Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

CompTIA Cloud+ Certification Exam Question and Answers

CompTIA Cloud+ Certification Exam

Last Update Jun 17, 2025
Total Questions : 452

We are offering FREE CV0-003 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare CV0-003 free exam questions and then go for complete pool of CompTIA Cloud+ Certification Exam test questions that will help you more.

CV0-003 pdf

CV0-003 PDF

$42  $104.99
CV0-003 Engine

CV0-003 Testing Engine

$50  $124.99
CV0-003 PDF + Engine

CV0-003 PDF + Testing Engine

$66  $164.99
Questions 1

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Which of the following actions should the analyst take to accomplish the objective?

Options:

A.  

Remove rules 1, 2, and 5.

B.  

Remove rules 1, 3, and 4.

C.  

Remove rules 2, 3, and 4.

D.  

Remove rules 3, 4, and 5.

Discussion 0
Questions 2

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?

Options:

A.  

Consult the law for the country where the company’s headquarters is located

B.  

Consult the regulatory requirements for the company’s industry

C.  

Consult the law for the country where the cloud services provider is located

D.  

Consult the cloud services provider's policies and guidelines

Discussion 0
Questions 3

Which of the following definitions of serverless computing BEST explains how it is different from using VMs?

Options:

A.  

Serverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP.

B.  

Serverless computing uses predictable billing and offers lower costs than VM compute services.

C.  

Serverless computing is a scalable, highly available cloud service that uses SDN technologies.

D.  

Serverless computing allows developers to focus on writing code and organizations to focus on business.

Discussion 0
Questions 4

A piece of software applies licensing fees on a socket-based model. Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?

Options:

A.  

The amount of memory in the server

B.  

The number of CPUs in the server

C.  

The type of cloud in which the software is deployed

D.  

The number of customers who will be using the software

Discussion 0
Questions 5

A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality?

Options:

A.  

NAC

B.  

IDS

C.  

DLP

D.  

EDR

Discussion 0
Questions 6

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).

Options:

A.  

A load balancer

B.  

SON

C.  

A firewall

D.  

SR-IOV

E.  

Storage replication

F.  

A VPN

Discussion 0
Questions 7

A cloud administrator is responsible for managing a cloud-based content management solution. According to the security policy, any data that is hosted in the cloud must be protected against data exfiltration. Which of the following solutions should the administrator implement?

Options:

A.  

HIDS

B.  

FIM

C.  

DLP

D.  

WAF

Discussion 0
Questions 8

A technician just received the lessons learned from some recent data that was lost due to an on-premises file-server crash. The action point is to change the backup strategy to minimize manual intervention. Which of the following is the BEST approach for the technician to implement?

Options:

A.  

Backup as a service

B.  

RAID 1

C.  

Long-term storage

D.  

New backup devices

Discussion 0
Questions 9

Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud?

Options:

A.  

Deploy a new instance using a known-good base image.

B.  

Configure a firewall rule to block the traffic on the affected instance.

C.  

Perform a forensic analysis of the affected instance.

D.  

Conduct a tabletop exercise involving developers and systems administrators.

Discussion 0
Questions 10

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?

Options:

A.  

DBaaS

B.  

SaaS

C.  

IaaS

D.  

PaaS

Discussion 0
Questions 11

A systems administrator must ensure confidential company information is not leaked to competitors. Which of the following services will BEST accomplish this goal?

Options:

A.  

CASB

B.  

IDS

C.  

FIM

D.  

EDR

E.  

DLP

Discussion 0
Questions 12

A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task.

Which of the following ports should the administrator open on the monitoring server’s firewall?

Options:

A.  

53

B.  

123

C.  

139

D.  

161

Discussion 0
Questions 13

A systems administrator is planning the storage requirements for a two-disk mirror of a server OS disk partition. Which of the following is the amount of disk space available in the mirrored volume?

Options:

A.  

30%

B.  

50%

C.  

75%

D.  

100%

Discussion 0
Questions 14

A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content.

Which of the following solutions will assist with the increased workload?

Options:

A.  

DoH

B.  

WAF

C.  

IPS

D.  

CDN

Discussion 0
Questions 15

A company has two primary offices, one in the United States and one in Europe. The company uses a public laaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

Options:

A.  

Add an application load balancer to the applications to spread workloads.

B.  

Integrate a CDN solution to distribute web content globally.

C.  

Upgrade the bandwidth of the dedicated connection to the laaS provider.

D.  

Migrate the applications to a region hosted in Europe.

Discussion 0
Questions 16

A systems administrator is deploying a GPU-accelerated VDI solution. Upon requests from several users, the administrator installs an older version of the OS on their virtual workstations. The majority of the VMs run the latest LTS version of the OS.

Which of the following types of drivers will MOST likely ensure compatibility will all virtual workstations?

Options:

A.  

Alternative community drivers

B.  

Legacy drivers

C.  

The latest drivers from the vendor’s website

D.  

The drivers from the OS repository

Discussion 0
Questions 17

A cloud administrator is planning to migrate a globally accessed application to the cloud.

Which of the following should the cloud administrator implement to BEST reduce latency for all users?

Options:

A.  

Regions

B.  

Auto-scaling

C.  

Clustering

D.  

Cloud bursting

Discussion 0
Questions 18

An organization is using multiple SaaS-based business applications, and the systems administrator is unable to monitor and control the use of these subscriptions. The administrator needs to implement a solution that will help the organization apply security policies and monitor each individual SaaS subscription. Which of the following should be deployed to achieve these requirements?

Options:

A.  

DLP

B.  

CASB

C.  

IPS

D.  

HIDS

Discussion 0
Questions 19

An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions.

Which of the following would be suitable to optimize the network for this requirement?

Options:

A.  

Implement CDN for overall cloud application

B.  

Implement auto-scaling of the compute resources

C.  

Implement SR-IOV on the server instances

D.  

Implement an application container solution

Discussion 0
Questions 20

A cloud administrator is designing a multiregion network within an IaaS provider. The business requirements for configuring the network are as follows:

    Use private networking in and between the multisites for data replication.

    Use low latency to avoid performance issues.

Which of the following solutions should the network administrator use within the IaaS provider to connect multiregions?

Options:

A.  

Peering

B.  

Gateways

C.  

VPN

D.  

Hub and spoke

Discussion 0
Questions 21

A Chief Information Security Officer (CISO) is evaluating the company’s security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?

Options:

A.  

An SLA document

B.  

ADR plan

C.  

SOC procedures

D.  

A risk register

Discussion 0
Questions 22

An administrator is performing an in-place upgrade on a quest VM operating system.

Which of the following can be performed as a quick method to roll back to an earlier state, if necessary?

Options:

A.  

A configuration file backup

B.  

A full backup of the database

C.  

A differential backup

D.  

A VM-level snapshot

Discussion 0
Questions 23

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments.

Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?

Options:

A.  

Chain

B.  

Star

C.  

Mesh

D.  

Hub and spoke

Discussion 0
Questions 24

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A – The end user accesses the application through a web browser to enter and view clinical data.

2A – The CTM application server reads/writes data to/from the database server.

1B – The end user accesses the application through a web browser to run reports on clinical data.

2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B – The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Discussion 0
Questions 25

A company is currently running a website on site. However, because of a business requirement to reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the company is considering operating in a hybrid environment. The website uses mostly static files and a small relational database. Which of the following should the cloud architect implement to achieve the objective at the LOWEST cost possible?

Options:

A.  

Implement a load-balanced environment in the cloud that is equivalent to the current on-premises setup and use DNS to shift the load from on premises to cloud.

B.  

Implement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is down. Restore the data from the backups.

C.  

Implement a website replica in the cloud with auto-scaling using the smallest possible footprint. Use DNS to shift the load from on premises to the cloud.

D.  

Implement a CDN that caches all requests with a higher TTL and deploy the laaS instances manually in case of disaster. Upload the backup on demand to the cloud to restore on the new instances.

Discussion 0
Questions 26

An administrator manages a file server that has a lot of users accessing and creating many files. As a result, the storage consumption is growing quickly. Which of the following would BEST control storage usage?

Options:

A.  

Compression

B.  

File permissions

C.  

User quotas

D.  

Access policies

Discussion 0
Questions 27

A cloud administrator is assigned to establish a connection between the on-premises data center and the new CSP infrastructure. The connection between the two locations must be secure at all times and provide service for all users inside the organization. Low latency is also required to improve performance during data transfer operations. Which of the following would BEST meet these requirements?

Options:

A.  

A VPC peering configuration

B.  

An IPSec tunnel

C.  

An MPLS connection

D.  

A point-to-site VPN

Discussion 0
Questions 28

A cloud administrator notices an e-commerce website was recently warned that the connection is not private. Which of the following is most likely the cause?

Options:

A.  

An expired certificate.

B.  

A misconfigured IPS.

C.  

A broken trust relationship.

D.  

Limited connectivity.

Discussion 0
Questions 29

A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found.

Which of the following is the MOST likely cause of the script failure?

Options:

A.  

Account mismatches

B.  

IP address changes

C.  

API version incompatibility

D.  

Server name changes

Discussion 0
Questions 30

A systems administrator needs to configure SSO authentication in a hybrid cloud environment.

Which of the following is the BEST technique to use?

Options:

A.  

Access controls

B.  

Federation

C.  

Multifactor authentication

D.  

Certificate authentication

Discussion 0
Questions 31

A company wants to move to a multicloud environment and utilize the technology that provides the most portability. Which of the following technology solutions would BEST meet the company's needs?

Options:

A.  

Bootstrap

B.  

Virtual machines

C.  

Clusters

D.  

Containers

Discussion 0
Questions 32

A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error.

Which of the following will MOST likely solve the issue?

Options:

A.  

Checking user passwords

B.  

Configuring QoS rules

C.  

Enforcing TLS authentication

D.  

Opening TCP port 3389

Discussion 0
Questions 33

A marketing team is using a SaaS-based service to send emails to large groups of potential customers. The internally managed CRM system is configured to generate a list of target customers automatically on a weekly basis, and then use that list to send emails to each customer as part of a marketing campaign. Last week, the first email campaign sent emails successfully to 3,000 potential customers. This week, the email campaign

attempted to send out 50,000 emails, but only 10,000 were sent.

Which of the following is the MOST likely reason for not sending all the emails?

Options:

A.  

API request limit

B.  

Incorrect billing account

C.  

Misconfigured auto-scaling

D.  

Bandwidth limitation

Discussion 0
Questions 34

An IT administrator is implementing security controls on an OS. Which of the following will provide the best protection against a brute-force attack? (Select two).

Options:

A.  

Implementing MFA

B.  

Enforcing strong passwords

C.  

Configuring user passwords to change every 30 days

D.  

Limiting failed log-in requests

E.  

Using API keys

F.  

Implementing SSH keys

Discussion 0
Questions 35

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

Options:

A.  

Require the user's source IP to be an RFC1918 address.

B.  

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.  

Require the use of a password and a physical token.

D.  

Require the password to be ten characters long.

Discussion 0
Questions 36

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections.

Which of the following MOST likely needs to be analyzed before rehosting the ERP?

Options:

A.  

Software

B.  

Licensing

C.  

Right-sizing

D.  

The network

Discussion 0
Questions 37

A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency.

Which of the following services should the technician deploy to eliminate the latency issue?

Options:

A.  

Auto-scaling

B.  

Cloud bursting

C.  

A content delivery network

D.  

A new cloud provider

Discussion 0
Questions 38

A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company.

Which of the following BEST describes this attack?

Options:

A.  

VM escape

B.  

Directory traversal

C.  

Buffer overflow

D.  

Heap spraying

Discussion 0
Questions 39

A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:

    secure connectivity that minimizes user login

    tracks user activity and monitors for anomalous activity

    requires secondary authentication

INSTRUCTIONS

Select controls and servers for the proper control points.

Options:

Discussion 0
Questions 40

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.  

Disk I/O limits

B.  

Affinity rule

C.  

CPU oversubscription

D.  

RAM usage

E.  

Insufficient GPU resources

F.  

License issues

Discussion 0
Questions 41

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance has been slow since the images were upgraded from Windows 7 to Windows 10.

This VDI environment is used to run simple tasks, such as Microsoft Office. The administrator investigates the virtual machines and finds the following settings:

    4 vCPU

    16GB RAM

    10Gb networking

    256MB frame buffer

Which of the following MOST likely needs to be upgraded?

Options:

A.  

vRAM

B.  

vCPU

C.  

vGPU

D.  

vNIC

Discussion 0
Questions 42

A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would all ow for the maximum number of two-core machines with equal memory?

Options:

A.  

30 VMs, 3GB of memory

B.  

40 VMs, 1,5GB of memory

C.  

45 VMs, 2 GB of memory

D.  

60 VMs, 1 GB of memory

Discussion 0
Questions 43

A large pharmaceutical company needs to ensure it is in compliance with the following requirements:

• An application must run on its own virtual machine.

• The hardware the application is hosted on does not change.

Which of the following will BEST ensure compliance?

Options:

A.  

Containers

B.  

A firewall

C.  

Affinity rules

D.  

Load balancers

Discussion 0
Questions 44

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

Options:

A.  

NIPS

B.  

Network overlay using GENEVE

C.  

DDoS protection

D.  

DoH

Discussion 0
Questions 45

An organization’s web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization’s web server infrastructure.

Which of the following should be implemented to prevent this in the future as a mitigation method?

Options:

A.  

Enable DLP

B.  

Configure microsegmentation

C.  

Enable DNSSEC

D.  

Deploy a vADC appliance

Discussion 0
Questions 46

A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues.

Which of the following is the MOST likely cause of this issue?

Options:

A.  

Change management failure

B.  

Service overload

C.  

Patching failure

D.  

Job validation issues

E.  

Deprecated features

Discussion 0
Questions 47

An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?

Options:

A.  

Two load balancers behind a single firewall

B.  

Firewalls in a blue-green configuration

C.  

Two firewalls in a HA configuration

D.  

A web application firewall

Discussion 0
Questions 48

A cloud administrator is working in a secure government environment. The administrator needs to implement corrective action due to recently identified security issue on the OS of a VM that is running a facility-management application in a cloud environment. The administrator needs to consult the application vendor, so it might take some time to resolve the issue. Which of the following is the FIRST action the administrator should take while working on the resolution?

Options:

A.  

Shut down the server.

B.  

Upgrade the OS

C.  

Update the risk register.

D.  

Raise a problem ticket.

Discussion 0
Questions 49

A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?

Options:

A.  

SNMPv3

B.  

Community strings

C.  

IPSec tunnels

D.  

ACLs

Discussion 0
Questions 50

An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations.

Which of the following is the MOST efficient way to bring the block storage in the primary datacenter up to date with the DR site?

Options:

A.  

Set up replication.

B.  

Copy the data across both sites.

C.  

Restore incremental backups.

D.  

Restore full backups.

Discussion 0
Questions 51

A systems administrator has migrated a web application to the cloud with a synchronous uplink speed of 100Mbps. After the migration, the administrator receives reports of slow connectivity to the web application. The administrator logs into the firewall and notices the WAN port is transmitting at a constant 12.5MBps. Which of the following BEST explains the reason for the issue?

Options:

A.  

Misconfigured subnetting

B.  

Insufficient compute

C.  

Firewall issues

D.  

Not enough upload bandwidth

Discussion 0
Questions 52

A cloud administrator has deployed a new VM. The VM cannot access the Internet or the VMs on any other subnet. The administrator runs a network command and sees the following output:

The new VM can access another VM at 172.16.31.39. The administrator has verified the IP address is correct. Which of the following is the MOST likely cause of the connectivity issue?

Options:

A.  

A missing static route

B.  

A duplicate IP on the network

C.  

Firewall issues

D.  

The wrong gateway

Discussion 0
Questions 53

A company is considering consolidating a number of physical machines into a virtual infrastructure that will be located at its main office. The company has the following requirements:

High-performance VMs

More secure

Has system independence

Which of the following is the BEST platform for the company to use?

Options:

A.  

Type 1 hypervisor

B.  

Type 2 hypervisor

C.  

Software application virtualization

D.  

Remote dedicated hosting

Discussion 0
Questions 54

A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit?

Options:

A.  

An SLA report

B.  

Tagging

C.  

Quotas

D.  

Showback

Discussion 0
Questions 55

A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?

Options:

A.  

Compute

B.  

Storage

C.  

Licensing

D.  

Scripts

Discussion 0
Questions 56

A cloud administrator has deployed several VM instances that are running the same applications on VDI nodes. Users are reporting that a role instance is looping between STARTED, INITIALIZING, BUSY, and stop. Upon investigation, the cloud administrator can see the status changing every few minutes. Which of the following should be done to resolve the issue?

Options:

A.  

Reboot the hypervisor.

B.  

Review the package and configuration file.

C.  

Configure service healing.

D.  

Disable memory swap.

Discussion 0
Questions 57

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Select TWO).

Options:

A.  

Disk I/O limits

B.  

Affinity rule

C.  

CPU oversubscription

D.  

RAM usage

E.  

Insufficient GPI-J resources

F.  

License issues

Discussion 0
Questions 58

A cloud solutions architect has received guidance to migrate an application from on premises to a public cloud. Which of the following requirements will help predict the operational expenditures in the cloud?

Options:

A.  

Average resource consumption

B.  

Maximum resource consumption

C.  

Minimum resource consumption

D.  

Actual hardware configuration

Discussion 0
Questions 59

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?

Options:

A.  

Store the credentials in a variable on every worker node

B.  

Store the credentials on a shared volume using whole-disk encryption

C.  

Store the credentials in a configuration file using SHA-256 inside the container image

D.  

Store the credentials using the orchestrator secret manager

Discussion 0
Questions 60

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

Options:

A.  

Reboot all the servers in the green stack

B.  

Failback to the blue stack

C.  

Restore from backups

D.  

Troubleshoot and resolve the application issues

Discussion 0
Questions 61

A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured?

Options:

A.  

Regions

B.  

Anti-affinity

C.  

Oversubscription

D.  

Container

Discussion 0
Questions 62

A startup online gaming company is designing the optimal graphical user experience for multiplayer scenarios. However, online players have reported latency issues. Which of the following should the company configure as a remediation?

Options:

A.  

Additional GPU memory

B.  

Faster clock speed

C.  

Additional CPU cores

D.  

Dynamic allocations

Discussion 0
Questions 63

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

Options:

A.  

RPO

B.  

MTTR

C.  

SLA

D.  

RTO

Discussion 0
Questions 64

An organization recently deployed a private cloud on a cluster of systems that delivers compute, network, and storage resources in a single hardware, managed by an intelligent software. Which of the following BEST describes this type of deployment?

Options:

A.  

High-performance computing

B.  

Hyperconverged infrastructure

C.  

Stand-alone computing

D.  

Dynamic allocations

Discussion 0
Questions 65

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

Options:

A.  

Insufficient memory on the hypervisor

B.  

Operating system memory limit

C.  

Memory mismatch error

D.  

Dynamic memory allocation

Discussion 0
Questions 66

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

Options:

A.  

A firewall

B.  

Switches

C.  

Ballooning

D.  

Autoscaling

Discussion 0
Questions 67

After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?

Options:

A.  

One 32 vCPU node with CDN caching

B.  

Two 8 vCPU nodes with load balancing

C.  

Three to six 8 vCPU nodes autoscaling group

D.  

Four 8 vCPU nodes with DNS round robin

Discussion 0
Questions 68

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?

Options:

A.  

Implement a secret management solution.

B.  

Create autoscaling capabilities.

C.  

Develop CI/CD tools.

D.  

Deploy a CMDB tool.

Discussion 0
Questions 69

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company's security posture?

Options:

A.  

SSH

B.  

MFA

C.  

Certificates

D.  

Federation

Discussion 0
Questions 70

A cloud administrator would like to maintain file integrity checks through hashing on a cloud object store. Which of the following is MOST suitable from a performance perspective?

Options:

A.  

SHA-256

B.  

SHA-512

C.  

MD5

D.  

AES

Discussion 0
Questions 71

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?

Options:

A.  

IPAM

B.  

DoH

C.  

VLAN

D.  

SDN

Discussion 0
Questions 72

A cloud administrator is responsible for managing a VDI environment that provides end users with access to limited applications. Which of the following should the administrator make changes to when a new application needs to be provided?

Options:

A.  

Application security policy

B.  

Application whitelisting policy

C.  

Application hardening policy

D.  

Application testing policy

Discussion 0
Questions 73

A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations.

Which of the following actions should the cloud administrator take FIRST?

Options:

A.  

Initiate a failover

B.  

Restore backups

C.  

Configure the network

D.  

Perform a failback

Discussion 0
Questions 74

An organization is implementing a new requirement to facilitate faster downloads for users of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?

Options:

A.  

Implement CDN for overall cloud application.

B.  

Implement autoscaling of the compute resources.

C.  

Implement SR-IOV on the server instances.

D.  

Implement an application container solution.

Discussion 0
Questions 75

A cloud administrator receives an email stating the following:

"Clients are receiving emails from our web application with non-encrypted links."

The administrator notices that links generated from the web application are opening in http://. Which of the following should be configured to redirect the traffic to https://?

Options:

A.  

User account access

B.  

Programming code

C.  

Web server configuration

D.  

Load balancer setting

Discussion 0
Questions 76

Following the deployment of a new VM, a cloud engineer notices the backup platform has not added the machine to the appropriate job. The backup platform uses a text-based variable for job configuration. This variable is based on the RPO requirements for the workload. Which of the following did the cloud engineer forget to configure when deploying the virtual machine?

    Tags

Options:

A.  

RPO

B.  

RTO

C.  

Server name

D.  

Template

Discussion 0
Questions 77

A company has entered into a business relationship with another organization and needs to provide access to internal resources through directory services. Which of the following should a systems administrator implement?

Options:

A.  

sso

B.  

VPN

C.  

SSH

D.  

SAML

Discussion 0
Questions 78

A company is moving its entire infrastructure to the cloud. The infrastructure consists of:

    100 virtual desktops

    10 database servers

    10 web servers

    15 application servers

    15 development servers

    7 VDI servers

Each server, except for web, application, and database servers, needs to be on an isolated subnet. The CSP has allocated a /24 subnet. Which of the following would best divide the IP space to meet these requirements?

Options:

Options:

A.  

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

B.  

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

C.  

VDI: /25Web, application, and database: /27Development: /27VDI servers: /28

D.  

VDI: /26Web, application, and database: /26Development: /26VDI servers: /28

Discussion 0
Questions 79

A systems administrator is configuring a cloud solution for a vulnerability assessment to test the company's resources that are hosted in a public cloud. The solution must test the company's resources from an external user's perspective. Which of the following should the systems administrator configure?

Options:

A.  

An agent-based scan

B.  

A network-based scan

C.  

A port scan

D.  

A credentialed scan

Discussion 0
Questions 80

A systems administrator is building a standardized OS template for the deployment of a web service. The image is intended for various autoscaling groups. Which of the following should be included in the image as best practice?

Options:

A.  

Graphical user interface.

B.  

Website configuration.

C.  

System security hardening elements.

D.  

Compute, memory, and storage capacity.

Discussion 0
Questions 81

A company uses multiple SaaS-based cloud applications. All the applications require authentication upon access. An administrator has been asked to address this issue and enhance security. Which of the following technologies would be the BEST solution?

Options:

A.  

Single sign-on

B.  

Certificate authentication

C.  

Federation

D.  

Multifactor authentication

Discussion 0
Questions 82

A cloud engineer receives an alert that a newly provisioned server is running a non-supported Linux version. The automation scripts are performing as expected on the server. Which of the following should the engineer check first?

Options:

A.  

Provisioning script indentation

B.  

Template selection

C.  

API version

D.  

Script account

Discussion 0
Questions 83

A cloud administrator is performing automated deployment of cloud infrastructure for clients. The administrator notices discrepancies from the baseline in the configuration of infrastructure that was deployed to a new client. Which of the following is most likely the cause?

Options:

A.  

The deployment user account changed

B.  

The deployment was done to a different resource group.

C.  

The deployment was done by a different cloud administrator.

D.  

The deployment template was modified.

Discussion 0
Questions 84

A cloud administrator must ensure all servers are in compliance with the company's security policy Which of the following should the administrator check FIRST?

Options:

A.  

The application version

B.  

The OS version

C.  

Hardened baselines

D.  

Password policies

Discussion 0
Questions 85

A systems administrator is troubleshooting a VDI deployment that is used to run high-frame-rate rendering. Users are reporting frequent application crashes. After running a benchmark, the administrator discovers the following:

Which of the following should the administrator do to resolve this issue?

Options:

A.  

Configure the GPU to run in compute mode.

B.  

Allocate more RAM in the VM template.

C.  

Select a higher vGPU profile.

D.  

Configure the GPU to run in graphics mode.

Discussion 0
Questions 86

A company's marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?

Options:

A.  

GPU passthrough

B.  

Increased memory

C.  

Converged infrastructure

D.  

An additional CPU core

Discussion 0
Questions 87

A systems administrator wants to repurpose and implement a legacy tool that has been used in the past as a multicloud monitoring system. Which of the following will be the most probable challenges in the future caused by this implementation? (Select two).

Options:

A.  

Connectivity issues.

B.  

Limited staff skill sets.

C.  

Licensing issues.

D.  

Messaging errors.

E.  

Latency issues.

F.  

Lack of support.

Discussion 0
Questions 88

A company has a web application that is accessed around the world. An administrator has been notified of performance issues regarding the application. Which of the following will BEST improve performance?

Options:

A.  

IPAM

B.  

SDN

C.  

CDN

D.  

VPN

Discussion 0
Questions 89

A cloud security engineer needs to design an IDS/IPS solution for a web application in a single virtual private network. The engineer is considering implementing IPS protection for traffic coming from the internet. Which of the following should the engineer consider to meet this requirement?

Options:

A.  

Configuring a web proxy server

B.  

Implementing load balancing using SSI- in front of web applications

C.  

Implementing IDS/IPS agents on each instance running in that virtual private network

D.  

Implementing dynamic routing

Discussion 0
Questions 90

A cloud engineer is troubleshooting poor performance on a corporate website configured behind a cloud application load balancer. The following output was collected on the cloud console:

    CDN status: Configured and content replicated to edge locations.

    WAF status: 10 rules applied; 8,787,638 hits / 37,634 blocks.

    Listening on ports: 80/443.

    Forwarding traffic to instances: 5 (2 healthy).

    Autoscaling events: 25.

Which of the following is the most likely cause of the issue?

Options:

A.  

The web servers are not responding properly.

B.  

The web firewall is blocking legitimate traffic.

C.  

The CDN should not be used during high loads.

D.  

Autoscaling events are too high.

Discussion 0
Questions 91

A systems administrator is working within a private cloud environment. Over time. random 4K read/write speeds on all VMS in the environment slow down until the VMS are completely unusable, with disk speeds of less than 1MBps. The administrator has gathered the information below:

• There is no correlation between the slowdown and VM/hypervisor resource utilization.

• The network is rated to 40Gbps and utilization is between 1—5%.

• The hypervisors use hundreds of NFSv3 mounts to the same storage appliance, one per VM.

• The VMS on each hypervisor become unresponsive after two weeks of uptime.

• The unresponsiveness is resolved by moving slow VMS onto a rebooted hypervisor.

Which of the following solutions will MOST likely resolve this issue?

Options:

A.  

Increase caching on the storage appliance.

B.  

Configure jumbo frames on the hypervisors and storage.

C.  

Increase CPU/RAM resources on affected VMS.

D.  

Reduce the number of NFSv3 mounts to one.

Discussion 0
Questions 92

A cloud engineer is configuring automated backups for a database. The engineer wants to ensure that backups can be restored quickly and consistently to meet the SLA. Which of the following backup methods would be the most appropriate?

Options:

A.  

Incremental.

B.  

Differential.

C.  

Full.

D.  

Synthetic full.

Discussion 0
Questions 93

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to BEST reduce cost?

Options:

A.  

Scaling of the environment after work hours

B.  

Implementing access control after work hours

C.  

Shutting down the environment after work hours

D.  

Blocking external access to the environment after work hours

Discussion 0
Questions 94

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator most likely use?

Options:

A.  

An API gateway

B.  

An IPS/IDS

C.  

A reverse proxy

D.  

A WAF

Discussion 0
Questions 95

Which of the following should be enabled to reduce cloud compute costs when planning hardware capacity?

Options:

A.  

Compression and deduplication on the object storage.

B.  

Autoscaling with load balancing.

C.  

Affinity settings per node.

D.  

Lifecycle management on the data storage.

Discussion 0
Questions 96

A company is migrating a large fleet of on-premises servers into the public cloud. The number of servers is estimated to be between 800 and 900. The systems administrator is doing the network planning. Which of the following subnets should the administrator use? (Select two).

Options:

A.  

10.10.115.0/22

B.  

B.  

10.10.119.0/23

C.  

C.  

10.10.120.0/23

D.  

D.  

192.168.1.0/23

E.  

E.  

192.168.1.0/24

F.  

F.  

192.168.10.0/21

Discussion 0
Questions 97

A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet.

Which of the following should the systems administrator implement to achieve this objective?

Options:

A.  

A stateful firewall

B.  

DLP

C.  

DNSSEC

D.  

Network flows

Discussion 0
Questions 98

Lateral-moving malware has infected the server infrastructure.

Which of the following network changes would MOST effectively prevent lateral movement in the future?

Options:

A.  

Implement DNSSEC in all DNS servers

B.  

Segment the physical network using a VLAN

C.  

Implement microsegmentation on the network

D.  

Implement 802.1X in the network infrastructure

Discussion 0
Questions 99

A cloud administrator needs to implement a mechanism to monitor the expense of the company’s cloud resources.

Which of the following is the BEST option to execute this task with minimal effort?

Options:

A.  

Ask the cloud provider to send a daily expense report

B.  

Set custom notifications for exceeding budget thresholds

C.  

Use the API to collect expense information from cloud resources

D.  

Implement a financial tool to monitor cloud resource expenses

Discussion 0
Questions 100

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations.

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?

Options:

A.  

Integrity

B.  

Versioning

C.  

Classification

D.  

Segmentation

Discussion 0
Questions 101

In an existing IaaS instance, it is required to deploy a single application that has different versions.

Which of the following should be recommended to meet this requirement?

Options:

A.  

Deploy using containers

B.  

Install a Type 2 hypervisor

C.  

Enable SR-IOV on the host

D.  

Create snapshots

Discussion 0
Questions 102

A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:

    High availability

    Horizontal auto-scaling

    60 nodes peak capacity per region

    Five reserved network IP addresses per subnet

    /24 range

Which of the following would BEST meet the above requirements?

Options:

A.  

Create two /25 subnets in different regions

B.  

Create three /25 subnets in different regions

C.  

Create two /26 subnets in different regions

D.  

Create three /26 subnets in different regions

E.  

Create two /27 subnets in different regions

F.  

Create three /27 subnets in different regions

Discussion 0
Questions 103

A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site.

Which of the following should be configured in between the cloud environment and the DR site?

Options:

A.  

Failback

B.  

Playbook

C.  

Zoning

D.  

Replication

Discussion 0
Questions 104

A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible.

Which of the following will BEST achieve this goal?

Options:

A.  

Configure CPU passthrough

B.  

Oversubscribe CPU resources

C.  

Switch from a Type 1 to a Type 2 hypervisor

D.  

Increase instructions per cycle

E.  

Enable simultaneous multithreading

Discussion 0
Questions 105

An organization deployed an application using a cloud provider's internal managed certificates. Developers are unable to retrieve data when calling the API from any machine.

The following error message is in the log:

12-04-2023-10:05:25, SSL Negotiation Error

12-04-2023-10:05:28,Invalid Certificate

12-04-2023-10:05:29, TLS Handshake Failed

12-04-2023-10:05:30,Connection Closed

Which of the following is the most likely cause of the error?

Options:

A.  

TLS version

B.  

Insecure cipher

C.  

Self-signed certificate

D.  

Root trust

Discussion 0
Questions 106

A data architect is planning a new deployment of data storage virtualization before a cloud migration to a public cloud. The requirement is to provide deduplication and backup policy management that is separate from the data VMs. Which of the following would be best to utilize to provision storage?

Options:

A.  

Software-defined storage

B.  

Containerized storage

C.  

Thick-provisioning storage

D.  

RAID 10 disk-array storage

Discussion 0
Questions 107

A media company has made the decision to migrate a physical, internal file server to the cloud and use a web- based interface to access and manage the files. The users must be able to use their current corporate logins.

Which of the following is the MOST efficient way to achieve this goal?

Options:

A.  

Deploy a VM in a cloud, attach storage, and copy the files across

B.  

Use a SaaS service with a directory service federation

C.  

Deploy a fileshare in a public cloud and copy the files across

D.  

Copy the files to the object storage location in a public cloud

Discussion 0
Questions 108

A systems administrator received an email from a cloud provider stating that storage is 80% full on the volume that stores VDI desktops. Which of the following is the MOST efficient way to mitigate the situation?

Options:

A.  

Deduplication

B.  

Compression

C.  

Replication

D.  

Storage migration

Discussion 0
Questions 109

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

Options:

A.  

Firewall outbound rules

B.  

Firewall inbound rules

C.  

Load balancer certificates

D.  

Load balancer stickiness

E.  

WAF transaction throttling

Discussion 0
Questions 110

A company is comparing an application environment to be hosted on site versus a SaaS model of the same application. Which of the following SaaS-based licensing models should the administrator consider?

Options:

A.  

Per core

B.  

Per socket

C.  

Per instance

D.  

Per user

Discussion 0
Questions 111

A cloud administrator is configuring several security appliances hosted in the private laaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?

Options:

A.  

Allow UDP 161 outbound from the web servers to the log collector .

B.  

Allow TCP 514 outbound from the web servers to the log collector.

C.  

Allow UDP 161 inbound from the log collector to the web servers .

D.  

Allow TCP 514 inbound from the log collector to the web servers .

Discussion 0
Questions 112

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?

Options:

A.  

There is a configuration failure in the syslog solution.

B.  

The application servers were migrated to the cloud as laaS instances.

C.  

The application administrators have not performed any activity in those servers.

D.  

There is a local firewall policy restriction on the syslog server.

Discussion 0
Questions 113

A company is using laaS services from two different providers: one for its primary site, and the other for a secondary site. The primary site is completely inaccessible, and the management team has decided to run through the BCP procedures. Which of the following will provide the complete asset information?

Options:

A.  

DR replication document

B.  

DR playbook

C.  

DR policies and procedures document

D.  

DR network diagram

Discussion 0
Questions 114

A systems administrator has verified that a physical switchport that is connected to a virtualization host is using all available bandwidth. Which of the following would best address this issue?

Options:

A.  

Port mirroring

B.  

Link aggregation

C.  

Spanning tree

D.  

Microsegmentation

Discussion 0
Questions 115

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?

Options:

A.  

Upgrading the physical server NICs to support IOGbps

B.  

Adding more vCPU

C.  

Enabling SR-IOV capability

D.  

Increasing the VM swap/paging size

Discussion 0
Questions 116

A cloud administrator needs to deploy a security virtual appliance in a private cloud environment, but this appliance will not be part of the standard catalog of items for other users to request. Which of the following is the BEST way to accomplish this task?

Options:

A.  

Create an empty VM. import the hard disk of the virtual appliance. and configure the CPU and memory.

B.  

Acquire the build scripts from the vendor and recreate the appliance using the baseline templates

C.  

Import the virtual appliance into the environment and deploy it as a VM

D.  

Convert the virtual appliance to a template and deploy a new VM using the template.

Discussion 0
Questions 117

A systems administrator needs to convert ten physical servers to virtual.

Which of the following would be the MOST efficient conversion method for the administrator to use?

Options:

A.  

Rebuild the servers from scratch

B.  

Use the vendor’s conversion tool

C.  

Clone the hard drive

D.  

Restore from backup

Discussion 0
Questions 118

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

Options:

A.  

Performance testing

B.  

Penetration testing

C.  

Vulnerability testing

D.  

Regression testing

Discussion 0
Questions 119

A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements.

Which of the following solutions will be BEST to help the administrator achieve the requirements?

Options:

A.  

Containers

B.  

Infrastructure as code

C.  

Desktop virtualization

D.  

Virtual machines

Discussion 0
Questions 120

A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information:

    The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.

    The cloud management console does not show an IP address for that server.

    A DNS lookup shows the hostname resolves to an IP address.

    The server is a member of the same security group as the others.

    The cloud administrator is able to log in remotely to the other servers without issue.

Which of the following is the MOST likely cause of the server being unavailable?

Options:

A.  

The network driver updates did not apply successfully, and the interface is in a down state.

B.  

The ACL policy for the server was updated as part of the server reboot, preventing login access.

C.  

The server was assigned a new IP address, and DNS entry for the server name was not updated.

D.  

The update caused an increase in the output to the logs, and the server is too busy to respond.

Discussion 0
Questions 121

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

Options:

A.  

Implement an ADC solution to load balance the VLAN traffic

B.  

Configure an ACL between the VLANs

C.  

Implement 802.1X in these VLANs

D.  

Configure on-demand routing between the VLANs

Discussion 0
Questions 122

A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?

Options:

A.  

The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS

B.  

The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor

C.  

The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule

D.  

Migrating from laaS to on premises, the network traffic between on-premises users and the laaS instance, and the CPU utilization of the hypervisor host

Discussion 0
Questions 123

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?

Options:

A.  

Virtual machines

B.  

Software as a service

C.  

Serverless computing

D.  

Containers

Discussion 0
Questions 124

An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?

Options:

A.  

Logs on the VM

B.  

Firewall on the VM

C.  

Memory on the VM

D.  

vGPU performance on the VM

Discussion 0
Questions 125

An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would be MOST useful to accomplish this task?

Options:

A.  

VLAN

B.  

NIPS

C.  

WAF

D.  

NAC

Discussion 0
Questions 126

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

Options:

A.  

Deduplication

B.  

Thin provisioning

C.  

Software-defined storage

D.  

iSCSI storage

Discussion 0
Questions 127

A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?

Options:

A.  

A service availability scan

B.  

An agent-based vulnerability scan

C.  

A default and common credentialed scan

D.  

A network port scan

Discussion 0
Questions 128

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly.

Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?

Options:

A.  

Tier pricing

B.  

Licensing

C.  

Estimated consumption

D.  

Feature compatibility

Discussion 0
Questions 129

A systems administrator is troubleshooting performance issues with a VDI environment. The administrator determines the issue is GPU related and then increases the frame buffer on the virtual machines. Testing confirms the issue is solved, and everything is now working correctly. Which of the following should the administrator do NEXT?

Options:

A.  

Consult corporate policies to ensure the fix is allowed

B.  

Conduct internal and external research based on the symptoms

C.  

Document the solution and place it in a shared knowledge base

D.  

Establish a plan of action to resolve the issue

Discussion 0
Questions 130

A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying the CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue?

Options:

A.  

Modify the deployment script to delete and recreate the database whenever the CMS application is deployed.

B.  

Modify the ACL to allow the staging environment to access the database in the sandbox environment.

C.  

Modify the CMS application deployment to use the previous version and redeploy the application.

D.  

Modify the configuration settings of the CMS application to connect to the database in the current environment.

Discussion 0
Questions 131

A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue?

Options:

A.  

Upgrade the virtual database server.

B.  

Move the virtual machine to flash storage and test again.

C.  

Check if other machines on the same storage are having issues.

D.  

Document the findings and place them in a shared knowledge base.

Discussion 0
Questions 132

A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.)

Options:

A.  

Install TLS certificates on the server.

B.  

Forward port 80 traffic to port 443.

C.  

Disable TLS 1.0/1.1 and SSL.

D.  

Disable password authentication.

E.  

Enable SSH key access only.

F.  

Provision the server in a separate VPC.

G.  

Disable the superuser/administrator account.

Discussion 0
Questions 133

A disaster situation has occurred, and the entire team needs to be informed about the situation. Which of the following documents will help the administrator find the details of the relevant team members for escalation?

Options:

A.  

Chain of custody

B.  

Root cause analysis

C.  

Playbook

D.  

Call tree

Discussion 0
Questions 134

A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other. Which of the following should an administrator perform to comply with the security requirement?

Options:

A.  

Create separate virtual networks for production, QA, and development servers.Move the servers to the appropriate virtual network.Apply a network security group to each virtual network that denies all traffic except for the firewall.

B.  

Create separate network security groups for production, QA, and development servers.Apply the network security groups on the appropriate production, QA, and development servers.Peer the networks together.

C.  

Create separate virtual networks for production, QA, and development servers.Move the servers to the appropriate virtual network.Peer the networks together.

D.  

Create separate network security groups for production, QA, and development servers.Peer the networks together.Create static routes for each network to the firewall.

Discussion 0
Questions 135

A technician is trying to delete six decommissioned VMs. Four VMs were deleted without issue. However, two of the VMs cannot be deleted due to an error. Which of the following would MOST likely enable the technician to delete the VMs?

Options:

A.  

Remove the snapshots

B.  

Remove the VMs' IP addresses

C.  

Remove the VMs from the resource group

D.  

Remove the lock from the two VMs

Discussion 0