CompTIA Cloud+ CV0-003 archive
A startup company has recently released its third version of a messaging application to its user base. Following the release of the new version, a bevy of user complaints surfaced, claiming that since updating the application, many cannot access previous conversations. Which of the following did the company most likely NOT do?
B. Regression testing
To improve a system's performance during virtualization, the VMs installed should have direct access to network hardware within the system. Which component facilitates this access?
B. SR-IOV
A small company would like to minimize excess hardware maintenance expenditures during its growth stage. The company currently maintains physical drives for its entire operation, which throughout the growth process, has become increasingly expensive. When considering a cloud solution, what should the company consider for its storage needs?
B. STaaS
Following a storage configuration upgrade, a number of applications have begun performing slower than expected. A technician tests the read/write performance, and the results show up to 20% slower speeds than projected. Which of the following is most likely the culprit of this performance degradation?
B. The IOPS is exceeding its cap
An administrator is securing the organization's cloud-based network resources from potential connections by configuring rules in the Access Control List (ACL). The rules will either accept or block the connections to the network based on predetermined criteria. What cloud appliance is the administrator configuring?
C. WAF
A cloud technician is analyzing storage tiers for a critical Structured Query Language (SQL) instance which requires high performance. Which of the following would best suit the technician's needs?
C. io2
An AWS VM instance must have its memory reconfigured to meet current demand. What must a user do prior to changing the instance type?
D. Power off the instance
If a company requires a storage solution that possesses both redundancy and maximum storage efficiency (to keep costs down), which of the following options would make the most sense?
D. RAID 5
A cloud administrator is trying to forecast licensing costs for their five year strategic plan. Which of the following licensing structures should they most likely plan for?
D. Subscription
A server technician has been diligently troubleshooting a critical service that crashed. They isolated the issue and implemented a possible resolution. What next step should the technician perform?
D. Verify full system functionality
An AWS technician is utilizing a remote desktop to investigate a company's internal application that is experiencing bug-like symptoms. Which tool would allow workstations used by the app users to accept any patches or updates, following the technician fixing any discovered issues?
D. Workspaces
Concerning cloud security in the IaaS model, which of the following are the responsibility of the customer? (Select all that apply.)
A. Operating System B. Identity Management
How does a host machine recognize memory used by virtual machines?
B. It doesn't perceive it
An administrator is configuring a SAN. Which of the following would permit the fastest possible performance while also providing redundancy?
B. Switched Fibre Channel
An IT technician is working an issue that was marked successfully resolved a week prior by a different technician. The cause of the issue was documented a week ago. What could the previous technician have done differently to troubleshoot the issue?
C. Implement preventive measures
A company is installing a web-based file sharing application to help transition its in-office departments to a primarily remote setup. What type of solution is the company installing?
A. SaaS
A storage administrator is architecting a solution that will provide quicker access to users. Which of the following replication strategies will support this? (Select all that apply.)
B. Content delivery network replication D. Distributed file system replication
A government agency wants to deploy an open-source platform to have complete control over the platform and become a CSP. What type of cloud deployment would meet the agency's needs?
A. Multitenancy
The web developers are decommissioning a legacy web server on Amazon Web Services (AWS) and want to stand up a newly configured web server in the same location. The developers have not yet configured the new server's network configuration but are requesting that the cloud administrators switch over the same network settings to the new server. What should the cloud administrator do to fulfill the request?
A. Reattach vNIC to the new server.
Developers updated the code for a web application to meet regulatory compliance goals. The new changes were staged in a different environment and worked well. Before worrying about quality assurance, what test can the developers perform to ensure these new changes do not break the application's functionality in production?
A. Regression test
An IT support manager for a small company needs to provide some basic functions for their company but is running minimal staff with limited skills. Which of the following solutions would be applicable solutions? (Select all that apply.)
A. SaaS C. MSPs
An organization has asked a network administrator to configure a departmental network that includes both storage and virtualization capabilities. The department maintains its own internal IT staff capable of managing the configuration, but it should come ready to deploy immediately across the entire department. What is the organization asking the administrator to configure?
A. Solution Template
A technical account manager is delivering a presentation to the head of technology within a company. Charged with leading a new internal solution to produce a more efficient internal routing effort, the manager must describe the specifics regarding how they will execute the project. Which of the following should the manager include in the presentation? (Select all that apply.)
A. Stakeholder identification C. Project constraints
In which of the following circumstances would a hub-and-spoke SDN (Software Defined Networking) design be an appropriate choice? (Select all that apply.)
A. When the organization needs to isolate workloads D. When the organization needs to centralize the management and analysis of traffic
A user has lost account access to the cloud. The CSP dispatched a technician to address the issue. The technician diagnoses that the user's account information expired and the technician needed to reset it. Following the reset, what should the technician do next?
A. have the user test the login
A cloud administrator is troubleshooting a server that recently lost its connection to the network. The administrator presumes it to be a hardware failure from the NIC, as the device manager is showing an error and all reset efforts have failed. What is the next step according to the CompTIA troubleshooting methodology?
B. Establish a plan
Which of the following are examples of block storage? (Select all that apply.)
B. GCP Persistent Disk C. AWS EBS
A server technician is testing new processing hardware to use in a private cloud deployment. What is the technician measuring to determine overall performance? (Select all that apply.)
B. IPC C. GHz
A systems administrator is troubleshooting a newly launched database that cannot access its storage. The database drew its original configuration from a similar database, using the same base image file. Which of the following is the most likely reason the database is experiencing these issues?
B. Improperly configured variable
Since a version update, a web application has turned in continuously slower performance ratings. To best fix this, which of the following components should the developer pay the most attention to? (Select all that apply.)
B. Patterns D. Baselines
An administrator created three virtual networks for an organization and then connected them together so that employees on any of the networks can seamlessly use the resources in any of the other networks. What type of software-defined networking is this?
B. Peering
An organization has asked a cloud administrator to configure a server to utilize all physical CPU capacity, as there is no space for multiple servers. Which license would show a price increase based on this configuration?
B. Per socket
The company purchased a cloud-based application that all employees can access from a web browser. The application will be able to support new employees as the company grows. What type of licensing structure did the company most likely purchase for this application?
B. Per user licensing
A network technician is trying to understand user requirements to give the best possible working experience. Which of the following are user needs? (Select all that apply.)
B. Performance C. Availability
If a CSP were to experience a significant service outage that resulted in organizational revenue losses, which document would assist the organization in determining the eligibility for a reduction in service fees?
B. SLA
A business would like to map out its IT infrastructure needs. Leadership has determined that the CapEx requirements will be factored into the budget first. Which of the following items would fall under this category? (Select all that apply.)
B. Servers C. Datacenters
An application developer would like to work on new versions for a recent gaming app release. To streamline operations, the developer will use a separate workstation from their primary workstation due to better sound and graphics quality. Which of the following options would facilitate better performance while remaining at a relatively cheap price?
C. Shared vGPU
A server architect is planning a cloud migration and is defining a given problem that software or services are expected to meet. Which of the following will best assist the architect in this process?
C. Solutions requirement
If a host begins claiming memory normally reserved for virtual machines, what is the likely indication?
C. The host is running out of memory
A user is unable to reach a cloud resource by name, but general Internet access is available. What would be an immediate cause of this issue?
A. Misconfigured DNS record
To detect unwanted or dangerous network traffic, an administrator is collecting and analyzing data from the network through the web application firewalls, the intrusion prevention systems, and the protocol analyzers. Network traffic has to travel through all of these devices, and all of these layers of monitoring are taking a toll on system resources and slowing down network traffic. What can the administrator implement to mitigate this issue?
A. NPB
A cloud administrator is extending the use of virtual local area networks in their Azure cloud environment. Which solution should the administrator use?
A. NVGRE
A user submitted a support ticket stating that their team is unable to access shared folders. When troubleshooting the issue, which of the following would be examples of identifying the problem rather than its scope? (Select all that apply.)
A. The virtual host lost connection to network storage D. The virtual machine is powered off
An administrator is configuring virtual servers for a help desk department. All servers will operate using virtualization and require the exact same level of compute power, memory, and applications. What would be the most efficient and consistent means of deploying the needed configurations?
A. VM templates
A cloud administrator is setting up security measures for a publicly available web service. Which of the following is the most suited solution for this scenario, understanding that security is a defense in depth approach?
A. Web application firewall
A cloud architect is designing a solution for a development company that makes mobile games. The games reach out to dedicated cloud gaming servers. Which of the following AWS instances would be best suited for this situation?
B. C6g
The IT team is setting up a hybrid cloud environment that requires secure communication between the company's datacenter and the cloud service provider (CSP). What type of network configuration will provide tunneled connection between the company and the CSP that require less work for administrators and users?
B. Site-to-Site VPN
Which of the following defines a measure of CPU activity over a length of time?
C. System load
A network administrator is configuring a series of virtual servers. The administrator provisions resources so that additional memory is available daily during a four-hour period. Which solution would best accommodate this provision?
A. Auto-scaling
If administrators would like to protect against significant availability failures within specific geographical regions, which of the following methods might they employ?
A. Availability zone replication
A virtual machine fails to utilize memory resources it normally uses during a certain time of day, and as a result, initiates a memory swap. What is most likely causing this remedial action?
A. Ballooning
A server administrator is architecting a cloud based solution for a company with various development projects and application dependencies. Which of the following solutions would be most applicable?
A. Containers
A cloud administrator is migrating a significant amount of server data from company-controlled premises to a cloud environment. As such, capacity is a primary concern, but the company will access the data very infrequently and so, a specific data model will not be required. Which storage type would be best for this requirement?
B. Blob
A large organization has recently released a new product tracking software. Unfortunately, the initial release contained numerous bugs and various functionality issues. As a result, the organization would like to iteratively release updated versions by switching users between environments as they are updated and tested. Which of the following best describes how this organization plans to develop and release future products?
B. Blue-Green
When designing capacity planning and requirements for cloud resources, which statement is applicable when accounting for system loads?
B. CPU queue length value should not exceed the number of logical processors (cores).
A cloud architect establishes a software defined network policy for tightly controlled integration between on-premises and cloud services. Which of the following architectural designs should they implement?
B. Cloud DMZ
A technical team is updating its storage arrangement by moving to a network solution. The team is less concerned about maximum capacity and more concerned about speed. Which of the following options would produce the greatest throughput?
C. 150 MiB/s
A Windows technician is configuring a new customer relationship management application. To complete the setup, the technician must push all necessary folders to a remote team. Which of the following tools would the technician most likely use to complete this task?
C. CIFS
A technical department has stood up a new server that will utilize virtualization to support a small team of specialists. Following the configuration of the VM's baseline settings and specifications, the team will eventually require further virtualization capabilities as they add more servers to form a cluster. What would be the most efficient means of configuring the virtualization capabilities as the technical department adds more servers?
C. Clones
A cloud administrator wants to use a network share to store files in the common Windows sharing format, which a web server will create but does not want to use a traditional file server. The administrator prefers using a serverless option so there are fewer cloud instances to manage. What storage protocol can the administrator use for this purpose?
D. CIFS
An administrator is testing the deployment of a recent software update. The administrator would like to test the update from a single workstation with a premade configuration. What is the administrator most likely utilizing for this test?
D. Container
A tier 1 support technician has been holding a support ticket for a system problem for an hour and has only identified the problem. Company policy requires tier 1 support tickets to escalate after an hour if the technician cannot resolve the problem. After escalating the ticket, what would the tier 2 technician do next?
D. Determine the scope of the problem
A server technician receives multiple complaints from users with varying permissions that a critical resource is inaccessible. What troubleshooting step should the technician perform next?
D. Establish theory of probably cause
A startup company requires a cheap cloud storage solution to accommodate its initially low overhead. The company only uses a few basic servers and primarily operates off of basic workstations. Which of the following storage options would make the most sense for the company right now?
D. File
When following troubleshooting methodology, which step takes place after establishing an action plan but before verifying that function has returned to the system?
D. Implement the solution or escalate
A backup administrator on the team requested more storage capacity for backup media. Instead of increasing storage capacity, another backup administrator on the team enabled the deduplication feature. How will this feature benefit the team's storage needs?
D. Removes duplicate data blocks
A company has dispatched one of its information technology teams to begin the initial setup for a new office location in a different state. The team will begin by building networking and architectural diagrams, as well as migrating data from the home office to the new location. What should the team utilize to secure this connection?
D. Site-to-site VPN
A department utilizing a large file system for its storage would like to avoid running out of space and subsequently necessitating the need for additional memory. Of the units within the department, the development team requires the most storage for projects, while the other teams can utilize much less with proper storage management. What would be an ideal option to ensure that the other departments do not overuse their space allocation?
D. Storage filesystem quota
What will a cloud administrator most likely create before uploading individual files to a cloud storage?
A. A bucket
A server technician wants to set up a configuration manager for their server environment through Powershell. Which of the following will help enable them to do this? (Select all that apply.)
A. DSC C. MOF
An AWS technician is provisioning six virtual processors to assist with an anticipated increase in workload. Each processor possesses eight cores. Using standard vCPU provisioning and multi-threading, how many total threads will the technician utilize in this effort?
A. 96
Which of the following scenarios represents a cloud-to-cloud migration? (Select all that apply.)
A. An administrator migrating an organization's data from a VPC to a community cloud. C. An administrator migrating an organization's data from a CSP to a VPC. D. An administrator migrating an organization's data from GCP to AWS.
An administrator is trying to determine why an application in a container is not running. Which of the following does NOT represent an item the administrator should troubleshoot to determine the cause?
A. An oversubscription of compute resources
The performance of an organization's cloud network is degrading, and the administrator is troubleshooting possible causes. What are some items the administrator should investigate? (Select all that apply.)
A. Auto-scaling configurations B. Storage capacity and type D. Network bandwidth
Engineers concern themselves with user density issues before moving to a cloud-based service. What approach can the engineers utilize to address any concerns? (Select all that apply.)
A. Capacity planning C. Trend analysis
How would engineers reconfigure memory for a server instance using AWS?
A. Change the instance type
A newly configured Ansible workflow job fails midway when trying to reconfigure a virtual instance in the cloud. Other single automation tasks targeting other instances are completing successfully. What can an IT administrator troubleshoot to resolve this issue? (Select all that apply.)
A. Check configuration sequence. B. Check target's startup processes.
An automation task failed to make a change to a Linux virtual instance. The job log recorded an error stating that the account did not have privileges to the remote server. What can the cloud developer check to resolve this problem? (Select all that apply.)
A. Check local private SSH key. C. Check assigned service account.
A cloud administrator is troubleshooting insufficient capacity and performance degradation. Which of the following troubleshooting steps should be part of the process? (Select all that apply.)
A. Check oversubscription of computing resources B. Check if correct templates are used to create instances
A user logs in to the cloud platform but cannot see the team's virtual instance. What troubleshooting steps can a cloud administrator perform? (Select all that apply.)
A. Check security group inheritance. C. Check security group misconfiguration.
Which of the following represents a single point of failure? (Select all that apply.)
A. Cloud direct connection D. Load balancer
A cloud-based server infrastructure for an organization is currently not available. Engineers determine that all of the virtual machines (VM) on a host and the host itself are shut down. What VM management approach helps to avoid such a situation? (Select all that apply.)
A. Clustering D. Anti-Affinity
An organization looks to reduce cloud-based storage costs. What hardware level features should the organization consider reducing storage usage and costs? (Select all that apply.)
A. Compression C. Deduplication
A large firm looks to move its systems to the cloud. Security responsibility is of great concern. In a shared security model, which areas are a cloud service provider (CSP) responsibility? (Select all that apply.)
A. Compute B. Storage
An engineer recommends that an administrator should deploy cloud-based virtual machines (VMs) for the first time by using templates. What advantages does the engineer say the template settings provide for rapid deployment? (Select all that apply.)
A. Compute resources B. Operating system C. Storage resources
A systems administrator evaluates various environments for a cloud-based microservice. The goal is to save costs while providing the resources the microservice needs. Which environment does the administrator utilize?
A. Container
A cloud server requires a license for each virtual CPU that is in use. Which license type does the IT department purchase?
A. Core
What kind of documentation should an organization have on hand to respond to an incident in the cloud? (Select all that apply.)
A. DR playbook B. Call tree D. Network flow diagram
A new virtual private cloud utilizes several virtual local area networks (VLANs). What should an administrator know in order to manage a VLAN? (Select all that apply.)
A. Data frames are tagged with VLAN information B. Functionality is at layer 2 in the OSI model C. Functionality is at the data link layer in the OSI model
A developer creates a cloud application with an infrastructure as code (IaC) approach. Engineers opt to use an automation tool to match the desired state to the device that will host the application. Which specific IaC method do the engineers utilize?
A. Declarative
A cloud service roadmap may vary; however, a general roadmap will include which primary phases? (Select all that apply.)
A. Development C. Deprecation
An organization needs to migrate a number of large databases from an Amazon Web Services (AWS) cloud to an Azure cloud. The databases use tables to store the data and keys to link the data information. What solution will the organization use to migrate the data?
A. Direct
A cloud administrator has received an automated email alert from software that has detected an anomaly in the normal system behavior. What type of software alerted the administrator?
A. HIDS
A network administrator reviews protocols in their companies' cloud environment to search for insecure protocols that should be removed. Which of the following protocols should not be used by themselves? (Select all that apply.)
A. Hypertext Transfer Protocol C. File Transfer Protocol D. Generic Routing Encapsulation
A web application firewall requires configuration to protect a group of cloud services. Which parameters would protect the services if access is required only from a particular source location? (Select all that apply.)
A. IP B. Country
Engineers discover that a cloud service occasionally experiences a severe latency with domain name system (DNS) queries. All network tests indicate that throughput is more than sufficient to remote DNS servers. How do the engineers improve the issue without modifying the physical or logical infrastructure?
A. Implement DNS Caching
Users mention that some private cloud services are accessible while others are not. An engineer determines that the access control lists (ACLs) need to be modified. What does the engineer find the default ACL to be for a service?
A. Inbound denied, outbound allowed
Users are reporting that they are unable to connect with the organization's cloud resources. What items should the administrator check? (Select all that apply.)
A. Is the CSP experiencing a network outage? D. Is the organization's ISP experiencing a network outage?
Key stakeholders gather for a post-incident meeting after experiencing a service disruption in a crucial cloud application. Communication between the support team and management did not go well during the incident. Which topics do the stakeholders focus on during this meeting? (Select all that apply.)
A. Lessons Learned C. Standard Operating Procedures
A security technician is setting up multi-factor authentication to cloud solutions. Which of the following are authentication factors that could be used? (Select all that apply.)
A. Location B. Current time D. One-time passwords
A team of administrators look for clever ways to automate cloud systems and services to streamline Windows-based cloud server maintenance activities. What options do the administrators consider for reliability and efficiency? (Select all that apply.)
A. Log file archiving B. Shutdowns and restarts C. Installations and upgrades
A lifecycle roadmap tracks the phases of a system or service. Which phase in the lifecycle does an IT department expect to last the longest?
A. Maintenance
Which of the following statements are false concerning network flow diagrams? (Select all that apply.)
A. Network flow diagrams are the same as data flow diagrams. B. Network flow diagrams do not assist with security.
Which goal of data encryption is concerned with the proof that data exists or was transmitted?
A. Non-repudiation
A developer troubleshoots building a cloud-based application. The application build process has run smoothly in the past, but now automation attempts continue but return a deprecation message in the process. IT staff recently upgraded the configuration management software. What is the likely cause of the problem?
A. Older configuration files contain deprecated settings.
An organization is testing the cloud disaster recovery plan. The goal is to implement the recovery without disrupting production. What kind of test is the organization running?
A. Parallel recovery
A server administrator was recently assigned the role of disaster recovery planning. They have developed a plan but are not quite ready for full scale testing. They do, however, want to include other people in the process. Which of the following will help the administrator at this point? (Select all that apply.)
A. Parallel recovery B. Walk through C. Table-top
The results of a recent audit mandate that an organization hardens cloud-based server operating systems. Which steps do systems administrators take? (Select all that apply.)
A. Perform system updates C. Control remote access D. Disable unused services
An organization looks to provide a cloud portal to an unaffiliated audience through a 3rd party service. Which cloud model does the organization deploy?
A. Public
An engineer monitors a system for excessive system load as it relates to processes. Which metric does the engineer record when considering the number of logical processors in the system?
A. Queue length
An organization has determined that they cannot lose more than 12 hours of data. What does this number represent?
A. RPO
While deploying an online eCommerce server, an organization states that in the event of a system crash, 8-10 hours of data loss is all that it can tolerate. When documenting a disaster recovery plan, engineers use this information for which metric?
A. RPO
A cloud architect has a migration contract for a company who wants to keep the migration fast and simple. Which type of migration would work best for the company?
A. Rehosting
What cloud records management feature or solution would be most beneficial in a use case where lawyers may want to go through years of data to convict a person suspected of money laundering? (Select all that apply.)
A. Retention D. Write once read many
An administrator is practicing security hardening. Which of the following software-based solutions will the administrator take to reduce the vulnerability of the network? (Select all that apply.)
A. Run systemd start sshd and systemd enable sshd on a machine used for remote administration. B. Use the Nmap tool to scan the network.
What type of cloud service is Microsoft Office 365?
A. SaaS
Support technicians establish a plan of action to resolve a cloud server issue. What should the technicians consider in this plan? (Select all that apply.)
A. Service interruptions D. Data loss
An administrator needs to restore data to a server, but the data owner wants to compare the files that are on the server to the restored files, to determine which version of the data to keep. What kind of restore should the administrator perform?
A. Side-by-side restoral
An organization is planning to implement Multifactor Authentication (MFA). Currently, users must enter a password to access resources. What other valid forms of authentication can the organization implement to successfully achieve MFA? (Select all that apply.)
A. Smart cards B. Fingerprint scanners
What type of tasks can a cloud administrator automate? (Select all that apply.)
A. Software updates B. Scaling C. Restarts
An administrator created a build and tested it extensively to correct the bugs and other issues, and then released it for use. What kind of build did the administrator create?
A. Stable
An engineer manages a new cloud deployment. Network routers in the virtual private cloud (VPC) are configured differently depending on the router's role in the network. Which configuration type has manual route entries?
A. Static
An organization has learned that it may be competing with other organizations for access to the cloud service provider's (CSPs) resources. Which of the following CSP resources might the organization's be competing for? (Select all that apply.)
A. Storage B. CPU and Memory C. Bandwidth
A server administrator for a small company is running a handful of servers on older equipment that hasn't been allocated budgeting for maintenance. The administrator is worried about file corruption affecting system files or configurations. Which of the following backups is most suited for the administrator's concerns?
A. System state
In preparation for patching the operating systems on a cloud network, the administrator double-checked to make sure the correct patch was queued for the operating system, that it was the correct version, and that it tested successfully in the test environment. However, the patch still failed to install in production. What are some reasons why the patch installation may have failed? (Select all that apply.)
A. The administrator failed to ensure that there was sufficient drive space available for the patch process. D. The administrator failed to disable antivirus during the patching process.
An organization has several VMs in their public cloud configured as web servers. However, when the administrator attempts to access the secure website, the browser times out. What must the administrator configure to correct this error and allow customers to access the website?
A. The administrator must configure an inbound rule in the ACL (Access Control List) to allow traffic on port 443.
An administrator is troubleshooting a failed orchestration job. Where should the administrator check for clues as to why the workflow failed and where to begin troubleshooting efforts?
A. The administrator should check the last successful automation job.
A cloud administrator is implementing a configuration management solution to ensure all nodes on the network meet requirements. However, when the administrator tests the solution, the control node is unable to reach the managed nodes. What are some possible reasons why? (Select all that apply.)
A. The control node obtained an IP address from the DHCP (Dynamic Host Configuration Protocol) server. B. The administrator has not allowed traffic from the control node through the firewalls. D. The administrator moved the managed nodes to a different environment.
Several cloud-based virtual servers power a public facing website. Thin storage provisioning of the servers is set to a maximum of 200 GB. What is the cost if 150 GB of space is in use?
A. The cost only applies to the storage space in use.
An administrator is using the ping command to test connectivity between the on-premises network and the cloud network. The response from the ping command is "Fail: DESTINATION HOST UNREACHABLE". What does this response indicate?
A. The on-premises computer was not able to send the ping request because the connection is down.
An organization is reviewing options for backup management and determines that a disk solution better suits the needs of the organization than a cloud solution. What are some reasons why the organization may have made this decision? (Select all that apply.)
A. The organization must retain complete control of the data. B. The organization already owns the disks.
A cloud administrator implemented a change management orchestration workflow for updating systems on the cloud network, but the orchestration workflow failed. The system did not report any authentication errors. What are some possible reasons why the orchestration workflow failed? (Select all that apply.)
A. The sequencing of the automated steps was incorrect. B. The systems required a reboot and had not completed the startup process before automation proceeded.
Top level engineers compile a document to address disaster recovery management techniques. Of interest to stakeholders is the recovery time objective (RTO). How do engineers describe this metric?
A. The time needed to maintain an organization's business continuity
A cloud service at an organization should only allow for logins based on a user's specific and authorized location. Which technologies do security engineers suggest using to comply with this requirement? (Select all that apply.)
A. VLAN B. IP C. GPS
While practicing a patch management strategy, a systems administrator decides to follow a N -1 approach. What does the administrator document as a negative to this approach?
A. Vulnerability
A server in a virtual private cloud cannot access a storage service on the distant side of a router. Which command does an administrator use to find the network path the server uses to the service?
A. tracert
Users at an organization complain that access to a new cloud service is very slow. The organization manages the service infrastructure through a contract with a CSP. As there are no on-premises servers or services, which cloud-based service areas do the engineers investigate? (Select all that apply.)
B. Data location C. Virtual infrastructure
An incident handler investigates logs on a Linux web server to determine if an attacker successfully breached the server. Which of the logs should the incident handler investigate to review the web logs?
B. /var/log/apache
When considering identity and access management (IAM), what is the goal of authorization?
B. Access
Multifactor access to a cloud management workstation fails for a systems administrator. The system administrator reports that the system accepted a password but will not accept a smart card. What does a security team determine the problem to be? (Select all that apply.)
B. An expired certificate C. A revoked certificate
Which configuration management tool is appropriate for automating cloud tasks using the concept of "playbooks?"
B. Ansible
An organization has concerns about single points of failure for their VMs. What can the cloud administrator use to ensure all the VMs do not fail at the same time?
B. Anti-affinity
To control costs, an administrator needs to set storage quotas for file shares on a Windows cloud-based server. What options exist to set quotas? (Select all that apply.)
B. By user C. By group D. By partition
A significant update for a cloud-based application is available. IT support decides to install the update on a small percentage of systems to monitor behavior before deploying the update to the entire environment. Consider the different upgrade methods and determine which one IT support implements.
B. Canary
A colleague reported that the Virtual Machine migration to the cloud failed immediately after starting the process. A pop-up window showed a failed connectivity status. What can the team check on to troubleshoot this issue? (Select all that apply.)
B. Check ISP C. Check logs
In which instance would an organization NOT employ the disaster recovery playbook?
B. Cloud administrator quits
A cloud administrator receives a "Suspicious activity" alert from Microsoft Azure for alerts. What are the next steps the administrator should take?
B. Complete further investigation to determine the cause of the alert.
A cloud engineer configures virtualized services for a new cloud-based application rollout. Which resource area does the engineer focus attention on to determine general I/O functionality requirements?
B. Compute
An engineer documents information through its lifecycle, including creation, use, storage, and destruction. Which diagram type does the engineer create?
B. Data
What type of operating system (OS) build is due for retirement and may no longer have active support?
B. Deprecated
An administrator is using Active Directory (AD) to manage permissions for users, permitting file and folder owners to manage other users' access to those resources. What kind of access control is this?
B. Discretionary access control
A security architect is setting up solutions for a medium sized company. The company wants security products that will actively block. Which of the following solutions should the architect recommend? (Select all that apply.)
B. Endpoint detection and response (EDR) systems C. Software firewall
A systems administrator evaluates the performance of cloud-based servers. In doing so, a monitoring baseline is set. What does the administrator accomplish?
B. Estimating the performance or stability of a given service or system
During a cloud storage service rollout, engineers opt to use a storage system that utilizes the common internet file system (CIFS). Which storage type do engineers deploy?
B. File
In following best practice, what does an engineer document throughout a service's lifecycle as it relates to troubleshooting? (Select all that apply.)
B. Findings C. Actions D. Outcomes
An administrator is reviewing the roles and features installed on the organization's servers, comparing them to what each server's purpose is, and removing the roles and features that are unnecessary. What practice is the administrator engaged in?
B. Hardening
An engineer configures cloud storage access for a variety of data purposes. Which access type is appropriate for frequently used project files?
B. Hot
Which security solution plays an active role in preventing threats from impacting a system?
B. IPS
An organization using a hybrid cloud deployment is experiencing issues with Active Directory synchronization between cloud-based and on-premise servers. Engineers have determined that they cannot ping devices beyond the local physical gateway, but cloud-based devices can still be pinged. What might be causing the issue?
B. ISP outage
A cloud architect establishes a Data Loss Prevention (DLP) program for their companies' cloud infrastructure. Which of the following are goals the architect should work towards? (Select all that apply.)
B. Identify confidential data in use C. Apply protection automatically D. Monitor for exfiltration
A cloud administrator can manage permissions for users or groups to access cloud resources using which of the following?
B. Identity and Access Management (IAM)
What process controls the access to resources on a cloud platform?
B. Identity management
An IT support technician discovers that a Windows-based cloud instance requires a new driver to resolve an issue. Installing the driver pertains to which step in the troubleshooting process?
B. Implement the Solution
Cloud engineers microsegment a network to secure sections from each other based on workload. When considering the granularity of the segments, which aspect is critical?
B. Independent governance
An employee saved a file to the cloud network and then made a hash of the file. Two weeks later, the employee ran another hash on the same file. When the employee compared the values of the two hashes, they were exactly the same. Which goal of encryption has the employee demonstrated?
B. Integrity
A systems technician is enabling drive encryption for devices in the enterprise. What are the tools available for the technician to achieve this? (Select all that apply.)
B. LUKS D. BitLocker
A hybrid cloud environment hosts web services on both on-premises and the cloud. A similar network is set up in an isolated environment for testing disaster recovery scenarios. If IT management wants to test their disaster recovery procedures with the participation of a limited amount of real user accounts, what type of test would be most appropriate to carry out?
B. Live cutover
An administrator has an organization's headquarters locked down so that users can only log in to the cloud network between 6 a.m. and 6 p.m. and only if they are in the headquarters building. What is this an example of?
B. Multifactor authentication
A cloud-based application requires use of the SMB protocol for Windows clients. An administrator implements what alternative protocol to support non-Windows clients? (Select all that apply.)
B. NFS C. CIFS
Systems administrators need to configure cloud storage to handle large amounts of audio and video data that will be accessed frequently. The solution should be scalable and provide highly detailed metadata. Which storage type will provide the required capabilities?
B. Object
Security consultants plan on performing disaster recovery testing for an organization with a large cloud presence. Plans are being considered, and recommendations are being made. Which test type is in progress?
B. Paper test
An entertainment company deploys a virtual server farm for a cloud-based gaming event. Which configuration do engineers use to ensure the highest visual experience possible?
B. Pass-through graphics processing unit
An organization deploys an application in a cloud-based infrastructure. The application has a one-time fee that is good for the life of the current version. Which license model does the organization purchase?
B. Perpetual
A server administrator is troubleshooting connectivity between two servers with the ping command but receives a message "REQUEST TIMED OUT." What is most likely going on?
B. Problem on the destination device
An organization recently experienced a data breach in the cloud network while a new cloud administrator was on call. The organization had all the necessary documentation to respond to the incident, but the response time was extremely slow compared to average incident response times. What can the organization do to decrease incident response times in the future?
B. Provide training.
A server administrator is attempting to look for pre-configured automated tasks that are already built and finds some Ruby scripts, support common operating systems and can be used with physical machines, VM's, and cloud instances. Which of the following tools will the administrator need to use?
B. Puppet
An administrator is evaluating an application for migration to the cloud and determines that before migrating the application, the organization must first send it back to the developers to remove hard-coded IP addresses and make other minor modifications. What cloud migration type does this represent?
B. Replatform
Which update type does an engineer use to apply numerous patches to a system at one time?
B. Rollup
A security administrator would like to implement a single sign-on (SSO) for a series of cloud linked databases from different vendors. Which potential solution does the administrator investigate?
B. SAML
A hybrid cloud solution with virtual hosts on-premises and in the cloud needs to avoid a single point of failure across both platforms. How can a cloud administrator force distribution of regular virtual machine (VM) instances across both platforms?
B. Set up anti-affinity rules.
Two cloud-based servers replicate customer data. Engineers are unhappy with the current configuration as it may lead to data loss in the event of a single server failure. To avoid such loss, what replication type do engineers plan on using?
B. Synchronous
An administrator is reviewing logs in Event Viewer. Which of the following is NOT a primary log the administrator will see here?
B. Syslog
An administrator manually configured four new VM (Virtual Machine) instances in the public cloud. Three of the VM instances work, but the administrator is unable to connect to the fourth instance from the on-premises network. What might the administrator have done to cause the connection to the fourth instance to fail? (Select all that apply.)
B. The administrator did not follow the correct procedures. C. The administrator applied inaccurate instance tags.
An administrator upgraded the hardware in a server. After the administrator put the server back in service, the system failed. The administrator never received an alert, although alerting worked properly before the administrator upgraded the hardware. What is the most likely reason why the administrator did not receive an alert when the system failed?
B. The administrator failed to take alerting out of maintenance mode.
An organization initially manually assigned random static IP addresses within the organization's range to network devices. Now that the organization is growing, an administrator is installing a Dynamic Host Configuration Protocol (DHCP) server to automatically assign IP addresses to client devices but needs to free up a contiguous address range in order to provide the DHCP server with a block of available IP addresses to assign. The organization's file servers are currently using IP addresses in the range the administrator wants to use for DHCP, so the administrator assigns new IP addresses outside of that range to the file servers. Shortly after, the helpdesk begins receiving calls from employees who are unable to access the file servers. What must the administrator do to correct this issue?
B. The administrator must update the DNS records with the new IP addresses.
Engineers decide to use IPsec encapsulation to encrypt a portion of network communications between two cloud servers. As network bandwidth is a concern, how do engineers configure the encryption? (Select all that apply.)
B. The engineers use transport mode C. The engineers use data encryption rules
An organization is evaluating options for migrating millions of medical records to a community cloud. The organization needs to migrate the records as quickly as possible and without any downtime. What are the best solutions for migrating the data? (Select all that apply.)
B. The organization should migrate the data using a CSP's proprietary solution that avoids the public Internet. C. The organization should migrate the data using a storage transfer service.
The helpdesk receives a call from a frustrated user. The system has required the user to change their password and the user has tried several different ones, but the system will not accept them. Why won't the system accept the user's passwords?
B. The passwords do not meet the password policy requirements.
A single user is having trouble downloading files from the CSP's server. The download fails with a message stating the files were blocked. Frustrated, the user claims that resolving this matter falls on the CSP. Which of the following best represents who should resolve this incident?
B. The user
An administrator upgraded the operating system on several servers and then ran the configuration management tool to ensure the nodes meet the established requirements. However, the configuration management process failed, even though it ran fine earlier that same day. What is a valid reason why the configuration management process may have failed?
B. The version of the operating system is now incorrect.
An administrator is installing Linux to test the new version of an operating system on their desktop. What will the administrator most likely deploy?
B. Type 2 Hypervisor
A network administrator is troubleshooting issues with a Virtual Private Cloud (VPC) connection. Which of the following are troubleshooting steps the administrator should test? (Select all that apply.)
B. Update name resolution C. Confirm security group membership
An organization had to evacuate their primary location due to approaching wildfires. As outlined in the business continuity plan, the organization moved all business operations to another location that they had previously set up with most of the equipment they needed. The organization acquired the rest of the needed equipment, restored data backups to the new location, and resumed operations within a day. What kind of disaster recovery site did the organization use?
B. Warm site
A solutions architect has performed a risk analysis for disaster recovery and has determined that the likelihood of needing to recover is very low. They also determined that needing some time to bring another center up is acceptable, but not too much time. Which of the following backup solutions would meet the company's needs? (Select all that apply.)
B. Warm site D. Cloud site
A cloud administrator is researching tools that will ensure the configuration of servers, devices, and services. The administrator is responsible for both Windows and Linux operating systems and does not want to rely on a client-server structure. The administrator also does not want to install agents or enable special services on managed devices. What is the cloud administrator's best option?
C. Ansible
An administrator new to automation and orchestration looks for help on the subject. If a colleague recommends using playbooks, which tool does the administrator use?
C. Ansible
The finance director recently learned how easy it is to intercept data and has concerns about someone tapping into the network to get the financial data. The cloud administrator assures the director that the financial data is encrypted before it leaves the program and that it stays encrypted unless being used by the program. What kind of encryption is the financial data using?
C. Application
An organization has recently recovered from a data breach and is working to identify what created the circumstances that allowed the breach to occur. What is the best way for the organization to understand the root cause?
C. Ask a series of "Why" questions.
An HR supervisor has asked the cloud administrator to check the log files to find out when a particular employee logged off the system on the previous day. Which goal of IAM does this satisfy?
C. Auditing
A systems administrator encounters a misconfiguration for a cloud instance. Which of the following should be checked?
C. Automation tools.
Which benefits does a type 1 hypervisor provide over a type 2 hypervisor? (Select all that apply.)
C. Better performance D. Increased security
A web application receives updates every six months. The production and staging environments alternate on the same schedule as the updates. What type of release model is in practice?
C. Blue-green
A systems administrator plans a system upgrade to several cloud-based network devices. Which approach fulfills the administrator's decision to upgrade a few systems during a scheduled period in order to evaluate updates prior to a general roll out?
C. Canary
A corporate counsel reviews established service level agreements for cloud services a company offers. What areas do these agreements cover? (Select all that apply.)
C. Compensation D. Downtime
A developer experiences a dependency compatibility issue while working on several Java based web applications. Each application has differing dependency requirements and will not run alongside each other on a development workstation. There is a need to have all applications running at the same time. How does the developer efficiently solve this problem?
C. Deploy a container for each application
Engineers discover that a VPC has a set of misconfigured virtual routers. As a result, traffic is not passing between different network segments. Engineers establish and test a theory on the cause. What troubleshooting step is taken next?
C. Establish a plan of action
An administrator has configured a cluster of web servers to ensure that if one server becomes unavailable, the other will continue to serve traffic. What does the cluster represent?
C. High availability
An organization considers a move from on-premise infrastructure to one in the cloud. Engineers at the organization are concerned with how to implement routers and switches. Which cloud subscription model would the engineers have to manage the routers and switches?
C. IaaS
A virtualized cloud system requires the authentication of the hardware that it runs on and utilizes a virtual trusted platform module (vTPM). Where does the vTPM reside?
C. In the hypervisor
A new virtual private cloud includes several servers that respond to public HTTPS requests. An engineer configures the servers to utilize load balancing to respond to requests more efficiently. How does load balancing work when the least busy server is configured to receive the next work cycle?
C. It uses a dynamic algorithm
A cloud administrator is implementing Ansible to manage the configuration of remote systems on the cloud network. What type of authentication should the administrator implement with Ansible to ensure that automated processes do not stop while waiting for authentication to complete?
C. Key-based authentication
An organization hired a new administrator to upgrade the VPN (Virtual Private Network) that employees use for off-site connections to the organization's network. The VPN is currently using PPTP (Point-to-Point Tunneling Protocol) to encapsulate the data packets and provide encryption. What tunneling protocol will the administrator implement for the upgraded VPN?
C. L2TP/IPsec
A cloud administrator needs to estimate the performance and stability of the cloud network's instances housing the big data databases. What process can the administrator perform to discover this information?
C. Monitoring baseline
A cloud administrator is configuring a load balancer to manage traffic to an organization's web servers that house a catalog of products for customers to buy online. What load balancer scheduling type should the cloud administrator configure to ensure that all customers can place orders at all times?
C. Most recently used
Engineers at an organization prepare for cloud migration. The services that will move are internal and proprietary in nature. What migration type and cloud type result from this move?
C. On premises-to-cloud, Private cloud
An administrator scripted all the steps needed to create and deploy new database servers for the organization's applications. After the administrator tested the scripts to ensure they worked properly, the administrator then created a workflow to start and run all the automated steps in order. What is this an example of?
C. Orchestration
An organization has tasked a systems administrator with configuring a series of workstations that a technical team will operate. The administrator has concerns with availability failures due to lacking resources during high traffic windows. What can the administrator do to help preemptively address this?
C. Over-provision resources from idle servers
Several cloud-based virtual machines (VM) routinely experience a severe loss of performance. Engineers discovered that the issue occurs when one VM renders 3D models. What graphics configuration should the VMs use?
C. Pass-through
What term describes policies that are set to control the entire lifecycle of data, from creation through destruction?
C. Records management
An organization has a cloud deployment in an availability zone with redundant server hardware, redundant power supplies, and redundant network connectivity. What is the next step that represents the best solution for the organization to mitigate a single point of failure?
C. Replicate the cloud deployment to another zone.
An organization's cloud service provider (CSP) recently experienced an outage, which caused the organization's cloud instances to be down for 30 minutes. Where can the organization look to see if this is longer than the CSP's guaranteed percent availability?
C. SLA
An organization has both Windows and Linux instances running and collecting log file information. What protocol will send the information to the centralized management information base (MIB)?
C. SNMP
IT technicians installed environmental sensors connected to power distribution units (PDUs) throughout a large datacenter. A network design shows an intermediary application receiving sensor logs that are then pushed to a centralized monitoring application in the cloud. How is the data getting to the monitoring solution?
C. SNMP is configured on the devices
One organization acquires another organization. In combining cloud infrastructures from each, a directive to rename servers to a standard format is issued. After doing so, many servers are no longer reachable by host name. What configuration should support engineers check?
C. Static resource records
A database administrator works for a critical financial institution which requires the client machines to be informed after multiple servers have a copy of the transaction. What type of replication should the administrator set up?
C. Synchronous
One of the VMs that houses an organization's big data analytics database has become corrupted from an operating system misconfiguration. What kind of backup can the administrator use to quickly restore it to the previous state?
C. System-state backup
An administrator is evaluating the infrastructure and services provided by an organization's datacenter for a P2V migration. What reasons might the administrator be doing this? (Select all that apply.)
C. The administrator is preparing the organization to move from on-premises to a cloud solution. D. The administrator is preparing the organization to move from on-premises to a virtualized solution.
Top level engineers create a set of policies to address disaster recovery management techniques. There is a great deal of emphasis on the mean time to recovery (MTTR). How do engineers describe this metric?
C. The time necessary to return a service to its fully operational status
A systems administrator implements a 3-2-1 backup rule. What does this storage scheme provide?
C. Three copies of data, two different media types, one copy offsite
An engineer resolves an issue where a single cloud resource was not available to end users. For what reason does the engineer then document a root cause analysis?
C. To evaluate why the problem occurred
About 70% of the company's customers are based on the east coast of the United States, while the company's headquarters is on the west coast. The company has resources in both a west and east coast region. What reasons may have influenced the company's decision to set up two regional cloud locations? (Select all that apply.)
C. To follow a disaster recovery playbook D. To replicate virtual machines (VMs)
A cloud administrator is troubleshooting connectivity issues between Virtual Private Clouds (VPCs). Which of the following steps should the administrator perform? (Select all that apply.)
C. Update security group memberships D. Update name resolution
A load balancer does not work as intended. All traffic should be evenly distributed amongst the servers. How should the engineer reconfigure load balancing?
C. With a static algorithm
An administrator only allows specific physical devices to connect to the organization's Virtual Private Cloud (VPC). What command can the administrator use to monitor device connections to the VPC by physical address?
C. arp
An engineer manages a new cloud deployment. Network devices in the cloud infrastructure are configured by using a software-defined (SDN) network approach. What plane controls packet management tasks or filters network traffic within and between segments?
D. Data
A cloud technician is attempting to look for pre-configured automated tasks that are already built. The technician finds some useful YAML files. Which of the following tools is the best option for the technician to use? Chef
D. Ansible
An organization was unable to relocate all on-premises resources to the cloud and now has concerns about the potential for data loss between the on-premises and cloud networks. What solution can the cloud administrator implement to mitigate this risk?
D. CASB
A small marketing firm is preparing a business continuity plan and needs to select the right kind of disaster recovery site. The firm's business relies on created and approved marketing campaign files to run daily campaigns and internet connectivity to run the business on the front end. The firm also uses customer relationship management software, as well as the website, for sales. The firm is in a tornado-prone area, but the firm's customers reside all across the country. One day of being unable to post a customer's campaign can cause the firm to lose business. What is the best disaster recovery solution for the marketing firm?
D. Cloud site
Network devices in cloud infrastructure are configured by using a software-defined (SDN) network approach. An engineer uses which management plane to program multiple network devices?
D. Control
A user mentions that a cloud-based data entry portal is not accessible. Engineers believe they have identified the problem as a client-side issue but are unsure of how prevalent it is across the system. What step should the engineers take next to solidify the problem?
D. Determine the scope
An organization is responding to a data breach in the cloud network. The organization has completely restored normal operations to the production environment and has isolated the breach on a specific segment of the network to further investigate and collect evidence. What negative action will eliminate the organization's chances of taking legal action against the threat actors?
D. Fail to track the chain of custody.
Engineers configure encryption on two cloud servers. As data integrity is a priority concern, what do the engineers hope to achieve by using file hashes?
D. File change monitoring
An organization recently acquired a new company. The organization has an on-premises network extended to the Azure cloud, and the newly acquired company is using an Amazon Web Service (AWS) cloud deployment. What can the network administrator implement to allow the organization's network to communicate with the new company's network?
D. GENEVE
An administrator is updating the routers in the cloud environment by making the changes in the code and then applying the changes to all the routers. What is this approach known as?
D. IaC
On the most fundamental level, every network allows access to system resources based on what?
D. Identity
Engineers implement a redundant array of independent disks (RAID) in all production physical cloud servers after experiencing a disaster recovery issue. When considering the troubleshooting methodology, which step do the engineers follow during this implementation?
D. Implement Preventive Measures
A company sets up a hybrid cloud environment to take advantage of cloud virtual instances to increase resources during peak hours for a set of load-balanced web servers. The on-premises load balancers need secure and accessible communication with the web servers in the cloud. How can a cloud administrator set up the network to stretch from on-premises to the cloud?
D. Implement a VXLAN across both environments.
An administrator configures the syslog logging service on cloud-based servers to forward logs to a central location. The forwarding is currently not working correctly. Where can the administrator find the logs?
D. In the /var/log directory
An organization has received formal notice that it must not allow any modifications to specific information within the organization. What kind of process is this?
D. Legal hold
A security administrator wants to enhance security by creating a flexible and scalable policy that separates infrastructure at the workload level. Which of the following solutions is best applicable to the administrator?
D. Microsegmentation
An employee sent a digitally signed resignation email to the HR department. Which goal of encryption proves that the employee sent the email?
D. Non-repudiation
An organization mandates that a multifactor authentication solution is in place to access a cloud-based database. Which solution uses what you know and what you have authentication methods?
D. Password, Hardware token
A security architect wants to set up permissions dynamically based on assigned functions within the company. What type of permissions structure would best suit their objective?
D. Role-based Access Control (RBAC)
A cloud administrator needs to apply an emergency hotfix to one of the instances. What type of backup should the administrator capture before applying the hotfix to the system?
D. Snapshot backup
An organization prepares to release a cloud-based service to the public. In which environment do engineers perform quality assurance testing?
D. Staging
What type of backup job is not created from the original data but is aggregated from other backup jobs?
D. Synthetic Full Backup
An orchestration workflow combines five automated steps to deploy a cloud-based conferencing server. What does an administrator ensure when using the workflow?
D. That testing is performed between each automation step
An administrator is troubleshooting a cloud client that is unable to communicate with other devices on the same subnet. The administrator opens a command prompt on the client, enters ipconfig, and sees that the client's IPv4 address is 169.254.0.0 and the subnet mask is 255.255.0.0. Why isn't the client communicating?
D. The client did not receive an IP address assignment.
An organization configures several virtual server instances in the cloud. Status reports indicate that the host system continuously utilizes a memory ballooning feature. What does this feature indicate to the engineers that monitor the systems?
D. The host does not have enough memory
An organization has configured a VPC (Virtual Private Cloud) but is often unable to access it due to repeated CSP (Cloud Service Provider) outages. The administrator checks the VPC downtime against the Service Level Agreement (SLA) and verifies the downtime is over the acceptable limits. What kind of issue does this represent?
D. Vendor-related
An engineer configures a new virtual machine (VM) in the cloud. After a few days of use, the engineer notices that the server functions properly, but the time on the VM differs by a few minutes than the host. The host uses an authoritative time source and a policy synchronizes time with other servers on the network. How does the engineer remedy this issue?
D. With guest extensions
A cloud server administrator has just set up NetIQ eDirectory as the directory services governing account management. Which protocol should the administrator coordinate with the network administrator to enable?
D. X.500
An administrator new to using Git tries to build a repository for a cloud application. Which command does the administrator use to place the code in the remote repository?
D. git push
A growing small-to-medium business has improved its revenue considerably over the past three years yet it was determined that this growth has failed to improve the bottom line enough to satisfy company leadership. The Chief Technology Officer has directed an effort to migrate certain solutions to a cloud environment as a means of reducing physical hardware overhead. What most likely illustrated this to the CTO, leading to this decision?
A. Business needs analysis
A virtual instance on the Amazon Web Services (AWS) platform has 64 virtual central processing units (vCPUs) and 432 (Gibibyte) GiB of memory. What can a cloud administrator do to make the virtual instance memory-optimized? (Select all that apply.)
A. Change virtual instance type C. Power off virtual instance
Recently, an attacker successfully obtained PII from multiple employees at a company by intercepting plain text traffic on the web. Aside from better monitoring practices, which of the following would use digital signatures and encryption to aid in mitigating an attack like this in the future?
A. DNSSEC
A graphic designer utilizes company cloud resources to archive various products. The cloud administrator managing the space would like to use the available storage more efficiently but does not want to degrade the quality of the visual backups. Which method would make the most sense?
A. Deduplication
A team dispatches two of its members to detect and correct a series of login and authentication issues that programmers are reporting. In what stage of the IT environment would these team members correct the issues?
A. Development
An organization would like to add a new storage system to house its array of graphics productions and marketing materials. Leadership prefers a solution that would provide high performance and fault tolerance, with rebuild times minimized in case of a data loss scenario. Which of the following would best suit this need?
A. Hardware RAID 10
A Microsoft administrator must reconfigure storage by access requirements for a company. Which of the following tiers are potential options for the administrator to utilize as storage segments? (Select all that apply.)
A. Hot B. Archive
A finance company would like to implement a customer relationship management solution that provides flexible resource utilization while maintaining the best possible security for client PII. Which of the following options would protect that segment of data while remaining cost-conscious?
A. Hybrid
What type of virtual system combines central processing unit (CPU), memory, storage, and network subsystems that are inseparable and operate as one unit?
A. Hyperconverged
If a user purchases a CPU that houses 8 cores but is capable of managing up to 16 tasks at a time, which technology is the user leveraging? (Select all that apply.)
A. Hyperthreading D. SMT
A company is currently switching its network protocols after a successful breach. Attackers stole a small amount of PII resulting from a packet sniffing attack. Which solution will help the company prevent this attack moving forward?
A. IPsec
Which of the following is a rule-based, lower-level security method generally seen as a highly secure means of communication encryption?
A. IPsec
A systems administrator responded to an important web service crashing. They analyzed logs to determine the issue, restarted the service, and were able to verify system functionality. What is the next step the administrator should take?
A. Implement preventative measures
A real estate accounting company would like to migrate its operation to the cloud but has expressed reservations regarding security. A member of the executive suite suggests a collective organization formed in conjunction with several similar companies that have collectively deployed a cloud-based environment. Each member company maintains cloud access. Which of the following is the executive describing?
B. Community
An organization currently has a cloud network subnetted using Layer 2 technology to isolate separate networks. However, the organization is rapidly growing and will soon need to accommodate over 5000 separate networks, which is more than the current subnetting technology can handle. What can the organization do to manage the growth? (Select all that apply.)
B. Use VRF D. Use VXLANs
An organization is using a public cloud to host sensitive information. The organization must ensure that the data is secure and private. What can the organization implement to provide greater security within the public cloud?
B. VPC
A cloud administrator receives a request to create a virtual instance on the Amazon Web Services (AWS) platform. The request explains that the virtual instance will perform various machine learning tasks for a new web application. What type of instance would the cloud administrator most likely create for this request?
C. Computer optimized
A backup administrator is researching options to store backup data in the cloud. Other than the cloud's potential to become an offsite storage solution in a disaster recovery scenario, what would not benefit from using a Storage as a Service (STaaS) cloud subscription? (Select all that apply.)
C. Data control D. Vendor lock-in
A company has asked an administrator to configure a new fleet of high storage, high-performance servers for a remote team of technicians. The team currently utilizes the same servers as the local office team, and the company would like the team to be able to rapidly respond during times of peak traffic and activity. Which of the following would allow the team to quickly increase memory and performance during these periods?
C. Dynamic allocations
A software development company has asked its lead administrator to suggest a means of simplifying asset management and reducing the overhead from maintaining a large fleet of servers. The company currently stores massive amounts of data and would like a solution that will allow this continued mass storage, while reducing the number of physical servers. Which of the following makes the most sense for the company to implement?
C. Employ a FaaS solution
A cloud technician receives a complaint that one employee cannot access certain cloud resources. Which of the following troubleshooting steps should the technician try first?
C. Establish a theory of probably cause
Which of the following provides additional servers, either virtual or physical, to support increased workloads? (Select all that apply.)
C. Horizontal scaling D. Scaling Out
A Microsoft cloud technician has configured a VPC for a large group project and would now like to connect different, smaller projects to the VPC. What kind of network is the technician setting up?
C. Hub-and-spoke
A company has asked an administrator to suggest options that would allow the company to have an almost entirely logical solution from the current physical hardware in place. The company has already procured a host of virtualization resources, including VMs, hypervisors, vCPUs, and vNICs. Which method would permit the company to add a virtual storage option to the entire solution?
C. Hyperconvergence
When configuring a network storage system for a company-wide function, which document should serve as a primary reference to effectively manage the project while also remaining compliant with company policy?
C. Operating procedures
Following a major database migration, a company hires a small IT firm. To assist the company, a security administrator assigns an analyst to locate potential opportunities for malicious parties to exploit the system within the new database and associated platform. Which practice is the analyst executing?
C. Pen testing
A cloud administrator just joined a new organization and is attempting to implement a common service. Which of the following would best help them implement the service?
C. SOPs