Cloud Computing Final Exam: Chapter 1-10
Doreen wants to configure the new application she is deploying to use object storage for the logs. Which of the following object-based storage should she choose?
a. Append blob
Henry has just been hired as a security engineer and has been tasked with analyzing the cloud infrastructure that the company uses. Which of the following might Henry be concerned about if he discovers that critical data is being stored in that environment?
a. Shared compute
Fictional Corp has just moved its web server from its on-premises data center to a cloud service provider. Which of the following most likely needs to be changed by an administrator?
c. DNS entries
Shelley wants to make sure that any protocols not using encryption are blocked at the firewall for one of her VPCs. Which of the following protocols should she ensure has a deny rule enabled for it?
c. Telnet
Cadence is analyzing disk space usage on one of the Linux virtual machines she manages. She noticed that log files are taking up more space than necessary. Which of the following automation jobs could she set up to resolve this issue?
a. Archive all log files older than 30 days to cold storage.
Startup Inc. has chosen the Azure platform as its cloud service provider. Which of the following tools might they use for configuration management, update management, and process automation?
a. Automation
Summer is analyzing one of the company's database servers and sees that it is currently using 90 percent of its allocated disk space. Which of the following could she do without creating another server to split the load with?
a. Scale up
Gary is reading one of the marketing e-mails that he receives as part of his company's Azure subscription. This particular e-mail highlights a tool that he's interested in learning more about. The tool is described as a security tool that relies on learning-based analytics to better monitor activities, identify threats, and prioritize alerts for follow-up by security staff. Which of the following should he look up in the Azure portal to learn more about it?
a. ATP
Tommen is doing an audit and finds that the firewall still includes some rules for some Windows servers that no longer exist in a VPC. The remaining servers all run a variant of Linux. Which of the following rules should he delete from the firewall?
a. Allow port 3389
Raven has been asked to configure the web server with a specific public class B IP address. Which of the following is a possible address she was given?
a. 168.192.10.172
Quinn is currently looking to deploy a new Microsoft SharePoint server farm, a web-based application, into its own VPC. Which of the following ports would be unnecessary for her to leave open on the firewall for usage or management purposes?
a. 22
Abby has just created a new virtual machine. Once it has been installed, she connects to it and finds that it has configured the default subnet mask for a class A network. Which of the following subnet masks was automatically configured for this server?
a. 255.0.0.0
Owen has just installed Linux as a virtual machine on the company's cloud service provider. He has configured the server to define a set of users to determine who has access to individual files and folders. Which of the following terms can describe the set of users?
a. ACL
Daenerys is examining the logs of one of the Linux servers as part of a standard auditing process. She comes across a number of entries showing that an administrative account has logged in from a foreign IP address many times over the past six months. She knows that the company doesn't have any operations in the country that the IP address is assigned to. Which of the following might describe the type of attack that has occurred?
a. APT
Chris has learned about a technique that he can configure on some of his virtualized systems to help with memory allocation. Using this specific technique, a driver gets installed on each of the virtual machines on a host. That driver allows the host to control a fake process on the virtual machine so that the VM assigns memory to that process. Rather than actually do something with the memory that has been allocated to the process, the host can then assign that memory to another virtual machine so that it can use the memory instead. Which of the following is the best description of the memory reclamation process that Chris is considering using?
a. Ballooning
Miriam is performing a quarterly review of all web-based applications that the company uses. She sees that one of the finance department's applications has an update available for it. After downloading the update, she applies the update to a duplicate of the production environment that does not receive any traffic. After verifying that everything looks good, she transfers all of the traffic over to that server and updates the formerly active server. Which of the following deployment types has she chosen for this application update?
a. Blue-green deployment
Fictional Corp has recently implemented a change management process where a group of employees, through regular meetings, must approve or deny the changes that are proposed through a formalized process. What is the name of the team of employees that is responsible for approving or denying the requested changes?
a. CAB
Arya is looking to install a security appliance that is designed to detect applications and other resources running within the domain and monitor them according to her organization's policies. Which of the following would she want to implement?
a. CASB
Eugene has been given the subnet 10.20.30.0/24 to use for the creation of a group of virtual machines to be used for the sales department. He is used to seeing a subnet mask in the format of four numbers separated by periods (255.255.255.0) along with the subnet ID, but isn't familiar with what the slash and a number mean after the subnet ID. He asks you to help him interpret the information. What term should you tell him to search for on a search engine to learn more about this topic?
a. CIDR
George has completed the implementation of a new change to one of the virtual machines on the CSP they use that runs a few of the company's applications. He went back through and compared the results to the original approved request and determined that the change was successful. What is the next step that George should perform?
a. Change documentation
Cato has received an email stating that the change that he requested has been completed and the tracking ticket associated with the change has been closed. Cato pulls up the cloud application to see the new features that he had requested but is disappointed to see that they aren't quite what had been described in the change request. Which of the following steps, or phases, of the change management process were omitted?
a. Change review
Fictional Corp is building out a private cloud in their data center. They want to ensure that there are extra resources available in the event that a server fails. Which of the following technologies might they build their cloud upon?
a. Cluster
Piper needs a storage solution for snapshots of the virtual machines and databases within her company's cloud infrastructure. These snapshots should rarely be needed. Which of the following solutions should she use?
a. Cold backup
Fictional Corp archives all of the video footage from its IP cameras that is older than 1 week. This footage is very rarely ever accessed. Which of the following is the best solution for how they should store this data?
a. Cold storage
James works for a company where administrators and users add individual granular permissions to various resources. Which of the following describes the access control methods used by this company?
a. DAC
Homer has just changed the public IP address on one of the virtual machines residing on the cloud service provider his company uses. However, he is now no longer able to ping the server by the FQDN, though he is still able to ping it by the IP address. Which of the following does Homer need to modify?
a. DNS A record
Hodor has a VPC that is only accessed by IP address and does not do any DNS lookups for any of the applications that it runs. Which of the following rules should he add to the firewall?
a. Deny port 53
Omar needs to install an update to the web servers so that the development team can use some of the new libraries and functions for the .NET application they are modifying. However, upon trying to install the latest .NET framework, an error is displayed stating that another update must be installed first. Which of the following technical terms describes why the .NET framework cannot be installed yet?
a. Dependencies
Thomas has been tasked with implementing automation wherever possible. He starts to work on the first system where he knows automation would greatly benefit the company. What is one of the first things he should do before implementing the automation?
a. Design a workflow
Fictional Corp's IT management team has decided that with their larger infrastructure, they need to look at automating some of the deployments of virtual machines and configurations. They want to use APIs to manage the configurations and installation of operating systems and software as well as for monitoring purposes. Which of the following describes the environment that they are wanting to create and start using?
a. DevOps
Sansa has moved the only Linux server within VPC1 to the Linux-only VPC15. The remaining servers in VPC1 all run Windows Server. Which of the following should she do on the firewall for VPC1?
a. Disable port 22
Patti's company has just migrated the only Windows server in a particular VPC to a different VPC. Which of the following should she do next?
a. Disable port 3389 on the firewall of the original VPC.
Bronn is examining the log files and notices a constant stream of traffic initializing sessions to an FTP server coming from a single IP address. Which of the following is most likely occurring?
a. DoS attack
Zara is implementing a configuration management tool that makes use of a system that sends XML messages to endpoints on various systems in order to make changes. What kind of technology is she putting into use?
d. API
Darren has been using Kubernetes for container management with the deployments his company has been using on the Google Cloud Platform. However, he is now being told that the company is going to be migrating to a different container management platform with Azure and AWS. Which of the following tools might he need to learn in order to make this transition and start deploying applications on the new platform?
a. Docker Swarm
Fictional Corp has decided to migrate much of its on-premises data center to a cloud service provider to take advantage of some of the benefits of cloud computing. The benefit that they found the most important was the ability to expand and grow (or shrink) as needed without any delay due to shipping and installing the hardware required for an on-premises data center. Which of the following common cloud terms was the most important factor in their decision?
a. Elasticity
Syed is implementing an event monitoring system that will be able to look at all events and determine if there is a pattern established by the different events that occur. Which of the following would be a feature of this monitoring system?
a. Event correlation
Marvin runs one of the operating system utilities on a server and receives a message that several of the files appear to have been modified or corrupted. The operating system is recommending reinstalling those files from the installation source. Which of the following tools could have alerted Marvin or other administrators when the files were originally changed?
a. FIM
Bonnie has been tasked with performing an analysis on her company's firewall infrastructure. The organization has a number of office locations across the United States in addition to a number of people that work remotely from home. She finds that many of the existing firewalls are no longer supported by the manufacturer and has convinced the company to allocate some budget to find a solution to replace them. Which of the following might she recommend as a replacement?
a. FWaaS
Sandra gets a text message at 9 pm while she is at home that there is a problem with one of the servers she is responsible for. The message indicates that it is a major issue. She hurriedly grabs her laptop and logs into the VPN to check on the problem and start troubleshooting, but finds that the system appears to be running just fine. Which of the following might describe this situation?
a. False positive
Stannis wants to block any traffic that uses insecure protocols from entering his VPC. Which of the following might he use to accomplish that goal?
a. Firewall
A social media organization has grown from its initial startup phase to being widely known within the United States. It has decided that it is time to broaden its horizons and see if it can grow the userbase globally as well. They have plans to expand into Europe within the next 12 months. Which of the following should they become familiar with before they start marketing the platform to European users.
a. GDPR
Fictional Corp has just received a shipment of 100 four-terabyte hard drives for the creation of a new application service. Which of the following will have an effect on the total amount of storage capacity that they can provide for this new service?
a. HA
Eleanor is trying to secure a couple of servers that she manages. After hardening the servers, she installs a piece of software on each of them that will detect intrusions, log the event, and notify the administration team. She does not want it to automatically stop the intrusions due to the possibility of false positives. Which of the following has she installed?
a. HIDS
Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulations out there that pertain to storing PII that are different than other industries. Which of the following sets of laws and regulations is he specifically thinking of that do not apply to other industries?
a. HIPAA
Bill is trying to create a new web application to replace an existing system that is becoming outdated. The old application has been modified a number of times and the code has become rather convoluted over time, so he has decided to start over. However, the application that it is replacing needs to be usable 24 hours a day, 7 days a week, 365 days per year with as little downtime as possible. Which of the following would be the type of system Bill is trying to create by adding in redundancy wherever he can?
a. High availability
Trey is designing a system that should maintain a 99.999% uptime by implementing multiple data centers located in different geographical regions with multiple Internet connections at each data center. Within the data centers there are redundant routers, switches, and even multiple private clouds. Which of the following is Trey designing for?
a. High availability
Teri logs into the cloud service provider's portal and reviews the reports that are available as part of her monthly analysis. She sees that one of the web applications currently using four web servers is experiencing an increase in traffic after a recent marketing campaign by the company, and she decides to add another two virtual machines to act as more web servers to help ease the load on the existing ones. Which of the following describes the procedure Teri performed?
a. Horizontal scaling
Sven wants to ensure that his infrastructure is protected from attacks against the applications themselves and the automation and orchestration that helps keep everything together. In some areas he implements a technology that can only detect attacks, while in others he implements a technology that can also stop the attack in progress. Which of the following terms can be used to describe the technology that he has implemented?
a. IDP
Carl has created a virtual machine on the cloud service provider that his company uses and has given it a static private IP address. He wants to make this server is the new web server for the company's website. Which of the following is required to allow that server to perform in that role?
a. IG
Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs, but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose?
a. L2TP
Shae wants to implement antivirus in her cloud environments. Where should she look at installing this protection to be most effective?
d. All of the other options are correct
A social video sharing platform has grown quite popular in the United States and has decided to expand to Europe. They want to open a second data center there as part of their expansion. Which of the following is perhaps one of the biggest pieces of the expansion that they want to consider a part of the data storage strategies?
a. Legal restrictions
Mason is doing an annual review of his company's disaster recovery procedures. Currently, the organization stores all of the backups for its on-premises data center on a cloud service provider in cold storage. However, the company has seen rapid growth over the past couple of years and he's concerned that this could be a problem. Which of the following might be the concern?
a. Local bandwidth limitations for restoring from the cloud.
Allen is visiting one of his client's data centers and, after signing in, is escorted through the premises the entire time. He notices that, in order to gain access to the data center, the employee had to swipe a proximity badge, key in a 6 digit code, and place his finger on a scanner. Which of the following describes the type of security that he just witnessed?
a. MFA
Seth is trying to determine whether his organization has enough spare parts on hand in case of component failure within their private cloud. One of the components that he is analyzing the inventory for is hard drives and finds that on average the model they use lasts three years before they fail. Which of the following terms describes this concept?
a. MTTF
Cersei wants to protect the application servers within her cloud deployment by implementing granular control of the traffic and workflows in the deployment. Which of the following would she implement?
a. Microsegmentation
Fictional Corp is expanding their presence to Europe. As part of their expansion, they realized that they need to consider some changes to the design of the cloud infrastructure they host on a cloud service provider. Which of the following might they decide to implement?
a. Multi-regional storage
Trent is designing the technology infrastructure to use at his company's new small office in the Caribbean. After researching the ISPs in the area, he sees that the amount of bandwidth available at that specific location is going to be rather limited. Which of the following may he want to install in order to provide local file storage for the office?
a. NAS
Jacob wants to export a virtual machine from one host to another as a single file. Which of the following file formats should he use?
a. OVA
Roz is configuring new virtual machines in the company's private cloud. She knows that the virtual machines need a total of 512 GiB of memory. However, the physical machine that she's deploying them to only has 256 GiB installed. Which of the following technologies, when configured correctly, could allow her to deploy the virtual machines to this hardware?
a. Overcommitment ratio
A server in one of Fictional Corp's branch offices is starting to generate warning messages that a piece of hardware is starting to experience issues and may fail soon. The company keeps the server on-premises for that location due to an unreliable Internet connection and thus cannot move it to the cloud because the office heavily relies on that server. Which of the following should a technician perform?
a. P2P migration
Jan has just migrated a virtual machine from the company's private cloud to the cloud service provider his company uses. He wants to see how the system responds as well as compare the original and new baselines. What type of testing should he perform?
a. Performance testing
Fictional Corp currently uses a private cloud within their data center. The CTO has recently learned about hybrid cloud implementations and their benefits, and has instructed the cloud team to implement a hybrid cloud as soon as possible. Which of the following types of cloud services should they start looking at adding to their setup?
a. Public
Fictional Corp's Vice President of Sales has just returned from a conference where he learned about a great customer relationship management platform that he would like for the company to begin using. This platform doesn't require any investment in hardware, operating systems, or any other software, and only requires administration of user accounts and configuration of the types of data that it needs to store. Users would access it through their web browser, and the administration and maintenance tasks for the IT department would be minimal. Which of the following is the VP suggesting that the company use?
a. Public cloud
Merlin wants to create a new script that will communicate with several of his CSP's APIs. Which of the following scripting languages might he use to create the script?
a. Python
Garrett has developed an application and is ready for the user acceptance team to go through and verify that everything is functional and working as it should while reporting any bugs they may identify. Which of the following environments should he copy the application to for them to begin their work?
a. QA
Desiree works for a web hosting company that adds new accounts and removes others on a regular basis. Which of the following should she automate for customers that have cancelled their service? (Choose two.)
a. Remove DNS entries for their sites. b. Archive the customer's sites and logs for 30 days and then delete them.
Kevin is implementing SSO functionality for his organization. Which of the following authentication standards could he use to implement it?
a. SAML
Fictional Corp currently has an alerting system set up to e-mail notifications to administrators. However, it has been pointed out that it may take a while for an administrator to see one of those e-mails, so they would like to have notifications sent to their mobile phones instead. Which of the following settings should they look for in the configuration of their alerting system?
a. SMS
Zane's company has chosen to use Ansible for its primary automation tool. Which of the following is the default protocol used by this tool that he might need to ensure it is open on the firewall in order for it to work correctly?
a. SSH
Dave manages a large network and has researched a bunch of automation tools. He decides on one that requires the installation of an agent, called a minion, on the nodes to be automated, which are then called minions. Which of the following automation tools did Dave choose?
a. SaltStack
Edgar is about to make some changes to a virtual machine. However, he knows that some of the changes may not be successful and wants a quick way to restore back to the original configuration and data in the case of failure. Which of the following strategies could allow Edgar to accomplish this goal?
a. Snapshot
Sharon has just finished probing her way through a virtual machine that has been causing problems on the company's private cloud looking for clues as to what might be causing those problems. She has a theory of what could be causing the problem. What is the next step that she should perform if she is following the CompTIA troubleshooting model?
a. Test the theory to determine cause.
The legal department of your organization has requested that you audit the licenses you are using for the operating system your organization uses. As you start analyzing the on-premises cloud systems, you need to ensure that you have the correct number of licenses. Which of the following should you ensure to count on the machine?
a. The number of CPU cores
Wyatt notices a message on the dashboard that one of the servers is no longer reachable by the automation system. He remotes into the server by name and is able to connect just fine. He pings the server by name from his workstation and it comes back with a different IP address than what is in the automation system. Which of the following is a possible reason why?
a. The server somehow changed from a static IP address to DHCP and is now receiving a different IP address and the automation system isn't configured to detect IP address changes automatically.
Hershel is working with a virtual network that has the subnet mask 255.255.255.192. He changes the IP address of one of the servers from 172.16.25.183 to 172.16.25.193. What is the result of this change?
a. The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a router.
Caroline is trying to access one of her company's custom cloud-based web applications. She sees a bright red screen advising that there is a security problem with the site and that she should not trust the contents of it. Which of the following most likely occurred that an administrator should probably check first?
a. The site's digital certificate has expired.
Fredrica is installing more infrastructure in her company's on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains?
a. VLAN
Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company?
a. VPC
Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection?
a. VPN
Morgan has hardened the virtual machines in the subnet he's just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment?
a. Virtual firewall
Daniel is looking for a good solution to store the log files from servers in his organization. He knows that the log files will never change. Which of the following describes the type of data he is looking to store and manage?
a. WORM
Julia uses AWS's CloudFormation tool to manage many of her company's resources. Which of the following may be used as part of the template configuration? (Choose two)
a. YAML c. JSON
Missandei's manager has asked her to implement microsegmentation for her company's cloud deployment. She wasn't overly familiar with this term and upon researching came across the reasoning to implement this as being that nothing should be trusted in a cloud environment and every system, communication, and user is considered a threat until proven otherwise. Which of the following concepts does this describe?
a. Zero-trust security model
Erma wants to look at the current IP configuration on a Linux server. Which of the following tools can she use to view this information? (Choose two)
a. ifconfig c. ip
Olivia manages a group of Windows and Linux servers. She knows there is a command that she can use to view currently open network connections that works on both platforms. Which of the following commands will she most likely use?
a. netstat
Victoria is trying to determine whether one of the new servers she set up on the cloud service provider is reachable and online from her current workstation. Which of the following tools is she most likely trying to use?
a. ping
Amber has been researching automation tools and believes that Puppet is the best option for her company to use. She is currently testing the open-source version but is considering asking for budget to be allocated so that she can implement the enterprise version. How many nodes can she run the enterprise version on before needing to start paying for the product?
b. 10
Darryl has been given the 10.20.30.64/26 network to use for a set of virtual machines that he is provisioning on his company's private cloud. He has been told to configure the last usable IP address in the range as the gateway, or router, address. Which of the following IP addresses should he use for the gateway?
b. 10.20.30.126
Finn needs to create multiple virtual networks using a /28 mask. How many devices can he put on each subnet?
b. 14
Bellamy has been asked to configure the virtual router interface for the subnetwork that contains the server with IP address 172.19.101.200 and subnet mask of 255.255.255.128. He is asked to use the first usable IP address of the subnet. Which of the following IP addresses should he use?
b. 172.19.101.129
Beth has been asked to migrate the company's virtual private clouds from class C private addresses to class B private addresses. Which of the following is a valid address for her to change the web server's IP address to?
b. 172.30.101.50
Lexa has been asked for the subnet ID and subnet mask in CIDR notation for one of the web servers in the company's private cloud. The web server has an IP address of 192.168.1.200 and a subnet mask of 255.255.255.192. What should she tell them?
b. 192.168.1.192/26
Rita has decided that the servers in one of the VPCs that she manages should only be reachable by IP address and they should not be able to perform any domain name lookups from the Internet. Which of the following ports should she disable on the firewall for that VPC?
b. 53
Fictional Corp has grown exponentially over the first few years of its existence. Until now it had been using commercial off-the-shelf software. They've decided to create a development team and need to decide what the best method of development management is. Which of the following are the two most common methods that they might choose from?
b. Agile d. Waterfall
Janelle's company has adopted the CompTIA troubleshooting model as part of their standard operating procedures to use when troubleshooting issues. She sees the step listed as identify the problem. Which of the following should she do as part of that step?
b. Ask the user probing questions to determine whether any recent changes have been made.
Greg is deploying a new application that will originally have 1 terabyte of disk space allocated to storing user files. However, since it is a new application, he is unsure how quickly the disk space may fill up and need to grow to accommodate new files. Which of the following cloud features should he ensure is configured correctly so as not to cause any errors to be displayed to users about the storage space being full?
b. Auto-scaling
Fictional Corp wants to start migrating a bunch of internal applications to a CSP. However, they are located in a rural area and their only connection option is a T1. However, they know that the move would save them money in electrical expenses and reduce the maintenance burden from having to monitor and control the various firewalls and other related equipment. Which of the following is most likely going to be the biggest hurdle for them?
b. Bandwidth limitations
Fictional Corp wants to examine systems within their data center to determine how they operate under normal conditions and determine what resources would be necessary to be provisioned on a cloud service provider if they were to make that transition. Which of the following describes the records that Fictional Corp is looking to review?
b. Baselines
A large social media platform is planning on converting from filesystem storage to object storage for the many photos that users upload. Which of the following types of object-based storage might they choose?
b. Block blob
Sean has implemented an automatic account locking policy that will lock a user account after 5 invalid attempts. Which of the following types of attacks will this help thwart?
b. Brute force
Bob has received a change request that now needs to be analyzed at the next regular meeting to determine whether or not the change should be implemented. Which of the following teams is responsible for reviewing this change and either giving it their approval or denying it?
b. CAB
Fictional Corp has an on-premises data center where content is written once and then referenced by its content rather than by its location on a disk. Which of the following types of storage are they most likely using?
b. CAS
Cara has requested some modifications to one of the cloud applications that the company developed internally. She pulled up the internal tracking application and sees that it has just gone through the change assessment phase. What is the next phase of the change management process that it should be in now?
b. Change implementation
Serena wants to implement as much automation in her organization as possible. One of her next tasks is to create a process where the system can duplicate a virtual machine on the fly. Which of the following terms might describe this automation process?
b. Cloning
Sid wants to create a new copy of a server so that he can test some patches to the server outside of the production environment. Which of the following describes the method described?
b. Cloning
A small company has decided that they have the extra bandwidth to host their website on-premises in their server room. However, occasionally their site goes viral for a few days at a time, which has caused the site to become completely unavailable to all users. Which of the following might solve their problem?
b. Cloud bursting
Fictional Corp has chosen to use AWS as its cloud service provider. One of the key benefits that it liked about the platform was a service that allows technicians to monitor metrics across AWS services by collating data in one or more dashboards, tracking events, or generating alerts. Which of the following AWS services were they impressed by?
b. CloudWatch
Tia has been analyzing the on-premises data center and determined that the data center can handle most of the traffic on a day-to-day basis. However, there are times when the bandwidth becomes saturated and she needs to find a solution to push the excess traffic out to virtual machines on a cloud service provider. Which of the following describes the technique she is looking to implement?
b. Cloudbursting
Greg is analyzing a server and notices that the storage space is now 90 percent full. He wants to save some space by deleting some of the historical records on the server. Which of the following might prevent him from doing so?
b. Compliance with regulations
Frank has just been hired as the new development manager at Widget Co. He was hired because he proposed that he could implement new methods such as one where new changes are deployed in small increments every 24 hours. Some of the team members don't quite understand it though, so he recommended they go read up on it. What search term would help them find the information they need to learn more about this method?
b. Continuous delivery
Fictional Corp has previously had a release schedule where changes were released into production on the first and third Saturday every month. However, it has been suggested that it would be more efficient to push the changes to production as soon as the code has passed testing. Which of the following methodologies is being suggested?
b. Continuous deployment
A large telecom company currently has both wireless and landline operations and wants to divest itself of the landline division. However, a lot of the servers that run each separate division are located in the same data center. Before they sell off the landline division, they want to migrate the servers out of that data center. Which of the following would be the best and most cost-effective solution so that they can preserve the capital that they have on hand while not taking on any new debt?
b. Convert the servers to virtual machines and migrate them to a cloud service provider.
Beau has a small external RAID array connected to his workstation to store local backups of the applications that he develops. Which of the following describe the type of storage solution he is using?
b. DAS
Haley does not want to manually assign IP addresses to clients on one of the network segments that she manages. Instead, she wants clients to obtain an IP address from a server that manages a pool of IP addresses. Which of the following technologies should she implement?
b. DHCP
Darla has changed the hostname of a Linux virtual machine within the operating system. She went to ping the server by the new name from her workstation, but is getting a host not found error message. Which of the following does she still need to configure?
b. DNS
Jennifer is analyzing her company's backup plan as part of business continuity planning. She finds that the cloud service provider that her company uses offers a service that would allow her team to spin up VMs from existing images in order to bring systems back online quickly. Which of the following would describe this offering from this CSP?
b. DRaaS
Fictional Corp is in the process of migrating applications and data from their on-premises physical servers to a cloud service provider. They have migrated the application code successfully, but now must move the underlying database servers. Which of the following might be the biggest concern with migrating the database servers?
b. Data integrity
Roberta is trying to find a way to save space on the SAN that acts as storage for all of the home directories in her organization. Which of the following might help Roberta accomplish this goal?
b. Deduplication
Milo has set up smart cards for users in the company's main office. He wants to tie them into the authentication systems so that users can log into their workstations with them as well as access certain resources. Which of the following does he need to assign to each user in order to make this integration work?
b. Digital certificate
Fictional Corp has multiple branch offices all over the world with servers located in them so that the web applications they offer to their local users are as fast as possible. They also have applications installed on them that are offered to their customers for the same reason. Which of the following terms might describe these branch offices and the infrastructure Fictional Corp is using?
b. Edge site
A holiday ornament manufacturer sees traffic increase to their website in the couple of months leading up to the holiday, but then it tapers off and is very low for the rest of the year. Which of the following benefits of cloud computing might they be the most interested in for this use?
b. Elasticity
Fictional Corp has decided to use a cloud service provider rather than continue to build out the standard infrastructure they had been creating and using in their on-premises data center. The primary deciding factor is that the cloud services can add or remove resources from servers or add or remove virtual machines without any human intervention. Which of the following features is the reason why Fictional Corp chose to use a cloud service provider?
b. Elasticity
Gary is creating a new virtual machine that needs to be closely monitored during its first few months of activity as the application that it is hosting is brand new and he's not sure what to expect out of it. Which of the following should he ensure is done to make sure that logs are collected in as much detail as possible?
b. Enable auditing
Fatima is implementing a new monitoring system that is looking for detectable changes in a cloud resource's state. Which of the following describes these changes of state?
b. Event
A large international organization currently has a single support desk that operates 24 hours per day, 7 days per week. However, they have realized that for disaster planning purposes, it would be a good idea to have multiple support desks in different locations so that if one went down the others could take over for it. Normal operations, though, would mean that they didn't have to staff any of the operations overnight. Which of the following has the company decided to use as the new model for their support desk?
b. FTS
Tomas is going to be deploying a new cloud-based point-of-sale application for the organization that will be run within web browsers on computers located in his company's retail stores. He knows that the system must experience as little downtime as possible. Which of the following technologies might he choose to implement?
b. Failover cluster (FC)
Walder is reviewing the logs and sees a spike in overnight activity by one of the user accounts that he knows the employee left the organization over a month ago. Which of the following is most likely the cause of these logins?
b. Failure to properly deactivate accounts
Xena has noticed that traffic to her company's website has been increasing from across the world. She has decided to start deploying copies of that server to various regions and wants to direct traffic to the site that is closest to each user. Which of the following technologies could she use to do this?
b. GSLB
Jon recently returned from an IT conference where he learned about a technology that could alert the administrators to any intrusions that may occur by installing software on each of the servers within the cloud deployment. Unfortunately, this particular system wouldn't stop the intrusion automatically. Which of the following technologies did he learn about?
b. HIDS
Podrick wants to implement a technology on the company's servers that will detect any intrusions as well as implement rules or other methods to immediately stop traffic that appears to be an intrusion. Which of the following is he looking to install?
b. HIPS
Sigmund has created a new web application server for the psychology department at the university he works for. He wants to install a tool on the server that will detect any security breaches, alert the administrative team, log the event, and attempt to stop the security breach before the attacker is able to gain further access or cause any damage. Which of the following types of tools might he install?
b. HIPS
John has just created a new virtual machine on its own virtual network. After configuring the operating system and ensuring the appropriate services are running, he tries and fails to connect to the virtual machine's IP address via RDP. Which of the following might be the reason?
b. He did not open port 3389 on the firewall for that vnet.
Margaret has designed an application and the underlying systems that it resides on to have a five-nine uptime, or 99.999%. Which of the following techniques has she implemented?
b. High availability
Marty has set up site mirroring to create a duplicate of the web server cluster. The clusters are arranged in an active-active configuration so that they both answer requests simultaneously. If something ever happens to one of the clusters, the traffic will transfer over to the other. Which of the following describes this type of configuration?
b. Hot standby
Fictional Corp uses a cloud service provider that provides a framework of techniques and tools for managing the identities of people and applications that allow for access to cloud resources. Which of the following describe this framework?
b. IAM
Nancy was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following should she read more about to find out how she can implement it?
b. IPsec
The Chief Technology Officer of an organization just got back from a technology conference where he learned about a set of best practices that many other organizations have put into place to help them be more efficient with their operations. Some of the topics covered by these best practices include change management and systems that store maintenance and configuration information for systems. He has determined that he wants everyone in his organization trained and up to speed on at least the foundational level of knowledge of these practices. What is the topic that the managers in IT should begin looking for training on?
b. ITIL
Jeanette just finished watching a video on a popular social media site about a technology that can provision and manage IT infrastructure through configuration files that can be automated rather than interactive tools that require manual configuration. Which of the following technologies was she learning about?
b. IaC
Ted has been tasked with moving the company's physical server infrastructure to a cloud-based infrastructure. He knows that the servers the company uses in the data center are fairly new and are nowhere near ready for retirement. However, he also knows that security is a very important factor in any decisions that are made. Which of the following is unlikely to be considered as a factor in the confidentiality aspect of security planning?
b. If the company were to deploy a private cloud, what kind of uptime requirements would the system need in order to meet the SLAs?
Alexandra has scheduled a full backup of one of the servers she manages for the first day of every month. Every week after that, any data that has changed since the previous backup of any kind is backed up. Which of the following describes these weekly backups?
b. Incremental
James is looking at his company's dashboard that is laid out with a number of metrics and goals that are measured for the company's cloud deployment. Which of the following is a common term used for a metric that the company may measure and report on?
b. KPI
Max has been hired as a consultant to help revamp the procedures that the IT department uses. He sees a lot of things that they are doing correctly, but sees that the information in the trouble tickets is severely lacking of detail. Which of the following systems would Max most likely recommend putting into place that could have been populated from ticket information if it had been there?
b. Knowledge base
Kevin has created a web application that will reside on the cloud service provider's platform that his company uses. However, the database for the application must reside on the company's private cloud in their data center. Which of the following might be a primary concern when running connectivity tests?
b. Latency
Lincoln is assigning permissions to users and groups for a new application that he is deploying. As he's doing this, which of the following principles should he make sure he follows?
b. Least privilege
Daphne is trying to log into her company's cloud-based email system, but is getting an error message. Upon logging into the administrative portal, it appears the credit card on file has expired. Which of the following seems to be the issue?
b. Licensing outage
Fictional Corp has an ecommerce shop where customers can buy widgets directly from them through their website. The shop runs on a virtual machine at a cloud service provider. However, the company has just been offered a deal with another cloud service provider that will save them a significant amount of money. They want to make the move to the new cloud service provider as quickly as possible with as little downtime as possible. Which of the following would be their best option, assuming it is technically feasible with the options available from both platforms?
b. Live migration
Jeff has a dashboard application that can give him an at-a-glance look at the various virtual machines on his cloud infrastructure. He notices that one of the systems is showing memory usage at 95 percent. Which of the following types of testing has possibly been overlooked for that system?
b. Load testing
Kathryn has been tasked with migrating several on-premises applications that currently reside on servers in the company's data center to a cloud service provider. As part of the process she has taken images from the local systems and put them onto the CSP's platform and now wants to run some tests to determine how well the environment auto-scales as demand increases. Which of the following best describes the type of testing she is performing at this stage of the migration?
b. Load testing
Sebastian is trying to access a resource that has been labeled as top secret, but he only has secret clearance. Which of the following access control methods does his organization use?
b. Mandatory access control
A large e-commerce platform sells and ships millions of dollars' worth of goods every day. Which of the following concepts is most likely the most important thing for them to consider in the design of their IT infrastructure?
b. Minimizing downtime
Martin wants to maintain an exact copy of the data from one of the data storage locations in a separate location for disaster recovery purposes. The copy of the data will not be actively used unless the systems have to failover to the copy. Which of the following describes the type of redundancy he is wanting to implement?
b. Mirroring
Tyrion wants to use a virtual firewall to filter the types of traffic that are allowed or not allowed into a virtual private cloud instance he has created on the cloud service provider his company uses. Which of the following can he use to accomplish this goal?
b. NACL
Eddard wants to install a VM running in the perimeter network that provides antivirus/anti-malware capabilities for the rest of the network. Which of the following describes the type of VM that he wants to install?
b. NVA
Sharon is having trouble logging into the new cloud-based web application that her small company uses. It asks whether she wants to use a local account or an OpenID account. Which of the following is used by OpenID in order to implement authentication?
b. OAuth
Alex is working on new corporate guidelines that prioritizes services for business continuity protection and how much money should be invested in protecting those resources. These guidelines support the standards defined by the service level agreement. Which of the following is the document described in this scenario?
b. OLA
Sylvester has several very critical web applications that he is responsible for. These applications are hosted in the company's on-premises data center. He wants to ensure that if something happens to one of the applications or the data that it can be recovered as fast as possible. Which of the following would allow him the quickest recovery time?
b. Online
There have been multiple performance issues with the virtual machines that reside on one of the hosts in the data center at Fictional Corp. After a bit of research, it is discovered that during peak hours, they are all concurrently trying to use all of the vCPUs that have been configured for them. Which of the following was set too high in this configuration?
b. Overcommitment ratio
Kathleen has noticed in the configuration management database that a couple of servers are no longer covered by the manufacturer's warranty. The organization has been migrating to the cloud over the past year, so that seemed to be the best place to migrate these to as well. What type of migration would this be considered?
b. P2V
Karen's manager knows that she is working on implementing a VPN connection between the company's on-premises data center and the cloud service provider her company uses. The manager approached her with a concern to make sure that she wasn't using an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following was most likely the protocol that the manager was concerned about?
b. PPTP
Zoie is using AWS as her company's chosen cloud service provider. She is interested in one of their service offerings that allows you to design the backup resources you need and leave them in a stopped state so you're not charged as much as what you would pay for running services. Which of the following is the method that this describes?
b. Pilot light
User acceptance testing has just been completed on a new application and it is ready for the rest of the user base at Fictional Corp to start using it. Which of the following environments should the application be copied to?
b. Production
Reina has configured an orchestration model for her company's infrastructure that requires servers to connect to the centralized server once an hour to determine if there should be any configuration changes made. Which of the following is she using?
b. Pull model
Steven has been tasked with planning the move from an infrastructure where administrators and users add permissions to resources individually to one where users are assigned to groups based upon the department they work in and what they do in the department and then assigning the groups to the resources. Which of the following has he been tasked with planning?
b. RBAC
Taryn is creating the service design package for a new application. As part of the initial design, she needs to consider company policies and guidelines. One of those guidelines states that the category of service she's designing should not take any more than 4 hours to restore. Which of the following describes the guidelines she needs to take into account?
b. RTO
Dwight has just moved all of the Linux servers from the VPC that they shared with some Windows servers to another VPC. Which of the following does he most likely need to do?
b. Remove the rules that allow port 22 from the firewall to the original VPC.
Fictional Corp has multiple monitoring systems in place to report various events that occur as soon as they happen. However, they have also tried to design the infrastructure so that it can withstand and compensate for these failures and outages and allow the system to still function so that the users do not notice the failure. Which of the following terms could be used to describe the theory they used when designing their infrastructure?
b. Resiliency
Wayne has received reports from users that several web applications are running very slowly at times. He is analyzing the virtual machine they reside on and sees that it is maxing out its resources on a regular basis. Which of the following cloud features should he configure so that more resources would be available on demand?
b. Rlasticity
Tanesha is currently documenting all of the steps necessary to perform various functions that her team is responsible for. Which of the following describes what she is creating?
b. Runbook
Kendra has received the list of requirements from the Finance department for a new application that is being developed. The application will be hosted on a cloud service provider, and she needs to ensure that she is able to guarantee that the application is up and running when they need it. Which of the following documents might she create to outline exactly what they are going to provide that will also help in determining the necessary infrastructure and timelines for performing backups?
b. SLA
Uma has been analyzing the performance and baselines from her virtual machines that are on a cloud service provider's platform. She sees that they do not appear to be performing up to the standards that her cloud service provider guarantees. Which of the following documents outlines the standards that they are guaranteeing?
b. SLA
Wayne is looking for an application that can collect health, performance, security, and availability information on network resources. Which of the following types of technologies should he begin researching?
b. SNMP
Fictional Corp has a variety of applications deployed across multiple cloud service providers. Claude has been tasked with making sure that users aren't required to have separate accounts for each application. Which of the following should he look at using to meet that goal?
b. SSO
Trish has been analyzing the company's resources on the cloud service provider her company uses. She sees that a cluster is running at near capacity and decides to add another virtual machine to the cluster. Which of the following would describe this scenario?
b. Scale out
Taj needs to install a set of updates for an application server that will restart the server three times. Which of the following should prevent at least some of the users from calling in to report an outage? (Choose two)
b. Schedule a maintenance window. c. Perform the update when the fewest number of people are using the application.
Ezekiel wants to ensure that several of the cloud resources he is responsible for managing are always available. Which of the following might best help him meet his goals of high availability?
b. Site mirroring between two or more regions
Kira needs to implement multifactor authentication for one of the new cloud applications. She needs to include something that you have and something that you know. Which of the following would meet those requirements? (Choose two.)
b. Smart card reader c. Password
Kayla has been tasked with migrating a physical server to the cloud service provider that Fictional Corp uses. Which of the following will allow her to perform that migration?
b. Snapshot
Tormund has created a set of firewall rules and has noticed that when there is traffic that matches a rule, the traffic allowed in one direction automatically allows traffic in the other direction for an active connection as long as there is at least one message going in either direction within 10 minutes. What is the name of that type of firewall?
b. Stateful
Juanita wants to create a data replication system where the data is constantly written to two locations at the same time. Which of the following describes this type of configuration?
b. Synchronous replication
Rose is implementing digital certificates for all of the users in her organization. Which of the following certificate types should she use?
b. TLS
Fictional Corp has guidelines in place that the business continuity processes should be reviewed at least once per year. As part of the review, members of the various teams responsible for carrying out certain activities meet in a conference room to discuss the business continuity plan and the disaster recovery plan and look for any gaps that may exist. Which of the following is the type of review that they are doing?
b. Tabletop exercise
Jorah is performing an analysis of some of the systems and protocols his company uses. Which of the following, if found in use, should he recommend discontinuing? (Select all that apply)
b. Telnet c. FTP
Fictional Corp has several scripts that can be copied and pasted into their cloud service provider's platform to create new virtual machines with certain specifications. After one of the administrators runs one of the scripts, she goes through and verifies that everything was set up correctly, only to find that certain things were not set up correctly. Which of the following is the most likely issue?
b. Template misconfiguration
Simon was asked to create three Linux virtual machines to host the company's new sales application and database server. He is going to be using the company's cloud service provider and was given the 10.20.30.0/30 subnet to put them on. He immediately tells the person giving him this task that he cannot do what is asked of him. Why?
b. The /30 subnet is not large enough for 3 virtual machines.
Fictional Corp has recently changed its server naming convention. Halfway through the renaming, the automation stops working. Which of the following should have been done as part of the process?
b. The automation configuration should have been updated as each server name was changed.
Gilly is walking down the hallway at her office when she notices someone in a delivery uniform carrying boxes down the hall without an escort. She also doesn't see a visitor's badge, which is supposed to be clipped to a visitor's collar. Which of the following might have just occurred?
b. Unauthorized physical access
Brian has built a private cloud in his company's data center. He has just racked up a server and turns it on for the first time. Which of the following extensions might he see that he should ensure are enabled in the UEFI/BIOS setup before continuing to install the operating system and configure the server to be part of the private cloud? (Choose two)
b. VT-x c. AMD-V
Which of the following steps of the troubleshooting model, if not done, could potentially cause users to experience new issues or problems with a system.
b. Verify full system functionality, and, if applicable, implement preventive measures.
Bob pulls up the company's dashboard and sees that one of the virtual machines is running low on storage space. He logs into the cloud provider's portal and increases the size of the virtual disk so that it will not run out unexpectedly and start causing errors. Which of the following processes has Bob just performed?
b. Vertical scaling
Martin has been asked to look for weaknesses within the company's cloud infrastructure and create a report to be delivered to upper management. He is not to actually try and exploit any of the weaknesses found to determine to what extent they might compromise the system. Which of the following has Martin been asked to do?
b. Vulnerability testing
Jacob needs to come up with a plan so that if a natural disaster was to strike their primary data center, another data center could be brought online within two days. Which of the following solutions should he recommend?
b. Warm site
Glenn has been tasked with creating a few new virtual machines for a new project that will be used by the finance department. It will contain sensitive data about the company and its operations. Which of the following is the most important thing for Glenn to consider as he's creating the virtual machines?
b. Which region he is creating the virtual machines in
Yolanda wants to see a list of MAC addresses that one of her servers has been communicating with. Which of the following command line tools will display that information?
b. arp
Zoie is working on a Windows server that has two network interfaces. One is assigned an IP address by a DHCP server while the other is a static IP address. She wants to see what the current dynamic IP address is. Which of the following command line utilities can she use to view that information?
b. ipconfig
Khal has set up a new web server on the company's private cloud. He has installed the security certificate necessary so that the application can be accessed by HTTPS. He isn't overly familiar with how these certificates work, so he decides to read up on the details. He learns that there is a pair of keys used to encrypt and decrypt the initial communications. Which of the following is the key that does not get sent to the browser?
b. private key
Thelonius has just created a new virtual machine. By default, the cloud service provider automatically configured it as part of a class C private network. Which of the following is the default subnet mask expressed in CIDR notation that was configured?
c. /24
Tara had originally created a /28 mask for the 12 servers in the sales group server pool. However, her company has just merged with a competitor and she needs to expand the subnet to accommodate another 20 servers. Which of the following new subnet masks will accommodate the new servers in addition to the original servers while having the fewest number of unused IP addresses remaining?
c. /26
Rosita has configured a subnet mask of 255.255.252.0 for the new virtual private cloud she is creating for her organization. One of the junior administrators remarks that he's never seen that kind of a subnet mask before and isn't sure how many devices the subnet would hold. How many devices should Rosita tell him that it will support?
c. 1,022
Marcus has been asked to configure a web server with a specific private class C IP address. Which of the following is a possible address she was given?
c. 192.168.205.63
Fictional Corp is operating at redundancy level RF3. How many resource failures can they tolerate and still maintain operation?
c. 2
Gabriel has been given the 10.30.0.0 network and told to use the subnet mask 255.255.248.0 for the new cloud infrastructure he is building out for the subsidiary his company just purchased. Assuming one of the IP addresses is used for a virtual router interface on that subnet, how many virtual machines could he create in each subnetwork?
c. 2045
Maggie wants to create a small subnetwork for the Human Resources servers that her organization uses. There are currently 10 servers, but she also needs to plan for 50 percent growth over the next two years. Which of the following subnet masks would give her adequate IP address space while leaving the fewest number of unused IP addresses in the block?
c. 255.255.255.240
Mavis wants to develop an application that can talk to one of the cloud-based services her company uses. As part of the design process, she needs to take into account the structure and type of messages that are sent back and forth from the service. Which of the following describes the endpoint that her application will be communicating with for that service?
c. API
Jack gets an alert that one of his web servers is receiving more requests than it can handle given its current resources. He has decided to implement vertical scaling to resolve the issue. Which of the following could he do to meet his objective?
c. Add more vCPUs and memory to the virtual machine.
Fictional Corp uses a process to provide oversight to the development, maintenance, and retirement of programs that the company creates and uses internally. Which of the following would best describe this oversight and process?
c. Application life cycle management
Joe has been asked about one of the storage systems his company maintains. This system writes the data to storage in one region and periodically copies the data to another region. What term can he use to describe this configuration?
c. Asynchronous replication
Nedra is assigning permissions to groups of users on the network for a new cloud-based application that she has just installed. Which of the following do her actions specifically enable?
c. Authorization
Fictional Corp's primary datacenter is located in an area that sees seasonal hurricanes every year. One particularly bad hurricane hits the area and knocks out power for the area. The generator only has 6 hours of runtime after the power goes out. Which of the following documents should they immediately reference to determine how to keep things running after the generator is out of fuel?
c. BCP
Carrie's company did not have a sufficient disaster recovery plan in place and has just had two servers fail at the same time. Their backups are a day old, but only includes the data being used by the applications that were on the servers. Which of the following describes the restoration process that she will have to pursue?
c. BMR
Terrance is designing storage for a startup company and needs to ensure from the beginning that it will be able to handle high levels of variety in high volumes and arriving in high velocity. Which of the following technologies is he designing for?
c. Big data
Judy's company is implementing a new authentication technology that requires assigning certificates to users and issuing smart cards. Which of the following does she need to install and configure to manage the certificates?
c. CA
Ward has been hired by Fictional Corp to manage the IT infrastructure group. One of the first questions he asks is how they keep track of all of the information about their servers, operating systems, networking gear, and applications. He is answered that some people have some of the information in spreadsheets, but that there appear to be different versions of that spreadsheet floating around. Which of the following might he decide to implement?
c. CMDB
Ronan has just received notification of a critical update that is available for one of the operating systems that his company uses. He downloads it from the OS developer's website and patches a couple of the systems. He then allows a small amount of traffic to those servers so he can verify that there are no new error messages or issues with the deployment. Once he's verified that they have updated successfully, he issues the patch to the rest of the servers running that operating system. Which of the following types of deployments has he just performed?
c. Canary deployment
One of the sales managers has approached the development team to ask for some changes to one of the web applications that his team uses. He made some great suggestions, but the development team manager told him they can't just make those changes without going through the formalized process. Which of the following should the development manager ask the sales manager for?
c. Change request
Emina has three separate VPCs at the cloud service provider that her company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might she implement in order to accommodate that requirement?
c. Cloud peering
Patricia's manager informs her that the company has leased a new office space that they do not plan on using except in case of an emergency. The power is already on for the building, but she needs to locate an Internet connection for the building and arrange for a minimal level of service that can be quickly increased to faster speeds in the event that they need to use it as a data center. Which of the following describes the type of facility that Patricia's company is setting up?
c. Cold site
Widgets Inc. is a startup and looking to manage their own hardware and software. They know that procuring real estate to build their own data center can take a few months and do not have that kind of time built into their schedule. Which of the following would allow them to build their own private cloud on their own hardware with the potential to migrate into their own data center later if need be?
c. Colocation
Roz is looking to save disk space on the servers by migrating log files older than 30 days to another server. Which of the following might she use to combine the files into one file that is smaller than the combined size of the originals?
c. Compression
A year ago Yvette configured two servers on separate VLANs. She still needs them to remain on separate VLANs, but now has a need for them to be able to send certain communications to each other over a certain port. Which of the following will be necessary for her to do?
c. Create a route between the two VLANs so they know how to contact each other.
Jamie is head of security at his company and has gotten an alert from the monitoring system that the web servers are receiving a sudden spike in traffic from a number of foreign IP addresses. This is causing the website to run very slow or return errors to some users. Which of the following is most likely occurring?
c. DDoS attack
Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?
c. DNS servers
Sheri has been asked to create or find a commercial off-the-shelf software that can give her company's technicians a quick overview of critical services and draw attention to issues that might indicate problems. Which of the following systems is she being asked to implement?
c. Dashboard
Fictional Corp has built a private cloud in their data center. That data center is in a region of the country that is prone to earthquakes. They want to ensure that the company can continue to operate in the event that a major earthquake hits and knocks out the power and Internet services. Which of the following strategies should they implement?
c. Disaster recovery
Carrie has just finished verifying that the problem she fixed on a problematic virtual machine has not caused any other issues, and the system is now running normally. Which of the following should she do while she is closing out the issue in the ticketing system?
c. Document findings, actions, and outcomes.
Jason is working on a Saturday afternoon and has determined that a newly discovered vulnerability affects a group of servers that contain critical data for the company. The operating system manufacturer has released a fix overnight, but the company's change management processes require approval before patching any of the systems. Which group could possibly give Jason an approval on a weekend outside of their normally scheduled meetings?
c. ECAB
Jim is a technician at Fictional Corp and has been assigned a ticket from the service desk to investigate a problem into one of the cloud applications being used by the company. He has a theory as to what could be causing the problem and tested it to determine the actual cause of the problem. Which of the following should Jim do next?
c. Establish a plan of action to resolve the problem and implement the solution.
John has received a ticket from the service desk describing an issue that a user is having with a cloud application. The ticket describes the issue that the user is having along with the answers to the probing questions that the service desk technician had asked. Which of the following is the next step in the troubleshooting model?
c. Establish a theory of probable cause.
Craig wants to create a computing infrastructure that will allow developers within his company to build applications on a primarily internally hosted platform rather than outsourcing the infrastructure to a third party provider. However, he wants the ability to easily interact with AWS products. Which of the following could Craig use to do so?
c. Eucalyptus
Tia has run a report on one of the Linux servers she manages and sees that one of the users has not changed their password in over two years. Which of the following parameters should she configure on the server?
c. Expiration
Petyr has been called into Fictional Corp to perform a security audit of their systems. One of the things that he notes on his report is that the sales department is using FTP to remotely upload scanned copies of physical order sheets from customers. Why is this an issue?
c. FTP is considered insecure.
Niles is analyzing a server and finds a problem with one of the applications. He didn't receive any notifications and thinks that perhaps it got lost in his spam folder or something else happened. After scouring the logs, he doesn't see any notifications or alerts in the system at all. Which of the following describes this situation?
c. False negative
Sophia needs to make sure that everything on certain systems gets backed up once per week. What is the technical term that is used to describe this type of backup?
c. Full
Cecil is interested in using more of the tools available from the cloud service provider his company has chosen to use, AWS. He sees that they have various security tools available including a threat detection tool that relies on machine learning, anomaly detection, and threat intelligence to identify threats and trigger events or functions. Which of the following is the tool that he may be interested in implementing?
c. GuardDuty
Amari is planning on deploying a failover cluster for a new cloud-based deployment. She works for a comedy television channel and needs to ensure that users can access their streaming services 24/7/365. Which of the following technical terms might describe the primary benefit that she is hoping for by implementing this technology?
c. HA
Fictional Corp is trying to choose a cloud service provider. There are many things to consider, and they have narrowed the choices down to two CSPs that could meet their technical needs. Which of the following might they also consider doing before signing any contracts or creating an account on those platforms?
c. Have the various agreements reviewed by the legal department
Fictional Corp has a data center that runs multiple internal applications. However, they want to migrate their email to a cloud service provider so that mail will continue to be delivered in the case of any Internet service interruptions. They also want to use a single directory service so that they don't have to create duplicate user accounts on the internal and external systems. Which of the following types of services is best suited for Fictional Corp's needs?
c. Hybrid cloud
Fictional Corp currently has a data center that is not taking advantage of any virtualization technologies. They have decided that it is time to start looking at migrating to the cloud and depending less on their own data center. However, they have read that even the major cloud providers occasionally have outages that prevent them from meeting the 99.999 percent uptime that Fictional Corp needs, even if that isn't specified in the SLA of the major providers. Which of the following cloud solutions might best fit Fictional Corp's needs? (Choose two)
c. Hybrid cloud d. Multi-cloud
Eddie is creating a new virtual machine on the cloud service provider his company uses. One of the specs that he's looking at describes the number of read and write operations that can be completed over certain periods of time. Which of the following specs is he comparing?
c. IOPS
A small startup company has just received a round of funding in order to provide the capacity that is required to deliver their smartphone app to a larger number of devices. They have decided to use a public cloud rather than build their own data center, but want to manage as much of the infrastructure as possible while realizing the savings on capital expenditures from the purchase of hardware. Which of the following service models will give them the most control over the security of the platform they want to develop?
c. IaaS
Danny is looking at deploying a new application that requires root-level access to the server. He is currently researching the capabilities of various cloud service providers but is only finding one type of implementation that would meet the requirements set forth by the application developer. Which of the following types of cloud offerings is he most likely going to need?
c. IaaS
Ellaria is analyzing the infrastructure that her organization uses and sees that the first rule of the firewall is as shown below. Which of the following is probably true? access-list 101 permit ip any any
c. Incorrect hardening settings
Katy wants to make a few automated API calls from a new application that she is developing. Which of the following might be a valid structure for the data that she needs to send to the API endpoint?
c. JSON
Davos has been reading about encryption recently. He begins to wonder how anything can be secure if everyone is using the same set of algorithms. After all, anyone using the same algorithm would be able to decrypt anything that had been encrypted using that algorithm. Which of the following helps make the data unusable by anyone else using that same encryption scheme without having this information?
c. Key
Darius manages a directory of users for one of the domains within his organization. Which of the following describes the protocol in use for querying the directory?
c. LDAP
Cara works for a startup company that up until now has been running on a single virtual machine. The virtual machine is starting to see capacity issues and she is unable to provision more CPU and memory resources to satisfy its needs. Which of the following would allow her to expand the capacity of her company's web server?
c. Load balancer
Noah has gone to work for the government and sees that some systems use a method of labeling data as classified, secret, and top secret rather than creating groups of users and applying permissions for those groups. Which of the following describes these systems of labeling data?
c. MAC
Fictional Corp has decided that it wants to automate as much of the infrastructure as possible. As well, it has decided to outsource some of the monitoring capabilities. Which of the following might they outsource some of these tasks to?
c. MSP
Fictional Corp is in the process of merging with Widgets Inc. They both use different cloud service providers for a variety of different applications that their employees need to perform their jobs. The IT departments of the organizations have been tasked with merging the IT infrastructure. One of the first tasks that they are looking at is combining the directory services for the two organizations so that all users are in one large LDAP database. Migrating from one cloud service provider to another is currently not a possibility due to the complexity of the applications deployed. Which of the following describes the type of infrastructure they will end up with as they continue to link the infrastructures together?
c. Multi-cloud
Gisella has just returned from a security conference where she won a free year of protection and support for her company with a device that will detect intrusions on her network, alert the administrators, and log the events. Unfortunately, it will not try to stop the intrusion. Which of the following has she won?
c. NIDS
Aaron's boss has learned that organizations can create their own clouds in their existing data centers. He has been tasked with researching products that could make better use of the hardware in their data centers and keeping their data on-premises. Which of the following products might Aaron recommend?
c. OpenStack
Allen has been tasked with the design, development, and optimization of automation processes. Which of the following is the term that could be used to describe his current set of tasks?
c. Orchestration
Juan is implementing automation processes into some of the cloud infrastructure that his organization uses. Which of the following terms best describes the design, development, and optimization of these automation tools?
c. Orchestration
Kylie has a number of processes that she has implemented automation for. As she was researching on the best way to automate another process, she came across some information about a technique for optimizing automation processes into a single workflow. Which of the following describe this technique?
c. Orchestration
Frederick is trying to deploy a number of new virtual machines to a new private cloud that his company has just built in their data center. He knows that he needs to configure the virtual machines to have multiple vCPUs, but he also knows that the number of vCPUs needed outnumbers the actual number of total logical cores available on the physical servers. Which of the following might describe one of the concepts he could implement in this scenario?
c. Overcommitment ratio
Sarah has deployed a private cloud infrastructure that requires users to insert a smart card into their computer or into a card reader in order to authenticate them to use the applications. The smart card is associated with a certificate for each user, which is verified against a certificate authority. Which of the following has she deployed?
c. PKI
Nicki is creating an object storage type to store VM disks. Which of the following is the best object-based solution to store these types of data?
c. Page blob
Blake has been examining the logs on one of the servers that he is responsible for that is hosted on a cloud service provider. He finds an instance where one of the employees has managed to give himself unauthorized administrative access on the server. Which of the following has occurred?
c. Privilege escalation
Owen has been tasked with having multifactor authentication installed for entrances into the company's data center. Which of the following would meet that requirement?
c. Proximity badge reader and fingerprint scanner
Strom works on a team that manages a number of nodes to provide commercial e-mail list services for companies. With their current infrastructure and volume, it is sometimes necessary to change the configuration of various nodes very quickly to be able to handle other functions. Which of the following would result in the quickest configuration changes being applied to the nodes?
c. Push model
Rick is planning a deployment of multiple virtual machines that need to have internal IP addresses. He is unsure which address ranges he can use. He knows there is a formal document that outlines the ranges that can be used for internal addresses. Which of the following options is that formalized set of specifications?
c. RFC 1918
Fictional Corp has decided to outsource the development of a cloud application that it wants to have developed for its sales department to use. Which of the following might the company use to solicit bids for the project?
c. RFP
Benji's manager tells him that the company is considering some changes to the backup policy because management has decided that it cannot lose any more than 2 hours' worth of data. Which of the following policies, or goals, is the manager describing?
c. RPO
Startup Inc. is developing a new application that they intend to use a cloud service provider to host. Initially, they plan on only launching the app in the United States and then growing from there once they have reached critical mass. Which of the following storage designs might they use initially in order to save on costs?
c. Regional storage
Piper is auditing the accounts on the cloud platform her company uses. She sees a master user that retains complete access and action permissions no matter what permissions are also given to the other users. Which of the following is the username for that account?
c. Root
Rick needs to expand the storage for his company's large private cloud. Which of the following types of storage do they most likely use?
c. SAN
Theon wants to transfer some files to one of the Linux servers that he manages. Which of the following would ensure that the transmissions are secure while not relying on SSL/TLS for the encryption?
c. SFTP
Sam is reviewing the agreements that Cheers Inc. has with their chosen cloud service provider. One of those agreements states that the RTO is 2 hours and that the system will maintain a 99.9% uptime. Which of the following describes the guarantee that Sam is currently reviewing?
c. SLA
Timothy is responsible for monitoring the performance of the applications the company has deployed on their internal private cloud as well as on the cloud service provider. When the applications were initially developed, the IT department had agreed to ensure that the services were available to varying degrees depending on criticality. As such, he needs to reference the documents for each of those services so he knows how they should be performing. Which document is Timothy most likely referencing?
c. SLA
Jeff has just been hired by Fictional Corp as a systems administrator. He is told that one of his responsibilities is going to be the backup processes used for on-premises systems in the company's data center. He is told about documentation that he should use to make sure that everything is done correctly. What type of documentation was he referred to?
c. SOPs
Fictional Corp is looking at solutions for their new CRM system for the sales department. The IT staff already has a fairly heavy workload, but they do not want to hire any additional IT staff. In order to reduce the maintenance burden of the new system, which of the following types of CRM should they choose to meet these needs?
c. SaaS
Meera notices someone entering a side door of her company's facility, but did not swipe a badge on the proximity badge reader before being able to open the door, even though there is a badge reader installed. Which of the following may have occurred?
c. Security device failure
Cherice has just completed an audit of a server group that she has recently taken over. She found a number of accounts that were still active even though the users no longer worked for the company. Which of the following should she do to prevent this issue in the future?
c. Set up an automation task to disable accounts that have been inactive over 30 days automatically and send the administrator a notification.
Cherise has been tasked with increasing the security for the company's data center. Currently there is a proximity badge reader on the door. She is considering adding an iris camera to the door. Once it is in place, which of the following factors will be used for authentication into the data center? (Choose all that apply.)
c. Something that you are d. Something that you have
Fictional Corp is trying out a new experimental technology that analyzes how users type as part of a multifactor authentication implementation. Which of the following categories of authentication factors would this fall into?
c. Something you do
Mark manages a custom application that resides on a cloud service provider that relies on users to authenticate by means of entering a username and password. Which of the following factors of authentication does this application use?
c. Something you know
Fred is trying to access the company's cloud-based CRM system while traveling abroad in Europe. He receives a message that access to this application is not allowed from the country he is currently in and lists the IP address detected by his connection. Which of the following factors of authentication is the CRM system using?
c. Somewhere you are
Daisy is researching load balancing solutions to implement for a new application that she is tasked with designing and deploying the infrastructure for. One of the requirements is that a client should continue communicating with the same server for the duration of their web browsing session. Which of the following features should she look for in the load balancer?
c. Sticky sessions
Joffrey is about to deploy a new web server. He wants to ensure that when a user accesses the server, that their web browsing session is encrypted between the browser and the server. Which of the following should he use with the web server to provide this functionality?
c. TLS
Emily is analyzing the logs for one of the servers in her organization. She sees three failed attempts to log in with an incorrect password. She then sees continued attempts to log in with a different error message. Which of the following could be the reason the error message changed?
c. The account is now locked after 3 failed attempts, so the error message has most likely changed from a failed password to one reflecting a locked account.
Martin is running an analysis on the logs from one of the web servers that resides on the company's private cloud. He finds that some users are accessing a site they shouldn't be able to, as the firewall should have rules to prevent them from accessing the server. Which of the following might be how they were able to access the site?
c. The rules on the firewall were listed in an incorrect order.
Lorna manages a private cloud with 500 terabytes of storage. However, the servers in the cloud have a total provisioned footprint of 800 terabytes. Which of the following describes the provisioning model that she is using?
c. Thin provisioning
Greta manages the on-premises networks for her company's Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement?
c. VXLAN
Negan has been given the 10.50.0.0/16 subnet to create the cloud infrastructure necessary for a new subsidiary that his company is creating, Zombies Inc. He wants to create a minimum of 500 smaller networks that can hold 100 servers each out of that space to minimize broadcast traffic within each subnet. Which of the following CIDR masks could he use to meet his requirements?
d. /25
Carol has created a subnet of 10.20.30.0/27. Which of the following is the address that is used for broadcast messages within the subnet?
d. 10.20.30.31
Octavia has set up a private cloud with a virtual machine at the IP address 172.19.101.5 and the subnet mask 255.255.255.192. She has been asked what the broadcast IP address is for the network. How should she respond?
d. 172.19.101.63
Clarke is trying to come up with a subnet mask so that three servers with the IP addresses 172.16.31.10, 172.16.30.15, and 172.16.31.206 are in the same network. Which of the following subnet masks will accommodate this requirement?
d. 255.255.254.0
Jenna's cloud service provider has just started supporting IPv6. She wants her web servers there to be accessible by both IPv4 and IPv6. Which of the following records should she add to the DNS configuration to ensure that IPv6 clients can access her company's website?
d. AAAA
Alex is the network administrator for a Windows Server network. Which of the following is most likely in use to manage the users and other resources on that network?
d. AD
Fictional Corp has just finished migrating a number of servers from an on-premises data center to a cloud service provider. However, users are now complaining that they are running much slower than before. Which of the following would NOT be a contributing factor as to why they seem slower?
d. Amount of disk space provisioned for virtual machines at the CSP
Adele is looking at the options for automation tools and needs to choose one that does not require the installation of an agent. Which of the following tools might she choose?
d. Ansible
Olina is fairly new at Fictional Corp and is used to working at much smaller companies. Most of her former jobs have all been manual work. However, she has been told that because of its size, her new company prefers to implement technologies that can perform various processes and procedures without human intervention so that humans can spend their time monitoring the systems for errors and fixing problems when something goes wrong. Which of the following describes what Fictional Corp has implemented to much more of an extent than her previous company?
d. Automation
Jana is trying to optimize the cloud infrastructure of her organization for availability. She wants to ensure that the virtual machines that normally use a certain amount of memory have the ability to use more physical memory up to a predefined level in cases of heavy workloads. Which of the following features should she look at configuring?
d. Bursting
Quincy has been working for an organization that implemented a business continuity plan in order to plan for how to continue doing business in the case of some form of a disaster. He then goes to work for another organization and finds that they call this plan something else. Which of the following terms might this other organization use?
d. COOP
Robert has just finished implementing a change that was approved by the change advisory board. After the change has been implemented, which of the following is the next step that should be performed?
d. Change review
Gendry has been learning more about security within the cloud after hearing that it is a hot topic within the IT industry. He starts reading up on SHA-3 being used for hashing. Which of the following best describes SHA-3?
d. Cipher
Stan is walking past a row of cubicles when he notices someone's password written down on a sticky note that is attached to a monitor. The password is passwordpassword3. Besides the obvious problem of being the word password repeated followed by a single number, which of the following policies isn't in place that should be?
d. Complexity
Frank is configuring a virtual machine that will reside on a CSP's infrastructure that will eventually need multiple terabytes of storage for data. However, he decides to only configure it with one terabyte in the beginning and then provision more disk space as necessary. Which of the following is the most likely reason for his decision?
d. Cost
Samwell wants to create a lightly protected subnet within the VNet that acts as a filter between the Internet and the other internal network resources. Which of the following describes the type of subnet that he is looking to deploy?
d. DMZ
Fictional Corp has a datacenter located next to a major river. Until now, the area has never flooded before, according to records that exist, but it has now been hit with what is being called a 1000-year flood. A week later the water has receded and employees are able to get back into the building. Which of the following documents should be referenced to determine how to proceed?
d. DRP
Fictional Corp uses a cloud service provider that offers the capability to spin up new virtual machines from existing images. Which of the following is the term that describes that service?
d. DRaaS
Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement?
d. Different subnets for each department
Cindy has a scheduled job to back up the web server every day at 1 am. Every hour she wants to run another backup to archive anything that has changed since the full backup. Which of the following describes the hourly backup process she wants to implement?
d. Differential
Angela has decided upon a multi-cloud deployment so that the company can continue to operate even if one of the cloud service providers experiences an outage. Which of the following explains the factor that was important to Angela in choosing this structure?
d. Disaster recovery
Pedro is looking for internal and external clues as to what may be causing a problem that has been reported via their ticketing system. Which of the following steps is he currently on from the troubleshooting model?
d. Establish a theory of probable cause.
Andrew manages a variety of applications spread out between multiple cloud providers. Users can sign into any of the cloud applications with the same username and password. Which of the following has been implemented?
d. Federation
Fictional Corp is a large company that provides critical SaaS applications for the medical industry. Even minimal downtime can cause quite a few problems for their clients. Which of the following does Fictional Corp most likely use as part of its business continuity plan?
d. Hot site
Fictional Corp implements multiple methods of keeping attackers out of its network and systems. Some of these systems may simply report on the intrusions while others will attempt to stop them while in progress. Which of the following describes the concept that Fictional Corp has implemented?
d. IDP
A user calls into the service desk stating they're having a problem accessing a particular cloud application. The service desk technician asks them some probing questions to see if there have been any changes to their local computer and what they were doing when it stopped working. Which step of the troubleshooting model describes the step that the process is currently at?
d. Identify the problem.
Fictional Corp uses a technology to gather all of the log files onto a centralized server. They then use a tool that will analyze these log files and look for correlation of events. Which of the following describes the type of tool that performs this analysis?
d. SIEM
Bianca manages the e-mail server for Fictional Corp. All of the employees' e-mails are encrypted using the user's keys. One of the user's certificates expires, so a new certificate is installed. However, now they can no longer access their archived e-mails. Which of the following does Bianca need to do to give this user access to their archived e-mails?
d. Import the keys for the old certificate so the e-mails can be decrypted and then re-encrypt them using the new certificate.
Myrcella has been hired to perform an audit of a security incident where a large corporation was using an open-source application that they had deployed to a cloud service provider. The application was used to manage the many people whose information it tracked and included a lot of identifying information about them that could be used in identity fraud. Unfortunately, the person that installed the application never removed the default administrative account that was still using the default password. Which of the following describes this scenario?
d. Incorrect hardening settings
Jed has just spent some time analyzing some of the applications on the cloud service provider his company uses. He found that one of the applications was using a lot of resources between the servers that it was deployed on and implemented horizontal scaling to resolve the issue. Which of the following did Jed do?
d. Increased the number of servers available to the application.
Bran has recently learned about the CIA triad. He knows that encryption is important to a variety of things within his organization's infrastructure. One of those is the ability to ensure that data being transmitted across the network cannot be modified undetected. Which of the following tenets of the CIA triad supports this idea?
d. Integrity
Ned is working on implementing an open-source container management service because it has some orchestration features that his organization would really benefit from. Which of the following is a possible solution that he may be working with?
d. Kubernetes
Grant is reviewing his company's BCP as part of an annual review. One of the pieces of information that he finds missing is how long on average it takes to recover systems after a failure. Which of the following terms might describe the information he may want to add to the BCP?
d. MTTR
Emily has just migrated the email from the company's on-premises data center to a cloud service provider. She has modified the appropriate A records, but e-mail isn't being delivered to the new servers. Which of the following records does she still need to modify?
d. MX
Jose just returned from a security conference where he learned about a technology that he can implement on his network that will detect security breaches on his network, log the event, and alert the administrator. He also wants it to automatically stop the breach. Which of the following technologies could he implement?
d. NIPS
Alejandro is wanting to configure a couple of new virtual machines to take advantage of DHCP services offered by their cloud service provider. The portal that the CSP provides has their offerings broken up into multiple higher level categories. Which of the following should he most likely look under to configure this service for his company's use?
d. Network components
Ivan is responsible for making tape backups of one of the on-premises servers in the data center and then taking the tapes to a lockbox at a local bank for safe keeping. Which of the following describes the type of backup that he is doing?
d. Offline
A large Fortune 500 company has a data center full of servers and wants to move 5 petabytes worth of data to a cloud service provider. Having run some calculations, it could take years to move all of this data to a cloud service provider. Which of the following does the company most likely need to consider in order to complete this migration in a timely manner?
d. Offline transfer
Jadis has just created a new Linux server on the cloud service provider that her company uses. She attempts to SSH into it and it immediately fails. Which of the following steps might she have forgotten to do?
d. Open port 22 on the virtual firewall
Marissa is wanting to implement a VPN at her company, but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?
d. OpenVPN
Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose?
d. OpenVPN
Niles manages his company's private cloud. His manager wants to start taking advantage of the benefits that resources of a cloud service provider can offer. However, upon starting to try and get his company's local Active Directory to authenticate users on the public cloud resources, he can't seem to get it working. Which of the following is the most likely issue?
d. Platform integration issue
Luc has installed Ansible and is trying to get it working correctly, but cannot seem to make it communicate with the various nodes that he wants to use it on. Which of the following is the most likely issue?
d. Port 22 is not open on the firewall.
Julia is designing a new customer relationship management application that will contain a number of types of information: customer list, products, inventory, orders, etc. Which of the following best suits the method of how she may want to store this data?
d. Relational database
Otis wants to give a mobile app short-term access to a resource without having to store long-term user credentials (such as access keys) in the app. Which of the following describes the method he can use to do that?
d. Roles
Regan has been asked to apply updates to one of the company's web application server farms. He does not want to update all of the servers at once in case there is some sort of an issue that causes a crash or failure. He decides to direct traffic away from a few servers and update those first. Once he has tested that everything is working successfully, he'll allow them to handle traffic again and then do another small group of servers. He'll continue repeating this process until all servers have been updated. Which of the following describes the deployment method that he has chosen?
d. Rolling deployment
Fictional Corp has been using their current cloud service provider for the past year. They have been mostly happy with the service provided up until about a month ago when various virtual machines started becoming unavailable for hours at a time. The CSP has a guarantee of a 99.999 percent uptime, which means they should only have about 5.26 minutes of downtime per year. Which of the following defines the guarantee the CSP is not meeting?
d. SLA
Fictional Corp has chosen AWS as its primary cloud service provider. Which of the following automation tools could they use to help with configuring and managing EC2 instances?
d. SSM
Eddie has been analyzing one of the clusters hosted in their on-premises data center. He sees that several of the servers are consistently sitting idle. Which of the following techniques might she want to do?
d. Scale in
Euron has received several complaints that none of the users can access the company's resources that are hosted on a cloud service provider. The company has a piece of hardware installed that provides a VPN tunnel to the CSP. Upon entering the data center, he sees that all of the lights are off on the device. He unplugs it and plugs it back in and does not see any changes. Which of the following has most likely occurred?
d. Security device failure
Faith has been tasked with migrating as many systems as possible to the cloud. She has a list of the systems that the IT department is aware of, but has heard employees talking about other systems that are not on her list. Which of the following might describe the systems that she still needs to gather information about?
d. Shadow IT
Cody suspects that his company has been the subject of an attack after reports from multiple users that they are missing files. He examines the logs and sees where it appears that the user logged in successfully for each of the users in question and that the strong encryption protocol was enforced and used each time. Which of the following may have occurred?
d. Social engineering
Jasper was given the IP address of 10.17.101.120/15 for the virtual machine he is to create along with the default gateway of 10.0.0.1. He enters the IP address correctly along with the subnet mask 255.254.0.0. However, the virtual machine doesn't appear to be able to communicate with the Internet when he tries to ping a popular domain name. Which of the following might be the reason why?
d. The default gateway is incorrect.
Brienne is trying to access one of her company's websites but gets an error message about not being able to trust the website. Which of the following has most likely occurred?
d. The site's certificate has expired
Tracey has built a private cloud in her organization with restrictions in place to prevent provisioning more disk space than is physically available. Which of the following describes this principle?
d. Thick provisioning
Frasier is comparing the logs from the firewall to the logs on the web server after a security incident. He is trying to correlate the events, but it appears that the traffic took several minutes to reach the web server from the firewall for each of the various attempts. Which of the following could be the issue?
d. Time synchronization
Fictional Corp's primary data center is located in Silicon Valley not far from the San Andreas fault line. Over the past couple of years, earthquakes have been getting more and more frequent and of a higher intensity. As a precaution, the company has decided to use a CSP to geographically disperse the infrastructure. They are currently using multiple hosts that contain between 2 and 20 virtual machines each within their data center. Which of the following types of migration would this be considered?
d. V2V
Terry has noticed in the configuration management database that one of the servers that acts as a host for multiple virtual machines is no longer covered by the manufacturer's warranty. He gets a replacement with a lot more capacity installed and migrates the guest machines to the new host. What type of migration would this be considered?
d. V2V
Creative Co has just set up a private cloud. However, they have employees that work remotely in the field and want them to be able to access resources on the private cloud. Which of the following could Creative Co implement in order to allow users to create secure connections from their computers across the Internet into the private cloud?
d. VPN
Teddy fixed an issue with a cloud-based application a few hours ago and just received a call from a user stating that another part of the application is now broken. Which of the following steps of the troubleshooting model did he most likely omit?
d. Verify full system functionality, and, if applicable, implement preventive measures.
Fictional Corp has assigned each user within their Active Directory implementation a username. This username is a form of:
d. identity
Eddie has a virtual machine that is currently serving as the sole web server for the organization he works for. The amount of traffic to the website has been increasing lately, and Eddie wants to add another web server to help answer some of the requests. Which of the following technologies should Eddie look at implementing in addition to the second web server?
d. load balancer
Isabel is troubleshooting a DNS issue on one of her Windows servers. Which of the following commands might let her look up the DNS records so she can track down where the problem might be?
d. nslookup
Adrienne wants to be able to analyze the traffic coming into a Linux server's network interface. Which of the following command line utilities will allow her to see this information?
d. tcpdump
Ursula is working on a Linux system and wants to determine which routers a packet will traverse when a packet is sent to a certain destination. Which of the following command line tools can she use to find that information?
d. traceroute
Wanda is trying to determine which routes packets are traveling over when accessing the company's chosen cloud service provider. Which of the following Windows tools can help her discover that information?
d. tracert