Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

A company wants to move its environment from on premises to the cloud without vendor lock-in. Which of the following would BEST meet this requirement?

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Full Access
Question # 5

A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.)

A.

Install TLS certificates on the server.

B.

Forward port 80 traffic to port 443.

C.

Disable TLS 1.0/1.1 and SSL.

D.

Disable password authentication.

E.

Enable SSH key access only.

F.

Provision the server in a separate VPC.

G.

Disable the superuser/administrator account.

Full Access
Question # 6

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?

A.

Incorrect encryption ciphers

B.

Broken trust relationship

C.

Invalid certificates

D.

Expired password

Full Access
Question # 7

A technician just received the lessons learned from some recent data that was lost due to an on-premises file-server crash. The action point is to change the backup strategy to minimize manual intervention. Which of the following is the BEST approach for the technician to implement?

A.

Backup as a service

B.

RAID 1

C.

Long-term storage

D.

New backup devices

Full Access
Question # 8

Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud?

A.

Deploy a new instance using a known-good base image.

B.

Configure a firewall rule to block the traffic on the affected instance.

C.

Perform a forensic analysis of the affected instance.

D.

Conduct a tabletop exercise involving developers and systems administrators.

Full Access
Question # 9

A systems administrator is configuring updates on a system. Which of the following update branches should the administrator choose to ensure the system receives updates that are maintained for at least four years?

A.

LTS

B.

Canary

C.

Beta

D.

Stable

Full Access
Question # 10

A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?

A.

DLP

B.

WAF

C.

FIM

D.

ADC

Full Access
Question # 11

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?

A.

Deploy web servers into an laaS provider.

B.

Implement a cloud-based VDI solution.

C.

Provision web servers in a container environment.

D.

Use PaaS components in the cloud to implement the product.

Full Access
Question # 12

A cloud administrator is working in a secure government environment. The administrator needs to implement corrective action due to recently identified security issue on the OS of a VM that is running a facility-management application in a cloud environment. The administrator needs to consult the application vendor, so it might take some time to resolve the issue. Which of the following is the FIRST action the administrator should take while working on the resolution?

A.

Shut down the server.

B.

Upgrade the OS

C.

Update the risk register.

D.

Raise a problem ticket.

Full Access
Question # 13

A cloud administrator is planning to migrate a globally accessed application to the cloud.

Which of the following should the cloud administrator implement to BEST reduce latency for all users?

A.

Regions

B.

Auto-scaling

C.

Clustering

D.

Cloud bursting

Full Access
Question # 14

Which of the following should be considered for capacity planning?

A.

Requirements, licensing, and trend analysis

B.

Laws and regulations

C.

Regions, clusters, and containers

D.

Hypervisors and scalability

Full Access
Question # 15

An organization is hosting a DNS domain with private and public IP ranges.

Which of the following should be implemented to achieve ease of management?

A.

Network peering

B.

A CDN solution

C.

A SDN solution

D.

An IPAM solution

Full Access
Question # 16

Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?

A.

Implement whole-disk encryption

B.

Deploy the latest OS patches

C.

Deploy an anti-malware solution

D.

Implement mandatory access control

Full Access
Question # 17

Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?

A.

Using only open-source technologies

B.

Keeping all resources up to date

C.

Creating a standby environment with a different cloud provider

D.

Having a detailed incident response plan

Full Access
Question # 18

An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort. Which of the following ports needs to be opened to fulfill this requirement?

A.

53

B.

67

C.

123

D.

161

Full Access
Question # 19

A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data.

Which of the following migration methods would be the BEST to use?

A.

Conduct a V2V migration

B.

Perform a storage live migration

C.

Rsync the data between arrays

D.

Use a storage vendor migration appliance

Full Access
Question # 20

An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used?

A.

Thick provisioning

B.

Software-defined storage

C.

User quotas

D.

Network file system

Full Access
Question # 21

A systems administrator needs to configure SSO authentication in a hybrid cloud environment.

Which of the following is the BEST technique to use?

A.

Access controls

B.

Federation

C.

Multifactor authentication

D.

Certificate authentication

Full Access
Question # 22

A VDI administrator has received reports of poor application performance.

Which of the following should the administrator troubleshoot FIRST?

A.

The network environment

B.

Container resources

C.

Client devices

D.

Server resources

Full Access
Question # 23

A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?

A.

Create a VPC and peer the networks.

B.

Implement dynamic routing.

C.

Enable DHCP on the networks.

D.

Obtain a new IPAM subscription.

Full Access
Question # 24

An organization’s web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization’s web server infrastructure.

Which of the following should be implemented to prevent this in the future as a mitigation method?

A.

Enable DLP

B.

Configure microsegmentation

C.

Enable DNSSEC

D.

Deploy a vADC appliance

Full Access
Question # 25

A systems administrator is analyzing a report of slow performance in a cloud application. This application is working behind a network load balancer with two VMs, and each VM has its own digital certificate configured. Currently, each VM is consuming 85% CPU on average. Due to cost restrictions, the administrator cannot scale vertically or horizontally in the environment. Which of the following actions should the administrator take to decrease the CPU utilization? (Choose two.)

A.

Configure the communication between the load balancer and the VMs to use a VPN.

B.

Move the digital certificate to the load balancer.

C.

Configure the communication between the load balancer and the VMs to use HTTP.

D.

Reissue digital certificates on the VMs.

E.

Configure the communication between the load balancer and the VMs to use HTTPS.

F.

Keep the digital certificates on the VMs.

Full Access
Question # 26

A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other. Which of the following should an administrator perform to comply with the security requirement?

A.

Create separate virtual networks for production, QA, and development servers.

Move the servers to the appropriate virtual network.

Apply a network security group to each virtual network that denies all traffic except for the firewall.

B.

Create separate network security groups for production, QA, and development servers.

Apply the network security groups on the appropriate production, QA, and development servers.

Peer the networks together.

C.

Create separate virtual networks for production, QA, and development servers.

Move the servers to the appropriate virtual network.

Peer the networks together.

D.

Create separate network security groups for production, QA, and development servers.

Peer the networks together.

Create static routes for each network to the firewall.

Full Access
Question # 27

All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST?

A.

Peer all the networks from each cloud environment.

B.

Migrate the servers.

C.

Create a VPN tunnel.

D.

Configure network access control lists.

Full Access
Question # 28

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Full Access
Question # 29

A systems administrator needs to deploy a solution to automate new application releases that come from the development team. The administrator is responsible for provisioning resources at the infrastructure layer without modifying any configurations in the application code. Which of the following would BEST accomplish this task?

A.

Implementing a CI/CD tool

B.

Configuring infrastructure as code

C.

Deploying an orchestration tool

D.

Employing DevOps methodology

Full Access
Question # 30

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?

A.

IPAM

B.

DoH

C.

VLAN

D.

SDN

Full Access
Question # 31

A cloud engineer is performing updates to an application and needs to gracefully stop any new transactions from processing before the updates can be applied. Which of the following steps should the engineer take?

A.

Enable maintenance mode from the application dashboard

B.

Wait until after business hours to conduct the change when the system is not in use

C.

Run a kill command on the system to stop the application services

D.

Use a load balancer to redirect traffic to other systems serving the application

Full Access
Question # 32

A cloud administrator has deployed several VM instances that are running the same applications on VDI nodes. Users are reporting that a role instance is looping between STARTED, INITIALIZING, BUSY, and stop. Upon investigation, the cloud administrator can see the status changing every few minutes. Which of the following should be done to resolve the issue?

A.

Reboot the hypervisor.

B.

Review the package and configuration file.

C.

Configure service healing.

D.

Disable memory swap.

Full Access
Question # 33

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Full Access
Question # 34

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Full Access
Question # 35

A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities.

Which of the following testing techniques would be BEST to use?

A.

Usability testing

B.

Regression testing

C.

Vulnerability testing

D.

Penetration testing

Full Access
Question # 36

A systems administrator is troubleshooting performance issues with a VDI environment. The administrator determines the issue is GPU related and then increases the frame buffer on the virtual machines. Testing confirms the issue is solved, and everything is now working correctly. Which of the following should the administrator do NEXT?

A.

Consult corporate policies to ensure the fix is allowed

B.

Conduct internal and external research based on the symptoms

C.

Document the solution and place it in a shared knowledge base

D.

Establish a plan of action to resolve the issue

Full Access
Question # 37

A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements.

Which of the following solutions will be BEST to help the administrator achieve the requirements?

A.

Containers

B.

Infrastructure as code

C.

Desktop virtualization

D.

Virtual machines

Full Access
Question # 38

A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web- based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.

The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment.

Which of the following is the MOST likely reason for this issue?

A.

The license limit on the number of server deployments allowed per month was exceeded

B.

The deployment script changes made by the first administrator were not checked in and committed

C.

The new server images were incompatible with the application load-balancer configuration

D.

The application load balancer exceeded the maximum number of servers it could use

Full Access
Question # 39

Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?

A.

A business continuity plan

B.

Incident response/disaster recovery documentation

C.

A tabletop exercise

D.

A root cause analysis

Full Access
Question # 40

The human resources department was charged for a cloud service that belongs to another department. All other cloud costs seem to be correct.

Which of the following is the MOST likely cause for this error?

A.

Misconfigured templates

B.

Misconfigured chargeback

C.

Incorrect security groups

D.

Misconfigured tags

Full Access
Question # 41

A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible.

Which of the following is the MOST important consideration to ensure a seamless migration?

A.

The cost of the environment

B.

The I/O of the storage

C.

Feature compatibility

D.

Network utilization

Full Access
Question # 42

A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior.

Which of the following is MOST likely the cause?

A.

API provider rate limiting

B.

Invalid API token

C.

Depleted network bandwidth

D.

Invalid API request

Full Access
Question # 43

A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency.

Which of the following services should the technician deploy to eliminate the latency issue?

A.

Auto-scaling

B.

Cloud bursting

C.

A content delivery network

D.

A new cloud provider

Full Access
Question # 44

A cloud administrator is building a new VM for a network security appliance. The security appliance installer says the CPU clock speed does not meet the requirements.

Which of the following will MOST likely solve the issue?

A.

Move the VM to a host with a faster CPU

B.

Add more vCPUs to the VM

C.

Enable CPU masking on the VM

D.

Enable hyperthreading on the virtual host

Full Access
Question # 45

A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times.

Which of the following actions will MOST likely solve this issue?

A.

Update the quest graphics drivers from the official repository

B.

Add more vGPU licenses to the host

C.

Instruct users to access virtual workstations only on the VLAN

D.

Select vGPU profiles with higher video RAM

Full Access
Question # 46

A company developed a product using a cloud provider’s PaaS platform and many of the platform-based components within the application environment.

Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider?

A.

Licensing

B.

Authentication providers

C.

Service-level agreement

D.

Vendor lock-in

Full Access
Question # 47

An IaaS application has a two-hour RTO and a four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy.

Which of the following should the administrator configure to achieve the application requirements with the LEAST cost?

A.

Back up to long-term storage every night

B.

Back up to object storage every three hours

C.

Back up to long-term storage every four hours

D.

Back up to object storage every hour

Full Access
Question # 48

After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message.

Which of the following should the administrator verify NEXT?

A.

The TLS certificate

B.

The firewall rules

C.

The concurrent connection limit

D.

The folder permissions

Full Access
Question # 49

After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)

A.

Identify the resources that are accessible to the affected IAM user

B.

Remove the published plain-text password

C.

Notify users that a data breach has occurred

D.

Change the affected IAM user’s password

E.

Delete the affected IAM user

Full Access
Question # 50

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs.

Which of the following should be verified NEXT?

A.

Application

B.

SAN

C.

VM GPU settings

D.

Network

Full Access
Question # 51

A cloud administrator needs to implement a mechanism to monitor the expense of the company’s cloud resources.

Which of the following is the BEST option to execute this task with minimal effort?

A.

Ask the cloud provider to send a daily expense report

B.

Set custom notifications for exceeding budget thresholds

C.

Use the API to collect expense information from cloud resources

D.

Implement a financial tool to monitor cloud resource expenses

Full Access
Question # 52

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

Identify the problematic device(s).

Part 2:

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

Part 2:

Only select a maximum of TWO options from the multiple choice question

Full Access
Question # 53

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

A.

Performance testing

B.

Penetration testing

C.

Vulnerability testing

D.

Regression testing

Full Access
Question # 54

An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time.

Which of the following should be implemented to improve application performance?

A.

Increase disk capacity

B.

Increase the memory and network bandwidth

C.

Upgrade the application

D.

Upgrade the environment and use SSD drives

Full Access
Question # 55

A cloud administrator has built a new private cloud environment and needs to monitor all computer, storage, and network components of the environment.

Which of the following protocols would be MOST useful for this task?

A.

SMTP

B.

SCP

C.

SNMP

D.

SFTP

Full Access
Question # 56

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?

A.

Consult the law for the country where the company’s headquarters is located

B.

Consult the regulatory requirements for the company’s industry

C.

Consult the law for the country where the cloud services provider is located

D.

Consult the cloud services provider's policies and guidelines

Full Access
Question # 57

In an IaaS platform, which of the following actions would a systems administrator take FIRST to identify the scope of an incident?

A.

Conduct a memory acquisition.

B.

Snapshot all volumes attached to an instance.

C.

Retrieve data from a backup.

D.

Perform a traffic capture.

Full Access
Question # 58

A piece of software applies licensing fees on a socket-based model. Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?

A.

The amount of memory in the server

B.

The number of CPUs in the server

C.

The type of cloud in which the software is deployed

D.

The number of customers who will be using the software

Full Access
Question # 59

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Full Access
Question # 60

An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection?

A.

WAF

B.

EDR

C.

IDS

D.

HIPS

E.

SSL

Full Access
Question # 61

A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?

A.

A CDN solution

B.

An MPLS connection between data centers

C.

A DNS round robin

D.

A site-to-site VPN between data centers

Full Access
Question # 62

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Full Access
Question # 63

A cloud administrator is monitoring a database system and notices an unusual increase in the read operations, which is causing a heavy load in the system. The system is using a relational database and is running in a VM. Which of the following should the administrator do to resolve the issue with minimal architectural changes?

A.

Migrate the relational database to a NoSQL database.

B.

Use a cache system to store reading operations.

C.

Create a secondary standby database instance.

D.

Implement the database system using a DBaaS.

Full Access
Question # 64

A company is using a method of tests and upgrades in which a small set of end users are exposed to new services before the majority of other users. Which of the following deployment methods is being used?

A.

Blue-green

B.

Canary

C.

Big bang

D.

Rolling

Full Access
Question # 65

An administrator manages a file server that has a lot of users accessing and creating many files. As a result, the storage consumption is growing quickly. Which of the following would BEST control storage usage?

A.

Compression

B.

File permissions

C.

User quotas

D.

Access policies

Full Access
Question # 66

A cloud administrator needs to coordinate and automate the management of a company's secrets and keys for all its cloud services with minimal effort and low cost. Which of the following is the BEST option to achieve the goal?

A.

Implement database as a service

B.

Configure Key Vault

C.

Use password as a service

D.

Implement KeePass

Full Access
Question # 67

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance has been slow since the images were upgraded from Windows 7 to Windows 10.

This VDI environment is used to run simple tasks, such as Microsoft Office. The administrator investigates the virtual machines and finds the following settings:

  • 4 vCPU
  • 16GB RAM
  • 10Gb networking
  • 256MB frame buffer

Which of the following MOST likely needs to be upgraded?

A.

vRAM

B.

vCPU

C.

vGPU

D.

vNIC

Full Access
Question # 68

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?

A.

MTTF

B.

SLA

C.

RTO

D.

RPO

Full Access
Question # 69

Users currently access SaaS email with five-character passwords that use only letters and numbers. An administrator needs to make access more secure without changing the password policy. Which of the following will provide a more secure way of accessing email at the lowest cost?

A.

Change the email service provider.

B.

Enable MFA with a one-time password.

C.

Implement SSO for all users.

D.

Institute certificate-based authentication

Full Access
Question # 70

A company wants to move to a multicloud environment and utilize the technology that provides the most portability. Which of the following technology solutions would BEST meet the company's needs?

A.

Bootstrap

B.

Virtual machines

C.

Clusters

D.

Containers

Full Access
Question # 71

An organization has the following requirements that need to be met when implementing cloud services:

  • SSO to cloud infrastructure
  • On-premises directory service
  • RBAC for IT staff

Which of the following cloud models would meet these requirements?

A.

Public

B.

Community

C.

Hybrid

D.

Multitenant

Full Access
Question # 72

A cloud administrator is responsible for managing a VDI environment that provides end users with access to limited applications. Which of the following should the administrator make changes to when a new application needs to be provided?

A.

Application security policy

B.

Application whitelisting policy

C.

Application hardening policy

D.

Application testing policy

Full Access
Question # 73

A web application has been configured to use autoscaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new CI/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now. the autoscaling configuration is creating a new VM ever\ five minutes. Which of the following actions will MOS I like y resolve the issue?

A.

Reducing the maximum threshold in the autoscaling configuration

B.

Debugging the script and redeploying it

C.

Changing the automation tool because it is incompatible

D.

Modifying the script to shut down the VM after five minutes

Full Access
Question # 74

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).

A.

A load balancer

B.

SON

C.

A firewall

D.

SR-IOV

E.

Storage replication

F.

A VPN

Full Access
Question # 75

A cloud administrator would like to maintain file integrity checks through hashing on a cloud object store. Which of the following is MOST suitable from a performance perspective?

A.

SHA-256

B.

SHA-512

C.

MD5

D.

AES

Full Access
Question # 76

A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?

A.

RAID 5

B.

RAID 6

C.

RAID 10

D.

RAID 50

Full Access
Question # 77

A cloud engineer has deployed a virtual storage appliance into a public cloud environment. The storage appliance has a NAT to a public IP address. An administrator later notices there are some strange files on the storage appliance and a large spike in network traffic on the machine. Which of the following is the MOST likely cause?

A.

The default password is still configured on the appliance.

B.

The appliance's certificate has expired.

C.

The storage appliance has no firewall.

D.

Data encryption is enabled, and the files are hashed.

Full Access
Question # 78

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks. After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

A.

The target system's API functionality has been deprecated.

B.

The password for the service account has expired.

C.

The IP addresses of the target system have changed.

D.

The target system has failed after the updates.

Full Access
Question # 79

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?

A.

Store the credentials in a variable on every worker node

B.

Store the credentials on a shared volume using whole-disk encryption

C.

Store the credentials in a configuration file using SHA-256 inside the container image

D.

Store the credentials using the orchestrator secret manager

Full Access
Question # 80

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?

A.

HTTPS

B.

IPSec

C.

TLS

D.

SSH

Full Access
Question # 81

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Select TWO).

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPI-J resources

F.

License issues

Full Access
Question # 82

A storage administrator is reviewing the storage consumption of a SAN appliance that is running a VDI environment. Which of the following features should the administrator implement to BEST reduce the storage consumption of the SAN?

A.

Deduplication

B.

Thick provisioning

C.

Compression

D.

SDS

Full Access
Question # 83

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?

A.

Log monitoring

B.

Patch management

C.

Vulnerability scanning

D.

System hardening

Full Access
Question # 84

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Full Access
Question # 85

A cloud administrator is configuring several security appliances hosted in the private laaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?

A.

Allow UDP 161 outbound from the web servers to the log collector .

B.

Allow TCP 514 outbound from the web servers to the log collector.

C.

Allow UDP 161 inbound from the log collector to the web servers .

D.

Allow TCP 514 inbound from the log collector to the web servers .

Full Access
Question # 86

Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue?

A.

Perform a memory dump of the OS.

Analyze the memory dump.

Upgrade the host CPU to a higher clock speed CPU.

B.

Perform a packet capture during authentication.

Validate the load-balancing configuration.

Analyze the network throughput of the load balancer.

C.

Analyze the storage system IOPS.

Increase the storage system capacity.

Replace the storage system disks to SSD.

D.

Evaluate the OS ACLs.

Upgrade the router firmware.

Increase the memory of the router.

Full Access
Question # 87

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Which of the following actions should the analyst take to accomplish the objective?

A.

Remove rules 1, 2, and 5.

B.

Remove rules 1, 3, and 4.

C.

Remove rules 2, 3, and 4.

D.

Remove rules 3, 4, and 5.

Full Access
Question # 88

A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements:

No downtime

Instant switch to a new version using traffic control for all users

Which of the following deployment strategies would be the BEST solution?

A.

Hot site

B.

Blue-green

C.

Canary

D.

Rolling

Full Access
Question # 89

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

A.

The target system's API functionality has been deprecated

B.

The password for the service account has expired

C.

The IP addresses of the target system have changed

D.

The target system has failed after the updates

Full Access
Question # 90

A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?

A.

SNMPv3

B.

Community strings

C.

IPSec tunnels

D.

ACLs

Full Access
Question # 91

A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue?

A.

Check the FAQ section of the vendor's documentation.

B.

Ask the user if the client device or access location has changed.

C.

Reboot the user's virtual desktop.

D.

Request permission to log in to the device remotely.

Full Access
Question # 92

A cloud administrator would like to deploy a cloud solution to its provider using automation techniques. Which of the following must be used? (Choose two.)

A.

Auto-scaling

B.

Tagging

C.

Playbook

D.

Templates

E.

Containers

F.

Serverless

Full Access
Question # 93

After a hardware upgrade on a private cloud system, the systems administrator notices a considerable drop in network performance. Which of the following is MOST likely the cause?

A.

The driver

B.

The memory

C.

The cluster placement

D.

The CPU

Full Access
Question # 94

A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring the VM uses only the storage if needs. Which of the following will BEST achieve this goal?

A.

Compression

B.

Deduplication

C.

RAID

D.

Thin provisioning

Full Access
Question # 95

A cloud architect is reviewing four deployment options for a new application that will be hosted by a public cloud provider. The application must meet an SLA that allows for no more than five hours of downtime annually. The cloud architect is reviewing the SLAs for the services each option will use:

Based on the information above, which of the following minimally complies with the SLA requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 96

A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?

A.

A service availability scan

B.

An agent-based vulnerability scan

C.

A default and common credentialed scan

D.

A network port scan

Full Access
Question # 97

A security analyst is investigating a recurring alert. The alert is reporting an insecure firewall configuration state after every cloud application deployment. The process of identifying the issue, requesting a fix, and waiting for the developers to manually patch the environment is being repeated multiple times. In an effort to identify the root issue, the following logs were collected:

Deploying template app prod. •yaml

Instance DB successfully created

DB keys successfully stored on vault

Instance WebApp successfully created

Access rules successfully applied

Access—keys successfully created

Which of the following options will provide a permanent fix for the issue?

A.

Validate the Iac code used during the deployment.

B.

Avoid the use of a vault to store database passwords.

C.

Rotate the access keys that were created during deployment.

D.

Recommend that the developers do not create multiple resources at once.

Full Access
Question # 98

A cloud administrator used a deployment script to recreate a number of servers hosted in a public-cloud provider_ However, after the script completes, the administrator receives the following error when attempting to connect to one of the servers Via SSH from the administrators workstation: CHANGED. Which of the following IS the MOST likely cause of the issue?

A.

The DNS records need to be updated

B.

The cloud provider assigned a new IP address to the server.

C.

The fingerprint on the server's RSA key is different

D.

The administrator has not copied the public key to the server.

Full Access
Question # 99

A web consultancy group currently works in an isolated development environment. The group uses this environment for the creation of the final solution, but also for showcasing it to customers, before commissioning the sites in production. Recently, customers of newly commissioned sites have reported they are not receiving the final product shown by the group, and

the website is performing in unexpected ways. Which of the following additional environments should the group adopt and include in its process?

A.

Provide each web consultant a local environment on their device.

B.

Require each customer to have a blue-green environment.

C.

Leverage a staging environment that is tightly controlled for showcasing.

D.

Initiate a disaster recovery environment to fail to in the event of reported issues.

Full Access
Question # 100

A company would like to move all its on-premises platforms to the cloud. The company has enough skilled Linux and web-server engineers but only a couple of skilled database administrators. It also has little expertise in managing email services. Which of the following solutions would BEST match the skill sets of available personnel?

A.

Run the web servers in PaaS, and run the databases and email in SaaS.

B.

Run the web servers, databases, and email in SaaS.

C.

Run the web servers in laaS, the databases in PaaS, and the email in SaaS.

D.

Run the web servers, databases, and email in laaS.

Full Access
Question # 101

A company has a large environment with multiple VPCs across three regions in a public cloud. The company is concerned about connectivity within the regions. Which of the following should the cloud administrator implement?

A.

Peering

B.

A firewall

C.

Network access control

D.

A load balancer

Full Access
Question # 102

A cloud administrator is reviewing the current private cloud and public laaS environment, and is building an optimization plan. Portability is of great concern for the administrator so resources can be easily moved from one environment to another.

Which of the following should the administrator implement?

A.

Serverless

B.

CDN

C.

Containers

D.

Deduplication

Full Access
Question # 103

A systems administrator is planning to deploy a database cluster in a virtualization environment. The administrator needs to ensure the database nodes do not exist on the same physical host. Which of the following would best meet this requirement?

A.

Oversubscription

B.

Anti-affinity

C.

A firewall

D.

A separate cluster

Full Access
Question # 104

A cloud engineer needs to perform a database migration. The database has a restricted SLA and cannot be offline for more than ten minutes per month. The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps Which of the following is the best option to perform the migration?

A.

Copy the database to an external device and ship the device to the CSP.

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-party tool to back up and restore the data to the new database.

D.

Use the database import/export method and copy the exported file.

Full Access
Question # 105

A cloud engineer needs to perform a database migration_ The database has a restricted SLA and cannot be offline for more than ten minutes per month The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps. Which of the following is the BEST option to perform the migration?

A.

Copy the database to an external device and ship the device to the CSP

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-patty tool to back up and restore the data to the new database

D.

use the database import/export method and copy the exported file.

Full Access
Question # 106

A corporation is evaluating an offer from a CSP to take advantage of volume discounts on a shared platform. The finance department is concerned about cost allocation transparency, as the current structure splits projects into dedicated billing accounts. Which of the following can be used to address this concern?

A.

Implementing resource tagging

B.

Defining a cost baseline

C.

Consolidating the billing accounts

D.

Using a third-party accounting tool

Full Access
Question # 107

A Cloud administrator needs to reduce storage costs. Which of the following would BEST help the administrator reach that goal?

A.

Enabling compression

B.

Implementing deduplication

C.

Using containers

D.

Rightsizing the VMS

Full Access
Question # 108

A VDI administrator is enhancing the existing environment with a feature to allow users to connect devices to virtual workstations. Which of the following types of devices are most likely to be allowed in the upgrade? (Select two).

A.

Display monitors

B.

USB devices

C.

SATA devices

D.

PCIe devices

E.

PCI devices

F.

Printers

Full Access
Question # 109

The Chief Information Officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud. The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information. Which of the following should be configured during the migration?

A.

ACL

B.

VPN

C.

P2V

D.

VDI

Full Access
Question # 110

A cloud administrator is looking at the company's cloud services bill for the previous month. The administrator notices on the billing dashboard that certain resources are not being billed to any particular department. Which of the following actions will help correct this billing issue?

A.

Check the utilization of the resources.

B.

Modify the chargeback details of the consumer.

C.

Add the resources to the consumer monitoring group.

D.

Modify the tags for all the unmapped resources.

Full Access
Question # 111

A company is using laaS services from two different providers: one for its primary site, and the other for a secondary site. The primary site is completely inaccessible, and the management team has decided to run through the BCP procedures. Which of the following will provide the complete asset information?

A.

DR replication document

B.

DR playbook

C.

DR policies and procedures document

D.

DR network diagram

Full Access
Question # 112

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator most likely use?

A.

An API gateway

B.

An IPS/IDS

C.

A reverse proxy

D.

A WAF

Full Access
Question # 113

A systems administrator is selecting the appropriate RAID level to support a private cloud with the following requirements:

. The storage array must withstand the failure of up to two drives.

. The storage array must maximize the storage capacity of its drives.

Which of the following RAID levels should the administrator implement?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Full Access
Question # 114

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Full Access
Question # 115

An organization provides integration services for finance companies that use web services. A new company that sends and receives more than 100,000 transactions per second has been integrated using the web service. The other integrated companies are now reporting slowness with regard to the integration service. Which of the following is the cause of the issue?

A.

Incorrect configuration in the authentication process

B.

Incorrect configuration in the message queue length

C.

Incorrect configuration in user access permissions

D.

Incorrect configuration in the SAN storage pool

Full Access
Question # 116

A cloud administrator is performing automated deployment of cloud infrastructure for clients. The administrator notices discrepancies from the baseline in the configuration of infrastructure that was deployed to a new client. Which of the following is most likely the cause?

A.

The deployment user account changed

B.

The deployment was done to a different resource group.

C.

The deployment was done by a different cloud administrator.

D.

The deployment template was modified.

Full Access
Question # 117

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Full Access
Question # 118

A systems administrator is reviewing the logs from a company's IDS and notices a large amount of outgoing traffic from a particular server. The administrator then runs a scan on the server, which detects malware that cannot be removed. Which of the following should the administrator do first?

A.

Determine the root cause.

B.

Disconnect the server from the network.

C.

Perform a more intrusive scan.

D.

Restore the server from a backup.

Full Access
Question # 119

As a result of an IT audit, a customer has decided to move some applications from an old legacy system to a private cloud. The current server location is remote with low bandwidth. Which of the following is the best migration strategy to use for this deployment?

A.

P2V with physical data transport

B.

P2P with remote data copy

C.

V2V with physical data transport

D.

V2P with physical data transport

E.

V2P with remote data copy

Full Access
Question # 120

A systems administrator is attempting to gather information about services and resource utilization on VMS in a cloud environment. Which of the following will BEST accomplish this objective?

A.

Syslog

B.

SNMP

C.

CMDB

D.

Service management

E.

Performance monitoring

Full Access
Question # 121

Different healthcare organizations have agreed to collaborate and build a cloud infrastructure that should minimize compliance costs and provide a high degree of security and privacy, as per regulatory requirements. This is an example of a:

A.

private cloud.

B.

community cloud.

C.

hybrid cloud.

D.

public cloud.

Full Access
Question # 122

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?

A.

Upgrading the physical server NICs to support 10Gbps

B.

Adding more vCPU

C.

Enabling SR-IOV capability

D.

Increasing the VM swap/paging size

Full Access
Question # 123

A company's marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?

A.

GPU passthrough

B.

Increased memory

C.

Converged infrastructure

D.

An additional CPU core

Full Access
Question # 124

An organization is implementing a new requirement to facilitate faster downloads for users of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?

A.

Implement CDN for overall cloud application.

B.

Implement autoscaling of the compute resources.

C.

Implement SR-IOV on the server instances.

D.

Implement an application container solution.

Full Access
Question # 125

Full Access