A systems administrator is configuring a DNS server. Which of the following steps should a technician take to ensure confidentiality between the DNS server and an upstream DNS provider?
An organization's security team must determine the likelihood of a breach on its external-facing websites. Which of the following would be best to identify the organization’s chances of incurring a breach?
A cloud administrator is choosing a backup schedule for a new application platform that creates many small files. The backup process impacts the performance of the application, and backup times should be minimized during weekdays. Which of the following backup types best meets the weekday requirements?
When designing a three-node. load-balanced application, a systems administrator must ensure each node runs on a different physical server for HA purposes. Which of the following does the systems administrator need to configure?
During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?
A systems administrator notices several VMS are constantly ballooning, while the memory usage of several other VMS is significantly lower than their resource allocation. Which of the following will MOST likely solve the issue?
A cloud administrator is assessing the scaling of an infrastructure stack. When viewing the configuration, the cloud administrator notices that the servers have a maximum limit of three. Which of the following is a way to increase throughput for the three servers without adjusting the maximum scaling limits?
A systems administrator needs to provide information for a capacity-planning document. Which of the following is the most relevant baseline and capacity information?