Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > CompTIA > CompTIA Cloud+ > CV0-003

CV0-003 CompTIA Cloud+ Certification Exam Question and Answers

Question # 4

A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity?

A.

Patch management

B.

Hardening

C.

Scaling

D.

Log and event monitoring

Full Access
Question # 5

A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue?

A.

Check the FAQ section of the vendor's documentation.

B.

Ask the user if the client device or access location has changed.

C.

Reboot the user's virtual desktop.

D.

Request permission to log in to the device remotely.

Full Access
Question # 6

A disaster situation has occurred, and the entire team needs to be informed about the situation. Which of the following documents will help the administrator find the details of the relevant team members for escalation?

A.

Chain of custody

B.

Root cause analysis

C.

Playbook

D.

Call tree

Full Access
Question # 7

A cloud administrator would like to deploy a cloud solution to its provider using automation techniques. Which of the following must be used? (Choose two.)

A.

Auto-scaling

B.

Tagging

C.

Playbook

D.

Templates

E.

Containers

F.

Serverless

Full Access
Question # 8

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?

A.

Virtual machines

B.

Software as a service

C.

Serverless computing

D.

Containers

Full Access
Question # 9

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL https://www.comptiasite.com. Which of the following would MOST likely resolve the issue?

A.

Renewing the expired certificate

B.

Updating the web-server software

C.

Changing the crypto settings on the web server

D.

Upgrading the users' browser to the latest version

Full Access
Question # 10

A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.)

A.

Install TLS certificates on the server.

B.

Forward port 80 traffic to port 443.

C.

Disable TLS 1.0/1.1 and SSL.

D.

Disable password authentication.

E.

Enable SSH key access only.

F.

Provision the server in a separate VPC.

G.

Disable the superuser/administrator account.

Full Access
Question # 11

Based on the shared responsibility model, which of the following solutions passes the responsibility of patching the OS to the customer?

A.

PaaS

B.

DBaaS

C.

laaS

D.

SaaS

Full Access
Question # 12

As a result of an IT audit, a customer has decided to move some applications from an old legacy system to a private cloud. The current server location is remote with low bandwidth. Which of the following is the best migration strategy to use for this deployment?

A.

P2V with physical data transport

B.

P2P with remote data copy

C.

V2V with physical data transport

D.

V2P with physical data transport

E.

V2P with remote data copy

Full Access
Question # 13

A systems administrator has been notified of possible illegal activities taking place on the network and has been directed to ensure any relevant emails are preserved for court use.

Which of the following is this MOST likely an example of?

A.

Email archiving

B.

Version control

C.

Legal hold

D.

File integrity monitoring

Full Access
Question # 14

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled? (Select TWO).

A.

Telnet

B.

FTP

C.

Remote login

D.

DNS

E.

DHCP

F.

LDAP

Full Access
Question # 15

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the best action to correct the latency issue?

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Full Access
Question # 16

A company wants to move to a multicloud environment and utilize the technology that provides the most portability. Which of the following technology solutions would BEST meet the company's needs?

A.

Bootstrap

B.

Virtual machines

C.

Clusters

D.

Containers

Full Access
Question # 17

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Full Access
Question # 18

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Full Access
Question # 19

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to best reduce cost?

A.

Scaling of the environment after work hours

B.

Implementing access control after work hours

C.

Shutting down the environment after work hours

D.

Blocking external access to the environment after work hours

Full Access
Question # 20

A cloud administrator received a request to provision a set of cloud resources in an effort to switch to infrastructure as code to automate and optimize operations. The administrator decides to try to run some tests with the following definition:

Which of the following is the most likely cause of the issue?

A.

The cloud provider is expecting the private key.

B.

The incorrect resource name was used.

C.

The environment variable for the public key path has not been set.

D.

An unexpected variable was provided.

Full Access
Question # 21

An IT professional is selecting the appropriate cloud storage solution for an application that has the following requirements:

. The owner of the objects should be the object writer.

· The storage system must enforce TLS encryption.

Which of the following should the IT professional configure?

A.

A bucket

B.

A CIFS endpoint

C.

A SAN

D.

An NFS mount

Full Access
Question # 22

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?

A.

Create a directory security group.

B.

Create a resource group.

C.

Create separate VLANs.

D.

Create a network security group.

Full Access
Question # 23

A cloud administrator has deployed several VM instances that are running the same applications on VDI nodes. Users are reporting that a role instance is looping between STARTED, INITIALIZING, BUSY, and stop. Upon investigation, the cloud administrator can see the status changing every few minutes. Which of the following should be done to resolve the issue?

A.

Reboot the hypervisor.

B.

Review the package and configuration file.

C.

Configure service healing.

D.

Disable memory swap.

Full Access
Question # 24

A local bank has all of its infrastructure in the cloud. An update was applied to the main database server at 5:00 a.m. on Monday morning, and the database was then corrupted and unusable. It had to be restored from backup. The last backup was taken the night before at 10:00 p.m. The database was then restored successfully, but seven hours' worth of data was lost, which is deemed unacceptable. Which of the following needs to be updated in the DR plan?

A.

Recovery point objective

B.

Statement of work

C.

Service-level agreement

D.

Recovery time objective

Full Access
Question # 25

A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured?

A.

Regions

B.

Anti-affinity

C.

Oversubscription

D.

Container

Full Access
Question # 26

A business is looking at extending the platform for an internally developed application using microservices from various cloud vendors. The cloud architect is responsible for reviewing the proposed solution design, which covers critical requirements for the business to fulfill its requirements. Which of the following is the most likely requirement the cloud architect needs to fulfill?

A.

Software

B.

Budgetary

C.

Security

D.

Integration

Full Access
Question # 27

An organization is deploying development, quality assurance, and production environments with equal numbers of IP addresses to the cloud. The IP address range provided is 10.168.0.0/24, and it needs to be terminated on a firewall. Which of the following IP subnets and firewall IPS should be used for one of the environments?

A.

10.168.0.0/26 and 10.168.0.63

B.

10.168.0.64/26 and 10.168.0.64

C.

10.168.0.128/26 and 10.168.0.190

D.

10.168.0.128/26 and 10.168.0.194

E.

10.168.0.192/26 and 10.168.0.191

Full Access
Question # 28

An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?

A.

Logs on the VM

B.

Firewall on the VM

C.

Memory on the VM

D.

vGPU performance on the VM

Full Access
Question # 29

A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.)

A.

Incorrect permissions

B.

Insufficient storage

C.

Billing issues with the cloud provider

D.

No connectivity to the public cloud

E.

Expired API token

F.

Disabled autoscaling

Full Access
Question # 30

A company has two identical environments (X and Y) running its core business application. As part of an upgrade, the X environment is patched/upgraded and tested while the Y environment is still serving the consumer workloads. Upon successful testing of the X environment, all workload is sent to this environment, and the Y environment is then upgraded before both environments start to manage the workloads. Which of the following upgrade methods is being used?

A.

Active-passive

B.

Canary

C.

Development/production

D.

Blue-green

Full Access
Question # 31

Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud?

A.

Deploy a new instance using a known-good base image.

B.

Configure a firewall rule to block the traffic on the affected instance.

C.

Perform a forensic analysis of the affected instance.

D.

Conduct a tabletop exercise involving developers and systems administrators.

Full Access
Question # 32

A cloud administrator is upgrading a cloud environment and needs to update the automation script to use a new feature from the cloud provider. After executing the script, the deployment fails. Which of the following is the MOST likely cause?

A.

API incompatibility

B.

Location changes

C.

Account permissions

D.

Network failure

Full Access
Question # 33

A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues.

Which of the following is the MOST likely cause of this issue?

A.

Change management failure

B.

Service overload

C.

Patching failure

D.

Job validation issues

E.

Deprecated features

Full Access
Question # 34

A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements:

No downtime

Instant switch to a new version using traffic control for all users

Which of the following deployment strategies would be the BEST solution?

A.

Hot site

B.

Blue-green

C.

Canary

D.

Rolling

Full Access
Question # 35

A cloud administrator is configuring several security appliances hosted in the private laaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?

A.

Allow UDP 161 outbound from the web servers to the log collector .

B.

Allow TCP 514 outbound from the web servers to the log collector.

C.

Allow UDP 161 inbound from the log collector to the web servers .

D.

Allow TCP 514 inbound from the log collector to the web servers .

Full Access
Question # 36

An organization is hosting its dedicated email infrastructure with unlimited mailbox creation capability. The management team would like to migrate to a SaaS-based solution. Which of the following must be considered before the migration?

A.

The SaaS provider's licensing model

B.

The SaaS provider's reputation

C.

The number of servers the SaaS provider has

D.

The number of network links the SaaS provider has

Full Access
Question # 37

A systems administrator is securing a new email system for a large corporation. The administrator wants to ensure private corporate information is not emailed to external users. Which of the following would be MOST useful to accomplish this task?

A.

DLP

B.

EDR

C.

DNSSEC

D.

SPF

Full Access
Question # 38

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?

A.

Log monitoring

B.

Patch management

C.

Vulnerability scanning

D.

System hardening

Full Access
Question # 39

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Full Access
Question # 40

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?

A.

Consult the law for the country where the company’s headquarters is located

B.

Consult the regulatory requirements for the company’s industry

C.

Consult the law for the country where the cloud services provider is located

D.

Consult the cloud services provider's policies and guidelines

Full Access
Question # 41

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

A.

Require the user's source IP to be an RFC1918 address.

B.

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.

Require the use of a password and a physical token.

D.

Require the password to be ten characters long.

Full Access
Question # 42

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

A.

Firewall outbound rules

B.

Firewall inbound rules

C.

Load balancer certificates

D.

Load balancer stickiness

E.

WAF transaction throttling

Full Access
Question # 43

A systems administrator wants to restrict access to a set of sensitive files to a specific group of users. Which of the following will achieve the objective?

A.

Add audit rules on the server

B.

Configure data loss prevention in the environment

C.

Change tine permissions and ownership of the files

D.

Implement a HIPS solution on the host

Full Access
Question # 44

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

A.

Site-to-site

B.

Client-to-site

C.

Point-to-site

D.

Point-to-point

Full Access
Question # 45

A company that requires full administrative control at the OS level is considering the use of public cloud services. Which of the following service models would BEST fit the company's requirements?

A.

SaaS

B.

DBaaS

C.

PaaS

D.

laaS

Full Access
Question # 46

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following

scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?

A.

Horizontal

B.

Vertical

C.

Cloud bursting

D.

Autoscaling

Full Access
Question # 47

A systems administrator is helping to develop a disaster recovery solution. The solution must ensure all production capabilities are available within two hours. Which of the following will BEST meet this requirement?

A.

A hot site

B.

A warm site

C.

A backup site

D.

A cold site

Full Access
Question # 48

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed.

Which of the following actions will make the server fully operational?

A.

Restart the RAID resynchronization process

B.

Perform a P2V migration of the server

C.

Swap the failed hard drive with a fresh one

D.

Restore the server from backup

Full Access
Question # 49

A systems administrator is troubleshooting performance issues with a VDI environment. The administrator determines the issue is GPU related and then increases the frame buffer on the virtual machines. Testing confirms the issue is solved, and everything is now working correctly. Which of the following should the administrator do NEXT?

A.

Consult corporate policies to ensure the fix is allowed

B.

Conduct internal and external research based on the symptoms

C.

Document the solution and place it in a shared knowledge base

D.

Establish a plan of action to resolve the issue

Full Access
Question # 50

After a few new web servers were deployed, the storage team began receiving incidents in their queue about the web servers. The storage administrator wants to verify the incident tickets that should have gone to the web server team. Which of the following is the MOST likely cause of the issue?

A.

Incorrect assignment group in service management

B.

Incorrect IP address configuration

C.

Incorrect syslog configuration on the web servers

D.

Incorrect SNMP settings

Full Access
Question # 51

An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?

A.

Two load balancers behind a single firewall

B.

Firewalls in a blue-green configuration

C.

Two firewalls in a HA configuration

D.

A web application firewall

Full Access
Question # 52

A system administrator supports an application in the cloud, which includes a restful API that receives an encrypted message that is passed to a calculator system. The administrator needs to ensure the proper function of the API using a new automation tool. Which of the following techniques would be BEST for the administrator to use to accomplish this requirement?

A.

Functional testing

B.

Performance testing

C.

Integration testing

D.

Unit testing

Full Access
Question # 53

A support engineer wants to prevent users from running malware on several IaaS compute instances. Which of the following will BEST achieve this objective?

A.

Encrypt all applications that users should not access.

B.

Set the execute filesystem permissions on the desired applications only.

C.

Implement an application whitelisting policy.

D.

Disable file sharing on the instance.

Full Access
Question # 54

A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM?

A.

CDN

B.

DNS

C.

NTP

D.

IPAM

Full Access
Question # 55

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Full Access
Question # 56

After announcing a big sales promotion, an e-commerce company starts to experience a slow response on its platform that is hosted in a public cloud. When checking the resources involved, the systems administrator sees the following consumption:

Considering all VMs were built from the same templates, which of the following actions should the administrator perform FIRST to speed up the response of the e-commerce platform?

A.

Spin up a new web server

B.

Spin up a new application server

C.

Add more memory to the web server

D.

Spin up a new database server

Full Access
Question # 57

An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations.

Which of the following is the MOST efficient way to bring the block storage in the primary datacenter up to date with the DR site?

A.

Set up replication.

B.

Copy the data across both sites.

C.

Restore incremental backups.

D.

Restore full backups.

Full Access
Question # 58

A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would all ow for the maximum number of two-core machines with equal memory?

A.

30 VMs, 3GB of memory

B.

40 VMs, 1,5GB of memory

C.

45 VMs, 2 GB of memory

D.

60 VMs, 1 GB of memory

Full Access
Question # 59

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?

A.

Incorrect encryption ciphers

B.

Broken trust relationship

C.

Invalid certificates

D.

Expired password

Full Access
Question # 60

A technician is trying to delete six decommissioned VMs. Four VMs were deleted without issue. However, two of the VMs cannot be deleted due to an error. Which of the following would MOST likely enable the technician to delete the VMs?

A.

Remove the snapshots

B.

Remove the VMs' IP addresses

C.

Remove the VMs from the resource group

D.

Remove the lock from the two VMs

Full Access
Question # 61

Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization?

A.

Auto-scaling of compute

B.

Oversubscription

C.

Dynamic memory allocations on guests

D.

Affinity rules in the hypervisor

Full Access
Question # 62

A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure?

A.

GPU

B.

CPU

C.

Storage

D.

Memory

Full Access
Question # 63

A systems administrator has received an email from the virtualized environment's alarms indicating the memory was reaching full utilization. When logging in, the administrator notices that one out of a five-host cluster has a utilization of 500GB out of 512GB of RAM. The baseline utilization has been 300GB for that host. Which of the following should the administrator check NEXT?

A.

Storage array

B.

Running applications

C.

VM integrity

D.

Allocated guest resources

Full Access
Question # 64

A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?

A.

A service availability scan

B.

An agent-based vulnerability scan

C.

A default and common credentialed scan

D.

A network port scan

Full Access
Question # 65

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

A.

Service_level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Full Access
Question # 66

A company has two primary offices, one in the United States and one in Europe. The company uses a public laaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

A.

Add an application load balancer to the applications to spread workloads.

B.

Integrate a CDN solution to distribute web content globally.

C.

Upgrade the bandwidth of the dedicated connection to the laaS provider.

D.

Migrate the applications to a region hosted in Europe.

Full Access
Question # 67

A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows:

A.

• Three public cloud hosts with four cores

• 120GB of RAM

• 100GB of storage

• 1Gbps

B.

• Three public cloud hosts with six cores

• 80GB of RAM

• 180GB of storage

• 150Mbps

C.

• Three public cloud hosts with six cores

• 80GB of RAM

• 1TB of storage

• 200Mbps

D.

• Four public cloud hosts with four cores

• 140GB of RAM

• 200GB of storage

Full Access
Question # 68

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

A.

Reboot all the servers in the green stack

B.

Failback to the blue stack

C.

Restore from backups

D.

Troubleshoot and resolve the application issues

Full Access
Question # 69

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?

A.

Implement a secret management solution.

B.

Create autoscaling capabilities.

C.

Develop CI/CD tools.

D.

Deploy a CMDB tool.

Full Access
Question # 70

A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?

A.

Compute

B.

Storage

C.

Licensing

D.

Scripts

Full Access
Question # 71

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).

A.

A load balancer

B.

SON

C.

A firewall

D.

SR-IOV

E.

Storage replication

F.

A VPN

Full Access
Question # 72

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public laaS. The team identifies the following rule as a potential

A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IR" Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the

server from their locations?

A.

Modify the outbound rule to allow the company's external IP address as a source.

B.

Add an inbound rule to use the IP address for the company's main office as a source.

C.

Modify the inbound rule to allow the company's external IP address as a source.

D.

Delete the inbound rule to allow the company's external IP address as a source.

Full Access
Question # 73

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?

A.

There is a configuration failure in the syslog solution.

B.

The application servers were migrated to the cloud as laaS instances.

C.

The application administrators have not performed any activity in those servers.

D.

There is a local firewall policy restriction on the syslog server.

Full Access
Question # 74

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?

A.

IPAM

B.

DoH

C.

VLAN

D.

SDN

Full Access
Question # 75

An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions.

Which of the following would be suitable to optimize the network for this requirement?

A.

Implement CDN for overall cloud application

B.

Implement auto-scaling of the compute resources

C.

Implement SR-IOV on the server instances

D.

Implement an application container solution

Full Access
Question # 76

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Full Access
Question # 77

An organization is required to set a custom registry key on the guest operating system.

Which of the following should the organization implement to facilitate this requirement?

A.

A configuration management solution

B.

A log and event monitoring solution

C.

A file integrity check solution

D.

An operating system ACL

Full Access
Question # 78

A systems administrator is troubleshooting network throughput issues following a deployment. The network is currently being overwhelmed by the amount of traffic between the database and the web servers in the environment.

Which of the following should the administrator do to resolve this issue?

A.

Set up affinity rules to keep web and database servers on the same hypervisor

B.

Enable jumbo frames on the gateway

C.

Move the web and database servers onto the same VXLAN

D.

Move the servers onto thick-provisioned storage

Full Access
Question # 79

A VDI administrator has received reports of poor application performance.

Which of the following should the administrator troubleshoot FIRST?

A.

The network environment

B.

Container resources

C.

Client devices

D.

Server resources

Full Access
Question # 80

An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time.

Which of the following should be implemented to improve application performance?

A.

Increase disk capacity

B.

Increase the memory and network bandwidth

C.

Upgrade the application

D.

Upgrade the environment and use SSD drives

Full Access
Question # 81

An organization has the following requirements that need to be met when implementing cloud services:

  • SSO to cloud infrastructure
  • On-premises directory service
  • RBAC for IT staff

Which of the following cloud models would meet these requirements?

A.

Public

B.

Community

C.

Hybrid

D.

Multitenant

Full Access
Question # 82

A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content.

Which of the following solutions will assist with the increased workload?

A.

DoH

B.

WAF

C.

IPS

D.

CDN

Full Access
Question # 83

A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal.

Which of the following should the administrator do to fix this issue?

A.

Change the database application IP

B.

Create a database cluster between the primary site and the DR site

C.

Update the connection string

D.

Edit the DNS record at the DR site for the application servers

Full Access
Question # 84

A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention.

Which of the following will BEST resolve this issue?

A.

Ensure all database queries are encrypted

B.

Create an IPSec tunnel between the database server and its clients

C.

Enable protocol encryption between the storage and the hypervisor

D.

Enable volume encryption on the storage

E.

Enable OS encryption

Full Access
Question # 85

A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error.

Which of the following will MOST likely solve the issue?

A.

Checking user passwords

B.

Configuring QoS rules

C.

Enforcing TLS authentication

D.

Opening TCP port 3389

Full Access
Question # 86

A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site.

Which of the following should be configured in between the cloud environment and the DR site?

A.

Failback

B.

Playbook

C.

Zoning

D.

Replication

Full Access
Question # 87

A systems administrator would like to reduce the network delay between two servers.

Which of the following will reduce the network delay without taxing other system resources?

A.

Decrease the MTU size on both servers

B.

Adjust the CPU resources on both servers

C.

Enable compression between the servers

D.

Configure a VPN tunnel between the servers

Full Access
Question # 88

A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well.

Which of the following should the administrator recommend the user do FIRST?

A.

Disable antivirus/anti-malware software

B.

Turn off the software firewall

C.

Establish a VPN tunnel between the computer and the web server

D.

Update the web browser to the latest version

Full Access
Question # 89

A company has deployed a new cloud solution and is required to meet security compliance.

Which of the following will MOST likely be executed in the cloud solution to meet security requirements?

A.

Performance testing

B.

Regression testing

C.

Vulnerability testing

D.

Usability testing

Full Access
Question # 90

A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities.

Which of the following testing techniques would be BEST to use?

A.

Usability testing

B.

Regression testing

C.

Vulnerability testing

D.

Penetration testing

Full Access
Question # 91

A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed.

Which of the following will BEST identify the CPU with more computational power?

A.

Simultaneous multithreading

B.

Bus speed

C.

L3 cache

D.

Instructions per cycle

Full Access
Question # 92

A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible.

Which of the following will BEST achieve this goal?

A.

Configure CPU passthrough

B.

Oversubscribe CPU resources

C.

Switch from a Type 1 to a Type 2 hypervisor

D.

Increase instructions per cycle

E.

Enable simultaneous multithreading

Full Access
Question # 93

Due to a policy change, a few of a customer’s application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%.

Which of the following is the MOST likely cause?

A.

There is not enough vCPU assigned

B.

The application is not compatible with the new settings

C.

The new configuration is adding latency

D.

The memory of the VM is underallocated

Full Access
Question # 94

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

Identify the problematic device(s).

Part 2:

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

Part 2:

Only select a maximum of TWO options from the multiple choice question

Full Access
Question # 95

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections.

Which of the following MOST likely needs to be analyzed before rehosting the ERP?

A.

Software

B.

Licensing

C.

Right-sizing

D.

The network

Full Access
Question # 96

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance has been slow since the images were upgraded from Windows 7 to Windows 10.

This VDI environment is used to run simple tasks, such as Microsoft Office. The administrator investigates the virtual machines and finds the following settings:

  • 4 vCPU
  • 16GB RAM
  • 10Gb networking
  • 256MB frame buffer

Which of the following MOST likely needs to be upgraded?

A.

vRAM

B.

vCPU

C.

vGPU

D.

vNIC

Full Access
Question # 97

A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command,

and notices the following relevant output:

Which of the following actions should the cloud administrator take to resolve the issue?

A.

Assign a new IP address of 192.168.100.10 to the web server

B.

Modify the firewall on 72.135.10.100 to allow only UDP

C.

Configure the WAF to filter requests from 17.3.130.3

D.

Update the gateway on the web server to use 72.135.10.1

Full Access
Question # 98

A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency.

Which of the following services should the technician deploy to eliminate the latency issue?

A.

Auto-scaling

B.

Cloud bursting

C.

A content delivery network

D.

A new cloud provider

Full Access
Question # 99

A systems administrator is provisioning VMs in a cloud environment and has been told to select an OS build with the furthest end-of-life date.

Which of the following OS builds would be BEST for the systems administrator to use?

A.

Open-source

B.

LTS

C.

Canary

D.

Beta

E.

Stable

Full Access
Question # 100

A systems administrator in a large enterprise needs to alter the configuration of one of the finance department’s database servers.

Which of the following should the administrator perform FIRST?

A.

Capacity planning

B.

Change management

C.

Backups

D.

Patching

Full Access
Question # 101

A systems administrator for an e-commerce company will be migrating the company’s main website to a cloud provider. The principal requirement is that the website must be highly available.

Which of the following will BEST address this requirement?

A.

Vertical scaling

B.

A server cluster

C.

Redundant switches

D.

A next-generation firewall

Full Access
Question # 102

Which of the following is relevant to capacity planning in a SaaS environment?

A.

Licensing

B.

A hypervisor

C.

Clustering

D.

Scalability

Full Access
Question # 103

Which of the following cloud deployment models allows a company to have full control over its IT infrastructure?

A.

Private

B.

Cloud within a cloud

C.

Hybrid

D.

Public

Full Access
Question # 104

An organization’s web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization’s web server infrastructure.

Which of the following should be implemented to prevent this in the future as a mitigation method?

A.

Enable DLP

B.

Configure microsegmentation

C.

Enable DNSSEC

D.

Deploy a vADC appliance

Full Access
Question # 105

A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:

  • High availability
  • Horizontal auto-scaling
  • 60 nodes peak capacity per region
  • Five reserved network IP addresses per subnet
  • /24 range

Which of the following would BEST meet the above requirements?

A.

Create two /25 subnets in different regions

B.

Create three /25 subnets in different regions

C.

Create two /26 subnets in different regions

D.

Create three /26 subnets in different regions

E.

Create two /27 subnets in different regions

F.

Create three /27 subnets in different regions

Full Access
Question # 106

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance.

Which of the following licensing models is the application MOST likely using?

A.

Per device

B.

Per user

C.

Core-based

D.

Volume-based

Full Access
Question # 107

A security analyst is investigating a recurring alert. The alert is reporting an insecure firewall configuration state after every cloud application deployment. The process of identifying the issue, requesting a fix, and waiting for the developers to manually patch the environment is being repeated multiple times. In an effort to identify the root issue, the following logs were collected:

Deploying template app prod. •yaml

Instance DB successfully created

DB keys successfully stored on vault

Instance WebApp successfully created

Access rules successfully applied

Access—keys successfully created

Which of the following options will provide a permanent fix for the issue?

A.

Validate the Iac code used during the deployment.

B.

Avoid the use of a vault to store database passwords.

C.

Rotate the access keys that were created during deployment.

D.

Recommend that the developers do not create multiple resources at once.

Full Access
Question # 108

An organization provides integration services for finance companies that use web services. A new company that sends and receives more than 100,000 transactions per second has been integrated using the web service. The other integrated companies are now reporting slowness with regard to the integration service. Which of the following is the cause of the issue?

A.

Incorrect configuration in the authentication process

B.

Incorrect configuration in the message queue length

C.

Incorrect configuration in user access permissions

D.

Incorrect configuration in the SAN storage pool

Full Access
Question # 109

A web consultancy group currently works in an isolated development environment. The group uses this environment for the creation of the final solution, but also for showcasing it to customers, before commissioning the sites in production. Recently, customers of newly commissioned sites have reported they are not receiving the final product shown by the group, and

the website is performing in unexpected ways. Which of the following additional environments should the group adopt and include in its process?

A.

Provide each web consultant a local environment on their device.

B.

Require each customer to have a blue-green environment.

C.

Leverage a staging environment that is tightly controlled for showcasing.

D.

Initiate a disaster recovery environment to fail to in the event of reported issues.

Full Access
Question # 110

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Full Access
Question # 111

A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way?

A.

Submit the upgrade to the CAB.

B.

Perform a full backup.

C.

Take a snapshot of the system.

D.

Test the upgrade in a preproduction environment.

Full Access
Question # 112

A DevOps team needs to provide a solution that offers isolation, portability, and scalability Which of the following would BEST meet these requirements?

A.

Virtual machines

B.

Containers

C.

Appliances

D.

Clusters

Full Access
Question # 113

An organization has a web-server farm. Which of the following solutions should be implemented to obtain efficient distribution of requests to theservers?

A.

A clustered web server infrastructure

B.

A load-balancing appliance

C.

A containerized application

D.

Distribution of web servers across different regions and zones

Full Access
Question # 114

An organization is implementing a new requirement to facilitate faster downloads for users of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?

A.

Implement CDN for overall cloud application.

B.

Implement autoscaling of the compute resources.

C.

Implement SR-IOV on the server instances.

D.

Implement an application container solution.

Full Access
Question # 115

A systems administrator is implementing a new file storage service that has been deployed in the company's private cloud instance. The key requirement is fast read/write times for the targeted users, and the budget for this project is not a concern. Which of the following storage types should the administrator deploy?

A.

Spinning disks

B.

NVMe

C.

SSD

D.

Hybrid

Full Access
Question # 116

A systems administrator is planning to migrate to a cloud solution with volume-based licensing. Which of the following is most important when considering licensing costs?

A.

The number of cores

B.

The number of threads

C.

The number of machines

D.

The number of sockets

Full Access
Question # 117

A company's marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?

A.

GPU passthrough

B.

Increased memory

C.

Converged infrastructure

D.

An additional CPU core

Full Access
Question # 118

A company is using a hybrid cloud environment. The private cloud is hosting the business applications, and the cloud services are being used to replicate for availability purposes.

The cloud services are also being used to accommodate the additional resource requirements to provide continued services. Which of the following scalability models is the company utilizing?

A.

Vertical scaling

B.

Autoscaling

C.

Cloud bursting

D.

Horizontal scaling

Full Access
Question # 119

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?

A.

Upgrading the physical server NICs to support IOGbps

B.

Adding more vCPU

C.

Enabling SR-IOV capability

D.

Increasing the VM swap/paging size

Full Access
Question # 120

A company has a web application running in an on-premises environment that needs to be migrated to the cloud. The company wants to implement a solution that maximizes scalability, availability, and security, while requiring no infrastructure administration. Which of the following services would be BEST to meet this goal?

A.

A PaaS solution

B.

A hybrid solution

C.

An laaS solution

D.

A SaaS solution

Full Access
Question # 121

A systems administrator audits a cloud application and discovers one of the key regulatory requirements has not been addressed. The requirement states that if

a physical breach occurs and hard drives are stolen, the contents of the drives should not be readable. Which of the following should be used to address the requirement?

A.

Obfuscation

B.

Encryption

C.

EDR

D.

HIPS

Full Access
Question # 122

A cloud administrator receives an email stating the following:

"Clients are receiving emails from our web application with non-encrypted links."

The administrator notices that links generated from the web application are opening in http://. Which of the following should be configured to redirect the traffic to https://?

A.

User account access

B.

Programming code

C.

Web server configuration

D.

Load balancer setting

Full Access
Question # 123

A cloud administrator is looking at the company's cloud services bill for the previous month. The administrator notices on the billing dashboard that certain resources are not being billed to any particular department. Which of the following actions will help correct this billing issue?

A.

Check the utilization of the resources.

B.

Modify the chargeback details of the consumer.

C.

Add the resources to the consumer monitoring group.

D.

Modify the tags for all the unmapped resources.

Full Access
Question # 124

A systems administrator notices the host filesystem is running out of storage space. Which of the following will best reduce the storage space on the system?

A.

Deduplication

B.

Compression

C.

Adaptive optimization

D.

Thin provisioning

Full Access
Question # 125

A systems administrator is selecting the appropriate RAID level to support a private cloud with the following requirements:

. The storage array must withstand the failure of up to two drives.

. The storage array must maximize the storage capacity of its drives.

Which of the following RAID levels should the administrator implement?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Full Access