Which of the following is the MOST efficient way to meet this requirement? A. Have the administrator of the SaaS solution keep track of user activities. B. Have a nightly upload to the SaaS provider of the current user base based on API call. C. Have users remove their SaaS accounts when they no longer need the service. D. Have a weekly user management script maintain the SaaS user base.

A. Have the administrator of the SaaS solution keep track of user activities.

Which of the following is the BEST way to ensure accounts in a cloud environment are disabled as soon as they no longer need to be active? A. Have the user contact the cloud systems administrator to disable the account when it is no longer needed. B. When users leave the company, ensure an account disablement request is initiated and will be fulfilled in less than four hours. C. Have accounts checked by the cloud systems administrator once per day to ensure active accounts are still valid. D. Reboot directory services servers once a day to ensure all account disablement requests are committed.

A. Have the user contact the cloud systems administrator to disable the account when it is no longer needed.

A cloud administrator is analyzing usage trends for a website housed within an IaaS cloud platform. The administrator notices that traffic and visitors to the site quadrupled from the normal baseline during the holiday season. The environment has a load balancer that uses standardized VMs to host the applications. Given this scenario, which of the following would be the MOST efficient, provide no downtime, and address the temporary spike in traffic? A. Implement an upward vertical scaling solution. B. Implement a downward vertical scaling solution. C. Implement an inward horizontal scaling solution. D. Implement an outward horizontal scaling solution.

A. Implement an upward vertical scaling solution.

A cloud implementation engineer successfully created a new VM. However, the engineer notices the new VM is not accessible from another network. A ping test works from another VM on the same subnet. Which of the following is the MOST likely problem? A. Incorrect subnet B. Incorrect host IP address C. Incorrect VLAN D. Incorrect gateway

A. Incorrect subnet

Which of the following authentication types is being required when a user must swipe a key card and then enter a password before being allowed access to the server room? A. Multi-factor authentication B. Single sign-on C. Biometric authentication D. Single-factor authentication

A. Multi-factor authentication

A cloud administrator is receiving alerts that the disk on several systems is 90% full. Upon reviewing the systems, the administrator determines that the log directory is using 50% of the disk. The company has a 14-day retention policy for all logs. Which of the following is the BEST solution to implement to minimize future alerts? A. Orchestrate a job to rotate the logs and upload to external storage. B. Delete any log files in the directory that are larger than 20MB. C. Archive the existing logs in the directory and upload to external storage. D. Add additional storage space to the log directory for the servers.

A. Orchestrate a job to rotate the logs and upload to external storage.

Which of the following cloud services would MOST likely be selected by a software development company that needs a cloud in which to develop software and does not have infrastructure requirements? A. PaaS B. SaaS C. IaaS D. XaaS

A. PaaS

What type of computing solution would be defined as a platform that is implemented within the corporate firewall and is under the control of the IT department. A. Private cloud B. public cloud C. VLAN D. VPN

A. Private cloud

A cloud administrator is looking at business requirements that specify the data available at the disaster recovery site must not be more than 24 hours old. Which of the following metrics correctly relates to these requirements? A. RTO B. MTBF C. MTTR D. RPO

A. RTO

An administrator has created a new virtual server according to specifications and verified that TCP/IP settings are correct. When the VM is powered on, however, an error message indicates that a network card MAC address conflict exists. Which of the following would resolve this issue? A. Remove the virtual NIC and configure another one. B. Add an additional NIC with a loopback interface. C. Ping the IP address to determine the location of the conflict. D. Change the MAC to ff:ff:ff:ff:ff:ff and obtain a new address.

A. Remove the virtual NIC and configure another one.

Several SaaS providers support identity federation for authentication. Which of the following would BEST assist in enabling federation? A. SAML B. NTLM C. MFA D. PKI

A. SAML

Which storage type provides block-level storage? A. SAN B. NAS C. DAS D. SATA

A. SAN

Which of the following storage technologies is IP-based? A. SCSI B. DAS C. FCP D. NAS

A. SCSI

An engineer is configuring the monitoring for a new application server. During the day, the CPU on the server is baselined at approximately 30% utilization. At midnight, a batch job is scheduled to run that will drive the CPU utilization up to 75% for approximately an hour. Any time the CPU utilization is at 40% or higher for longer than ten minutes, administrators will receive an alert. Which of the following is the BEST method to ensure administrators do not experience message fatigue due to false alerts? A. Set a different threshold during the batch peak time. B. Increase the alert time threshold to 65 minutes. C. Increase the alert utilization threshold to 80%. D. Manually disable monitoring during the batch job.

A. Set a different threshold during the batch peak time.

A customer wants a cloud systems administrator to adjust the backup schedule after month-end to ensure the data can be restored as fast as possible while minimizing the time needed to perform the backup. Which of the following backup types should be scheduled? A. Synthetic full B. Incremental C. Differential D. Full

A. Synthetic full

After a recent outage going unnoticed, an administrator has been tasked to configure monitoring for the Linux-based and Windows-based host operating systems in a hybrid cloud. Which of the following services should the administrator confirm are functional prior to employing centralized monitoring to both types of operating systems? (Select two.) A. Syslog services B. Cron services C. Web services D. Task Manager services E. WMI services

A. Syslog services B. Cron services

Engineers are preparing to move guests to new compute and storage infrastructure. Basic network and SAN connectivity have been established. Which of the following options are valid NEXT steps to prepare for guest migration to the new infrastructure? (Select two.) A. Tag the live migration VLAN on the trunk to the new servers. B. Correctly size and provision NFS LUNs on the new storage. C. Zone HBAs. D. Prep mirror VMs on new hosts for data migration. E. Tag the SAN trunks with the correct guest network VLANs.

A. Tag the live migration VLAN on the trunk to the new servers. D. Prep mirror VMs on new hosts for data migration.

An administrator is trying to enable hardware-assisted virtualization in the BIOS of a computer and notices it is not an option. He checks the specification on the manufacturer's website and finds that the system should support hardware-assisted virtualization. What is most likely the reason why he can't enable it? A. The BIOS needs a firmware update. B. The BIOS is corrupt. C. Hardware-assisted virtualization is enabled in the operating system, not the BIOS. D. The firmware is corrupt.

A. The BIOS needs a firmware update.

A cloud engineer is using a hosted service for aggregating the logs for all the servers in a public cloud environment. Each server is configured via syslog to send its logs to a central location. A new version of the application was recently deployed, and the SaaS server now stops processing logs at noon each day. In reviewing the system logs, the engineer notices the size of the logs has increased by 50% each day. Which of the following is the MOST likely reason the logs are not being published after noon? A. The logging directory does not have sufficient storage space. B. The syslog service is not running on the servers. C. The data limit has been exceeded at the SaaS provider. D. There is a cloud service provider outage.

A. The logging directory does not have sufficient storage space.

Which statement defines chargeback? A. The recovery of costs from consumers of cloud services B. The process of identifying costs and assigning them to specific cost categories C. A method of ensuring that cloud computing becomes a profit instead of a cost D. A system for confirming that billing occurs for the cloud services being used

A. The recovery of costs from consumers of cloud services

A cloud administrator is tasked with ensuring redundancy and high availability of an IaaS cloud platform environment. The administrator is given the following requirements: Two web servers must share the same configurations and service client connections evenly. Two database servers must share data and configurations, with only one being used at a time. Given the above, which of the following should the administrator propose to BEST meet these requirements? (Select two.) A. The web server should be configured with a round-robin DNS with a CNAME record. B. The web server should be configured with a load balancer with a virtual IP address. C. The database server should be configured as an active-active cluster. D. The database server should be configured as an active-passive cluster. E. The availability aspect of the request does not currently exist in the IaaS cloud platform. F. The redundancy aspect of the request does not currently exist in the IaaS cloud platform.

A. The web server should be configured with a round-robin DNS with a CNAME record. D. The database server should be configured as an active-passive cluster.

Which data tier would you recommend for a mission-critical database that needs to be highly available all the time? A. Tier 1 B. Tier 2 C. Tier 3 D. Tier 4

A. Tier 1

Which of the following hypervisors would provide the best performance for a host machine? A. Type 1 B. Type 2 c. open source d. proprietary

A. Type 1

A development team released a new version of an application and wants to deploy it to the cloud environment with a faster rollback and minimal downtime. Which of the following should the cloud administrator do to achieve this goal? A. Use a rolling deployment to update all the servers in the PROD cloud environment with the new application. To switch to the previous version, repeat the process. B. Deploy the application to the PROD cloud environment and the previous version to QA. To switch to the previous version, promote the QA environment to PROD. C. Deploy the application to a subset of servers in the environment and route traffic to these servers. To switch to the previous version, change the route to the non-updated servers. D. Deploy the application to a staging environment and force a failover to this environment. To restore the previous version, create a backup and restore from the previous night's backup.

A. Use a rolling deployment to update all the servers in the PROD cloud environment with the new application. To switch to the previous version, repeat the process.

The CSA needs to install a patch on 58 virtual server instances during the Friday evening maintenance window. Which of the following is the MOST efficient way to get the patches installed? A. Use the patch management tool to automate and orchestrate the patch installation. B. Use a security vulnerability scanning tool to apply the patch automatically. C. Schedule the patch to install from a remote file server upon server reboot. D. Connect the server instances to the Internet to download the patch automatically.

A. Use the patch management tool to automate and orchestrate the patch installation.

In an IaaS model, to which of the following methodologies would the client apply a list of OS patches, assuming approval from CAB has been given? A. Using a patch management system, identify the hypervisor type, select a group of hypervisors to be patched, and perform a rolling application of patches. B. Using a patch management system, identify the guests that require patching, and select and apply the patches. C. Using a patch management system, identify the applications needing the patch, select the required application in a patch management console, and apply the patches. D. Using a patch management system, identify the services that require patching, and select and apply the patches.

A. Using a patch management system, identify the hypervisor type, select a group of hypervisors to be patched, and perform a rolling application of patches.

An organization wants to create a server VM that is segregated from the rest of the servers. Which of the following should the server administrator configure? A. Virtual NIC B. Trunk port C. Virtual memory D. VPN connection

A. Virtual NIC

Internal users are reporting high latency when connecting to external servers in the cloud. Which of the following should a network administrator optimize? A. WAN B. SAN C. VLAN D. LAN

A. WAN

Which term is used to define the increasing number of services delivered over the internet? A. XaaS B. CaaS C. MaaS D. C-MaaS

A. XaaS

A new server is connected to the fibre channel switch. In order to allow the server to see its allocated storage on the storage array, the administrator must configure the server's WWNN as a member. The server administrator is configuring which of the following? A. Zoning B. LUN masking C. Supernetting D. VLAN tagging

A. Zoning

Which of the following statements is a benefit of a hybrid cloud? A. data security management B. requirement of a major financial investment C. dependency of internal IT department D. complex networking

A. data security management

A cloud infrastructure function that can grow and shrink to meet peak demand requirements quickly is known as ____. A. elasticity B. federation C. automation D. caching

A. elasticity

A company is building a new server cluster to host applications for external clients. The company wants to ensure high availability and maximum throughput, and requests that the server administrators configure teamed interfaces on all servers in the cluster. In this scenario, a teamed interface refers to ____. A. link aggregation B. elasticity on demand C. a TCP offload engine D. resource pooling

A. link aggregation

Which of the following would be considered an advantage of cloud computing? A. Increased security B. Ability to scale to meet growing usage demands C Ease of integrating equipment hosted in other data centers D. Increased privacy for corporate data

B. Ability to scale to meet growing usage demands

A company's security policy requires full disk encryption on all clients with preboot enabled. The encryption server is hosted, and the requirement is to push an update to all endpoints. Which of the following is the BEST method to test and apply the update with minimal disruption to end users? A. Access the API of the encryption server, develop a custom script, and then update all endpoints. B. Access the web UI portal of the encryption server, apply the update to the test group, validate, and then update all endpoints. C. Add the update to the standard desktop configuration image, apply the update to a test VM, and then reimage clients. D. Access the web UI of the encryption server and disable preboot, apply the update, test, and then deploy the update to all endpoints.

B. Access the web UI portal of the encryption server, apply the update to the test group, validate, and then update all endpoints.

Which HA solution involves multiple servers that each service requests concurrently, but can assume the load of one member if that member fails. A. Active-passive B. Active-active C. Passive-passive D. Passive-active

B. Active-active

A cloud engineer notices on a dashboard that the host is close to reaching maximum capacity for the CPU and memory in the cloud environment, which could cause performance issues. The cloud environment has 100 servers, with 25% of the servers consuming their compute only during peak business hours, 25% consuming half of the allocated resources, and the remaining 50% using the compute during off hours. Which of the following should the engineer perform to optimize the efficiency of the compute usage in the cloud? A. Add additional CPUs and RAM to the host that is serving the cloud. B. Adjust the cloud workload by migrating resource-intensive applications to different hosts. C. Add additional hosts to the environment using the cloud management tool. D. Enable automatic scaling in the cloud management tool.

B. Adjust the cloud workload by migrating resource-intensive applications to different hosts.

A company changed its policy to have seven-year data retention in the public cloud. Which of the following would be the MOST cost-effective way to meet retention requirements? A. Site mirroring B. Automated archiving C. Replication D. Third-party sites

B. Automated archiving

Which of the following is a benefit of remote hypervisor administration? A. Only being able to modify one hypervisor host at a time B. Being able to remotely manage multiple hypervisor hosts from a single console C. Not having access to a hypervisor host D. Remotely accessing a hypervisor host has no benefit

B. Being able to remotely manage multiple hypervisor hosts from a single console

A large finance firm processes three times as many transactions in December of each year. The transactions are processed in a private cloud. Management wants to avoid adding permanent resources to accommodate the single month increase. Which of the following is the BEST way to meet the need? A. Migrate all transaction processing to a public cloud and size capacity for the largest seasonal needs. B. Keep current capacity for processing, but implement cloud bursting to auto scale the resources without having to invest in infrastructure. C. Determine usage patterns over time and virtualize the processing traffic to give room for seasonal changes in resource demand. D. Determine usage patterns for the seasonal capacity needs and add physical resources to allow additional processing.

B. Keep current capacity for processing, but implement cloud bursting to auto scale the resources without having to invest in infrastructure.

Warren is a systems administrator working in a corporate data center, and he has been tasked with hiding storage resources from a server that does not need access to the storage device hosting the storage resources. What can Warren configure on the storage controller to accomplish this task? A. Zoning B. LUN Masking C. Port Masking D. VLANs

B. LUN Masking

Which of the following is the BEST process to provide data access control to only the hosts authorized to access the LUN? A. RAID Masking B. LUN Masking C. RAID Mirroring D. LUN Binding

B. LUN Masking

Which of the following allows you to provide security to the data contained in a storage array? A. Trunking B. LUN masking C. LUN provisioning D. Multipathing

B. LUN masking

A multinational corporation needs to migrate servers, which are supporting a national defense project, to a new datacenter. The data in question is approximately 20GB in size. The engineer on the project is considering datacenters in several countries as possible destinations. All sites in consideration are on a high-speed MPLS network (10Gb+ connections). Which of the following environmental constraints is MOST likely to rule out a possible site as an option? A. Downtime impact B. Legal restrictions C. Peak time frames D. Bandwidth

B. Legal restrictions

Which of the following are requirements for adequate application performance when using synchronous replication? (Choose two) A. Object storage B. Low latency C. Multipathing D. High-speed links

B. Low latency D. High-speed links

A company has been migrating a significant number of its on-premises applications to various SaaS providers. The IT department has noticed the following: 1. User account management has become challenging. 2. User account compromises have increased. 3. Accessing various SaaS applications is challenging. Which of the following should the IT security department implement to BEST resolve the issue? (Choose three.) A. Single sign-on B. Multifactor authentication C. Network intrusion prevention system D. Password synchronization E. Federation F. IPSec tunnel to the SaaS providers G. VPN to SaaS providers

B. Multifactor authentication D. Password synchronization E. Federation

Which of the following would increase availability from a virtualization host to a storage device? A. Trunking B. Multipathing C. Link aggregation D. VLANs

B. Multipathing

Which storage type can take advantage of Universal Naming Convention addressable storage? A. SAN B. NAS C. DAS D. SATA

B. NAS

A cloud service company is proposing a solution to a major sporting venue. The solution offers 99.999% availability during special events, which is proven through specialized testing. Which of the following techniques should be applied to confirm the high availability claimed by the company? (Choose two.) A. Vulnerability testing B. Penetration testing C. Load testing D. Failover testing E. Integration testing

B. Penetration testing D. Failover testing

A new SaaS timecard application that is being tested will be used by all employees at a large corporation. The following process was used to test the application: - Three users from each site used the application for three weeks. - The new application was used side by side with the existing application. - The outputs of the old and new applications were compared side by side. Which of the following requirements did the testing plan confirm? (Select three.) A. High availability B. Performance C. Connectivity D. Data integrity E. Sizing F. Security

B. Performance D. Data integrity E. Sizing

Which of the following would be a requirement when planning the compute resources for a host computer? A. The host computer does not need to have enough compute resources to support the virtual machine workload. B. The host computer must have enough compute resources to support the virtual machine workload. C. The host computer must be running a support operating system. D. The number of virtual machines running Microsoft Windows must be known.

B. The host computer must have enough compute resources to support the virtual machine workload.

A cloud administrator updates the syslog forwarder configuration on a local server in production to use a different port. The development team is no longer receiving the audit logs from that server. However, the security team can retrieve and search the logs for the same server. Which of the following is MOST likely the issue? A. The development team is not looking at the correct server when querying for the logs. B. The security team has greater permissions than the development team. C. The audit logging service has been disabled on the server. D. The development team's syslog server is configured to listen on the wrong port.

B. The security team has greater permissions than the development team.

Which provisioning model would you use if data is added quickly and often? The solution must be ensure consistent performance. A. Thin provisioning B. Thick provisioning C. Overprovisioning D. Encryption

B. Thick provisioning

Which term describes the ability for an organization to store data based on performance, cost, and availability? A. RAID B. Tiered storage C. SSD D. Tape drive

B. Tiered storage

A company has a virtual database server running in the cloud that the company would like to start hosting in-house on a newly purchased blade server. Which of the following virtualization tools would BEST be used to accomplish this? A. P2P B. V2P C. P2V D. V2V

B. V2P

In a virtual machine, which component appears as an Ethernet adapter? A. Virtual HBA B. Virtual NIC C. Virtual switch D. Virtual router

B. Virtual NIC

A university is running a DNA decoding project that will take seven years if it runs on its current internal mainframe. The university negotiated a deal with a large cloud provider, which will donate its cloud resource to process the DNA decoding during the low peak time throughout the world. Which of the following is the MOST important resource the university should ask the cloud provider to donate? A. A large storage for the DNA decoding results. B. A larger pipe to transfer the results. C. A closer datacenter to the university. D. Any available compute resource.

C. A closer datacenter to the university.

Which of the following will be the BEST option for an administrator to bring VMs online at a warm site after a natural disaster has occurred at the primary site? A. Kick off a full backup B. Request offsite backup tapes C. Confirm enterprise tape library is functional D. Verify replication is enabled

C. Confirm enterprise tape library is functional

Which of the following contributes to increased read access performance on a fibre channel SAN? A. Zoning B. Clustered storage C. Caching D. QoS

C. Caching

Which of the following reduces the amount of data that must be transmitted on a network by keeping a copy of recently transmitted data in memory? A. Latency B. Compression C. Caching D. Bandwidth

C. Caching

Several suspicious emails are being reported from end users. Organizational email is hosted by a SaaS provider. Upon investigation, the URL in the email links to a phishing site where users are prompted to enter their domain credentials to reset their passwords. Which of the following should the cloud administrator do to protect potential account compromise? A. Forward the email to the systems team distribution list and provide the compromised user list. B. Click on the URL link to verify the website and enter false domain credentials. C. Change the encryption key for the entire organization and lock out all users from using email until the issue is remediated. D. Notify users who received the email to reset their passwords regardless of whether they click on the URL.

C. Change the encryption key for the entire organization and lock out all users from using email until the issue is remediated.

When you run out of computer resources in your internal data center and expand to an external cloud on demand, this is an example of what? A. SaaS B. Hybrid cloud C. Cloud bursting D.Elasticity

C. Cloud bursting

A cloud deployment has been created explicitly for the finance department. What type of cloud deployment would this be defined as? A. Public cloud B. Hybrid cloud C. Community cloud D. Private cloud

C. Community cloud

A cloud administrator is adding several accounts for new development team interns. These interns will need access to some, but not all, of the resources and will only be working over the summer. Which of the following user provisioning techniques should be used? A. Create a single account for the interns to share. Set the expiration date for the account to six months. B. Create a role labeled "interns" with the appropriate permissions. Create a separate account with an expiration date for each intern and add each intern to that role. C. Create one template user account with the appropriate permissions and use it to clone the other accounts. Set an expiration date for each account individually. D. Create individual accounts for each intern, set the permissions and expiration date for each account, and link them to a temporary guests user group.

C. Create one template user account with the appropriate permissions and use it to clone the other accounts. Set an expiration date for each account individually.

Which of the following typically provides a FASTER access speed in a network storage implementation? A. NFS B. SAN C. DAS D. SATA

C. DAS

Which type of storage system is directly attached to a computer and does not use a storage network between the computer and the storage system? A. NAS B. SAN C. DAS D. Network share

C. DAS

Which statement would identify the primary difference between NAS and DAS? A NAS cannot be shared and accessed by the multiple computers. B. DAS provides fault tolerance C. DAS does not connect to networked storaged devices D. NAS uses an HBA and DAS does not

C. DAS does not connect to networked storaged devices

A file server is being migrated from physical hardware into a private cloud. Baselining of the server shows the disks average 90% full at all times. The contents of the file server consist mostly of compressed audio files. Multiple copies of the same files are often saved in different locations on the same disk. Which of the following storage technologies is MOST likely to help minimize storage utilization when moving this server to the private cloud? A. Compression B. Thin provisioning C. Deduplication D. Tokenization

C. Deduplication

Which of the following access control types would give a system administrator the ability to assign access according to least privilege? A. Role based B. Rule based C. Discretionary D. Mandatory

C. Discretionary

Which of the following allows you to connect a server to storage devices with speeds of 128 Gbps? A. Ethernet B. iSCSI C. Fibre Channel D. SAS

C. Fibre Channel

The administrator wants to have central storage for all of the files to be stored for each VM. Which of the following is used to connect a host to a SAN utilizing a fiber connection? A. VNIC B. NIC C. HBA D. SCSI adapter

C. HBA

You have been given a drive space requirement of 2 terabytes for a production file server. Which type of disk would you recommended for this project if cost is a primary concern? A. SSD B. Tape C. HDD D. VLAN

C. HDD

Every night a datacenter takes snapshots of each VM and backs them up to a tape which is shipped off to a disaster recovery site once a week. Which of the following can mitigate a security breach if the tapes were to fall out of the shipping vehicle during transport? A. Transmission level encryption B. Transport layer encryption C. Hard drive encryption D. File level encryption

C. Hard drive encryption

A new browser version has been deployed to all users at a company. After the deployment, users report that they can no longer access the company's secure time-card system, which is hosted by a SaaS provider. A technician investigates and discovers a security error is received upon opening the site. If the browser is rolled back to the older version, the site is accessible again. Which of the following is the MOST likely cause of the security error users are seeing? A. SSL certificate expiration on the SaaS load balancers. B. Federation issues between the SaaS provider and the company. C. Obsolete security technologies implemented on the SaaS servers. D. Unencrypted communications between the users and the application.

C. Obsolete security technologies implemented on the SaaS servers.

Which of the following is usually accessed via a web browser? A. IaaS B. SaaS C. PaaS D. Virtual Machines

C. PaaS

A cloud administrator is provisioning five VMs, each with a minimum of 8GB of RAM and a varying load throughout the day. The hypervisor has only 32GB of RAM. Which of the following features should the administrator use? A. Memory overcommitment B. Thin-provisioned model C. Process scheduling D. Hyperthreading

C. Process scheduling

Which of the following would be considered an example of IaaS? A. Providing productivity software for use over the internet B. a multiuser program that is hosted by a third party C. Providing hardware resources over the internet D. a database that is hosted in the cloud

C. Providing hardware resources over the internet

What RAID level would be used for a database file that requires minimum write requests to the database, a large amount of read requests to the database, and fault tolerance for the database? A. RAID 10 B. RAID 1 C. RAID 5 D. RAID 0

C. RAID 5

A customer recently provisioned a new server on the IaaS. The IP address assigned from the pool resolves to another hostname. Some user traffic is being dumped or is causing slowness because of this issue. Which of the following maintenance activities does the provider need to perform to prevent this issue? A. Use cloud provider tools to remove orphaned resources. B. Initiate resource reclamation. C. Run a script to remove stale DNS entries. D. Update outdated security firewall configurations.

C. Run a script to remove stale DNS entries.

Which type of storage device would be used primarily for off-site storage and archiving? A. HDD B. SSD C. Tape D. SCSI

C. Tape

A company purchased a SaaS CRM application. The signed SLA meets year-round performance requirements. Three months after deployment, customers start reporting a slow application response time. System availability, connectivity, and proper functionality still meet the ... Which of the following is MOST likely the reason for the poor response time? A. Incorrect business requirements are invalidating the testing results. B. Bandwidth restrictions are causing poor performance. C. The application version is causing compatibility issues. D. Inadequate documentation is affecting the user interface.

C. The application version is causing compatibility issues.

cloud administrator uses a script to automatically restart all the servers running in the public cloud provider environment, which hosts e-commerce applications. The administrator decides to implement the same script for a similar environment that hosts the finance applications. After verifying the script is deployed to the public cloud environment for finance, the administrator schedules a job to run at 9:00 a.m. After 9:00 a.m., the administrator receives a report from the e- commerce team that the application is experiencing outages. Which of the following should the administrator do to resolve the issue? A. Update the version of the CLI tool for the public cloud provider. B. Copy the script up to a bastion host in the environment and run it from there. C. Validate the access credentials for the cloud provider are correct. D. Debug the script and modify it to remove the flawed logic.

C. Validate the access credentials for the cloud provider are correct.

Which of the following network topologies should an administrator use to segment traffic? A. Metropolitan Area Networks B. Local Area Networks C. Virtual Local Area Networks D. Wide Area Networks

C. Virtual Local Area Networks

In an IaaS environment, the security team issues a new signature file to prevent specific malware threats from infiltrating the company network. Which of the following describes where the security team should deploy the updated signatures? A. IDS B. Spam filter C. WAF D. NIPS E. HIPS

C. WAF

Which of the following file systems was designed to protect against data corruption and is a 128-bit file system? A. NTFS B. UFS C. ZFS D. FAT

C. ZFS

Which of the following uses IP networks that enable servers to access remote disks as if they were locally attached? A. SAS B. SATA C. iSCSI D. Fibre Channel

C. iSCSI

Which of the following utilities would BEST help diagnose NAS mount points? A. route B. ping C. ifconfig D. nfsstat

C. ifconfig

A courier company has virtualized its packing software application. The CSA needs to confirm the deployment is utilizing the correct amount of CPU per virtual instance. After confirming the deployment requirements, the CSA should log into the cloud services portal to ensure that ____. A. the VMs with the most CPU cores available have been selected B. smaller VMs are being selected to reduce the total deployment cost C. the deployment is utilizing the recommended amount of CPUs per VM D. the alarms on CPU utilization have been enabled

C. the deployment is utilizing the recommended amount of CPUs per VM

An organization is converting a physical SQL server into a virtual server. The SQL database has been in use for several years and contains critical data for the organization. Which of the following conversion methods would be MOST appropriate? A. Automated offline B. Manual offline C. Manual online D. Automated online

D. Automated online

A company wants to leverage a SaaS provider for its back-office services, and security is paramount. Which of the following solutions should a cloud engineer deploy to BEST meet the security requirements? A. Firewall B. IPS/IDS C. Proxy gateway D. CASB

D. CASB

You have been tasked with planning the purchase of a new virtualization host computer. When it comes time to recommend the processor type, which processor capability is more important? A. CPUs are more important than CPU cores and cache. B. CPU cores and cache are more important than CPUs. C. CPU speed is more important than CPU cores and cache. D. CPU cores and cache are more important than CPU speed.

D. CPU cores and cache are more important than CPU speed.

A cloud administrator has deployed a new all-flash storage array with deduplication and compression enabled, and moved some of the VMs into it. The goal was to achieve 4:1 storage efficiency while maintaining sub-millisecond latency. Which of the following results would BEST suit the requirements? A. Compression 1:1, Deduplication 4:1, Overall savings 4:1, Average latency 1.0ms B. Compression 1.5:1, Deduplication 1.8:1, Overall savings 2.2:1, Average latency 600us C. Compression 1.3:1, Deduplication 3.1:1, Overall savings 4.3:1, Average latency 900us D. Compression 1.8:1, Deduplication 2.7:1, Overall savings 4.2:1, Average latency 1.2ms

D. Compression 1.8:1, Deduplication 2.7:1, Overall savings 4.2:1, Average latency 1.2ms

Which of the following terms best describes life cycle management? A. Baseline B. Finite C. Linear D. Continuum

D. Continuum

Cloud bursting can alleviate which of the following attacks? A. Buffer Overflow B. Brute Force C. XSS D. DDOS

D. DDOS

Which of the following ensures that there is enough space for vendors to install their programs and run the software they will be managing for various SaaS products? A. Network isolation B. Laws and regulations C. Multi-tenancy D. Data segregation

D. Data segregation

A cloud administrator has finished building a virtual server template in a public cloud environment. The administrator is now cloning six servers from that template. Each server is configured with one private IP address and one public IP address. After starting the server instances, the cloud administrator notices that two of the servers do not have a public IP address. Which of the following is the MOST likely cause? A. The maximum number of public IP addresses has already been reached. B. The two servers are not attached to the correct public subnet. C. There is no Internet gateway configured in the cloud environment. D. The two servers do not have enough virtual network adapters attached.

D. The two servers do not have enough virtual network adapters attached.

After deploying new VMs, the systems administrator notices it is not possible to connect to them using network credentials; however, local accounts work. After logging in, the administrator notices the NTP servers are not set. Which of the following is MOST likely causing this issue? A. Directory services requires the use of NTP servers. B. The VMs are insufficiently licensed. C. There is a directory services outage. D. There is a time synchronization issue.

D. There is a time synchronization issue.

A company upgraded a hosted vulnerability scanner to the latest version, and now tickets are not being created to assign critical vulnerabilities. After confirming the ticketing issue, all the scanning services are confirmed to be running on the VM. Which of the following is the MOST likely cause and best method to fix the issue? A. There was an IP change to the VM. Make changes to the server properties. B. The upgrade has a bug Reboot the server and attempt the upgrade again. C. The vulnerability scanner is on a different subnet. Open the ports, and it will reconnect. D. There is an application compatibility issue. Roll back to the previous working backup.

D. There is an application compatibility issue. Roll back to the previous working backup.

A system's application servers need to be patched. The requirements for maintenance work are as follows: - System downtime is not allowed. - The application server in use must be in the sane patch status. - System performance must be maintained during patching work. - Testing after patching must be done before the application server is in use. - If any trouble occurs, recover the previous version in ten minutes. Which of the following methodologies should be selected? A. Rolling update B. Patching directly C. Blue-green deployment D. Three staging environments

D. Three staging environments

Which of the following file systems is used primarily for Unix-based operating systems? A. NTFS B. FAT C. VMFS D. UFS

D. UFS

A critical new security update has been released to fix an identified zero-day vulnerability with the SSH server process. Due to its severity, all development and staging servers must have this update applied immediately. Which of the following is the FASTEST way for the administrator to apply the patch and ensure all systems are configured consistently? A. Shut down all servers and use the server provisioning tools to deploy new ones that have the latest patch applied. B. Create a master inventory list of servers that must be patched. Log in to each server and deploy the patch, making sure to check off each server on the list. C. Use the existing tooling to clone the existing servers. Update each clone with the latest patch and shut down the original system. D. Update the set of configuration management scripts to include the latest patch. Execute these scripts against a master inventory of servers.

D. Update the set of configuration management scripts to include the latest patch. Execute these scripts against a master inventory of servers.

The administrator of virtual infrastructure needs to provision block storage for a virtual machine on which a business critical application will be installed. Considering performance, which of the following describes how the administrator should attach the storage to the VM? A. Using NFS B. Using CIFS C. Using IPv6 D. Using iSCSI

D. Using iSCSI

Which component controls how the network traffic flows between the virtual machines and the host computer and also how network traffic flows between the virtual machine and other network devices in the organization? A. Virtual NIC B. Virtual storage C. Virtual HBA D. Virtual switch

D. Virtual switch

An administrator is testing a new web server from outside of the corporate firewall. The administrator performs a test from a single PC and the web server responds accordingly. The administrator then provisions several virtual machines on a network behind NAT and uses them to perform the same operation on the web server at the same time, but thereafter soon discovers that none of the machines can reach the web server. Which of the following could be responsible? A. IPS B. Blacklisting C. IDS D. Whitelisting E. Firewall

E. Firewall

Which of the following alerting methods allows a technician to receive an alert on a mobile device such as a cell phone? a. SMTP b. SMS c. SNMP d. Syslog

b. SMS

Which of the following utilizes UDP port 514 when collecting events? a. SNMP b. Syslog c. WMI d. Web services

b. Syslog

What type of hypervisor is provided to an enterprise to use without cost? a. proprietary b. open source c. type 1 d. type 2

b. open source

You are investigating which technology is best suited for virtualizing a server operating system for personal use on a desktop computer. Which of the following technologies would you recommend? a. type 1 b. type 2 c. SAN d. RAID 6

b. type 2

Which of these can be used by both a cloud consumer and cloud provider to give a visual picture of performance metrics? a. API b. SNMP c. Dashboard d. SMTP

c. Dashboard

Which of the following would you use to remotely access a virtualization host in a secure fashion? a. Telnet b. Ping c. HTTPS d. Console port

c. HTTPS

Which of the following hypervisors runs on a bare metal system? a. open source b. proprietary c. type 1 d. type 2

c. type 1

An administrator is testing a variety of operating systems while performing other functions like surfing the Internet and word processing. What type of hypervisor is the admin most likely using? a. type 1 b. enterprise hypervisor c. type 2 d. open source

c. type 2

Which of the following allows for out-of-band management of a computer? a. WMI b. SMS c. SNMP d. IPMI

d. IPMI

Which of the following constantly executes a software component called an agent, which reports information using the protocol back to a manager? a. WMI b. SMTP c. SMS d. SNMP

d. SNMP


Ensembles d'études connexes

Chapter 3 - strategic marketing planning

View Set

MGMT 490 Business Policy Chapter 4 Evaluating a Company's Resources, Capabilities, and Competitiveness

View Set

Chapter 12: Food Safety Concerns

View Set