New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Cloud+ > CV0-003

CV0-003 CompTIA Cloud+ Certification Exam Question and Answers

Question # 4

A company is planning its cloud architecture and wants to use a VPC for each of its three products per environment in two regions, totaling 18 VPCs. The products have interdependences, consuming services between VPCs. Which of the following should the cloud architect use to connect all the VPCs?

A.

MPLS connections

B.

VPC peering

C.

Hub and spoke

D.

VPN connections

Full Access
Question # 5

A systems administrator received an email from a cloud provider stating that storage is 80% full on the volume that stores VDI desktops. Which of the following is the MOST efficient way to mitigate the situation?

A.

Deduplication

B.

Compression

C.

Replication

D.

Storage migration

Full Access
Question # 6

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?

A.

There is a configuration failure in the syslog solution.

B.

The application servers were migrated to the cloud as laaS instances.

C.

The application administrators have not performed any activity in those servers.

D.

There is a local firewall policy restriction on the syslog server.

Full Access
Question # 7

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?

A.

MTTF

B.

SLA

C.

RTO

D.

RPO

Full Access
Question # 8

A storage administrator is reviewing the storage consumption of a SAN appliance that is running a VDI environment. Which of the following features should the administrator implement to BEST reduce the storage consumption of the SAN?

A.

Deduplication

B.

Thick provisioning

C.

Compression

D.

SDS

Full Access
Question # 9

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

A.

Require the user's source IP to be an RFC1918 address.

B.

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.

Require the use of a password and a physical token.

D.

Require the password to be ten characters long.

Full Access
Question # 10

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?

A.

IPAM

B.

DoH

C.

VLAN

D.

SDN

Full Access
Question # 11

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).

A.

A load balancer

B.

SON

C.

A firewall

D.

SR-IOV

E.

Storage replication

F.

A VPN

Full Access
Question # 12

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?

A.

Store the credentials in a variable on every worker node

B.

Store the credentials on a shared volume using whole-disk encryption

C.

Store the credentials in a configuration file using SHA-256 inside the container image

D.

Store the credentials using the orchestrator secret manager

Full Access
Question # 13

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following

scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?

A.

Horizontal

B.

Vertical

C.

Cloud bursting

D.

Autoscaling

Full Access
Question # 14

A startup online gaming company is designing the optimal graphical user experience for multiplayer scenarios. However, online players have reported latency issues. Which of the following should the company configure as a remediation?

A.

Additional GPU memory

B.

Faster clock speed

C.

Additional CPU cores

D.

Dynamic allocations

Full Access
Question # 15

A systems administrator wants to restrict access to a set of sensitive files to a specific group of users. Which of the following will achieve the objective?

A.

Add audit rules on the server

B.

Configure data loss prevention in the environment

C.

Change tine permissions and ownership of the files

D.

Implement a HIPS solution on the host

Full Access
Question # 16

A cloud solutions architect has received guidance to migrate an application from on premises to a public cloud. Which of the following requirements will help predict the operational expenditures in the cloud?

A.

Average resource consumption

B.

Maximum resource consumption

C.

Minimum resource consumption

D.

Actual hardware configuration

Full Access
Question # 17

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

A.

Service_level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Full Access
Question # 18

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks. After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

A.

The target system's API functionality has been deprecated.

B.

The password for the service account has expired.

C.

The IP addresses of the target system have changed.

D.

The target system has failed after the updates.

Full Access
Question # 19

An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection?

A.

WAF

B.

EDR

C.

IDS

D.

HIPS

E.

SSL

Full Access
Question # 20

A security analyst is investigating incidents in which attackers are able to access sensitive data from a corporate application's database. The attacks occur periodically and usually

after the release of a new application's version. The following log confirms the compromise:

USER: WebApp access—key accepted

WebApp user assumed DBA role

GetData API call executed

The following actions are made after every incident occurrence:

• Validation of firewall rules

• Scripted rebuild of the database and web instances

• Application deployment from a cloud code repository

Which of the following actions will MOST likely prevent future compromises?

A.

Rotating the account credentials

B.

Migrating the database to be on premises

C.

Forbidding the use of API calls to retrieve data

D.

Implementing a new database service account

Full Access
Question # 21

A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality?

A.

NAC

B.

IDS

C.

DLP

D.

EDR

Full Access
Question # 22

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company's security posture?

A.

SSH

B.

MFA

C.

Certificates

D.

Federation

Full Access
Question # 23

A local bank has all of its infrastructure in the cloud. An update was applied to the main database server at 5:00 a.m. on Monday morning, and the database was then corrupted and unusable. It had to be restored from backup. The last backup was taken the night before at 10:00 p.m. The database was then restored successfully, but seven hours' worth of data was lost, which is deemed unacceptable. Which of the following needs to be updated in the DR plan?

A.

Recovery point objective

B.

Statement of work

C.

Service-level agreement

D.

Recovery time objective

Full Access
Question # 24

A company is using a method of tests and upgrades in which a small set of end users are exposed to new services before the majority of other users. Which of the following deployment methods is being used?

A.

Blue-green

B.

Canary

C.

Big bang

D.

Rolling

Full Access
Question # 25

An administrator needs to back up all the data from each VM daily while also saving space. Which of the following backup types will BEST fit this scenario?

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Full

Full Access
Question # 26

A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows:

A.

• Three public cloud hosts with four cores

• 120GB of RAM

• 100GB of storage

• 1Gbps

B.

• Three public cloud hosts with six cores

• 80GB of RAM

• 180GB of storage

• 150Mbps

C.

• Three public cloud hosts with six cores

• 80GB of RAM

• 1TB of storage

• 200Mbps

D.

• Four public cloud hosts with four cores

• 140GB of RAM

• 200GB of storage

Full Access
Question # 27

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?

A.

HTTPS

B.

IPSec

C.

TLS

D.

SSH

Full Access
Question # 28

A cloud administrator is configuring several security appliances hosted in the private laaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?

A.

Allow UDP 161 outbound from the web servers to the log collector .

B.

Allow TCP 514 outbound from the web servers to the log collector.

C.

Allow UDP 161 inbound from the log collector to the web servers .

D.

Allow TCP 514 inbound from the log collector to the web servers .

Full Access
Question # 29

A cloud engineer has deployed a virtual storage appliance into a public cloud environment. The storage appliance has a NAT to a public IP address. An administrator later notices there are some strange files on the storage appliance and a large spike in network traffic on the machine. Which of the following is the MOST likely cause?

A.

The default password is still configured on the appliance.

B.

The appliance's certificate has expired.

C.

The storage appliance has no firewall.

D.

Data encryption is enabled, and the files are hashed.

Full Access
Question # 30

A systems administrator needs to deploy a solution to automate new application releases that come from the development team. The administrator is responsible for provisioning resources at the infrastructure layer without modifying any configurations in the application code. Which of the following would BEST accomplish this task?

A.

Implementing a CI/CD tool

B.

Configuring infrastructure as code

C.

Deploying an orchestration tool

D.

Employing DevOps methodology

Full Access
Question # 31

A cloud solutions architect is working on a private cloud environment in which storage consumption is increasing daily, resulting in high costs. Which of the following can the architect use to provide more space without adding more capacity? (Select two).

A.

Tiering

B.

Deduplication

C.

RAID provisioning

D.

Compression

E.

Flash optimization

F.

NVMe

Full Access
Question # 32

A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?

A.

A CDN solution

B.

An MPLS connection between data centers

C.

A DNS round robin

D.

A site-to-site VPN between data centers

Full Access
Question # 33

A cloud administrator is supporting an application that has several reliability issues. The administrator needs visibility into the performance characteristics of the application. Which of the following will MOST likely be used in a reporting dashboard?

A.

Data from files containing error messages from the application

B.

Results from the last performance and workload testing

C.

Detail log data from syslog files of the application

D.

Metrics and time-series data measuring key performance indicators

Full Access
Question # 34

A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?

A.

Compute

B.

Storage

C.

Licensing

D.

Scripts

Full Access
Question # 35

A systems administrator audits a cloud application and discovers one of the key regulatory requirements has not been addressed. The requirement states that if

a physical breach occurs and hard drives are stolen, the contents of the drives should not be readable. Which of the following should be used to address the requirement?

A.

Obfuscation

B.

Encryption

C.

EDR

D.

HIPS

Full Access
Question # 36

The Chief Information Officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud. The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information. Which of the following should be configured during the migration?

A.

ACL

B.

VPN

C.

P2V

D.

VDI

Full Access
Question # 37

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Full Access
Question # 38

Which of the following are advantages of a public cloud? (Select TWO).

A.

Full control of hardware

B.

Reduced monthly costs

C.

Decreased network latency

D.

Pay as you use

E.

Availability of self-service

F.

More secure data

Full Access
Question # 39

A corporation is evaluating an offer from a CSP to take advantage of volume discounts on a shared platform. The finance department is concerned about cost allocation transparency, as the current structure splits projects into dedicated billing accounts. Which of the following can be used to address this concern?

A.

Implementing resource tagging

B.

Defining a cost baseline

C.

Consolidating the billing accounts

D.

Using a third-party accounting tool

Full Access
Question # 40

A systems administrator is setting up a backup solution to follow the 3-2-1 policy. Currently, the solution is set to back up from the servers to an on-site storage server. Which of the following should the administrator configure to comply with the 3-2-1 policy?

A.

Weekly lull backups, with daily incremental backups

B.

A second on-site storage server for backups

C.

Storage snapshots

D.

An off-site storage server for backups

Full Access
Question # 41

A company has applications that need to remain available in the event of the data center being unavailable. The company's cloud architect needs to find a solution to maintain business continuity. Which of following should the company implement?

A.

A DR solution for the application between different data centers

B.

An off-site backup solution with a third-party vendor

C.

laC techniques to recreate the system at a new provider

D.

An HA solution for the application inside the data center

Full Access
Question # 42

A systems administrator is reviewing the application development process with the development team and notices that the team has no way to collaboratively develop code. Which of the following methods should be implemented to resolve this issue?

A.

Continuous deployment.

B.

Version control.

C.

Change management.

D.

Configuration management.

Full Access
Question # 43

A systems administrator receives an alert that VDI performance on the cluster is poor. Opening any application takes one to two minutes. The administrator investigates and finds the following conditions:

    Cluster memory utilization: 65%

    Cluster SSD utilization: 70%

    Average VM CPU wait time: 14%

    Cluster CPU utilization: 75%

Which of the following actions should the administrator take to improve VDI performance?

A.

Add CPU resources to the cluster.

B.

Increase the number of vCPUs per VM.

C.

Add memory to the nodes in the cluster.

D.

Increase the amount of SSD storage in the cluster.

Full Access
Question # 44

As a result of an IT audit, a customer has decided to move some applications from an old legacy system to a private cloud. The current server location is remote with low bandwidth. Which of the following is the best migration strategy to use for this deployment?

A.

P2V with physical data transport

B.

P2P with remote data copy

C.

V2V with physical data transport

D.

V2P with physical data transport

E.

V2P with remote data copy

Full Access
Question # 45

Different healthcare organizations have agreed to collaborate and build a cloud infrastructure that should minimize compliance costs and provide a high degree of security and privacy, as per regulatory requirements. This is an example of a:

A.

private cloud.

B.

community cloud.

C.

hybrid cloud.

D.

public cloud.

Full Access
Question # 46

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Full Access
Question # 47

A cloud engineer is required to move legacy systems to a public cloud. The system configuration is provided below:

Server Name

Cores

OS Disk (Used)

Data Disk (Used)

Encryption

Web1

2

500GB (45%)

1TB (20%)

OS

Web2

2

500GB (40%)

1TB (90%)

OS

App1

4

250GB (90%)

2TB (65%)

No

App2

4

250GB (70%)

2TB (95%)

No

DB1

16

250GB (25%)

4TB (65%)

Data

The public cloud provider VMs support a maximum OS disk size of 250GB and a data disk size of 2TB. Which of the following tasks will contribute to a successful migration to the cloud environment? (Select two).

A.

Clean up Web1's OS disk.

B.

Shrink the OS disk for Web1 and Web2.

C.

Migrate DB1 to DBaaS.

D.

Clean up App1's OS Disk.

E.

Decrypt DB1.

F.

Convert DB1 to a clustered database.

Full Access
Question # 48

A systems administrator is tasked with configuring a cloud-based disaster recovery solution. The organization requires that the recovery point objective (RPO) be as low as possible while keeping costs manageable. Which of the following strategies best meets this requirement?

A.

Incremental backups with snapshots.

B.

Differential backups stored on a warm site.

C.

Replication of critical data to a cold site.

D.

Full backups stored offsite.

Full Access
Question # 49

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled? (Select two).

A.

Telnet

B.

FTP

C.

Remote log-in

D.

DNS

E.

DHCP

F.

LDAP

Full Access
Question # 50

A cloud engineer needs to perform a database migration. The database has a restricted SLA and cannot be offline for more than ten minutes per month. The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps Which of the following is the best option to perform the migration?

A.

Copy the database to an external device and ship the device to the CSP.

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-party tool to back up and restore the data to the new database.

D.

Use the database import/export method and copy the exported file.

Full Access
Question # 51

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to best reduce cost?

A.

Scaling of the environment after work hours

B.

Implementing access control after work hours

C.

Shutting down the environment after work hours

D.

Blocking external access to the environment after work hours

Full Access
Question # 52

A cloud security engineer needs to design an IDS/IPS solution for a web application in a single virtual private network. The engineer is considering implementing IPS protection for traffic coming from the internet. Which of the following should the engineer consider to meet this requirement?

A.

Configuring a web proxy server

B.

Implementing load balancing using SSI- in front of web applications

C.

Implementing IDS/IPS agents on each instance running in that virtual private network

D.

Implementing dynamic routing

Full Access
Question # 53

A company has entered into a business relationship with another organization and needs to provide access to internal resources through directory services. Which of the following should a systems administrator implement?

A.

sso

B.

VPN

C.

SSH

D.

SAML

Full Access
Question # 54

A systems administrator is building a standardized OS template for the deployment of a web service. The image is intended for various autoscaling groups. Which of the following should be included in the image as best practice?

A.

Graphical user interface.

B.

Website configuration.

C.

System security hardening elements.

D.

Compute, memory, and storage capacity.

Full Access
Question # 55

A cloud administrator is looking at the company's cloud services bill for the previous month. The administrator notices on the billing dashboard that certain resources are not being billed to any particular department. Which of the following actions will help correct this billing issue?

A.

Check the utilization of the resources.

B.

Modify the chargeback details of the consumer.

C.

Add the resources to the consumer monitoring group.

D.

Modify the tags for all the unmapped resources.

Full Access
Question # 56

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?

A.

Log monitoring

B.

Patch management

C.

Vulnerability scanning

D.

System hardening

Full Access
Question # 57

A systems administrator needs to provide information for a capacity-planning document. Which of the following is the most relevant baseline and capacity information?

A.

vCPU, vGPU, subscriptions, geographical, storage, user density, firewall settings.

B.

vGPU, storage, networking, user density, firewall, budgetary.

C.

vCPU, subscriptions, storage, DDoS, licensing, user density.

D.

vCPU, vGPU, subscriptions, storage, bandwidth, licensing.

Full Access
Question # 58

A cloud engineer is migrating a customer's web servers from a hypervisor platform to a CSP environment. The engineer needs to decouple the infrastructure and components during the migration to reduce the single points of failure. Which of the following storage options should the cloud engineer migrate the content to in order to improve availability?

A.

Block

B.

File

C.

Object

D.

iSCSI

E.

NFS

Full Access
Question # 59

A systems administrator wants to be notified every time an application's configuration files are updated. Which of the following should the administrator implement to achieve the objective?

A.

ZFS

B.

FIM

C.

MAC

D.

DLP

Full Access
Question # 60

A cloud engineer gathered the following requirements for a factory automation system:

    Assembly line systems are latency-sensitive.

    Internet connectivity issues are common and can be prolonged.

    Services must support a 99.999% system uptime.

Which of the following components would be useful in implementing a hybrid model? (Select two).

A.

Cloud-based orchestration.

B.

Cloud edge devices.

C.

Local services.

D.

Cloud-managed services.

E.

Centralized logging and alerting.

F.

CDN provider.

Full Access
Question # 61

A systems administrator is writing a script for provisioning nodes in the environment. Which of the following would be best for the administrator to use to provision the authentication credentials to the script?

B.

password=$env_password

C.

password=$ (cat /opt/app/credentials)

D.

password="MyS3cretP4sswordIsVeryLong"

Full Access
Question # 62

A new development team requires workstations hosted in a PaaS to develop a new website. Members of the team also require remote access to the workstations using their corporate email addresses. Which of the following solutions will BEST meet these requirements? (Select TWO).

A.

Deploy new virtual machines.

B.

Configure email account replication.

C.

Integrate identity services.

D.

Implement a VDI solution.

E.

Migrate local VHD workstations.

F.

Create a new directory service.

Full Access
Question # 63

A cloud engineer is configuring automated backups for a database. The engineer wants to ensure that backups can be restored quickly and consistently to meet the SLA. Which of the following backup methods would be the most appropriate?

A.

Incremental.

B.

Differential.

C.

Full.

D.

Synthetic full.

Full Access
Question # 64

A systems administrator is implementing a new version of a company's primary human-resources application. An upgrade will be performed on the production server, as there is no development environment. The administrator needs to have a

plan in case something goes wrong with the upgrade. Which of the following will work best to ensure a quick rollback in case an issue arises?

A.

An application-level backup

B.

A production snapshot

C.

A full backup

D.

A differential backup

Full Access
Question # 65

A cloud administrator receives an email stating the following:

"Clients are receiving emails from our web application with non-encrypted links."

The administrator notices that links generated from the web application are opening in http://. Which of the following should be configured to redirect the traffic to https://?

A.

User account access

B.

Programming code

C.

Web server configuration

D.

Load balancer setting

Full Access
Question # 66

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Full Access
Question # 67

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Full Access
Question # 68

A non-critical file on a database server was deleted and needs to be recovered. A cloud administrator must use the least disruptive restoration process to retrieve the file, as the database server cannot be stopped during the business day. Which of the following restoration methods would best accomplish this goal?

A.

Alternate location

B.

Restore from image

C.

Revert to snapshot

D.

In-place restoration

Full Access
Question # 69

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?

A.

Incorrect encryption ciphers

B.

Broken trust relationship

C.

Invalid certificates

D.

Expired password

Full Access
Question # 70

A cloud administrator wants to have a central repository for all the logs in the company’s private cloud. Which of the following should be implemented to BEST meet this requirement?

A.

SNMP

B.

Log scrubbing

C.

CMDB

D.

A syslog server

Full Access
Question # 71

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Full Access
Question # 72

An administrator has been informed that some requests are taking a longer time to respond than other requests of the same type. The cloud consumer is using multiple network service providers and is performing link load balancing for bandwidth aggregation. Which of the following commands will help the administrator understand the possible latency issues?

A.

ping

B.

ipconfig

C.

traceroute

D.

netstat

Full Access
Question # 73

A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity?

A.

Patch management

B.

Hardening

C.

Scaling

D.

Log and event monitoring

Full Access
Question # 74

A company needs to migrate the storage system and batch jobs from the local storage system to a public cloud provider. Which of the following accounts will MOST likely be created to run the batch processes?

A.

User

B.

LDAP

C.

Role-based

D.

Service

Full Access
Question # 75

A systems administrator wants to ensure two VMs remain together on the same host. Which of the following must be set up to enable this functionality?

A.

Affinity

B.

Zones

C.

Regions

D.

A cluster

Full Access
Question # 76

A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?

A.

Create a VPC and peer the networks.

B.

Implement dynamic routing.

C.

Enable DHCP on the networks.

D.

Obtain a new IPAM subscription.

Full Access
Question # 77

A cloud administrator has deployed a new VM. The VM cannot access the Internet or the VMs on any other subnet. The administrator runs a network command and sees the following output:

The new VM can access another VM at 172.16.31.39. The administrator has verified the IP address is correct. Which of the following is the MOST likely cause of the connectivity issue?

A.

A missing static route

B.

A duplicate IP on the network

C.

Firewall issues

D.

The wrong gateway

Full Access
Question # 78

Which of the following definitions of serverless computing BEST explains how it is different from using VMs?

A.

Serverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP.

B.

Serverless computing uses predictable billing and offers lower costs than VM compute services.

C.

Serverless computing is a scalable, highly available cloud service that uses SDN technologies.

D.

Serverless computing allows developers to focus on writing code and organizations to focus on business.

Full Access
Question # 79

A Chief Information Security Officer (CISO) is evaluating the company’s security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?

A.

An SLA document

B.

ADR plan

C.

SOC procedures

D.

A risk register

Full Access
Question # 80

An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations.

Which of the following is the MOST efficient way to bring the block storage in the primary datacenter up to date with the DR site?

A.

Set up replication.

B.

Copy the data across both sites.

C.

Restore incremental backups.

D.

Restore full backups.

Full Access
Question # 81

Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?

A.

A business continuity plan

B.

Incident response/disaster recovery documentation

C.

A tabletop exercise

D.

A root cause analysis

Full Access
Question # 82

A software development manager is looking for a solution that will allow a team of developers to work in isolated environments that can be spun up and torn down quickly.

Which of the following is the MOST appropriate solution?

A.

Containers

B.

File subscriptions

C.

Ballooning

D.

Software-defined storage

Full Access
Question # 83

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Which of the following actions should the analyst take to accomplish the objective?

A.

Remove rules 1, 2, and 5.

B.

Remove rules 1, 3, and 4.

C.

Remove rules 2, 3, and 4.

D.

Remove rules 3, 4, and 5.

Full Access
Question # 84

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it.

Which of the following configuration options would BEST meet this requirement?

A.

Virtual GPU

B.

External GPU

C.

Passthrough GPU

D.

Shared GPU

Full Access
Question # 85

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?

A.

Deploy web servers into an laaS provider.

B.

Implement a cloud-based VDI solution.

C.

Provision web servers in a container environment.

D.

Use PaaS components in the cloud to implement the product.

Full Access
Question # 86

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed.

Which of the following actions will make the server fully operational?

A.

Restart the RAID resynchronization process

B.

Perform a P2V migration of the server

C.

Swap the failed hard drive with a fresh one

D.

Restore the server from backup

Full Access
Question # 87

A company had a system compromise, and the engineering team resolved the issue after 12 hours. Which of the following information will MOST likely be requested by the Chief Information Officer (CIO) to understand the issue and its resolution?

A.

A root cause analysis

B.

Application documentation

C.

Acquired evidence

D.

Application logs

Full Access
Question # 88

A vendor is installing a new retail store management application for a customer. The application license ensures software costs are low when the application is not being used, but costs go up when use is higher.

Which of the following licensing models is MOST likely being used?

A.

Socket-based

B.

Core-based

C.

Subscription

D.

Volume-based

Full Access
Question # 89

Which of the following service models would be used for a database in the cloud?

A.

PaaS

B.

laaS

C.

CaaS

D.

SaaS

Full Access
Question # 90

Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization?

A.

Auto-scaling of compute

B.

Oversubscription

C.

Dynamic memory allocations on guests

D.

Affinity rules in the hypervisor

Full Access
Question # 91

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?

A.

Virtual machines

B.

Software as a service

C.

Serverless computing

D.

Containers

Full Access
Question # 92

Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud?

A.

Deploy a new instance using a known-good base image.

B.

Configure a firewall rule to block the traffic on the affected instance.

C.

Perform a forensic analysis of the affected instance.

D.

Conduct a tabletop exercise involving developers and systems administrators.

Full Access
Question # 93

A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure?

A.

GPU

B.

CPU

C.

Storage

D.

Memory

Full Access
Question # 94

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

A.

The target system's API functionality has been deprecated

B.

The password for the service account has expired

C.

The IP addresses of the target system have changed

D.

The target system has failed after the updates

Full Access
Question # 95

An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used?

A.

Thick provisioning

B.

Software-defined storage

C.

User quotas

D.

Network file system

Full Access
Question # 96

A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?

A.

API version incompatibility

B.

Misconfigured script account

C.

Wrong template selection

D.

Incorrect provisioning script indentation

Full Access
Question # 97

A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring the VM uses only the storage if needs. Which of the following will BEST achieve this goal?

A.

Compression

B.

Deduplication

C.

RAID

D.

Thin provisioning

Full Access
Question # 98

A systems administrator adds servers to a round-robin, load-balanced pool, and then starts receiving reports of the website being intermittently unavailable. Which of the following is the MOST likely cause of the issue?

A.

The network is being saturated.

B.

The load balancer is being overwhelmed.

C.

New web nodes are not operational.

D.

The API version is incompatible.

E.

There are time synchronization issues.

Full Access
Question # 99

A technician needs to deploy two virtual machines in preparation for the configuration of a financial application next week. Which of the following cloud deployment models should the technician use?

A.

XaaS

B.

IaaS

C.

PaaS

D.

SaaS

Full Access
Question # 100

A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other. Which of the following should an administrator perform to comply with the security requirement?

A.

Create separate virtual networks for production, QA, and development servers.

Move the servers to the appropriate virtual network.

Apply a network security group to each virtual network that denies all traffic except for the firewall.

B.

Create separate network security groups for production, QA, and development servers.

Apply the network security groups on the appropriate production, QA, and development servers.

Peer the networks together.

C.

Create separate virtual networks for production, QA, and development servers.

Move the servers to the appropriate virtual network.

Peer the networks together.

D.

Create separate network security groups for production, QA, and development servers.

Peer the networks together.

Create static routes for each network to the firewall.

Full Access
Question # 101

A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?

A.

The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS

B.

The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor

C.

The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule

D.

Migrating from laaS to on premises, the network traffic between on-premises users and the laaS instance, and the CPU utilization of the hypervisor host

Full Access
Question # 102

A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site.

Which of the following should be configured in between the cloud environment and the DR site?

A.

Failback

B.

Playbook

C.

Zoning

D.

Replication

Full Access
Question # 103

An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation:

    Production traffic (10.10.0.0/24)

    Network backup (10.20.0.0/25)

    Virtual IP network (10.20.0.128/25)

The following configuration exists on the server:

The backup administrator observes that the weekly backup is failing for this server. Which of the following commands should the administrator run to identify the issue?

A.

ROUTE PRINT

B.

NETSTAT -A

C.

IPCONFIG /ALL

D.

NET SM

Full Access
Question # 104

After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?

A.

One 32 vCPU node with CDN caching

B.

Two 8 vCPU nodes with load balancing

C.

Three to six 8 vCPU nodes autoscaling group

D.

Four 8 vCPU nodes with DNS round robin

Full Access
Question # 105

A company has decided to get multiple compliance and security certifications for its public cloud environment. However, the company has few staff members to handle the extra workload, and it has limited knowledge of the current infrastructure.

Which of the following will help the company meet the compliance requirements as quickly as possible?

A.

DLP

B.

CASB

C.

FIM

D.

NAC

Full Access
Question # 106

Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A’s cloud resources while retaining its IAM solution.

Which of the following should be implemented?

A.

Multifactor authentication

B.

Single sign-on

C.

Identity federation

D.

Directory service

Full Access
Question # 107

A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below:

The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions.

Which of the following solutions would help the company accommodate the new workload in the SHORTEST amount of time and with the maximum financial benefits?

A.

Configure auto-scaling within the private cloud

B.

Set up cloud bursting for the additional resources

C.

Migrate all workloads to a public cloud provider

D.

Add more capacity to the private cloud

Full Access
Question # 108

The human resources department was charged for a cloud service that belongs to another department. All other cloud costs seem to be correct.

Which of the following is the MOST likely cause for this error?

A.

Misconfigured templates

B.

Misconfigured chargeback

C.

Incorrect security groups

D.

Misconfigured tags

Full Access
Question # 109

A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution.

Which of the following will provide the data to measure business continuity? (Choose two.)

A.

A service-level agreement

B.

Automation scripts

C.

Playbooks

D.

A network diagram

E.

A backup and restore

F.

A recovery time objective

Full Access
Question # 110

A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command,

and notices the following relevant output:

Which of the following actions should the cloud administrator take to resolve the issue?

A.

Assign a new IP address of 192.168.100.10 to the web server

B.

Modify the firewall on 72.135.10.100 to allow only UDP

C.

Configure the WAF to filter requests from 17.3.130.3

D.

Update the gateway on the web server to use 72.135.10.1

Full Access
Question # 111

Based on the shared responsibility model, which of the following solutions passes the responsibility of patching the OS to the customer?

A.

PaaS

B.

DBaaS

C.

laaS

D.

SaaS

Full Access
Question # 112

A cloud administrator is planning to migrate a globally accessed application to the cloud.

Which of the following should the cloud administrator implement to BEST reduce latency for all users?

A.

Regions

B.

Auto-scaling

C.

Clustering

D.

Cloud bursting

Full Access
Question # 113

A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities.

Which of the following testing techniques would be BEST to use?

A.

Usability testing

B.

Regression testing

C.

Vulnerability testing

D.

Penetration testing

Full Access
Question # 114

An organization has two businesses that are developing different software products. They are using a single cloud provider with multiple IaaS instances. The organization identifies that the tracking of costs for each

business are inaccurate.

Which of the following is the BEST method for resolving this issue?

A.

Perform segregation of the VLAN and capture egress and ingress values of each network interface

B.

Tag each server with a dedicated cost and sum them based on the businesses

C.

Split the total monthly invoice equally between the businesses

D.

Create a dedicated subscription for the businesses to manage the costs

Full Access
Question # 115

Which of the following is relevant to capacity planning in a SaaS environment?

A.

Licensing

B.

A hypervisor

C.

Clustering

D.

Scalability

Full Access
Question # 116

A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task.

Which of the following ports should the administrator open on the monitoring server’s firewall?

A.

53

B.

123

C.

139

D.

161

Full Access
Question # 117

An organization’s web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization’s web server infrastructure.

Which of the following should be implemented to prevent this in the future as a mitigation method?

A.

Enable DLP

B.

Configure microsegmentation

C.

Enable DNSSEC

D.

Deploy a vADC appliance

Full Access
Question # 118

The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other’s work.

Which of the following did the team MOST likely forget to implement?

A.

Incident type categories

B.

A calling tree

C.

Change management

D.

Roles and responsibilities

Full Access
Question # 119

A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the only group allowed to modify files in the directory.

Which of the following will accomplish the desired objective?

A.

Remove the file write permissions for the application service account.

B.

Restrict the file write permissions to the development group only.

C.

Add access to the fileshare for the systems administrator’s group.

D.

Deny access to all development user accounts

Full Access
Question # 120

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

Identify the problematic device(s).

Part 2:

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

Part 2:

Only select a maximum of TWO options from the multiple choice question

Full Access
Question # 121

A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content.

Which of the following solutions will assist with the increased workload?

A.

DoH

B.

WAF

C.

IPS

D.

CDN

Full Access
Question # 122

A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements.

Which of the following solutions will be BEST to help the administrator achieve the requirements?

A.

Containers

B.

Infrastructure as code

C.

Desktop virtualization

D.

Virtual machines

Full Access
Question # 123

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Full Access
Question # 124

A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data.

Which of the following migration methods would be the BEST to use?

A.

Conduct a V2V migration

B.

Perform a storage live migration

C.

Rsync the data between arrays

D.

Use a storage vendor migration appliance

Full Access
Question # 125

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPU resources

F.

License issues

Full Access
Question # 126

A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web- based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.

The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment.

Which of the following is the MOST likely reason for this issue?

A.

The license limit on the number of server deployments allowed per month was exceeded

B.

The deployment script changes made by the first administrator were not checked in and committed

C.

The new server images were incompatible with the application load-balancer configuration

D.

The application load balancer exceeded the maximum number of servers it could use

Full Access
Question # 127

A cloud administrator is designing a multiregion network within an IaaS provider. The business requirements for configuring the network are as follows:

    Use private networking in and between the multisites for data replication.

    Use low latency to avoid performance issues.

Which of the following solutions should the network administrator use within the IaaS provider to connect multiregions?

A.

Peering

B.

Gateways

C.

VPN

D.

Hub and spoke

Full Access
Question # 128

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs.

Which of the following should be verified NEXT?

A.

Application

B.

SAN

C.

VM GPU settings

D.

Network

Full Access
Question # 129

A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal.

Which of the following should the administrator do to fix this issue?

A.

Change the database application IP

B.

Create a database cluster between the primary site and the DR site

C.

Update the connection string

D.

Edit the DNS record at the DR site for the application servers

Full Access
Question # 130

A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company.

Which of the following BEST describes this attack?

A.

VM escape

B.

Directory traversal

C.

Buffer overflow

D.

Heap spraying

Full Access
Question # 131

Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?

A.

Implement whole-disk encryption

B.

Deploy the latest OS patches

C.

Deploy an anti-malware solution

D.

Implement mandatory access control

Full Access
Question # 132

A company has deployed a new cloud solution and is required to meet security compliance.

Which of the following will MOST likely be executed in the cloud solution to meet security requirements?

A.

Performance testing

B.

Regression testing

C.

Vulnerability testing

D.

Usability testing

Full Access
Question # 133

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance.

Which of the following licensing models is the application MOST likely using?

A.

Per device

B.

Per user

C.

Core-based

D.

Volume-based

Full Access
Question # 134

A systems administrator in a large enterprise needs to alter the configuration of one of the finance department’s database servers.

Which of the following should the administrator perform FIRST?

A.

Capacity planning

B.

Change management

C.

Backups

D.

Patching

Full Access
Question # 135

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments.

Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?

A.

Chain

B.

Star

C.

Mesh

D.

Hub and spoke

Full Access
Question # 136

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

A.

Performance testing

B.

Penetration testing

C.

Vulnerability testing

D.

Regression testing

Full Access