Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

CompTIA CV0-003 Dumps

Page: 1 / 41
Total 405 questions

CompTIA Cloud+ Certification Exam Questions and Answers

Question 1

Which of the following cloud deployment models allows a company to have full control over its IT infrastructure?

Options:

A.

Private

B.

Cloud within a cloud

C.

Hybrid

D.

Public

Question 2

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

Options:

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Question 3

A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well.

Which of the following should the administrator recommend the user do FIRST?

Options:

A.

Disable antivirus/anti-malware software

B.

Turn off the software firewall

C.

Establish a VPN tunnel between the computer and the web server

D.

Update the web browser to the latest version

Question 4

A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage.

Which of the following RAID types should the administrator choose?

Options:

A.

5

B.

6

C.

10

D.

50

Question 5

A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency.

Which of the following services should the technician deploy to eliminate the latency issue?

Options:

A.

Auto-scaling

B.

Cloud bursting

C.

A content delivery network

D.

A new cloud provider

Question 6

A cloud administrator is planning to migrate a globally accessed application to the cloud.

Which of the following should the cloud administrator implement to BEST reduce latency for all users?

Options:

A.

Regions

B.

Auto-scaling

C.

Clustering

D.

Cloud bursting

Question 7

A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal.

Which of the following should the administrator do to fix this issue?

Options:

A.

Change the database application IP

B.

Create a database cluster between the primary site and the DR site

C.

Update the connection string

D.

Edit the DNS record at the DR site for the application servers

Question 8

A company developed a product using a cloud provider’s PaaS platform and many of the platform-based components within the application environment.

Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider?

Options:

A.

Licensing

B.

Authentication providers

C.

Service-level agreement

D.

Vendor lock-in

Question 9

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

asAnalyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

asIdentify the problematic device(s).

Part 2:

asIdentify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

as

as

as

as

as

as

as

as

Part 2:

Only select a maximum of TWO options from the multiple choice question

as

Options:

Question 10

An organization’s web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization’s web server infrastructure.

Which of the following should be implemented to prevent this in the future as a mitigation method?

Options:

A.

Enable DLP

B.

Configure microsegmentation

C.

Enable DNSSEC

D.

Deploy a vADC appliance

Question 11

After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)

Options:

A.

Identify the resources that are accessible to the affected IAM user

B.

Remove the published plain-text password

C.

Notify users that a data breach has occurred

D.

Change the affected IAM user’s password

E.

Delete the affected IAM user

Question 12

An organization has the following requirements that need to be met when implementing cloud services:

  • SSO to cloud infrastructure
  • On-premises directory service
  • RBAC for IT staff

Which of the following cloud models would meet these requirements?

Options:

A.

Public

B.

Community

C.

Hybrid

D.

Multitenant

Question 13

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments.

Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?

Options:

A.

Chain

B.

Star

C.

Mesh

D.

Hub and spoke

Question 14

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations.

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?

Options:

A.

Integrity

B.

Versioning

C.

Classification

D.

Segmentation

Question 15

A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site.

Which of the following should be configured in between the cloud environment and the DR site?

Options:

A.

Failback

B.

Playbook

C.

Zoning

D.

Replication

Question 16

A cloud administrator is building a new VM for a network security appliance. The security appliance installer says the CPU clock speed does not meet the requirements.

Which of the following will MOST likely solve the issue?

Options:

A.

Move the VM to a host with a faster CPU

B.

Add more vCPUs to the VM

C.

Enable CPU masking on the VM

D.

Enable hyperthreading on the virtual host

Question 17

A SaaS provider wants to maintain maximum availability for its service.

Which of the following should be implemented to attain the maximum SLA?

Options:

A.

A hot site

B.

An active-active site

C.

A warm site

D.

A cold site

Question 18

A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content.

Which of the following solutions will assist with the increased workload?

Options:

A.

DoH

B.

WAF

C.

IPS

D.

CDN

Question 19

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Question 20

A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the only group allowed to modify files in the directory.

Which of the following will accomplish the desired objective?

Options:

A.

Remove the file write permissions for the application service account.

B.

Restrict the file write permissions to the development group only.

C.

Add access to the fileshare for the systems administrator’s group.

D.

Deny access to all development user accounts

Question 21

A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed.

Which of the following will BEST identify the CPU with more computational power?

Options:

A.

Simultaneous multithreading

B.

Bus speed

C.

L3 cache

D.

Instructions per cycle

Question 22

An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources.

Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?

Options:

A.

Dedicated

B.

Shared

C.

Passthrough

D.

vGPU

Question 23

A systems administrator needs to convert ten physical servers to virtual.

Which of the following would be the MOST efficient conversion method for the administrator to use?

Options:

A.

Rebuild the servers from scratch

B.

Use the vendor’s conversion tool

C.

Clone the hard drive

D.

Restore from backup

Question 24

A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task.

Which of the following ports should the administrator open on the monitoring server’s firewall?

Options:

A.

53

B.

123

C.

139

D.

161

Question 25

An organization requires the following to be achieved between the finance and marketing departments:

  • Allow HTTPS/HTTP.

  • Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

Options:

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Question 26

A systems administrator is configuring a storage array.

Which of the following should the administrator configure to set up mirroring on this array?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 27

After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message.

Which of the following should the administrator verify NEXT?

Options:

A.

The TLS certificate

B.

The firewall rules

C.

The concurrent connection limit

D.

The folder permissions

Question 28

A systems administrator would like to reduce the network delay between two servers.

Which of the following will reduce the network delay without taxing other system resources?

Options:

A.

Decrease the MTU size on both servers

B.

Adjust the CPU resources on both servers

C.

Enable compression between the servers

D.

Configure a VPN tunnel between the servers

Question 29

An IaaS provider has numerous devices and services that are commissioned and decommissioned automatically on an ongoing basis. The cloud administrator needs to implement a solution that will help reduce administrative overhead.

Which of the following will accomplish this task?

Options:

A.

IPAM

B.

NAC

C.

NTP

D.

DNS

Question 30

A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations.

Which of the following actions should the cloud administrator take FIRST?

Options:

A.

Initiate a failover

B.

Restore backups

C.

Configure the network

D.

Perform a failback

Question 31

An organization will be deploying a web application in a public cloud with two web servers, two database servers, and a load balancer that is accessible over a single public IP.

Taking into account the gateway for this subnet and the potential to add two more web servers, which of the following will meet the minimum IP requirement?

Options:

A.

192.168.1.0/26

B.

192.168.1.0/27

C.

192.168.1.0/28

D.

192.168.1.0/29

Question 32

A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution.

Which of the following will provide the data to measure business continuity? (Choose two.)

Options:

A.

A service-level agreement

B.

Automation scripts

C.

Playbooks

D.

A network diagram

E.

A backup and restore

F.

A recovery time objective

Question 33

A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?

Options:

A.

RAID 5

B.

RAID 6

C.

RAID 10

D.

RAID 50

Question 34

In an IaaS platform, which of the following actions would a systems administrator take FIRST to identify the scope of an incident?

Options:

A.

Conduct a memory acquisition.

B.

Snapshot all volumes attached to an instance.

C.

Retrieve data from a backup.

D.

Perform a traffic capture.

Question 35

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator MOST likely use?

Options:

A.

An API gateway

B.

An IPS/IDS

C.

A reverse proxy

D.

A WAF

Question 36

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

Options:

A.

Reboot all the servers in the green stack

B.

Failback to the blue stack

C.

Restore from backups

D.

Troubleshoot and resolve the application issues

Question 37

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

Options:

A.

A firewall

B.

Switches

C.

Ballooning

D.

Autoscaling

Question 38

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public laaS. The team identifies the following rule as a potential

as

A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IR" Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the

server from their locations?

Options:

A.

Modify the outbound rule to allow the company's external IP address as a source.

B.

Add an inbound rule to use the IP address for the company's main office as a source.

C.

Modify the inbound rule to allow the company's external IP address as a source.

D.

Delete the inbound rule to allow the company's external IP address as a source.

Question 39

A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement?

Options:

A.

Create /25 subnets in two regions and run 80 instances on each one.

B.

Create /26 subnets in two regions and run 40 instances on each one.

C.

Create /26 subnets in three regions and run 40 instances on each one.

D.

Create /26 subnets in three regions and run 80 instances on each one.

Question 40

Users currently access SaaS email with five-character passwords that use only letters and numbers. An administrator needs to make access more secure without changing the password policy. Which of the following will provide a more secure way of accessing email at the lowest cost?

Options:

A.

Change the email service provider.

B.

Enable MFA with a one-time password.

C.

Implement SSO for all users.

D.

Institute certificate-based authentication

Question 41

A cloud architect is deploying a web application that contains many large images and will be accessed on two continents. Which of the following will MOST improve the user experience while keeping costs low?

Options:

A.

Implement web servers in both continents and set up a VPN between the VPCs.

B.

Implement web servers on both continents and peer the VPCs.

C.

Implement a CDN and offload the images to an object storage.

D.

Implement a replica of the entire solution on every continent.

Question 42

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

Options:

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Question 43

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

Options:

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Question 44

A systems administrator is helping to develop a disaster recovery solution. The solution must ensure all production capabilities are available within two hours. Which of the following will BEST meet this requirement?

Options:

A.

A hot site

B.

A warm site

C.

A backup site

D.

A cold site

Question 45

An administrator needs to back up all the data from each VM daily while also saving space. Which of the following backup types will BEST fit this scenario?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Full

Question 46

An organization is hosting its dedicated email infrastructure with unlimited mailbox creation capability. The management team would like to migrate to a SaaS-based solution. Which of the following must be considered before the migration?

Options:

A.

The SaaS provider's licensing model

B.

The SaaS provider's reputation

C.

The number of servers the SaaS provider has

D.

The number of network links the SaaS provider has

Question 47

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the BEST action to correct the latency issue?

Options:

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Question 48

A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?

Options:

A.

Compute

B.

Storage

C.

Licensing

D.

Scripts

Question 49

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

Options:

A.

Service_level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Question 50

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company's security posture?

Options:

A.

SSH

B.

MFA

C.

Certificates

D.

Federation

Question 51

An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection?

Options:

A.

WAF

B.

EDR

C.

IDS

D.

HIPS

E.

SSL

Question 52

A local bank has all of its infrastructure in the cloud. An update was applied to the main database server at 5:00 a.m. on Monday morning, and the database was then corrupted and unusable. It had to be restored from backup. The last backup was taken the night before at 10:00 p.m. The database was then restored successfully, but seven hours' worth of data was lost, which is deemed unacceptable. Which of the following needs to be updated in the DR plan?

Options:

A.

Recovery point objective

B.

Statement of work

C.

Service-level agreement

D.

Recovery time objective

Question 53

A cloud engineer, who manages workloads in a public cloud environment, uses autoscaling to maintain availability of a critical application. During a recent burst in demands, the engineer received the following error alert:

LimitedlnstanceCapacity

Which of the following is MOST likely cause of the error?

Options:

A.

The cloud account has a misconfigured security group.

B.

The cloud account has exhausted the number of instances quota.

C.

The cloud account has had rights revoked to create instances.

D.

The autoscaling feature does not have permissions to create instances.

Question 54

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

Options:

A.

Firewall outbound rules

B.

Firewall inbound rules

C.

Load balancer certificates

D.

Load balancer stickiness

E.

WAF transaction throttling

Question 55

A systems administrator must ensure confidential company information is not leaked to competitors. Which of the following services will BEST accomplish this goal?

Options:

A.

CASB

B.

IDS

C.

FIM

D.

EDR

E.

DLP

Question 56

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks. After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

Options:

A.

The target system's API functionality has been deprecated.

B.

The password for the service account has expired.

C.

The IP addresses of the target system have changed.

D.

The target system has failed after the updates.

Question 57

A company has two primary offices, one in the United States and one in Europe. The company uses a public laaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

Options:

A.

Add an application load balancer to the applications to spread workloads.

B.

Integrate a CDN solution to distribute web content globally.

C.

Upgrade the bandwidth of the dedicated connection to the laaS provider.

D.

Migrate the applications to a region hosted in Europe.

Question 58

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?

Options:

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Question 59

A company that requires full administrative control at the OS level is considering the use of public cloud services. Which of the following service models would BEST fit the company's requirements?

Options:

A.

SaaS

B.

DBaaS

C.

PaaS

D.

laaS

Question 60

A security audit related to confidentiality controls found the following transactions occurring in the system:

GET &user=277

Which of the following solutions will solve the audit finding?

Options:

A.

Using a TLS-protected API endpoint

B.

Implementing a software firewall

C.

Deploying a HIDS on each system

D.

Implementing a Layer 4 load balancer

Question 61

A systems administrator needs to deploy a solution to automate new application releases that come from the development team. The administrator is responsible for provisioning resources at the infrastructure layer without modifying any configurations in the application code. Which of the following would BEST accomplish this task?

Options:

A.

Implementing a CI/CD tool

B.

Configuring infrastructure as code

C.

Deploying an orchestration tool

D.

Employing DevOps methodology

Question 62

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

Options:

A.

Require the user's source IP to be an RFC1918 address.

B.

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.

Require the use of a password and a physical token.

D.

Require the password to be ten characters long.

Question 63

A large pharmaceutical company needs to ensure it is in compliance with the following requirements:

• An application must run on its own virtual machine.

• The hardware the application is hosted on does not change.

Which of the following will BEST ensure compliance?

Options:

A.

Containers

B.

A firewall

C.

Affinity rules

D.

Load balancers

Question 64

A financial industry services firm was the victim of an internal data breach, and the perpetrator was a member of the company's development team. During the investigation, one of the security administrators accidentally deleted the perpetrator's user data. Even though the data is recoverable, which of the following has been violated?

Options:

A.

Chain of custody

B.

Evidence acquisition

C.

Containment

D.

Root cause analysis

Question 65

A systems administrator is deploying a new cloud application and needs to provision cloud services with minimal effort. The administrator wants to reduce the tasks required for maintenance, such as OS patching, VM and volume provisioning, and autoscaling configurations. Which of the following would be the BEST option to deploy the new application?

Options:

A.

A VM cluster

B.

Containers

C.

OS templates

D.

Serverless

Question 66

An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?

Options:

A.

Two load balancers behind a single firewall

B.

Firewalls in a blue-green configuration

C.

Two firewalls in a HA configuration

D.

A web application firewall

Question 67

Which of the following cloud services is fully managed?

Options:

A.

IaaS

B.

GPU in the cloud

C.

IoT

D.

Serverless compute

E.

SaaS

Question 68

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?

Options:

A.

Incorrect encryption ciphers

B.

Broken trust relationship

C.

Invalid certificates

D.

Expired password

Question 69

A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements:

No downtime

Instant switch to a new version using traffic control for all users

Which of the following deployment strategies would be the BEST solution?

Options:

A.

Hot site

B.

Blue-green

C.

Canary

D.

Rolling

Question 70

A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?

Options:

A.

Alternate location

B.

Rolling

C.

Storage live migration

D.

In-place

Question 71

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?

Options:

A.

Virtual machines

B.

Software as a service

C.

Serverless computing

D.

Containers

Question 72

A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power.

Which of the following should be investigated FIRST?

Options:

A.

Server power

B.

Rack power

C.

Switch power

D.

SAN power

Question 73

A systems administrator wants to ensure two VMs remain together on the same host. Which of the following must be set up to enable this functionality?

Options:

A.

Affinity

B.

Zones

C.

Regions

D.

A cluster

Question 74

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it.

Which of the following configuration options would BEST meet this requirement?

Options:

A.

Virtual GPU

B.

External GPU

C.

Passthrough GPU

D.

Shared GPU

Question 75

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL Which of the following would MOST likely resolve the issue?

Options:

A.

Renewing the expired certificate

B.

Updating the web-server software

C.

Changing the crypto settings on the web server

D.

Upgrading the users' browser to the latest version

Question 76

A company had a system compromise, and the engineering team resolved the issue after 12 hours. Which of the following information will MOST likely be requested by the Chief Information Officer (CIO) to understand the issue and its resolution?

Options:

A.

A root cause analysis

B.

Application documentation

C.

Acquired evidence

D.

Application logs

Question 77

Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?

Options:

A.

A business continuity plan

B.

Incident response/disaster recovery documentation

C.

A tabletop exercise

D.

A root cause analysis

Question 78

A cloud security analyst is implementing a vulnerability scan of the web server in the DMZ, which is running in an IaaS compute instance. The default inbound firewall settings are as follows:

as

Which of the following will provide the analyst with the MOST accurate report?

Options:

A.

An agent-based scan

B.

A network vulnerability scan

C.

A default and common credentialed scan

D.

A network credentialed vulnerability scan

Question 79

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly.

Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?

Options:

A.

Tier pricing

B.

Licensing

C.

Estimated consumption

D.

Feature compatibility

Question 80

A company needs to migrate the storage system and batch jobs from the local storage system to a public cloud provider. Which of the following accounts will MOST likely be created to run the batch processes?

Options:

A.

User

B.

LDAP

C.

Role-based

D.

Service

Question 81

Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue?

Options:

A.

Perform a memory dump of the OS.

Analyze the memory dump.

Upgrade the host CPU to a higher clock speed CPU.

B.

Perform a packet capture during authentication.

Validate the load-balancing configuration.

Analyze the network throughput of the load balancer.

C.

Analyze the storage system IOPS.

Increase the storage system capacity.

Replace the storage system disks to SSD.

D.

Evaluate the OS ACLs.

Upgrade the router firmware.

Increase the memory of the router.

Question 82

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

Options:

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Question 83

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?

Options:

A.

Deploy web servers into an laaS provider.

B.

Implement a cloud-based VDI solution.

C.

Provision web servers in a container environment.

D.

Use PaaS components in the cloud to implement the product.

Question 84

A systems administrator is examining a managed hosting agreement and wants to determine how much data would be lost if a server had to be restored from backups. To which of the following metrics should the administrator refer?

Options:

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Question 85

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

Options:

A.

Internet of Things

B.

Digital transformation

C.

Artificial intelligence

D.

DNS over TLS

Question 86

A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit?

Options:

A.

An SLA report

B.

Tagging

C.

Quotas

D.

Showback

Question 87

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

Options:

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Question 88

A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?

Options:

A.

API version incompatibility

B.

Misconfigured script account

C.

Wrong template selection

D.

Incorrect provisioning script indentation

Question 89

An administrator has been informed that some requests are taking a longer time to respond than other requests of the same type. The cloud consumer is using multiple network service providers and is performing link load balancing for bandwidth aggregation. Which of the following commands will help the administrator understand the possible latency issues?

Options:

A.

ping

B.

ipconfig

C.

traceroute

D.

netstat

Question 90

Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps.

Which of the following solutions will resolve the issue the FASTEST?

Options:

A.

Change the connection to point-to-site VPN

B.

Order a direct link to the provider

C.

Enable quality of service

D.

Upgrade the link to 200Mbps

Question 91

An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would be MOST useful to accomplish this task?

Options:

A.

VLAN

B.

NIPS

C.

WAF

D.

NAC

Question 92

A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?

Options:

A.

DLP

B.

WAF

C.

FIM

D.

ADC

Question 93

A cloud administrator wants to have a central repository for all the logs in the company’s private cloud. Which of the following should be implemented to BEST meet this requirement?

Options:

A.

SNMP

B.

Log scrubbing

C.

CMDB

D.

A syslog server

Question 94

A systems administrator is configuring updates on a system. Which of the following update branches should the administrator choose to ensure the system receives updates that are maintained for at least four years?

Options:

A.

LTS

B.

Canary

C.

Beta

D.

Stable

Question 95

Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization?

Options:

A.

Auto-scaling of compute

B.

Oversubscription

C.

Dynamic memory allocations on guests

D.

Affinity rules in the hypervisor

Question 96

A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective?

Options:

A.

22, 53, 445

B.

22, 443, 445

C.

25, 123, 443

D.

137, 139, 445

Question 97

A company that performs passive vulnerability scanning at its transit VPC has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the use to verify if this is a true positive with the LEAST effort and cost? (Select TWO).

Options:

A.

A network-based scan

B.

An agent-based scan

C.

A port scan

D.

A red-team exercise

E.

A credentialed scan

F.

A blue-team exercise

G.

Unknown environment penetration testing

Question 98

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

Options:

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Question 99

A cloud security engineer needs to design an IDS/IPS solution for a web application in a single virtual private network. The engineer is considering implementing IPS protection for traffic coming from the internet. Which of the following should the engineer consider to meet this requirement?

Options:

A.

Configuring a web proxy server

B.

Implementing load balancing using SSI- in front of web applications

C.

Implementing IDS/IPS agents on each instance running in that virtual private network

D.

Implementing dynamic routing

Question 100

Which of the following enables CSPs to offer unlimited capacity to customers?

Options:

A.

Adequate budget

B.

Global data center distribution

C.

Economies of scale

D.

Agile project management

Question 101

A cloud engineer recently set up a container image repository. The engineer wants to ensure that downloaded images are not modified in transit. Which of the following is the best method to achieve this goal?

Options:

A.

SHA-256

B.

IPSec

C.

AES-256

D.

MD5

E.

serpent-256

Question 102

A cloud administrator created four VLANs to autoscale the container environment. Two of the VLANs are on premises, while two VLANs are on a public cloud provider with a direct link between them. Firewalls are between the links with an additional subnet for communication, which is 192.168.5.0/24.

The on-premises gateways are:

192.168.1.1/24

192.168.2.1/24

The cloud gateways are:

192.168.3.1/24

192.168.4.1/24

The orchestrator is unable to communicate with the cloud subnets. Which Of the following should the administrator do to resolve the issue?

Options:

A.

Allow firewall traffic to 192.168.5.0/24.

B.

Set both firewall interfaces to 192.168.5.1/24.

C.

Add interface 192.168.3.1/24 on the local firewall.

D.

Add interface 192.168.1.1/24 on the cloud firewall.

Question 103

A systems administrator is configuring a DNS server. Which of the following steps should a technician take to ensure confidentiality between the DNS server and an upstream DNS provider?

Options:

A.

Enable DNSSEC.

B.

Implement single sign-on.

C.

Configure DOH.

D.

Set up DNS over SSL.

Question 104

A non-critical file on a database server was deleted and needs to be recovered. A cloud administrator must use the least disruptive restoration process to retrieve the file, as the database server cannot be stopped during the business day. Which of the following restoration methods would best accomplish this goal?

Options:

A.

Alternate location

B.

Restore from image

C.

Revert to snapshot

D.

In-place restoration

Question 105

An environment has a dual-stack infrastructure in an active-active configuration in two separate data centers. Which of the following best describes replication between the two sites?

Options:

A.

Data is moved constantly from the hot site to the warm site.

B.

Data is replicated every 15 minutes from one site to the other.

C.

Data is moved from one site to the other once per day.

D.

Data is synchronized in real time across the sites.

E.

Data is moved twice a day from Site A to Site B, and then from Site B to Site A.

Question 106

An enterprise is considering a cost model for a DBaaS. Which of the following is BEST for a cloud solution?

Options:

A.

per gigabyte

B.

per seat

C.

Per user

D.

Per device

Question 107

A systems administrator has verified that a physical switchport that is connected to a virtualization host is using all available bandwidth. Which of the following would best address this issue?

Options:

A.

Port mirroring

B.

Link aggregation

C.

Spanning tree

D.

Microsegmentation

Question 108

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to BEST reduce cost?

Options:

A.

Scaling of the environment after work hours

B.

Implementing access control after work hours

C.

Shutting down the environment after work hours

D.

Blocking external access to the environment after work hours

Question 109

A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way?

Options:

A.

Submit the upgrade to the CAB.

B.

Perform a full backup.

C.

Take a snapshot of the system.

D.

Test the upgrade in a preproduction environment.

Question 110

An organization is deploying development, quality assurance, and production environments with equal numbers of IP addresses to the cloud. The IP address range provided is 10.168.0.0/24, and it needs to be terminated on a firewall. Which of the following IP subnets and firewall IPS should be used for one of the environments?

Options:

A.

10.168.0.0/26 and 10.168.0.63

B.

10.168.0.64/26 and 10.168.0.64

C.

10.168.0.128/26 and 10.168.0.190

D.

10.168.0.128/26 and 10.168.0.194

E.

10.168.0.192/26 and 10.168.0.191

Question 111

A cloud administrator is reviewing the current private cloud and public laaS environment, and is building an optimization plan. Portability is of great concern for the administrator so resources can be easily moved from one environment to another.

Which of the following should the administrator implement?

Options:

A.

Serverless

B.

CDN

C.

Containers

D.

Deduplication

Question 112

A systems administrator is troubleshooting a VDI deployment that is used to run high-frame-rate rendering. Users are reporting frequent application crashes. After running a benchmark, the administrator discovers the following:

as

Which of the following should the administrator do to resolve this issue?

Options:

A.

Configure the GPU to run in compute mode.

B.

Allocate more RAM in the VM template.

C.

Select a higher vGPU profile.

D.

Configure the GPU to run in graphics mode.

Question 113

A company plans to publish a new application and must conform with security standards. Which of the following types of testing are most important for the systems administrator to run to assure the security and compliance of the application before publishing? (Select two).

Options:

A.

Regression testing

B.

Vulnerability testing

C.

Usability testing

D.

Functional testing

E.

Penetration testing

F.

Load testing

Question 114

Which of the following are advantages of a public cloud? (Select TWO).

Options:

A.

Full control of hardware

B.

Reduced monthly costs

C.

Decreased network latency

D.

Pay as you use

E.

Availability of self-service

F.

More secure data

Question 115

A systems administrator is planning to migrate to a cloud solution with volume-based licensing. Which of the following is most important when considering licensing costs?

Options:

A.

The number of cores

B.

The number of threads

C.

The number of machines

D.

The number of sockets

Question 116

A corporation is evaluating an offer from a CSP to take advantage of volume discounts on a shared platform. The finance department is concerned about cost allocation transparency, as the current structure splits projects into dedicated billing accounts. Which of the following can be used to address this concern?

Options:

A.

Implementing resource tagging

B.

Defining a cost baseline

C.

Consolidating the billing accounts

D.

Using a third-party accounting tool

Question 117

A systems administrator is attempting to gather information about services and resource utilization on VMS in a cloud environment. Which of the following will BEST accomplish this objective?

Options:

A.

Syslog

B.

SNMP

C.

CMDB

D.

Service management

E.

Performance monitoring

Question 118

A systems administrator notices several VMS are constantly ballooning, while the memory usage of several other VMS is significantly lower than their resource allocation. Which of the following will MOST likely solve the issue?

Options:

A.

Rightsizing

B.

Bandwidth increase

C.

Cluster placement

D.

Storage tiers

Question 119

A VDI administrator is deploying 512 desktops for remote workers. Which of the following would meet the minimum number of IP addresses needed for the desktops?

Options:

A.

/22

B.

/23

C.

/24

D.

/25

Question 120

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

Options:

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Question 121

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

Options:

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Question 122

A systems administrator is deploying a new version of a website. The website is deployed in the cloud using a VM cluster. The administrator must then deploy the new version into one VM first. After a period of time, if there are no issues detected, a second VM will be updated. This process must continue until all the VMS are updated. Which of the following upgrade methods is being implemented?

Options:

A.

Canary

B.

Blue-green

C.

Rolling

D.

Staging

Question 123

A web consultancy group currently works in an isolated development environment. The group uses this environment for the creation of the final solution, but also for showcasing it to customers, before commissioning the sites in production. Recently, customers of newly commissioned sites have reported they are not receiving the final product shown by the group, and

the website is performing in unexpected ways. Which of the following additional environments should the group adopt and include in its process?

Options:

A.

Provide each web consultant a local environment on their device.

B.

Require each customer to have a blue-green environment.

C.

Leverage a staging environment that is tightly controlled for showcasing.

D.

Initiate a disaster recovery environment to fail to in the event of reported issues.

Question 124

A systems administrator is implementing a new version of a company's primary human-resources application. An upgrade will be performed on the production server, as there is no development environment. The administrator needs to have a

plan in case something goes wrong with the upgrade. Which of the following will work best to ensure a quick rollback in case an issue arises?

Options:

A.

An application-level backup

B.

A production snapshot

C.

A full backup

D.

A differential backup

Question 125

A cloud solutions architect is working on a private cloud environment in which storage consumption is increasing daily, resulting in high costs. Which of the following can the architect use to provide more space without adding more capacity? (Select two).

Options:

A.

Tiering

B.

Deduplication

C.

RAID provisioning

D.

Compression

E.

Flash optimization

F.

NVMe

Page: 1 / 41
Total 405 questions