Summer Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following cloud computing characteristics is a facilitator of a company's organizational agility?

A.

Professional services

B.

Managed services

C.

Reduced time to market

D.

Licensing model

Full Access
Question # 5

A company is migrating a legacy application to the cloud. Two C-level executives are currently engaged in the initial stages of the migration, and they are planning a rip-and-replace approach.

Before initiating the project, the FIRST step should be to identify:

A.

the required network performance.

B.

the key stakeholders.

C.

the desired CSP.

D.

the required cloud services.

E.

the required amount of storage.

Full Access
Question # 6

A company is deploying a new application and must decide whether to build an infrastructure to host the application on premises or in the cloud. Which of the following BEST describes the financial impact of hosting the application in the cloud?

A.

The company's capital expense will be less.

B.

The company will be able to defer licensing costs.

C.

The provider will share responsibility for the company's monthly bill.

D.

Monthly operating costs will remain constant despite usage.

Full Access
Question # 7

Which of the following would help a company avoid failure of a cloud project due to a lack of adherence of the company’s operations and business processes to a cloud solution?

A.

Cloud managed services

B.

Company baseline

C.

Proof of value

D.

Industry benchmarks

Full Access
Question # 8

A company decommissioned its testing environment. Which of the following should the company do FIRST to avoid charges?

A.

Detach and delete disposable resources.

B.

Empty the logging directory.

C.

Delete infrastructure as code templates.

D.

Disable alerts and alarms.

Full Access
Question # 9

A startup company wants to use a CRM application to manage its sales and support organizations. The company does not have any IT staff. Which of the following cloud computing models is MOST appropriate for this company to use?

A.

CaaS

B.

PaaS

C.

IaaS

D.

SaaS

Full Access
Question # 10

A company is sending copies of its information to an off-site server managed by a CSR Which of the following BEST describes this strategy?

A.

Backup

B.

Zones

C.

Locality

D.

Geo-redundancy

Full Access
Question # 11

A cloud administrator patched a known vulnerability in an operating system. This is an example of risk:

A.

transference

B.

avoidance.

C.

mitigation.

D.

acceptance.

Full Access
Question # 12

Which of the following is a security advantage of using CDNs?

A.

Advanced threat inspection

B.

VPN sessions to the consumers

C.

Resiliency against DDoS attacks

D.

Data encryption at rest

Full Access
Question # 13

A cloud systems administrator needs to migrate several corporate applications to a public cloud provider and decommission the internal hosting environment. This migration must be completed by the end of the month. Because these applications are internally developed to meet specific business accounting needs, the administrator cannot use an alternative application.

Which of the following BEST describes the approach the administrator should use?

A.

Hybrid deployment

B.

Phased migration

C.

Lift and shift

D.

Rip and replace

Full Access
Question # 14

A systems administrator must select a CSP while considering system uptime and access to critical servers. Which of the following is the MOST important criterion when choosing the CSP?

A.

Elasticity

B.

Scalability

C.

Availability

D.

Serviceability

Full Access
Question # 15

Which of the following techniques helps an organization determine benchmarks for application performance within a set of resources?

A.

Auto-scaling

B.

Load testing

C.

Sandboxing

D.

Regression testing

Full Access
Question # 16

A web application was deployed, and files are available globally to improve user experience. Which of the following technologies is being used?

A.

SAN

B.

CDN

C.

VDI

D.

API

Full Access
Question # 17

Resource consumption in a company's laaS environment has been stable; however, a few servers have recently experienced spikes in CPU usage for days at a time. Costs are rising steadily, and it is unclear who owns the servers. Which of the following would work BEST to allow the company to charge the appropriate department? (Select TWO).

A.

Employ a software defined network.

B.

Employ orchestration automation.

C.

Review the storage usage reports.

D.

Review the network ingress reports.

E.

Employ resource tagging.

F.

Review the compute usage reports.

Full Access
Question # 18

Which of the following risks is MOST likely a result of vendor lock-in?

A.

Premature obsolescence

B.

Data portability issues

C.

External breach

D.

Greater system vulnerability

Full Access
Question # 19

A small business wants to move its accounting operations to the cloud. Which of the following cloud service models would put the MOST liability on the provider with regard to shared responsibility?

A.

laaS

B.

BPaaS

C.

PaaS

D.

SaaS

Full Access
Question # 20

Which of the following activities in a cloud environment requires a defined scope and formal authorization from the CSP?

A.

Orchestration

B.

Penetration testing

C.

Sandboxing

D.

Vulnerability scanning

Full Access
Question # 21

Which of the following allows for the management of network policies from a central portal while maintaining a hardware-agnostic approach?

A.

Virtual private network

B.

Software-defined network

C.

Load balancing

D.

Direct Connect

Full Access
Question # 22

A small business is engaged with a cloud provider to migrate from on-premises CRM software. The contract includes fixed costs associated with the product. Which of the following variable costs must be considered?

A.

Time to market

B.

Operating expenditure fees

C.

BYOL costs

D.

Human capital

Full Access
Question # 23

The optimal, sequential order in which cloud resources should be recovered in the event of a major failure would be defined in the:

A.

recovery point objective.

B.

disaster recovery plan.

C.

incident response plan.

D.

network topology diagram.

Full Access
Question # 24

Which of the following technologies would help a game company prepare its cloud infrastructure to support a global distribution workload of a newly released online game? (Choose two.)

A.

Auto-scaling

B.

VDI

C.

Data portability

D.

CDN

E.

Templates

F.

Blockchain

Full Access
Question # 25

Which of the following is achieved by implementing replication, redundancy, and disaster recovery?

A.

Improved performance

B.

Improved throughput

C.

Improved latency

D.

Improved availability

Full Access
Question # 26

Which of the following is a cloud service model that organizations use when their third-party ERP tool is provided as a complete service?

A.

Public cloud

B.

SaaS

C.

Hybrid cloud

D.

IaaS

Full Access
Question # 27

Which of the following is MOST likely to use a CDN?

A.

Realty listing website

B.

Video streaming service

C.

Email service provider

D.

Document management system

Full Access
Question # 28

A company would like to improve its current DR plan with an emphasis on high availability. Which of the following metrics should the company focus on?

A.

MTTR

B.

RTO

C.

QoS

D.

RPO

Full Access
Question # 29

Which of the following metrics defines how much data loss a company can tolerate?

A.

RTO

B.

TCO

C.

MTTR

D.

ROI

E.

RPO

Full Access
Question # 30

Which of the following BEST describes how a cloud provider helps a company with security risk responses?

A.

Acceptance

B.

Mitigation

C.

Avoidance

D.

Transference

Full Access
Question # 31

Which of the following concepts will help lower the attack surface after unauthorized user-level access?

A.

Hardening

B.

Validation

C.

Sanitization

D.

Audit

Full Access
Question # 32

Which of the following cloud characteristics helps transform from a typical capital expenditure model to an operating expenditure model?

A.

Pay-as-you-go

B.

Elasticity

C.

Self-service

D.

Availability

Full Access
Question # 33

A network team establishes a new connection to an IaaS CSP that is more efficient and has networking costs that are 25% less than previous monthly expenditures. The bill outlines the following costs:

Storage:$10000

Compute:$12000

Network:$7000

Which of the following will be the total cloud expenditure for the following month? A. $26000

B. $26250

C. $27250

D. $29000

Full Access
Question # 34

Which of the following service models BEST describes a cloud-hosted application in which the end user only creates user access and configures options?

A.

MaaS

B.

SaaS

C.

PaaS

D.

laaS

Full Access
Question # 35

A company hired a DevOps engineer to move business systems to the cloud. The current systems administrator does not have scripting experience and has been deploying servers manually. Which of the following would BEST optimize this process?

A.

Infrastructure as code deployment model

B.

API integration to a cloud provider

C.

Load testing

D.

Continuous delivery/continuous integration

Full Access
Question # 36

Which of the following security concerns is BEST addressed by moving systems to the cloud?

A.

Availability

B.

Authentication

C.

Confidentiality

D.

Integrity

Full Access
Question # 37

A low-budget project with a flexible completion time can become financially feasible via the use of:

A.

right-sizing.

B.

resource tagging.

C.

reserved instances.

D.

spot instances.

Full Access
Question # 38

Which of the following is true about the use of technologies such as JSON and XML for cloud data interchange and automation tasks?

A.

It can cause cloud vendor lock-in

B.

The company needs to define a specific programming language for cloud management.

C.

The same message format can be used across different cloud platforms.

D.

It is considered an unsafe format of communication.

Full Access
Question # 39

A Chief Information Officer is starting a cloud migration plan for the next three years of growth and requires an understanding of IT initiatives. Which of the following will assist in the assessment?

A.

Technical gap analysis

B.

Cloud architecture diagram review

C.

Current and future business requirements

D.

Feasibility study

Full Access
Question # 40

Which of the following DevOps options is used to integrate with cloud solutions?

A.

Provisioning

B.

API

C.

SOA

D.

Automation

Full Access
Question # 41

A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment. All users require the ability to modify personal working environments. Which of the following is the BEST solution?

A.

SSO

B.

VDI

C.

SSH

D.

VPN

Full Access
Question # 42

A company is moving its long-term archive data to the cloud. Which of the following storage types will the company MOST likely use?

A.

File

B.

Object

C.

Tape

D.

Block

Full Access
Question # 43

A cloud developer chooses to use private key encryption for all traffic in a new application. Which of the following security concerns does this BEST describe?

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Authorization

Full Access
Question # 44

A vendor wants to distribute a cloud management application in a format that can be used on both public and private clouds, but one that does not include an underlying OS that would require patching and management. Which of the following would BEST meet this need?

A.

Containerization

B.

Federation

C.

Collaboration

D.

Microservices

Full Access
Question # 45

In a DevOps environment there is a requirement to start building application solutions in an efficient manner without any dependent components. Which of the following should a DevOps engineer do to meet these requirements?

A.

Build the applications in QA, and then enable resource tagging.

B.

Build the applications in QA, and then clone and deploy them in production.

C.

Use templates for building the applications.

D.

Use templates and enable auto-scaling.

Full Access
Question # 46

A company has defined a multicloud model.

Which of the following is the MOST important aspect to consider when defining the company's needs?

A.

Change management

B.

Data sovereignty

C.

Data portability

D.

Data classification

Full Access
Question # 47

A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?

A.

Configuration management

B.

Incident management

C.

Resource management

D.

Change management

Full Access
Question # 48

Which of the following are the appropriate responses to risks?

A.

Mitigate, accept, avoid, validate

B.

Migrate, accept, avoid, transfer

C.

Mitigate, accept, avoid, transfer

D.

Migrate, accept, avoid, validate

Full Access
Question # 49

An organization plans to keep three of its cloud servers online for another nine months and a fourth server online for a year. The current pricing is $200 per month per server. The cloud provider announced the sale price of $1,500 per year per reserved instance.

Which of the following represents the cost savings by converting all four of the cloud servers to reserved instances?

A.

$900

B.

$1,800

C.

$2,400

D.

$3,600

Full Access
Question # 50

A company's SaaS provider recently changed its licensing model, and a business analyst is required to do an overall cost analysis for a three-year contract renewal. Which of the following will provide the entire financial forecast over the renewal period?

A.

ROI

B.

TCO

SOW

C.

RFI

Full Access
Question # 51

A company wants to deploy an application in a public cloud. Which of the following service models gives the MOST responsibility to the provider?

A.

PaaS

B.

IaaS

C.

BPaaS

D.

SaaS

Full Access
Question # 52

A company wants to analyze the results of an email marketing campaign. The company identified different information sources it can use in combination with its current databases. It also contacted the CSP to use its solutions to ingest, transform, and process the information. Which of the following is the company implementing?

A.

Blockchain

B.

Big Data

C.

Social media

D.

loT

Full Access
Question # 53

A cloud service provider is marketing its new PaaS offering to potential clients. Which of the following companies would MOST likely be interested?

A.

A company specializing in application development

B.

A company with many legacy applications

C.

A company with proprietary systems

D.

A company that outsources support of its IT systems

Full Access
Question # 54

A document that outlines the scope of a project, specific deliverables, scheduling, and additional specific details from the client/buyer is called a:

A.

statement of work.

B.

standard operating procedure.

C.

master service document.

D.

service level agreement.

Full Access
Question # 55

A company migrated all of its infrastructure to the cloud. The cloud security team must review the security post-migration.

Which of the following is the MOST appropriate task for the cloud security team to perform?

A.

Risk register

B.

Threat assessment

C.

Application scan

D.

Vulnerability scan

Full Access
Question # 56

Transferring all of a customer's on-premises data and virtual machines to an appliance, and then shipping it to a cloud provider is a technique used in a:

A.

phased migration approach.

B.

replatforming migration approach.

C.

rip and replace migration approach.

D.

lift and shift migration approach.

Full Access
Question # 57

Which of the following BEST describes the open-source licensing model for application software?

A.

Software is free to use, but the source code is not available to modify.

B.

Modifications to existing software are not allowed.

C.

Code modifications must be submitted for approval.

D.

Source code is readily available to view and use.

Full Access
Question # 58

A software developer wants to ensure a packaged application can be deployed in different environments without modifying anything but the application settings. The developer creates an image and provides instructions for the systems administrator to use for deployment. This is an example of:

A.

application versioning.

B.

source code control.

C.

containerization.

D.

deployment automation.

Full Access
Question # 59

Which of the following BEST describes decreasing the resources assigned to a system to avoid paying for unused capacity?

A.

Orchestration

B.

Auto-scaling

C.

Right-sizing

D.

Scalability

Full Access
Question # 60

Which of the following deployment models includes application components on a company’s network as well as on the Internet?

A.

Private

B.

Public

C.

Community

D.

Hybrid

Full Access
Question # 61

When selecting a cloud provider, which of the following is MOST likely to be a financial consideration?

A.

Proof of concept

B.

Request for information

C.

Licensing models

D.

Request for proposal

Full Access
Question # 62

An IT company is planning to migrate its current infrastructure to the cloud due to support no longer being available and dependence on some legacy databases. Which of the following would be the BEST migration approach?

A.

Rip and replace

B.

Phased

C.

Hybrid

D.

Lift and shift

Full Access
Question # 63

Which of the following BEST describes a pay-as-you-go licensing model within a cloud service?

A.

Subscription agreement

B.

Perpetual agreement

C.

Enterprise agreement

D.

Promotional agreement

Full Access
Question # 64

Which of the following technologies allows a social media application to authenticate access to resources that are available in the cloud?

A.

Microservices

B.

LDAP

C.

Federation

D.

MFA

Full Access
Question # 65

Which of the following is used to connect on-premises resources to resources located in a cloud environment?

A.

Virtual private network

B.

Access control list

C.

Secure file transfer protocol

D.

Software-defined network

Full Access