Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CV0-003 Exam Dumps - CompTIA Cloud+ Certification Exam

Question # 4

A cloud administrator is working in a secure government environment. The administrator needs to implement corrective action due to recently identified security issue on the OS of a VM that is running a facility-management application in a cloud environment. The administrator needs to consult the application vendor, so it might take some time to resolve the issue. Which of the following is the FIRST action the administrator should take while working on the resolution?

A.

Shut down the server.

B.

Upgrade the OS

C.

Update the risk register.

D.

Raise a problem ticket.

Full Access
Question # 5

An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort. Which of the following ports needs to be opened to fulfill this requirement?

A.

53

B.

67

C.

123

D.

161

Full Access
Question # 6

A company is considering consolidating a number of physical machines into a virtual infrastructure that will be located at its main office. The company has the following requirements:

High-performance VMs

More secure

Has system independence

Which of the following is the BEST platform for the company to use?

A.

Type 1 hypervisor

B.

Type 2 hypervisor

C.

Software application virtualization

D.

Remote dedicated hosting

Full Access
Question # 7

A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective?

A.

22, 53, 445

B.

22, 443, 445

C.

25, 123, 443

D.

137, 139, 445

Full Access
Question # 8

A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?

A.

The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS

B.

The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor

C.

The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule

D.

Migrating from laaS to on premises, the network traffic between on-premises users and the laaS instance, and the CPU utilization of the hypervisor host

Full Access
Question # 9

A cloud administrator is monitoring a database system and notices an unusual increase in the read operations, which is causing a heavy load in the system. The system is using a relational database and is running in a VM. Which of the following should the administrator do to resolve the issue with minimal architectural changes?

A.

Migrate the relational database to a NoSQL database.

B.

Use a cache system to store reading operations.

C.

Create a secondary standby database instance.

D.

Implement the database system using a DBaaS.

Full Access
Question # 10

A systems administrator is troubleshooting a VDI deployment that is used to run high-frame-rate rendering. Users are reporting frequent application crashes. After running a benchmark, the administrator discovers the following:

Which of the following should the administrator do to resolve this issue?

A.

Configure the GPU to run in compute mode.

B.

Allocate more RAM in the VM template.

C.

Select a higher vGPU profile.

D.

Configure the GPU to run in graphics mode.

Full Access
Question # 11

A systems administrator is reviewing the logs from a company's IDS and notices a large amount of outgoing traffic from a particular server. The administrator then runs a scan on the server, which detects malware that cannot be removed. Which of the following should the administrator do first?

A.

Determine the root cause.

B.

Disconnect the server from the network.

C.

Perform a more intrusive scan.

D.

Restore the server from a backup.

Full Access
Question # 12

An organization's executives would like to allow access to devices that meet the corporate security compliance levels. Which of the following criteria are most important for the organization to consider? (Select two).

A.

Serial number

B.

Firmware

C.

Antivirus version and definition

D.

OS patch level

E.

CPU architecture

F.

Manufacturer

Full Access
Question # 13

An organization located in Asia connects to a cloud infrastructure hosted in North America and Europe. Sporadic slowness has been observed when using the PaaS and laaS components. A diagnostic using the following commands was run, and the following results were collected:

Which of the following is the most likely reason for the latency?

A.

Service degradation on the ISP

B.

A DDoS attack on the organization's infrastructure

C.

Misconfiguration of the network security groups

D.

Switch failure at the organization

Full Access
Question # 14

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL https://www.comptiasite.com. Which of the following would MOST likely resolve the issue?

A.

Renewing the expired certificate

B.

Updating the web-server software

C.

Changing the crypto settings on the web server

D.

Upgrading the users' browser to the latest version

Full Access
Question # 15

A systems administrator is deploying a new version of a website. The website is deployed in the cloud using a VM cluster. The administrator must then deploy the new version into one VM first. After a period of time, if there are no issues detected, a second VM will be updated. This process must continue until all the VMS are updated. Which of the following upgrade methods is being implemented?

A.

Canary

B.

Blue-green

C.

Rolling

D.

Staging

Full Access
Question # 16

A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues.

Which of the following is the MOST likely cause of this issue?

A.

Change management failure

B.

Service overload

C.

Patching failure

D.

Job validation issues

E.

Deprecated features

Full Access
Question # 17

A cloud administrator is setting up a new coworker for API access to a public cloud environment. The administrator creates a new user and gives the coworker access to a collection of automation scripts. When the coworker attempts to use a deployment script, a 403 error is returned. Which of the following is the MOST likely cause of the error?

A.

Connectivity to the public cloud is down.

B.

User permissions are not correct.

C.

The script has a configuration error.

D.

Oversubscription limits have been exceeded.

Full Access
Question # 18

A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM?

A.

CDN

B.

DNS

C.

NTP

D.

IPAM

Full Access
Question # 19

Which of the following should be considered for capacity planning?

A.

Requirements, licensing, and trend analysis

B.

Laws and regulations

C.

Regions, clusters, and containers

D.

Hypervisors and scalability

Full Access
Question # 20

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?

A.

Create a directory security group.

B.

Create a resource group.

C.

Create separate VLANs.

D.

Create a network security group.

Full Access
Question # 21

A company is currently running a website on site. However, because of a business requirement to reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the company is considering operating in a hybrid environment. The website uses mostly static files and a small relational database. Which of the following should the cloud architect implement to achieve the objective at the LOWEST cost possible?

A.

Implement a load-balanced environment in the cloud that is equivalent to the current on-premises setup and use DNS to shift the load from on premises to cloud.

B.

Implement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is down. Restore the data from the backups.

C.

Implement a website replica in the cloud with auto-scaling using the smallest possible footprint. Use DNS to shift the load from on premises to the cloud.

D.

Implement a CDN that caches all requests with a higher TTL and deploy the laaS instances manually in case of disaster. Upload the backup on demand to the cloud to restore on the new instances.

Full Access
Question # 22

A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement?

A.

Create /25 subnets in two regions and run 80 instances on each one.

B.

Create /26 subnets in two regions and run 40 instances on each one.

C.

Create /26 subnets in three regions and run 40 instances on each one.

D.

Create /26 subnets in three regions and run 80 instances on each one.

Full Access
Question # 23

A security audit related to confidentiality controls found the following transactions occurring in the system:

GET http://gateway.securetransaction.com/privileged/api/v1/changeResource?id=123 &user=277

Which of the following solutions will solve the audit finding?

A.

Using a TLS-protected API endpoint

B.

Implementing a software firewall

C.

Deploying a HIDS on each system

D.

Implementing a Layer 4 load balancer

Full Access
Question # 24

A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.)

A.

Incorrect permissions

B.

Insufficient storage

C.

Billing issues with the cloud provider

D.

No connectivity to the public cloud

E.

Expired API token

F.

Disabled autoscaling

Full Access
Question # 25

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Full Access
Question # 26

A company is using a method of tests and upgrades in which a small set of end users are exposed to new services before the majority of other users. Which of the following deployment methods is being used?

A.

Blue-green

B.

Canary

C.

Big bang

D.

Rolling

Full Access
Question # 27

An organization recently deployed a private cloud on a cluster of systems that delivers compute, network, and storage resources in a single hardware, managed by an intelligent software. Which of the following BEST describes this type of deployment?

A.

High-performance computing

B.

Hyperconverged infrastructure

C.

Stand-alone computing

D.

Dynamic allocations

Full Access
Question # 28

A company has hired a security firm to perform a vulnerability assessment of its environment. In the first phase, an engineer needs to scan the network services exposed by the hosts. Which of the following will help achieve this with the LEAST privileges?

A.

An agent-based scan

B.

A credentialed scan

C.

A network-based scan

D.

An application scan

Full Access
Question # 29

A company is using an laaS environment. Which of the following licensing models would BEST suit the organization from a financial perspective to implement scaling?

A.

Subscription

B.

Volume-based

C.

per user

D.

Socket-based

Full Access
Question # 30

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Full Access
Question # 31

A systems administrator must ensure confidential company information is not leaked to competitors. Which of the following services will BEST accomplish this goal?

A.

CASB

B.

IDS

C.

FIM

D.

EDR

E.

DLP

Full Access
Question # 32

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

A.

Require the user's source IP to be an RFC1918 address.

B.

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.

Require the use of a password and a physical token.

D.

Require the password to be ten characters long.

Full Access
Question # 33

A VDI administrator is enhancing the existing environment with a feature to allow users to connect devices to virtual workstations. Which of the following types of devices are most likely to be allowed in the upgrade? (Select two).

A.

Display monitors

B.

USB devices

C.

SATA devices

D.

PCIe devices

E.

PCI devices

F.

Printers

Full Access
Question # 34

Full Access
Question # 35

A systems administrator is trying to connect to a remote KVM host. The command line appears as follows:

After logging in to the remote server, the administrator verifies the daemon is running. Which of the following should the administrator try NEXT?

A.

Opening port 22 on the firewall

B.

Running the command with elevated privileges

C.

Checking if the SSH password is correct

D.

Ensuring the private key was properly imported

Full Access
Question # 36

Which of the following enables CSPs to offer unlimited capacity to customers?

A.

Adequate budget

B.

Global data center distribution

C.

Economies of scale

D.

Agile project management

Full Access
Question # 37

An organization is implementing a new requirement to facilitate faster downloads for users of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?

A.

Implement CDN for overall cloud application.

B.

Implement autoscaling of the compute resources.

C.

Implement SR-IOV on the server instances.

D.

Implement an application container solution.

Full Access
Question # 38

A company has applications that need to remain available in the event of the data center being unavailable. The company's cloud architect needs to find a solution to maintain business continuity. Which of following should the company implement?

A.

A DR solution for the application between different data centers

B.

An off-site backup solution with a third-party vendor

C.

laC techniques to recreate the system at a new provider

D.

An HA solution for the application inside the data center

Full Access
Question # 39

The Chief Information Officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud. The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information. Which of the following should be configured during the migration?

A.

ACL

B.

VPN

C.

P2V

D.

VDI

Full Access
Question # 40

A systems administrator notices several VMS are constantly ballooning, while the memory usage of several other VMS is significantly lower than their resource allocation. Which of the following will MOST likely solve the issue?

A.

Rightsizing

B.

Bandwidth increase

C.

Cluster placement

D.

Storage tiers

Full Access
Question # 41

A security analyst is investigating a recurring alert. The alert is reporting an insecure firewall configuration state after every cloud application deployment. The process of identifying the issue, requesting a fix, and waiting for the developers to manually patch the environment is being repeated multiple times. In an effort to identify the root issue, the following logs were collected:

Deploying template app prod. •yaml

Instance DB successfully created

DB keys successfully stored on vault

Instance WebApp successfully created

Access rules successfully applied

Access—keys successfully created

Which of the following options will provide a permanent fix for the issue?

A.

Validate the Iac code used during the deployment.

B.

Avoid the use of a vault to store database passwords.

C.

Rotate the access keys that were created during deployment.

D.

Recommend that the developers do not create multiple resources at once.

Full Access
Question # 42

A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?

A.

API version incompatibility

B.

Misconfigured script account

C.

Wrong template selection

D.

Incorrect provisioning script indentation

Full Access
Question # 43

A cloud administrator receives an email stating the following:

"Clients are receiving emails from our web application with non-encrypted links."

The administrator notices that links generated from the web application are opening in http://. Which of the following should be configured to redirect the traffic to https://?

A.

User account access

B.

Programming code

C.

Web server configuration

D.

Load balancer setting

Full Access
Question # 44

A cloud solutions architect is working on a private cloud environment in which storage consumption is increasing daily, resulting in high costs. Which of the following can the architect use to provide more space without adding more capacity? (Select two).

A.

Tiering

B.

Deduplication

C.

RAID provisioning

D.

Compression

E.

Flash optimization

F.

NVMe

Full Access
Question # 45

A systems administrator is implementing a new file storage service that has been deployed in the company's private cloud instance. The key requirement is fast read/write times for the targeted users, and the budget for this project is not a concern. Which of the following storage types should the administrator deploy?

A.

Spinning disks

B.

NVMe

C.

SSD

D.

Hybrid

Full Access
Question # 46

A systems administrator is working within a private cloud environment. Over time. random 4K read/write speeds on all VMS in the environment slow down until the VMS are completely unusable, with disk speeds of less than 1MBps. The administrator has gathered the information below:

• There is no correlation between the slowdown and VM/hypervisor resource utilization.

• The network is rated to 40Gbps and utilization is between 1—5%.

• The hypervisors use hundreds of NFSv3 mounts to the same storage appliance, one per VM.

• The VMS on each hypervisor become unresponsive after two weeks of uptime.

• The unresponsiveness is resolved by moving slow VMS onto a rebooted hypervisor.

Which of the following solutions will MOST likely resolve this issue?

A.

Increase caching on the storage appliance.

B.

Configure jumbo frames on the hypervisors and storage.

C.

Increase CPU/RAM resources on affected VMS.

D.

Reduce the number of NFSv3 mounts to one.

Full Access
Question # 47

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Full Access
Question # 48

A systems administrator has received an email from the virtualized environment's alarms indicating the memory was reaching full utilization. When logging in, the administrator notices that one out of a five-host cluster has a utilization of 500GB out of 512GB of RAM. The baseline utilization has been 300GB for that host. Which of the following should the administrator check NEXT?

A.

Storage array

B.

Running applications

C.

VM integrity

D.

Allocated guest resources

Full Access
Question # 49

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to best reduce cost?

A.

Scaling of the environment after work hours

B.

Implementing access control after work hours

C.

Shutting down the environment after work hours

D.

Blocking external access to the environment after work hours

Full Access
Question # 50

A systems administrator has verified that a physical switchport that is connected to a virtualization host is using all available bandwidth. Which of the following would best address this issue?

A.

Port mirroring

B.

Link aggregation

C.

Spanning tree

D.

Microsegmentation

Full Access
Question # 51

A cloud administrator used a deployment script to recreate a number of servers hosted in a public-cloud provider_ However, after the script completes, the administrator receives the following error when attempting to connect to one of the servers Via SSH from the administrators workstation: CHANGED. Which of the following IS the MOST likely cause of the issue?

A.

The DNS records need to be updated

B.

The cloud provider assigned a new IP address to the server.

C.

The fingerprint on the server's RSA key is different

D.

The administrator has not copied the public key to the server.

Full Access
Question # 52

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following

scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?

A.

Horizontal

B.

Vertical

C.

Cloud bursting

D.

Autoscaling

Full Access
Question # 53

An administrator needs to back up all the data from each VM daily while also saving space. Which of the following backup types will BEST fit this scenario?

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Full

Full Access
Question # 54

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).

A.

A load balancer

B.

SON

C.

A firewall

D.

SR-IOV

E.

Storage replication

F.

A VPN

Full Access
Question # 55

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

A.

Reboot all the servers in the green stack

B.

Failback to the blue stack

C.

Restore from backups

D.

Troubleshoot and resolve the application issues

Full Access
Question # 56

A cloud architect is deploying a web application that contains many large images and will be accessed on two continents. Which of the following will MOST improve the user experience while keeping costs low?

A.

Implement web servers in both continents and set up a VPN between the VPCs.

B.

Implement web servers on both continents and peer the VPCs.

C.

Implement a CDN and offload the images to an object storage.

D.

Implement a replica of the entire solution on every continent.

Full Access
Question # 57

A systems administrator notices the host filesystem is running out of storage space. Which of the following will best reduce the storage space on the system?

A.

Deduplication

B.

Compression

C.

Adaptive optimization

D.

Thin provisioning

Full Access
Question # 58

A systems administrator is planning to migrate to a cloud solution with volume-based licensing. Which of the following is most important when considering licensing costs?

A.

The number of cores

B.

The number of threads

C.

The number of machines

D.

The number of sockets

Full Access
Question # 59

A cloud administrator created four VLANs to autoscale the container environment. Two of the VLANs are on premises, while two VLANs are on a public cloud provider with a direct link between them. Firewalls are between the links with an additional subnet for communication, which is 192.168.5.0/24.

The on-premises gateways are:

192.168.1.1/24

192.168.2.1/24

The cloud gateways are:

192.168.3.1/24

192.168.4.1/24

The orchestrator is unable to communicate with the cloud subnets. Which Of the following should the administrator do to resolve the issue?

A.

Allow firewall traffic to 192.168.5.0/24.

B.

Set both firewall interfaces to 192.168.5.1/24.

C.

Add interface 192.168.3.1/24 on the local firewall.

D.

Add interface 192.168.1.1/24 on the cloud firewall.

Full Access
Question # 60

A systems administrator is implementing a new version of a company's primary human-resources application. An upgrade will be performed on the production server, as there is no development environment. The administrator needs to have a

plan in case something goes wrong with the upgrade. Which of the following will work best to ensure a quick rollback in case an issue arises?

A.

An application-level backup

B.

A production snapshot

C.

A full backup

D.

A differential backup

Full Access
Question # 61

A web consultancy group currently works in an isolated development environment. The group uses this environment for the creation of the final solution, but also for showcasing it to customers, before commissioning the sites in production. Recently, customers of newly commissioned sites have reported they are not receiving the final product shown by the group, and the website is performing in unexpected ways. Which of the following additional environments should the group adopt and include in its process?

A.

Provide each web consultant a local environment on their device.

B.

Require each customer to have a blue-green environment.

C.

Leverage a staging environment that is tightly controlled for showcasing

D.

Initiate a disaster recovery environment to fail to in the event of reported issues.

Full Access
Question # 62

A cloud administrator is supporting an application that has several reliability issues. The administrator needs visibility into the performance characteristics of the application. Which of the following will MOST likely be used in a reporting dashboard?

A.

Data from files containing error messages from the application

B.

Results from the last performance and workload testing

C.

Detail log data from syslog files of the application

D.

Metrics and time-series data measuring key performance indicators

Full Access
Question # 63

A technician just received the lessons learned from some recent data that was lost due to an on-premises file-server crash. The action point is to change the backup strategy to minimize manual intervention. Which of the following is the BEST approach for the technician to implement?

A.

Backup as a service

B.

RAID 1

C.

Long-term storage

D.

New backup devices

Full Access
Question # 64

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Full Access
Question # 65

A cloud security analyst is implementing a vulnerability scan of the web server in the DMZ, which is running in an IaaS compute instance. The default inbound firewall settings are as follows:

Which of the following will provide the analyst with the MOST accurate report?

A.

An agent-based scan

B.

A network vulnerability scan

C.

A default and common credentialed scan

D.

A network credentialed vulnerability scan

Full Access
Question # 66

An organization has the following requirements that need to be met when implementing cloud services:

  • SSO to cloud infrastructure
  • On-premises directory service
  • RBAC for IT staff

Which of the following cloud models would meet these requirements?

A.

Public

B.

Community

C.

Hybrid

D.

Multitenant

Full Access
Question # 67

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed.

Which of the following actions will make the server fully operational?

A.

Restart the RAID resynchronization process

B.

Perform a P2V migration of the server

C.

Swap the failed hard drive with a fresh one

D.

Restore the server from backup

Full Access
Question # 68

A company wants to move its environment from on premises to the cloud without vendor lock-in. Which of the following would BEST meet this requirement?

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Full Access
Question # 69

A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?

A.

Alternate location

B.

Rolling

C.

Storage live migration

D.

In-place

Full Access
Question # 70

A systems administrator adds servers to a round-robin, load-balanced pool, and then starts receiving reports of the website being intermittently unavailable. Which of the following is the MOST likely cause of the issue?

A.

The network is being saturated.

B.

The load balancer is being overwhelmed.

C.

New web nodes are not operational.

D.

The API version is incompatible.

E.

There are time synchronization issues.

Full Access
Question # 71

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Full Access
Question # 72

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?

A.

Virtual machines

B.

Software as a service

C.

Serverless computing

D.

Containers

Full Access
Question # 73

Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps.

Which of the following solutions will resolve the issue the FASTEST?

A.

Change the connection to point-to-site VPN

B.

Order a direct link to the provider

C.

Enable quality of service

D.

Upgrade the link to 200Mbps

Full Access
Question # 74

All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST?

A.

Peer all the networks from each cloud environment.

B.

Migrate the servers.

C.

Create a VPN tunnel.

D.

Configure network access control lists.

Full Access
Question # 75

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Full Access
Question # 76

Which of the following cloud services is fully managed?

A.

IaaS

B.

GPU in the cloud

C.

IoT

D.

Serverless compute

E.

SaaS

Full Access
Question # 77

A cloud engineer is responsible for a legacy web application that runs on an on-premises VM environment. The VM environment is approaching end of life. The engineer needs to migrate the web application to the cloud as quickly as possible because the VM environment has the following limitations:

• The VM environment has a single IOGB disk.

• The VM environment still uses 10Mbps, which leaves a 100Mbps WAN connection underutilized.

• No installation media is available.

Which of the following is the best way to migrate the web application to the cloud?

A.

Use the VM import connector to import the VM into the cloud.

B.

Use import/export to import the VM as a snapshot and attach it to a cloud instance.

C.

Use REST APIs to import an image of the VM into the cloud.

D.

Use object storage to create a backup of the VM and restore data into the cloud instance.

Full Access
Question # 78

To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public DBaaS solution. Which of the following would be the BEST technique?

A.

Live migration

B.

Physical-to-virtual

C.

Storage-level mirroring

D.

Database replication

Full Access
Question # 79

An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?

A.

Two load balancers behind a single firewall

B.

Firewalls in a blue-green configuration

C.

Two firewalls in a HA configuration

D.

A web application firewall

Full Access
Question # 80

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

A.

Internet of Things

B.

Digital transformation

C.

Artificial intelligence

D.

DNS over TLS

Full Access
Question # 81

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Full Access
Question # 82

A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?

A.

RAID 5

B.

RAID 6

C.

RAID 10

D.

RAID 50

Full Access
Question # 83

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?

A.

Insufficient guest bandwidth

B.

Overwhelmed vCPU

C.

A storage error on the guest

D.

Incorrect VLAN assignment

E.

Inadequate memory allocation

Full Access
Question # 84

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?

A.

IPAM

B.

DoH

C.

VLAN

D.

SDN

Full Access
Question # 85

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company's security posture?

A.

SSH

B.

MFA

C.

Certificates

D.

Federation

Full Access
Question # 86

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment?

A.

The regional area

B.

Cloud bursting

C.

Lower costs

D.

Scalability

Full Access
Question # 87

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public laaS. The team identifies the following rule as a potential

A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IR" Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the

server from their locations?

A.

Modify the outbound rule to allow the company's external IP address as a source.

B.

Add an inbound rule to use the IP address for the company's main office as a source.

C.

Modify the inbound rule to allow the company's external IP address as a source.

D.

Delete the inbound rule to allow the company's external IP address as a source.

Full Access
Question # 88

A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured?

A.

Regions

B.

Anti-affinity

C.

Oversubscription

D.

Container

Full Access
Question # 89

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the BEST action to correct the latency issue?

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Full Access
Question # 90

A cloud administrator would like to maintain file integrity checks through hashing on a cloud object store. Which of the following is MOST suitable from a performance perspective?

A.

SHA-256

B.

SHA-512

C.

MD5

D.

AES

Full Access
Question # 91

A systems administrator is helping to develop a disaster recovery solution. The solution must ensure all production capabilities are available within two hours. Which of the following will BEST meet this requirement?

A.

A hot site

B.

A warm site

C.

A backup site

D.

A cold site

Full Access
Question # 92

A systems administrator needs to implement a service to protect a web application from external attacks. The administrator must have session-based granular control of all HTTP traffic. Which of the following should the administrator configure?

A.

IDS

B.

WAF

C.

DLP

D.

NAC

Full Access
Question # 93

A web application has been configured to use autoscaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new CI/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now. the autoscaling configuration is creating a new VM ever\ five minutes. Which of the following actions will MOS I like y resolve the issue?

A.

Reducing the maximum threshold in the autoscaling configuration

B.

Debugging the script and redeploying it

C.

Changing the automation tool because it is incompatible

D.

Modifying the script to shut down the VM after five minutes

Full Access
Question # 94

Lateral-moving malware has infected the server infrastructure.

Which of the following network changes would MOST effectively prevent lateral movement in the future?

A.

Implement DNSSEC in all DNS servers

B.

Segment the physical network using a VLAN

C.

Implement microsegmentation on the network

D.

Implement 802.1X in the network infrastructure

Full Access
Question # 95

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Full Access
Question # 96

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations.

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?

A.

Integrity

B.

Versioning

C.

Classification

D.

Segmentation

Full Access
Question # 97

A systems administrator is configuring a storage array.

Which of the following should the administrator configure to set up mirroring on this array?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Full Access
Question # 98

A systems administrator is provisioning VMs in a cloud environment and has been told to select an OS build with the furthest end-of-life date.

Which of the following OS builds would be BEST for the systems administrator to use?

A.

Open-source

B.

LTS

C.

Canary

D.

Beta

E.

Stable

Full Access
Question # 99

A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible.

Which of the following will BEST achieve this goal?

A.

Configure CPU passthrough

B.

Oversubscribe CPU resources

C.

Switch from a Type 1 to a Type 2 hypervisor

D.

Increase instructions per cycle

E.

Enable simultaneous multithreading

Full Access
Question # 100

A systems administrator is deploying a GPU-accelerated VDI solution. Upon requests from several users, the administrator installs an older version of the OS on their virtual workstations. The majority of the VMs run the latest LTS version of the OS.

Which of the following types of drivers will MOST likely ensure compatibility will all virtual workstations?

A.

Alternative community drivers

B.

Legacy drivers

C.

The latest drivers from the vendor’s website

D.

The drivers from the OS repository

Full Access
Question # 101

A systems administrator in a large enterprise needs to alter the configuration of one of the finance department’s database servers.

Which of the following should the administrator perform FIRST?

A.

Capacity planning

B.

Change management

C.

Backups

D.

Patching

Full Access
Question # 102

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Full Access
Question # 103

A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well.

Which of the following should the administrator recommend the user do FIRST?

A.

Disable antivirus/anti-malware software

B.

Turn off the software firewall

C.

Establish a VPN tunnel between the computer and the web server

D.

Update the web browser to the latest version

Full Access
Question # 104

A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web- based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.

The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment.

Which of the following is the MOST likely reason for this issue?

A.

The license limit on the number of server deployments allowed per month was exceeded

B.

The deployment script changes made by the first administrator were not checked in and committed

C.

The new server images were incompatible with the application load-balancer configuration

D.

The application load balancer exceeded the maximum number of servers it could use

Full Access
Question # 105

A SAN that holds VM files is running out of storage space.

Which of the following will BEST increase the amount of effective storage on the SAN?

A.

Enable encryption

B.

Increase IOPS

C.

Convert the SAN from RAID 50 to RAID 60

D.

Configure deduplication

Full Access
Question # 106

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPU resources

F.

License issues

Full Access
Question # 107

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance.

Which of the following licensing models is the application MOST likely using?

A.

Per device

B.

Per user

C.

Core-based

D.

Volume-based

Full Access
Question # 108

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs.

Which of the following should be verified NEXT?

A.

Application

B.

SAN

C.

VM GPU settings

D.

Network

Full Access
Question # 109

A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below:

The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions.

Which of the following solutions would help the company accommodate the new workload in the SHORTEST amount of time and with the maximum financial benefits?

A.

Configure auto-scaling within the private cloud

B.

Set up cloud bursting for the additional resources

C.

Migrate all workloads to a public cloud provider

D.

Add more capacity to the private cloud

Full Access
Question # 110

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Full Access
Question # 111

An organization requires the following to be achieved between the finance and marketing departments:

  • Allow HTTPS/HTTP.

  • Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Full Access
Question # 112

A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data.

Which of the following migration methods would be the BEST to use?

A.

Conduct a V2V migration

B.

Perform a storage live migration

C.

Rsync the data between arrays

D.

Use a storage vendor migration appliance

Full Access
Question # 113

A company developed a product using a cloud provider’s PaaS platform and many of the platform-based components within the application environment.

Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider?

A.

Licensing

B.

Authentication providers

C.

Service-level agreement

D.

Vendor lock-in

Full Access
Question # 114

An organization is hosting a DNS domain with private and public IP ranges.

Which of the following should be implemented to achieve ease of management?

A.

Network peering

B.

A CDN solution

C.

A SDN solution

D.

An IPAM solution

Full Access
Question # 115

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Full Access
Question # 116

An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions.

Which of the following would be suitable to optimize the network for this requirement?

A.

Implement CDN for overall cloud application

B.

Implement auto-scaling of the compute resources

C.

Implement SR-IOV on the server instances

D.

Implement an application container solution

Full Access
Question # 117

A systems administrator needs to configure SSO authentication in a hybrid cloud environment.

Which of the following is the BEST technique to use?

A.

Access controls

B.

Federation

C.

Multifactor authentication

D.

Certificate authentication

Full Access
Question # 118

A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found.

Which of the following is the MOST likely cause of the script failure?

A.

Account mismatches

B.

IP address changes

C.

API version incompatibility

D.

Server name changes

Full Access
Question # 119

Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?

A.

Implement whole-disk encryption

B.

Deploy the latest OS patches

C.

Deploy an anti-malware solution

D.

Implement mandatory access control

Full Access
Question # 120

A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information:

  • The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.
  • The cloud management console does not show an IP address for that server.
  • A DNS lookup shows the hostname resolves to an IP address.
  • The server is a member of the same security group as the others.
  • The cloud administrator is able to log in remotely to the other servers without issue.

Which of the following is the MOST likely cause of the server being unavailable?

A.

The network driver updates did not apply successfully, and the interface is in a down state.

B.

The ACL policy for the server was updated as part of the server reboot, preventing login access.

C.

The server was assigned a new IP address, and DNS entry for the server name was not updated.

D.

The update caused an increase in the output to the logs, and the server is too busy to respond.

Full Access
Question # 121

A cloud administrator needs to implement a mechanism to monitor the expense of the company’s cloud resources.

Which of the following is the BEST option to execute this task with minimal effort?

A.

Ask the cloud provider to send a daily expense report

B.

Set custom notifications for exceeding budget thresholds

C.

Use the API to collect expense information from cloud resources

D.

Implement a financial tool to monitor cloud resource expenses

Full Access
Question # 122

A cloud administrator has built a new private cloud environment and needs to monitor all computer, storage, and network components of the environment.

Which of the following protocols would be MOST useful for this task?

A.

SMTP

B.

SCP

C.

SNMP

D.

SFTP

Full Access
Question # 123

A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed.

Which of the following will BEST identify the CPU with more computational power?

A.

Simultaneous multithreading

B.

Bus speed

C.

L3 cache

D.

Instructions per cycle

Full Access
Question # 124

A systems administrator needs to configure an email client to ensure data integrity of the email messages.

Which of the following provides the BEST mechanism to achieve this goal?

A.

Cyclic redundancy check

B.

SHA-1 hashes

C.

SHA-256 hashes

D.

Digital signature

Full Access
Question # 125

An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation:

  • Production traffic (10.10.0.0/24)
  • Network backup (10.20.0.0/25)
  • Virtual IP network (10.20.0.128/25)

The following configuration exists on the server:

The backup administrator observes that the weekly backup is failing for this server. Which of the following commands should the administrator run to identify the issue?

A.

ROUTE PRINT

B.

NETSTAT -A

C.

IPCONFIG /ALL

D.

NET SM

Full Access