Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)

A.

Identify the resources that are accessible to the affected IAM user

B.

Remove the published plain-text password

C.

Notify users that a data breach has occurred

D.

Change the affected IAM user’s password

E.

Delete the affected IAM user

Full Access
Question # 5

A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web- based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.

The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment.

Which of the following is the MOST likely reason for this issue?

A.

The license limit on the number of server deployments allowed per month was exceeded

B.

The deployment script changes made by the first administrator were not checked in and committed

C.

The new server images were incompatible with the application load-balancer configuration

D.

The application load balancer exceeded the maximum number of servers it could use

Full Access
Question # 6

Due to a policy change, a few of a customer’s application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%.

Which of the following is the MOST likely cause?

A.

There is not enough vCPU assigned

B.

The application is not compatible with the new settings

C.

The new configuration is adding latency

D.

The memory of the VM is underallocated

Full Access
Question # 7

An organization has two businesses that are developing different software products. They are using a single cloud provider with multiple IaaS instances. The organization identifies that the tracking of costs for each

business are inaccurate.

Which of the following is the BEST method for resolving this issue?

A.

Perform segregation of the VLAN and capture egress and ingress values of each network interface

B.

Tag each server with a dedicated cost and sum them based on the businesses

C.

Split the total monthly invoice equally between the businesses

D.

Create a dedicated subscription for the businesses to manage the costs

Full Access
Question # 8

A marketing team is using a SaaS-based service to send emails to large groups of potential customers. The internally managed CRM system is configured to generate a list of target customers automatically on a weekly basis, and then use that list to send emails to each customer as part of a marketing campaign. Last week, the first email campaign sent emails successfully to 3,000 potential customers. This week, the email campaign

attempted to send out 50,000 emails, but only 10,000 were sent.

Which of the following is the MOST likely reason for not sending all the emails?

A.

API request limit

B.

Incorrect billing account

C.

Misconfigured auto-scaling

D.

Bandwidth limitation

Full Access
Question # 9

An organization will be deploying a web application in a public cloud with two web servers, two database servers, and a load balancer that is accessible over a single public IP.

Taking into account the gateway for this subnet and the potential to add two more web servers, which of the following will meet the minimum IP requirement?

A.

192.168.1.0/26

B.

192.168.1.0/27

C.

192.168.1.0/28

D.

192.168.1.0/29

Full Access
Question # 10

A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality?

A.

NAC

B.

IDS

C.

DLP

D.

EDR

Full Access
Question # 11

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPU resources

F.

License issues

Full Access
Question # 12

A cloud administrator has built a new private cloud environment and needs to monitor all computer, storage, and network components of the environment.

Which of the following protocols would be MOST useful for this task?

A.

SMTP

B.

SCP

C.

SNMP

D.

SFTP

Full Access
Question # 13

A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier.

Which of the following access control rules should be changed?

A.

Discretionary-based

B.

Attribute-based

C.

Mandatory-based

D.

Role-based

Full Access
Question # 14

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs.

Which of the following should be verified NEXT?

A.

Application

B.

SAN

C.

VM GPU settings

D.

Network

Full Access
Question # 15

After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message.

Which of the following should the administrator verify NEXT?

A.

The TLS certificate

B.

The firewall rules

C.

The concurrent connection limit

D.

The folder permissions

Full Access
Question # 16

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Full Access
Question # 17

A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content.

Which of the following solutions will assist with the increased workload?

A.

DoH

B.

WAF

C.

IPS

D.

CDN

Full Access
Question # 18

A systems administrator would like to reduce the network delay between two servers.

Which of the following will reduce the network delay without taxing other system resources?

A.

Decrease the MTU size on both servers

B.

Adjust the CPU resources on both servers

C.

Enable compression between the servers

D.

Configure a VPN tunnel between the servers

Full Access
Question # 19

An administrator is performing an in-place upgrade on a quest VM operating system.

Which of the following can be performed as a quick method to roll back to an earlier state, if necessary?

A.

A configuration file backup

B.

A full backup of the database

C.

A differential backup

D.

A VM-level snapshot

Full Access
Question # 20

A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.

This is an example of:

A.

a storage area network

B.

a network file system

C.

hyperconverged storage

D.

thick-provisioned disks

Full Access
Question # 21

An organization’s web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization’s web server infrastructure.

Which of the following should be implemented to prevent this in the future as a mitigation method?

A.

Enable DLP

B.

Configure microsegmentation

C.

Enable DNSSEC

D.

Deploy a vADC appliance

Full Access
Question # 22

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

A.

Performance testing

B.

Penetration testing

C.

Vulnerability testing

D.

Regression testing

Full Access
Question # 23

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Full Access
Question # 24

Lateral-moving malware has infected the server infrastructure.

Which of the following network changes would MOST effectively prevent lateral movement in the future?

A.

Implement DNSSEC in all DNS servers

B.

Segment the physical network using a VLAN

C.

Implement microsegmentation on the network

D.

Implement 802.1X in the network infrastructure

Full Access
Question # 25

A cloud administrator is building a new VM for a network security appliance. The security appliance installer says the CPU clock speed does not meet the requirements.

Which of the following will MOST likely solve the issue?

A.

Move the VM to a host with a faster CPU

B.

Add more vCPUs to the VM

C.

Enable CPU masking on the VM

D.

Enable hyperthreading on the virtual host

Full Access
Question # 26

An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team.

Which of the following controls will BEST mitigate the risk of exploitation?

A.

DLP

B.

HIDS

C.

NAC

D.

WAF

Full Access
Question # 27

A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:

    High availability

    Horizontal auto-scaling

    60 nodes peak capacity per region

    Five reserved network IP addresses per subnet

    /24 range

Which of the following would BEST meet the above requirements?

A.

Create two /25 subnets in different regions

B.

Create three /25 subnets in different regions

C.

Create two /26 subnets in different regions

D.

Create three /26 subnets in different regions

E.

Create two /27 subnets in different regions

F.

Create three /27 subnets in different regions

Full Access
Question # 28

Users currently access SaaS email with five-character passwords that use only letters and numbers. An administrator needs to make access more secure without changing the password policy. Which of the following will provide a more secure way of accessing email at the lowest cost?

A.

Change the email service provider.

B.

Enable MFA with a one-time password.

C.

Implement SSO for all users.

D.

Institute certificate-based authentication

Full Access
Question # 29

An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources.

Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?

A.

Dedicated

B.

Shared

C.

Passthrough

D.

vGPU

Full Access
Question # 30

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Full Access
Question # 31

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A – The end user accesses the application through a web browser to enter and view clinical data.

2A – The CTM application server reads/writes data to/from the database server.

1B – The end user accesses the application through a web browser to run reports on clinical data.

2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B – The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 32

A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled.

Which of the following techniques would BEST help the administrator assess these business requirements?

A.

Performance testing

B.

Usability testing

C.

Vulnerability testing

D.

Regression testing

Full Access
Question # 33

A cloud engineer is responsible for a legacy web application that runs on an on-premises VM environment. The VM environment is approaching end of life. The engineer needs to migrate the web application to the cloud as quickly as possible because the VM environment has the following limitations:

• The VM environment has a single IOGB disk.

• The VM environment still uses 10Mbps, which leaves a 100Mbps WAN connection underutilized.

• No installation media is available.

Which of the following is the best way to migrate the web application to the cloud?

A.

Use the VM import connector to import the VM into the cloud.

B.

Use import/export to import the VM as a snapshot and attach it to a cloud instance.

C.

Use REST APIs to import an image of the VM into the cloud.

D.

Use object storage to create a backup of the VM and restore data into the cloud instance.

Full Access
Question # 34

Several users are able to access internal company resources with corporate credentials; however, when they try to log in to external SaaS applications, the users are redirected back to the log-in page. Which of the following is the most likely cause of the issue?

    The SaaS provider is experiencing an outage with its directory service.

    A new company policy requires all users to reset passwords.

    MFA on the internal company authentication service is misconfigured.

    The SSL certificate on the external SaaS application is expired.

A.

A new security policy turned off cookies on the users' browsers.

Full Access
Question # 35

A systems administrator received a report stating resumes submitted through the company's website are being exposed at the URL https://careers.company.com/upload/. Which of the following actions should the administrator take to fix the issue?

A.

Remove write permissions to the folder /upload/.

B.

Implement file integrity monitoring.

C.

Reconfigure the folder /upload/ to request authentication.

D.

Implement a DLP solution.

E.

Implement encryption in transit.

Full Access
Question # 36

A systems administrator has a redundant backup system in place. Which of the following should the systems administrator perform to maintain efficient operation and comply with the global standard in the corporate backup policies?

A.

Modify RTO policies.

B.

Confirm completion of the backups.

C.

Test the backups.

D.

Modify RPO policies.

Full Access
Question # 37

A cloud administrator needs to implement a new system within the current CSR The system requires a storage service to allocate a large number of digital files and images. The storage service must keep files for distributed access and serve images directly to the user's browser. Which of the following solutions would best meet these requirements?

A.

NAS storage

B.

Object storage

C.

File storage

D.

Block storage

Full Access
Question # 38

A company plans to publish a new application and must conform with security standards. Which of the following types of testing are most important for the systems administrator to run to assure the security and compliance of the application before publishing? (Select two).

A.

Regression testing

B.

Vulnerability testing

C.

Usability testing

D.

Functional testing

E.

Penetration testing

F.

Load testing

Full Access
Question # 39

A VDI administrator is enhancing the existing environment with a feature to allow users to connect devices to virtual workstations. Which of the following types of devices are most likely to be allowed in the upgrade? (Select two).

A.

Display monitors

B.

USB devices

C.

SATA devices

D.

PCIe devices

E.

PCI devices

F.

Printers

Full Access
Question # 40

A company would like to move all its on-premises platforms to the cloud. The company has enough skilled Linux and web-server engineers but only a couple of skilled database administrators. It also has little expertise in managing email services. Which of the following solutions would BEST match the skill sets of available personnel?

A.

Run the web servers in PaaS, and run the databases and email in SaaS.

B.

Run the web servers, databases, and email in SaaS.

C.

Run the web servers in laaS, the databases in PaaS, and the email in SaaS.

D.

Run the web servers, databases, and email in laaS.

Full Access
Question # 41

An organization's two-node, hybrid container cluster is experiencing failures during horizontal scaling to the cloud cluster instance. The on-premises IP range is 192.168.0.0/16, and the cloud environment is 10.168.0.0/16. Overlapping or stretched VLANs are not permitted, and a node is deployed in each location. The cloud monitoring agent reports a healthy status for the second instance, but when pinging the clusters from on premises, the following output is received:

pinging cluster1. comptia. containers.com C192.168.100 reply

pinging cluster2. comptia. containers.com [192.16B .100 .128] request timed out

Which of the following is the most likely reason for the scaling failure?

A.

Incorrect DNS entry

B.

Offline cluster node

C.

Incorrect proxy entry

D.

Incorrect cluster IP

E.

Incorrect IP route

Full Access
Question # 42

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Full Access
Question # 43

An enterprise is considering a cost model for a DBaaS. Which of the following is BEST for a cloud solution?

A.

per gigabyte

B.

per seat

C.

Per user

D.

Per device

Full Access
Question # 44

A cloud administrator needs to reduce storage costs. Which of the following would best help the administrator reach that goal?

A.

Enabling compression

B.

Implementing deduplication

C.

Using containers

D.

Rightsizing the VMs

Full Access
Question # 45

A cloud administrator is configuring a CDN for an organization’s website to improve performance for users in remote regions. Which of the following CDN features will help achieve this goal?

A.

Compression of content.

B.

Content replication to edge locations.

C.

Dynamic request routing.

D.

Content deduplication.

Full Access
Question # 46

A systems administrator is troubleshooting a VDI deployment that is used to run high-frame-rate rendering. Users are reporting frequent application crashes. After running a benchmark, the administrator discovers the following:

Which of the following should the administrator do to resolve this issue?

A.

Configure the GPU to run in compute mode.

B.

Allocate more RAM in the VM template.

C.

Select a higher vGPU profile.

D.

Configure the GPU to run in graphics mode.

Full Access
Question # 47

A cloud architect is designing a solution to handle unstructured data with high scalability requirements. Which of the following storage options would be the best fit?

A.

Block storage.

B.

Object storage.

C.

File storage.

D.

Tiered storage.

Full Access
Question # 48

A systems administrator is diagnosing performance issues on a web application. The web application sends thousands of extremely complex SQL queries to a database server, which has trouble retrieving the information in time. The administrator checks the database server and notes the following resource utilization:

    CPU: 64%

    RAM: 97%

    Network throughput: 384/1000 Kbps

    Disk throughput: 382,700 Kbps

The administrator also notices that the storage for the database server is consistently near its IOPS limit. Which of the following will best resolve these performance issues?

A.

Increase CPU resources on the database server.

B.

Increase caching on the database server.

C.

Put the storage and the database on the same VLAN.

D.

Enable compression on storage traffic.

E.

Enable deduplication on the storage appliance.

Full Access
Question # 49

A cloud architect is receiving complaints from VDI users overseas about slowness, even though the remote office has Gigabit internet. Which of the following will most likely solve the issue?

A.

Increasing bandwidth.

B.

Enabling compression.

C.

Lowering latency.

D.

Adding redundancy.

Full Access
Question # 50

A systems administrator receives an alert that VDI performance on the cluster is poor. Opening any application takes one to two minutes. The administrator investigates and finds the following conditions:

    Cluster memory utilization: 65%

    Cluster SSD utilization: 70%

    Average VM CPU wait time: 14%

    Cluster CPU utilization: 75%

Which of the following actions should the administrator take to improve VDI performance?

A.

Add CPU resources to the cluster.

B.

Increase the number of vCPUs per VM.

C.

Add memory to the nodes in the cluster.

D.

Increase the amount of SSD storage in the cluster.

Full Access
Question # 51

A company has a web application that is accessed around the world. An administrator has been notified of performance issues regarding the application. Which of the following will BEST improve performance?

A.

IPAM

B.

SDN

C.

CDN

D.

VPN

Full Access
Question # 52

A company's marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?

A.

GPU passthrough

B.

Increased memory

C.

Converged infrastructure

D.

An additional CPU core

Full Access
Question # 53

A cloud solutions architect is working on a private cloud environment in which storage consumption is increasing daily, resulting in high costs. Which of the following can the architect use to provide more space without adding more capacity? (Select two).

A.

Tiering

B.

Deduplication

C.

RAID provisioning

D.

Compression

E.

Flash optimization

F.

NVMe

Full Access
Question # 54

An organization hosts an ERP database in on-premises infrastructure. A recommendation has been made to migrate the ERP solution to reduce operational overhead in the maintenance of the data center. Which of the following should be considered when migrating this on-premises database to DBaaS?

    • Database application version compatibility

• Database IOPS values

• Database storage utilization

    • Physical database server CPU cache value

• Physical database server DAS type

• Physical database server network I/O

    • Database total user count

• Database total number of tables

• Database total number of storage procedures

• Physical database server memory configuration

• Physical database server CPU frequency

A.

• Physical database server operating system

Full Access
Question # 55

An IT administrator is implementing security controls on an OS. Which of the following will provide the best protection against a brute-force attack? (Select two).

A.

Implementing MFA

B.

Enforcing strong passwords

C.

Configuring user passwords to change every 30 days

D.

Limiting failed log-in requests

E.

Using API keys

F.

Implementing SSH keys

Full Access
Question # 56

The Chief Information Officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud. The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information. Which of the following should be configured during the migration?

A.

ACL

B.

VPN

C.

P2V

D.

VDI

Full Access
Question # 57

A systems administrator automates a series of tasks in a playbook and receives the following error during testing:

"Unable to find any of pip2, pip to use. pip needs to be installed."

The administrator verifies that pip is installed correctly. Which of the following actions will most likely resolve this issue?

A.

Ensure pip is up to date.

B.

Create a firewall rule to allow pip.

C.

Refactor the automation code.

D.

Update the system path.

Full Access
Question # 58

A cloud administrator created four VLANs to autoscale the container environment. Two of the VLANs are on premises, while two VLANs are on a public cloud provider with a direct link between them. Firewalls are between the links with an additional subnet for communication, which is 192.168.5.0/24.

The on-premises gateways are:

192.168.1.1/24

192.168.2.1/24

The cloud gateways are:

192.168.3.1/24

192.168.4.1/24

The orchestrator is unable to communicate with the cloud subnets. Which Of the following should the administrator do to resolve the issue?

A.

Allow firewall traffic to 192.168.5.0/24.

B.

Set both firewall interfaces to 192.168.5.1/24.

C.

Add interface 192.168.3.1/24 on the local firewall.

D.

Add interface 192.168.1.1/24 on the cloud firewall.

Full Access
Question # 59

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?

A.

Upgrading the physical server NICs to support IOGbps

B.

Adding more vCPU

C.

Enabling SR-IOV capability

D.

Increasing the VM swap/paging size

Full Access
Question # 60

A web consultancy group currently works in an isolated development environment. The group uses this environment for the creation of the final solution, but also for showcasing it to customers, before commissioning the sites in production. Recently, customers of newly commissioned sites have reported they are not receiving the final product shown by the group, and

the website is performing in unexpected ways. Which of the following additional environments should the group adopt and include in its process?

A.

Provide each web consultant a local environment on their device.

B.

Require each customer to have a blue-green environment.

C.

Leverage a staging environment that is tightly controlled for showcasing.

D.

Initiate a disaster recovery environment to fail to in the event of reported issues.

Full Access
Question # 61

A cloud administrator needs to deploy a security virtual appliance in a private cloud environment, but this appliance will not be part of the standard catalog of items for other users to request. Which of the following is the BEST way to accomplish this task?

A.

Create an empty VM. import the hard disk of the virtual appliance. and configure the CPU and memory.

B.

Acquire the build scripts from the vendor and recreate the appliance using the baseline templates

C.

Import the virtual appliance into the environment and deploy it as a VM

D.

Convert the virtual appliance to a template and deploy a new VM using the template.

Full Access
Question # 62

A cloud engineer needs to perform a database migration. The database has a restricted SLA and cannot be offline for more than ten minutes per month. The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps Which of the following is the best option to perform the migration?

A.

Copy the database to an external device and ship the device to the CSP.

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-party tool to back up and restore the data to the new database.

D.

Use the database import/export method and copy the exported file.

Full Access
Question # 63

An organization's security team must determine the likelihood of a breach on its external-facing websites. Which of the following would be best to identify the organization’s chances of incurring a breach?

A.

Regression testing.

B.

Functional testing.

C.

Vulnerability scanning.

D.

Penetration testing.

Full Access
Question # 64

An organization that currently stores a set of documents in the cloud is concerned about potential loss if these documents are accidentally deleted. Which of the following is the best way for the organization to quickly recover a lost file?

A.

Enabling deduplication on the cloud storage.

B.

Enabling versioning for the underlying cloud storage.

C.

Creating an identity and access management policy.

D.

Creating a single snapshot of the cloud storage.

Full Access
Question # 65

A cloud engineer is migrating a customer's web servers from a hypervisor platform to a CSP environment. The engineer needs to decouple the infrastructure and components during the migration to reduce the single points of failure. Which of the following storage options should the cloud engineer migrate the content to in order to improve availability?

A.

Block

B.

File

C.

Object

D.

iSCSI

E.

NFS

Full Access
Question # 66

A security analyst is investigating a recurring alert. The alert is reporting an insecure firewall configuration state after every cloud application deployment. The process of identifying the issue, requesting a fix, and waiting for the developers to manually patch the environment is being repeated multiple times. In an effort to identify the root issue, the following logs were collected:

Deploying template app prod. •yaml

Instance DB successfully created

DB keys successfully stored on vault

Instance WebApp successfully created

Access rules successfully applied

Access—keys successfully created

Which of the following options will provide a permanent fix for the issue?

A.

Validate the Iac code used during the deployment.

B.

Avoid the use of a vault to store database passwords.

C.

Rotate the access keys that were created during deployment.

D.

Recommend that the developers do not create multiple resources at once.

Full Access
Question # 67

A cloud administrator is assigned to establish a connection between the on-premises data center and the new CSP infrastructure. The connection between the two locations must be secure at all times and provide service for all users inside the organization. Low latency is also required to improve performance during data transfer operations. Which of the following would BEST meet these requirements?

A.

A VPC peering configuration

B.

An IPSec tunnel

C.

An MPLS connection

D.

A point-to-site VPN

Full Access
Question # 68

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it.

Which of the following configuration options would BEST meet this requirement?

A.

Virtual GPU

B.

External GPU

C.

Passthrough GPU

D.

Shared GPU

Full Access
Question # 69

To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public DBaaS solution. Which of the following would be the BEST technique?

A.

Live migration

B.

Physical-to-virtual

C.

Storage-level mirroring

D.

Database replication

Full Access
Question # 70

An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used?

A.

Thick provisioning

B.

Software-defined storage

C.

User quotas

D.

Network file system

Full Access
Question # 71

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Full Access
Question # 72

A technician needs to deploy two virtual machines in preparation for the configuration of a financial application next week. Which of the following cloud deployment models should the technician use?

A.

XaaS

B.

IaaS

C.

PaaS

D.

SaaS

Full Access
Question # 73

After a few new web servers were deployed, the storage team began receiving incidents in their queue about the web servers. The storage administrator wants to verify the incident tickets that should have gone to the web server team. Which of the following is the MOST likely cause of the issue?

A.

Incorrect assignment group in service management

B.

Incorrect IP address configuration

C.

Incorrect syslog configuration on the web servers

D.

Incorrect SNMP settings

Full Access
Question # 74

An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort. Which of the following ports needs to be opened to fulfill this requirement?

A.

53

B.

67

C.

123

D.

161

Full Access
Question # 75

A support engineer wants to prevent users from running malware on several IaaS compute instances. Which of the following will BEST achieve this objective?

A.

Encrypt all applications that users should not access.

B.

Set the execute filesystem permissions on the desired applications only.

C.

Implement an application whitelisting policy.

D.

Disable file sharing on the instance.

Full Access
Question # 76

An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?

A.

Logs on the VM

B.

Firewall on the VM

C.

Memory on the VM

D.

vGPU performance on the VM

Full Access
Question # 77

A cloud architect is reviewing four deployment options for a new application that will be hosted by a public cloud provider. The application must meet an SLA that allows for no more than five hours of downtime annually. The cloud architect is reviewing the SLAs for the services each option will use:

Based on the information above, which of the following minimally complies with the SLA requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 78

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Full Access
Question # 79

Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization?

A.

Auto-scaling of compute

B.

Oversubscription

C.

Dynamic memory allocations on guests

D.

Affinity rules in the hypervisor

Full Access
Question # 80

A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity?

A.

Patch management

B.

Hardening

C.

Scaling

D.

Log and event monitoring

Full Access
Question # 81

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?

A.

Virtual machines

B.

Software as a service

C.

Serverless computing

D.

Containers

Full Access
Question # 82

A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?

A.

Alternate location

B.

Rolling

C.

Storage live migration

D.

In-place

Full Access
Question # 83

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

A.

Internet of Things

B.

Digital transformation

C.

Artificial intelligence

D.

DNS over TLS

Full Access
Question # 84

Which of the following cloud services is fully managed?

A.

IaaS

B.

GPU in the cloud

C.

IoT

D.

Serverless compute

E.

SaaS

Full Access
Question # 85

A company needs to access the cloud administration console using its corporate identity. Which of the following actions would MOST likely meet the requirements?

A.

Implement SSH key-based authentication.

B.

Implement cloud authentication with local LDAP.

C.

Implement multifactor authentication.

D.

Implement client-based certificate authentication.

Full Access
Question # 86

A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring the VM uses only the storage if needs. Which of the following will BEST achieve this goal?

A.

Compression

B.

Deduplication

C.

RAID

D.

Thin provisioning

Full Access
Question # 87

A Chief Information Security Officer (CISO) is evaluating the company’s security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?

A.

An SLA document

B.

ADR plan

C.

SOC procedures

D.

A risk register

Full Access
Question # 88

A systems administrator is troubleshooting performance issues with a VDI environment. The administrator determines the issue is GPU related and then increases the frame buffer on the virtual machines. Testing confirms the issue is solved, and everything is now working correctly. Which of the following should the administrator do NEXT?

A.

Consult corporate policies to ensure the fix is allowed

B.

Conduct internal and external research based on the symptoms

C.

Document the solution and place it in a shared knowledge base

D.

Establish a plan of action to resolve the issue

Full Access
Question # 89

A systems administrator is analyzing a report of slow performance in a cloud application. This application is working behind a network load balancer with two VMs, and each VM has its own digital certificate configured. Currently, each VM is consuming 85% CPU on average. Due to cost restrictions, the administrator cannot scale vertically or horizontally in the environment. Which of the following actions should the administrator take to decrease the CPU utilization? (Choose two.)

A.

Configure the communication between the load balancer and the VMs to use a VPN.

B.

Move the digital certificate to the load balancer.

C.

Configure the communication between the load balancer and the VMs to use HTTP.

D.

Reissue digital certificates on the VMs.

E.

Configure the communication between the load balancer and the VMs to use HTTPS.

F.

Keep the digital certificates on the VMs.

Full Access
Question # 90

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

A.

The target system's API functionality has been deprecated

B.

The password for the service account has expired

C.

The IP addresses of the target system have changed

D.

The target system has failed after the updates

Full Access
Question # 91

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL https://www.comptiasite.com. Which of the following would MOST likely resolve the issue?

A.

Renewing the expired certificate

B.

Updating the web-server software

C.

Changing the crypto settings on the web server

D.

Upgrading the users' browser to the latest version

Full Access
Question # 92

A cloud administrator is upgrading a cloud environment and needs to update the automation script to use a new feature from the cloud provider. After executing the script, the deployment fails. Which of the following is the MOST likely cause?

A.

API incompatibility

B.

Location changes

C.

Account permissions

D.

Network failure

Full Access
Question # 93

A systems administrator is trying to reduce storage consumption. Which of the following file types would benefit the MOST from compression?

A.

System files

B.

User backups

C.

Relational database

D.

Mail database

Full Access
Question # 94

A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue?

A.

Upgrade the virtual database server.

B.

Move the virtual machine to flash storage and test again.

C.

Check if other machines on the same storage are having issues.

D.

Document the findings and place them in a shared knowledge base.

Full Access
Question # 95

A systems administrator adds servers to a round-robin, load-balanced pool, and then starts receiving reports of the website being intermittently unavailable. Which of the following is the MOST likely cause of the issue?

A.

The network is being saturated.

B.

The load balancer is being overwhelmed.

C.

New web nodes are not operational.

D.

The API version is incompatible.

E.

There are time synchronization issues.

Full Access
Question # 96

A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?

A.

SNMPv3

B.

Community strings

C.

IPSec tunnels

D.

ACLs

Full Access
Question # 97

After announcing a big sales promotion, an e-commerce company starts to experience a slow response on its platform that is hosted in a public cloud. When checking the resources involved, the systems administrator sees the following consumption:

Considering all VMs were built from the same templates, which of the following actions should the administrator perform FIRST to speed up the response of the e-commerce platform?

A.

Spin up a new web server

B.

Spin up a new application server

C.

Add more memory to the web server

D.

Spin up a new database server

Full Access
Question # 98

A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit?

A.

An SLA report

B.

Tagging

C.

Quotas

D.

Showback

Full Access
Question # 99

A cloud administrator is setting up a new coworker for API access to a public cloud environment. The administrator creates a new user and gives the coworker access to a collection of automation scripts. When the coworker attempts to use a deployment script, a 403 error is returned. Which of the following is the MOST likely cause of the error?

A.

Connectivity to the public cloud is down.

B.

User permissions are not correct.

C.

The script has a configuration error.

D.

Oversubscription limits have been exceeded.

Full Access
Question # 100

A cloud administrator is responsible for managing a cloud-based content management solution. According to the security policy, any data that is hosted in the cloud must be protected against data exfiltration. Which of the following solutions should the administrator implement?

A.

HIDS

B.

FIM

C.

DLP

D.

WAF

Full Access
Question # 101

In an IaaS platform, which of the following actions would a systems administrator take FIRST to identify the scope of an incident?

A.

Conduct a memory acquisition.

B.

Snapshot all volumes attached to an instance.

C.

Retrieve data from a backup.

D.

Perform a traffic capture.

Full Access
Question # 102

A cloud administrator is configuring several security appliances hosted in the private laaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?

A.

Allow UDP 161 outbound from the web servers to the log collector .

B.

Allow TCP 514 outbound from the web servers to the log collector.

C.

Allow UDP 161 inbound from the log collector to the web servers .

D.

Allow TCP 514 inbound from the log collector to the web servers .

Full Access
Question # 103

A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured?

A.

Regions

B.

Anti-affinity

C.

Oversubscription

D.

Container

Full Access
Question # 104

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Full Access
Question # 105

A cloud engineer, who manages workloads in a public cloud environment, uses autoscaling to maintain availability of a critical application. During a recent burst in demands, the engineer received the following error alert:

LimitedlnstanceCapacity

Which of the following is MOST likely cause of the error?

A.

The cloud account has a misconfigured security group.

B.

The cloud account has exhausted the number of instances quota.

C.

The cloud account has had rights revoked to create instances.

D.

The autoscaling feature does not have permissions to create instances.

Full Access
Question # 106

A cloud architect is deploying a web application that contains many large images and will be accessed on two continents. Which of the following will MOST improve the user experience while keeping costs low?

A.

Implement web servers in both continents and set up a VPN between the VPCs.

B.

Implement web servers on both continents and peer the VPCs.

C.

Implement a CDN and offload the images to an object storage.

D.

Implement a replica of the entire solution on every continent.

Full Access
Question # 107

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?

A.

MTTF

B.

SLA

C.

RTO

D.

RPO

Full Access
Question # 108

A systems administrator is helping to develop a disaster recovery solution. The solution must ensure all production capabilities are available within two hours. Which of the following will BEST meet this requirement?

A.

A hot site

B.

A warm site

C.

A backup site

D.

A cold site

Full Access
Question # 109

A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows:

A.

• Three public cloud hosts with four cores

• 120GB of RAM

• 100GB of storage

• 1Gbps

B.

• Three public cloud hosts with six cores

• 80GB of RAM

• 180GB of storage

• 150Mbps

C.

• Three public cloud hosts with six cores

• 80GB of RAM

• 1TB of storage

• 200Mbps

D.

• Four public cloud hosts with four cores

• 140GB of RAM

• 200GB of storage

Full Access
Question # 110

A cloud engineer is performing updates to an application and needs to gracefully stop any new transactions from processing before the updates can be applied. Which of the following steps should the engineer take?

A.

Enable maintenance mode from the application dashboard

B.

Wait until after business hours to conduct the change when the system is not in use

C.

Run a kill command on the system to stop the application services

D.

Use a load balancer to redirect traffic to other systems serving the application

Full Access
Question # 111

A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed.

Which of the following will BEST identify the CPU with more computational power?

A.

Simultaneous multithreading

B.

Bus speed

C.

L3 cache

D.

Instructions per cycle

Full Access
Question # 112

In an existing IaaS instance, it is required to deploy a single application that has different versions.

Which of the following should be recommended to meet this requirement?

A.

Deploy using containers

B.

Install a Type 2 hypervisor

C.

Enable SR-IOV on the host

D.

Create snapshots

Full Access
Question # 113

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments.

Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?

A.

Chain

B.

Star

C.

Mesh

D.

Hub and spoke

Full Access
Question # 114

A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information:

    The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.

    The cloud management console does not show an IP address for that server.

    A DNS lookup shows the hostname resolves to an IP address.

    The server is a member of the same security group as the others.

    The cloud administrator is able to log in remotely to the other servers without issue.

Which of the following is the MOST likely cause of the server being unavailable?

A.

The network driver updates did not apply successfully, and the interface is in a down state.

B.

The ACL policy for the server was updated as part of the server reboot, preventing login access.

C.

The server was assigned a new IP address, and DNS entry for the server name was not updated.

D.

The update caused an increase in the output to the logs, and the server is too busy to respond.

Full Access
Question # 115

Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A’s cloud resources while retaining its IAM solution.

Which of the following should be implemented?

A.

Multifactor authentication

B.

Single sign-on

C.

Identity federation

D.

Directory service

Full Access
Question # 116

A security analyst is investigating incidents in which attackers are able to access sensitive data from a corporate application's database. The attacks occur periodically and usually

after the release of a new application's version. The following log confirms the compromise:

USER: WebApp access—key accepted

WebApp user assumed DBA role

GetData API call executed

The following actions are made after every incident occurrence:

• Validation of firewall rules

• Scripted rebuild of the database and web instances

• Application deployment from a cloud code repository

Which of the following actions will MOST likely prevent future compromises?

A.

Rotating the account credentials

B.

Migrating the database to be on premises

C.

Forbidding the use of API calls to retrieve data

D.

Implementing a new database service account

Full Access
Question # 117

A company that requires full administrative control at the OS level is considering the use of public cloud services. Which of the following service models would BEST fit the company's requirements?

A.

SaaS

B.

DBaaS

C.

PaaS

D.

laaS

Full Access
Question # 118

A cloud solutions architect has received guidance to migrate an application from on premises to a public cloud. Which of the following requirements will help predict the operational expenditures in the cloud?

A.

Average resource consumption

B.

Maximum resource consumption

C.

Minimum resource consumption

D.

Actual hardware configuration

Full Access
Question # 119

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public laaS. The team identifies the following rule as a potential

A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IR" Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the

server from their locations?

A.

Modify the outbound rule to allow the company's external IP address as a source.

B.

Add an inbound rule to use the IP address for the company's main office as a source.

C.

Modify the inbound rule to allow the company's external IP address as a source.

D.

Delete the inbound rule to allow the company's external IP address as a source.

Full Access
Question # 120

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?

A.

Insufficient guest bandwidth

B.

Overwhelmed vCPU

C.

A storage error on the guest

D.

Incorrect VLAN assignment

E.

Inadequate memory allocation

Full Access
Question # 121

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

A.

A firewall

B.

Switches

C.

Ballooning

D.

Autoscaling

Full Access
Question # 122

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Select TWO).

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPI-J resources

F.

License issues

Full Access
Question # 123

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Full Access
Question # 124

A security audit related to confidentiality controls found the following transactions occurring in the system:

GET http://gateway.securetransaction.com/privileged/api/v1/changeResource?id=123 &user=277

Which of the following solutions will solve the audit finding?

A.

Using a TLS-protected API endpoint

B.

Implementing a software firewall

C.

Deploying a HIDS on each system

D.

Implementing a Layer 4 load balancer

Full Access
Question # 125

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?

A.

HTTPS

B.

IPSec

C.

TLS

D.

SSH

Full Access
Question # 126

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

A.

Site-to-site

B.

Client-to-site

C.

Point-to-site

D.

Point-to-point

Full Access
Question # 127

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company's security posture?

A.

SSH

B.

MFA

C.

Certificates

D.

Federation

Full Access
Question # 128

After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?

A.

One 32 vCPU node with CDN caching

B.

Two 8 vCPU nodes with load balancing

C.

Three to six 8 vCPU nodes autoscaling group

D.

Four 8 vCPU nodes with DNS round robin

Full Access
Question # 129

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

A.

RPO

B.

MTTR

C.

SLA

D.

RTO

Full Access
Question # 130

An organization is hosting its dedicated email infrastructure with unlimited mailbox creation capability. The management team would like to migrate to a SaaS-based solution. Which of the following must be considered before the migration?

A.

The SaaS provider's licensing model

B.

The SaaS provider's reputation

C.

The number of servers the SaaS provider has

D.

The number of network links the SaaS provider has

Full Access
Question # 131

A cloud administrator needs to coordinate and automate the management of a company's secrets and keys for all its cloud services with minimal effort and low cost. Which of the following is the BEST option to achieve the goal?

A.

Implement database as a service

B.

Configure Key Vault

C.

Use password as a service

D.

Implement KeePass

Full Access
Question # 132

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?

A.

Store the credentials in a variable on every worker node

B.

Store the credentials on a shared volume using whole-disk encryption

C.

Store the credentials in a configuration file using SHA-256 inside the container image

D.

Store the credentials using the orchestrator secret manager

Full Access
Question # 133

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the BEST action to correct the latency issue?

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Full Access
Question # 134

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Full Access
Question # 135

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?

A.

There is a configuration failure in the syslog solution.

B.

The application servers were migrated to the cloud as laaS instances.

C.

The application administrators have not performed any activity in those servers.

D.

There is a local firewall policy restriction on the syslog server.

Full Access
Question # 136

A company has two primary offices, one in the United States and one in Europe. The company uses a public laaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

A.

Add an application load balancer to the applications to spread workloads.

B.

Integrate a CDN solution to distribute web content globally.

C.

Upgrade the bandwidth of the dedicated connection to the laaS provider.

D.

Migrate the applications to a region hosted in Europe.

Full Access