Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance has been slow since the images were upgraded from Windows 7 to Windows 10.

This VDI environment is used to run simple tasks, such as Microsoft Office. The administrator investigates the virtual machines and finds the following settings:

    4 vCPU

    16GB RAM

    10Gb networking

    256MB frame buffer

Which of the following MOST likely needs to be upgraded?

A.

vRAM

B.

vCPU

C.

vGPU

D.

vNIC

Full Access
Question # 5

A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.)

A.

The fabric interconnects

B.

The virtual appliances

C.

The firmware

D.

The virtual machines

E.

The baselines

F.

The operating system

Full Access
Question # 6

Which of the following should be considered for capacity planning?

A.

Requirements, licensing, and trend analysis

B.

Laws and regulations

C.

Regions, clusters, and containers

D.

Hypervisors and scalability

Full Access
Question # 7

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

A.

The target system's API functionality has been deprecated

B.

The password for the service account has expired

C.

The IP addresses of the target system have changed

D.

The target system has failed after the updates

Full Access
Question # 8

A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other. Which of the following should an administrator perform to comply with the security requirement?

A.

Create separate virtual networks for production, QA, and development servers.Move the servers to the appropriate virtual network.Apply a network security group to each virtual network that denies all traffic except for the firewall.

B.

Create separate network security groups for production, QA, and development servers.Apply the network security groups on the appropriate production, QA, and development servers.Peer the networks together.

C.

Create separate virtual networks for production, QA, and development servers.Move the servers to the appropriate virtual network.Peer the networks together.

D.

Create separate network security groups for production, QA, and development servers.Peer the networks together.Create static routes for each network to the firewall.

Full Access
Question # 9

A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring the VM uses only the storage if needs. Which of the following will BEST achieve this goal?

A.

Compression

B.

Deduplication

C.

RAID

D.

Thin provisioning

Full Access
Question # 10

A technician just received the lessons learned from some recent data that was lost due to an on-premises file-server crash. The action point is to change the backup strategy to minimize manual intervention. Which of the following is the BEST approach for the technician to implement?

A.

Backup as a service

B.

RAID 1

C.

Long-term storage

D.

New backup devices

Full Access
Question # 11

A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.)

A.

Incorrect permissions

B.

Insufficient storage

C.

Billing issues with the cloud provider

D.

No connectivity to the public cloud

E.

Expired API token

F.

Disabled autoscaling

Full Access
Question # 12

A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?

A.

Compute

B.

Storage

C.

Licensing

D.

Scripts

Full Access
Question # 13

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Full Access
Question # 14

An organization recently deployed a private cloud on a cluster of systems that delivers compute, network, and storage resources in a single hardware, managed by an intelligent software. Which of the following BEST describes this type of deployment?

A.

High-performance computing

B.

Hyperconverged infrastructure

C.

Stand-alone computing

D.

Dynamic allocations

Full Access
Question # 15

A cloud administrator is responsible for managing a VDI environment that provides end users with access to limited applications. Which of the following should the administrator make changes to when a new application needs to be provided?

A.

Application security policy

B.

Application whitelisting policy

C.

Application hardening policy

D.

Application testing policy

Full Access
Question # 16

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?

A.

There is a configuration failure in the syslog solution.

B.

The application servers were migrated to the cloud as laaS instances.

C.

The application administrators have not performed any activity in those servers.

D.

There is a local firewall policy restriction on the syslog server.

Full Access
Question # 17

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).

A.

A load balancer

B.

SON

C.

A firewall

D.

SR-IOV

E.

Storage replication

F.

A VPN

Full Access
Question # 18

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Full Access
Question # 19

A systems administrator has migrated a web application to the cloud with a synchronous uplink speed of 100Mbps. After the migration, the administrator receives reports of slow connectivity to the web application. The administrator logs into the firewall and notices the WAN port is transmitting at a constant 12.5MBps. Which of the following BEST explains the reason for the issue?

A.

Misconfigured subnetting

B.

Insufficient compute

C.

Firewall issues

D.

Not enough upload bandwidth

Full Access
Question # 20

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

A.

Internet of Things

B.

Digital transformation

C.

Artificial intelligence

D.

DNS over TLS

Full Access
Question # 21

A technician needs to deploy two virtual machines in preparation for the configuration of a financial application next week. Which of the following cloud deployment models should the technician use?

A.

XaaS

B.

IaaS

C.

PaaS

D.

SaaS

Full Access
Question # 22

A vendor is installing a new retail store management application for a customer. The application license ensures software costs are low when the application is not being used, but costs go up when use is higher.

Which of the following licensing models is MOST likely being used?

A.

Socket-based

B.

Core-based

C.

Subscription

D.

Volume-based

Full Access
Question # 23

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly.

Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?

A.

Tier pricing

B.

Licensing

C.

Estimated consumption

D.

Feature compatibility

Full Access
Question # 24

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?

A.

Incorrect encryption ciphers

B.

Broken trust relationship

C.

Invalid certificates

D.

Expired password

Full Access
Question # 25

A systems administrator is deploying a new cloud application and needs to provision cloud services with minimal effort. The administrator wants to reduce the tasks required for maintenance, such as OS patching, VM and volume provisioning, and autoscaling configurations. Which of the following would be the BEST option to deploy the new application?

A.

A VM cluster

B.

Containers

C.

OS templates

D.

Serverless

Full Access
Question # 26

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed.

Which of the following actions will make the server fully operational?

A.

Restart the RAID resynchronization process

B.

Perform a P2V migration of the server

C.

Swap the failed hard drive with a fresh one

D.

Restore the server from backup

Full Access
Question # 27

An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would be MOST useful to accomplish this task?

A.

VLAN

B.

NIPS

C.

WAF

D.

NAC

Full Access
Question # 28

A cloud administrator wants to have a central repository for all the logs in the company’s private cloud. Which of the following should be implemented to BEST meet this requirement?

A.

SNMP

B.

Log scrubbing

C.

CMDB

D.

A syslog server

Full Access
Question # 29

A systems administrator is analyzing a report of slow performance in a cloud application. This application is working behind a network load balancer with two VMs, and each VM has its own digital certificate configured. Currently, each VM is consuming 85% CPU on average. Due to cost restrictions, the administrator cannot scale vertically or horizontally in the environment. Which of the following actions should the administrator take to decrease the CPU utilization? (Choose two.)

A.

Configure the communication between the load balancer and the VMs to use a VPN.

B.

Move the digital certificate to the load balancer.

C.

Configure the communication between the load balancer and the VMs to use HTTP.

D.

Reissue digital certificates on the VMs.

E.

Configure the communication between the load balancer and the VMs to use HTTPS.

F.

Keep the digital certificates on the VMs.

Full Access
Question # 30

Which of the following cloud services is fully managed?

A.

IaaS

B.

GPU in the cloud

C.

IoT

D.

Serverless compute

E.

SaaS

Full Access
Question # 31

An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations.

Which of the following is the MOST efficient way to bring the block storage in the primary datacenter up to date with the DR site?

A.

Set up replication.

B.

Copy the data across both sites.

C.

Restore incremental backups.

D.

Restore full backups.

Full Access
Question # 32

A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective?

A.

22, 53, 445

B.

22, 443, 445

C.

25, 123, 443

D.

137, 139, 445

Full Access
Question # 33

A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST?

A.

The firewall

B.

The subnet

C.

The gateway

D.

The services

Full Access
Question # 34

To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public DBaaS solution. Which of the following would be the BEST technique?

A.

Live migration

B.

Physical-to-virtual

C.

Storage-level mirroring

D.

Database replication

Full Access
Question # 35

A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements:

No downtime

Instant switch to a new version using traffic control for all users

Which of the following deployment strategies would be the BEST solution?

A.

Hot site

B.

Blue-green

C.

Canary

D.

Rolling

Full Access
Question # 36

A company wants to move its environment from on premises to the cloud without vendor lock-in. Which of the following would BEST meet this requirement?

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Full Access
Question # 37

A cloud administrator recently noticed that a number of files stored at a SaaS provider’s file-sharing service were deleted. As part of the root cause analysis, the administrator noticed the parent folder permissions were modified last week. The administrator then used a test user account and determined the permissions on the files allowed everyone to have write access.

Which of the following is the best step for the administrator to take NEXT?

A.

Identify the changes to the file-sharing service and document

B.

Acquire a third-party DLP solution to implement and manage access

C.

Test the current access permissions to the file-sharing service

D.

Define and configure the proper permissions for the file-sharing service

Full Access
Question # 38

A systems administrator needs to convert ten physical servers to virtual.

Which of the following would be the MOST efficient conversion method for the administrator to use?

A.

Rebuild the servers from scratch

B.

Use the vendor’s conversion tool

C.

Clone the hard drive

D.

Restore from backup

Full Access
Question # 39

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Full Access
Question # 40

A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below:

The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions.

Which of the following solutions would help the company accommodate the new workload in the SHORTEST amount of time and with the maximum financial benefits?

A.

Configure auto-scaling within the private cloud

B.

Set up cloud bursting for the additional resources

C.

Migrate all workloads to a public cloud provider

D.

Add more capacity to the private cloud

Full Access
Question # 41

A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior.

Which of the following is MOST likely the cause?

A.

API provider rate limiting

B.

Invalid API token

C.

Depleted network bandwidth

D.

Invalid API request

Full Access
Question # 42

In an existing IaaS instance, it is required to deploy a single application that has different versions.

Which of the following should be recommended to meet this requirement?

A.

Deploy using containers

B.

Install a Type 2 hypervisor

C.

Enable SR-IOV on the host

D.

Create snapshots

Full Access
Question # 43

A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution.

Which of the following will provide the data to measure business continuity? (Choose two.)

A.

A service-level agreement

B.

Automation scripts

C.

Playbooks

D.

A network diagram

E.

A backup and restore

F.

A recovery time objective

Full Access
Question # 44

An organization has two businesses that are developing different software products. They are using a single cloud provider with multiple IaaS instances. The organization identifies that the tracking of costs for each

business are inaccurate.

Which of the following is the BEST method for resolving this issue?

A.

Perform segregation of the VLAN and capture egress and ingress values of each network interface

B.

Tag each server with a dedicated cost and sum them based on the businesses

C.

Split the total monthly invoice equally between the businesses

D.

Create a dedicated subscription for the businesses to manage the costs

Full Access
Question # 45

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Full Access
Question # 46

A cloud administrator is designing a multiregion network within an IaaS provider. The business requirements for configuring the network are as follows:

    Use private networking in and between the multisites for data replication.

    Use low latency to avoid performance issues.

Which of the following solutions should the network administrator use within the IaaS provider to connect multiregions?

A.

Peering

B.

Gateways

C.

VPN

D.

Hub and spoke

Full Access
Question # 47

An organization is required to set a custom registry key on the guest operating system.

Which of the following should the organization implement to facilitate this requirement?

A.

A configuration management solution

B.

A log and event monitoring solution

C.

A file integrity check solution

D.

An operating system ACL

Full Access
Question # 48

An organization has the following requirements that need to be met when implementing cloud services:

    SSO to cloud infrastructure

    On-premises directory service

    RBAC for IT staff

Which of the following cloud models would meet these requirements?

A.

Public

B.

Community

C.

Hybrid

D.

Multitenant

Full Access
Question # 49

Which of the following cloud deployment models allows a company to have full control over its IT infrastructure?

A.

Private

B.

Cloud within a cloud

C.

Hybrid

D.

Public

Full Access
Question # 50

A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web- based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.

The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment.

Which of the following is the MOST likely reason for this issue?

A.

The license limit on the number of server deployments allowed per month was exceeded

B.

The deployment script changes made by the first administrator were not checked in and committed

C.

The new server images were incompatible with the application load-balancer configuration

D.

The application load balancer exceeded the maximum number of servers it could use

Full Access
Question # 51

A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations.

Which of the following actions should the cloud administrator take FIRST?

A.

Initiate a failover

B.

Restore backups

C.

Configure the network

D.

Perform a failback

Full Access
Question # 52

A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found.

Which of the following is the MOST likely cause of the script failure?

A.

Account mismatches

B.

IP address changes

C.

API version incompatibility

D.

Server name changes

Full Access
Question # 53

An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?

A.

Logs on the VM

B.

Firewall on the VM

C.

Memory on the VM

D.

vGPU performance on the VM

Full Access
Question # 54

A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier.

Which of the following access control rules should be changed?

A.

Discretionary-based

B.

Attribute-based

C.

Mandatory-based

D.

Role-based

Full Access
Question # 55

An IaaS application has a two-hour RTO and a four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy.

Which of the following should the administrator configure to achieve the application requirements with the LEAST cost?

A.

Back up to long-term storage every night

B.

Back up to object storage every three hours

C.

Back up to long-term storage every four hours

D.

Back up to object storage every hour

Full Access
Question # 56

A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the only group allowed to modify files in the directory.

Which of the following will accomplish the desired objective?

A.

Remove the file write permissions for the application service account.

B.

Restrict the file write permissions to the development group only.

C.

Add access to the fileshare for the systems administrator’s group.

D.

Deny access to all development user accounts

Full Access
Question # 57

A systems administrator is configuring a storage array.

Which of the following should the administrator configure to set up mirroring on this array?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Full Access
Question # 58

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?

A.

Create a directory security group.

B.

Create a resource group.

C.

Create separate VLANs.

D.

Create a network security group.

Full Access
Question # 59

An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection?

A.

WAF

B.

EDR

C.

IDS

D.

HIPS

E.

SSL

Full Access
Question # 60

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following

scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?

A.

Horizontal

B.

Vertical

C.

Cloud bursting

D.

Autoscaling

Full Access
Question # 61

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

A.

Firewall outbound rules

B.

Firewall inbound rules

C.

Load balancer certificates

D.

Load balancer stickiness

E.

WAF transaction throttling

Full Access
Question # 62

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

A.

Site-to-site

B.

Client-to-site

C.

Point-to-site

D.

Point-to-point

Full Access
Question # 63

A systems administrator received an email from a cloud provider stating that storage is 80% full on the volume that stores VDI desktops. Which of the following is the MOST efficient way to mitigate the situation?

A.

Deduplication

B.

Compression

C.

Replication

D.

Storage migration

Full Access
Question # 64

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment?

A.

The regional area

B.

Cloud bursting

C.

Lower costs

D.

Scalability

Full Access
Question # 65

A web application has been configured to use autoscaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new CI/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now. the autoscaling configuration is creating a new VM ever\ five minutes. Which of the following actions will MOS I like y resolve the issue?

A.

Reducing the maximum threshold in the autoscaling configuration

B.

Debugging the script and redeploying it

C.

Changing the automation tool because it is incompatible

D.

Modifying the script to shut down the VM after five minutes

Full Access
Question # 66

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the BEST action to correct the latency issue?

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Full Access
Question # 67

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Select TWO).

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPI-J resources

F.

License issues

Full Access
Question # 68

A systems administrator needs to implement a service to protect a web application from external attacks. The administrator must have session-based granular control of all HTTP traffic. Which of the following should the administrator configure?

A.

IDS

B.

WAF

C.

DLP

D.

NAC

Full Access
Question # 69

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?

A.

MTTF

B.

SLA

C.

RTO

D.

RPO

Full Access
Question # 70

A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured?

A.

Regions

B.

Anti-affinity

C.

Oversubscription

D.

Container

Full Access
Question # 71

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

A.

RPO

B.

MTTR

C.

SLA

D.

RTO

Full Access
Question # 72

A security audit related to confidentiality controls found the following transactions occurring in the system:

GET http://gateway.securetransaction.com/privileged/api/v1/changeResource?id=123 &user=277

Which of the following solutions will solve the audit finding?

A.

Using a TLS-protected API endpoint

B.

Implementing a software firewall

C.

Deploying a HIDS on each system

D.

Implementing a Layer 4 load balancer

Full Access
Question # 73

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

A.

Reboot all the servers in the green stack

B.

Failback to the blue stack

C.

Restore from backups

D.

Troubleshoot and resolve the application issues

Full Access
Question # 74

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

A.

A firewall

B.

Switches

C.

Ballooning

D.

Autoscaling

Full Access
Question # 75

A systems administrator is diagnosing performance issues on a web application. The web application sends thousands of extremely complex SQL queries to a database server, which has trouble retrieving the information in time. The administrator checks the database server and notes the following resource utilization:

CPU: 64%

RAM: 97%

Network throughput: 384,100Kbps.

Disk throughput: 382,700Kbps

The administrator also looks at the storage for the database server and notices it is consistently near its OPS limit. Which of the following will BEST resolve these performance issues?

A.

Increase CPU resources on the database server.

B.

Increase caching on the database server.

C.

Put the storage and the database on the same VLAN.

D.

Enable compression on storage traffic.

E.

Enable deduplication on the storage appliance.

Full Access
Question # 76

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?

A.

HTTPS

B.

IPSec

C.

TLS

D.

SSH

Full Access
Question # 77

A cloud administrator needs to verify domain ownership with a third party. The third party has provided a secret that must be added to the DNS server. Which of the following DNS records does the administrator need to update to include the secret?

A.

NS

B.

TXT

C.

AAAA

D.

SOA

Full Access
Question # 78

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled? (Select TWO).

A.

Telnet

B.

FTP

C.

Remote login

D.

DNS

E.

DHCP

F.

LDAP

Full Access
Question # 79

A cloud administrator deployed new hosts in a private cloud. After a few months elapsed, some of the hypervisor features did not seem to be working. Which of the following was MOST likely causing the issue?

A.

Incorrect permissions

B.

Missing license

C.

Incorrect tags

D.

Oversubscription

Full Access
Question # 80

A systems administrator is implementing a new version of a company's primary human-resources application. An upgrade will be performed on the production server, as there is no development environment. The administrator needs to have a

plan in case something goes wrong with the upgrade. Which of the following will work best to ensure a quick rollback in case an issue arises?

A.

An application-level backup

B.

A production snapshot

C.

A full backup

D.

A differential backup

Full Access
Question # 81

A non-critical file on a database server was deleted and needs to be recovered. A cloud administrator must use the least disruptive restoration process to retrieve the file, as the database server cannot be stopped during the business day. Which of the following restoration methods would best accomplish this goal?

A.

Alternate location

B.

Restore from image

C.

Revert to snapshot

D.

In-place restoration

Full Access
Question # 82

A cloud administrator receives an email stating the following:

"Clients are receiving emails from our web application with non-encrypted links."

The administrator notices that links generated from the web application are opening in http://. Which of the following should be configured to redirect the traffic to https://?

A.

User account access

B.

Programming code

C.

Web server configuration

D.

Load balancer setting

Full Access
Question # 83

Which of the following provides groups of compute units that can horizontally scale according to a workload?

A.

Orchestrated container environment

B.

Cloud-reserved instances

C.

Autoscaling

D.

Cloud bursting

Full Access
Question # 84

A systems administrator is building a standardized OS template for the deployment of a web service. The image is intended for various autoscaling groups. Which of the following should be included in the image as best practice?

A.

Graphical user interface.

B.

Website configuration.

C.

System security hardening elements.

D.

Compute, memory, and storage capacity.

Full Access
Question # 85

A company is using a hybrid cloud environment. The private cloud is hosting the business applications, and the cloud services are being used to replicate for availability purposes.

The cloud services are also being used to accommodate the additional resource requirements to provide continued services. Which of the following scalability models is the company utilizing?

A.

Vertical scaling

B.

Autoscaling

C.

Cloud bursting

D.

Horizontal scaling

Full Access
Question # 86

A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?

A.

The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS

B.

The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor

C.

The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule

D.

Migrating from laaS to on premises, the network traffic between on-premises users and the laaS instance, and the CPU utilization of the hypervisor host

Full Access
Question # 87

A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?

A.

V2V

B.

V2P

C.

P2P

D.

P2V

Full Access
Question # 88

A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues.

Which of the following is the MOST likely cause of this issue?

A.

Change management failure

B.

Service overload

C.

Patching failure

D.

Job validation issues

E.

Deprecated features

Full Access
Question # 89

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Which of the following actions should the analyst take to accomplish the objective?

A.

Remove rules 1, 2, and 5.

B.

Remove rules 1, 3, and 4.

C.

Remove rules 2, 3, and 4.

D.

Remove rules 3, 4, and 5.

Full Access
Question # 90

Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps.

Which of the following solutions will resolve the issue the FASTEST?

A.

Change the connection to point-to-site VPN

B.

Order a direct link to the provider

C.

Enable quality of service

D.

Upgrade the link to 200Mbps

Full Access
Question # 91

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Full Access
Question # 92

A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled.

Which of the following techniques would BEST help the administrator assess these business requirements?

A.

Performance testing

B.

Usability testing

C.

Vulnerability testing

D.

Regression testing

Full Access
Question # 93

A systems administrator needs to configure SSO authentication in a hybrid cloud environment.

Which of the following is the BEST technique to use?

A.

Access controls

B.

Federation

C.

Multifactor authentication

D.

Certificate authentication

Full Access
Question # 94

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Full Access
Question # 95

A systems administrator is creating a playbook to run tasks against a server on a set schedule.

Which of the following authentication techniques should the systems administrator use within the playbook?

A.

Use the server’s root credentials

B.

Hard-code the password within the playbook

C.

Create a service account on the server

D.

Use the administrator’s SSO credentials

Full Access
Question # 96

A media company has made the decision to migrate a physical, internal file server to the cloud and use a web- based interface to access and manage the files. The users must be able to use their current corporate logins.

Which of the following is the MOST efficient way to achieve this goal?

A.

Deploy a VM in a cloud, attach storage, and copy the files across

B.

Use a SaaS service with a directory service federation

C.

Deploy a fileshare in a public cloud and copy the files across

D.

Copy the files to the object storage location in a public cloud

Full Access
Question # 97

Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A’s cloud resources while retaining its IAM solution.

Which of the following should be implemented?

A.

Multifactor authentication

B.

Single sign-on

C.

Identity federation

D.

Directory service

Full Access
Question # 98

A systems administrator is troubleshooting issues with network slowness. Traffic analysis shows that uplink bandwidth on the core switch is often sustained at 125Mbps due to a

combination of production traffic from other sources. Which of the following would BEST resolve the issue?

A.

Turn off the servers that use the most bandwidth.

B.

Enable QoS to prioritize production traffic.

C.

Increase the buffer size on the core switch.

D.

Reboot the core switch.

Full Access
Question # 99

A company is using a method of tests and upgrades in which a small set of end users are exposed to new services before the majority of other users. Which of the following deployment methods is being used?

A.

Blue-green

B.

Canary

C.

Big bang

D.

Rolling

Full Access
Question # 100

After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?

A.

One 32 vCPU node with CDN caching

B.

Two 8 vCPU nodes with load balancing

C.

Three to six 8 vCPU nodes autoscaling group

D.

Four 8 vCPU nodes with DNS round robin

Full Access
Question # 101

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Full Access
Question # 102

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Full Access
Question # 103

A cloud administrator is configuring several security appliances hosted in the private laaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?

A.

Allow UDP 161 outbound from the web servers to the log collector .

B.

Allow TCP 514 outbound from the web servers to the log collector.

C.

Allow UDP 161 inbound from the log collector to the web servers .

D.

Allow TCP 514 inbound from the log collector to the web servers .

Full Access
Question # 104

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to BEST reduce cost?

A.

Scaling of the environment after work hours

B.

Implementing access control after work hours

C.

Shutting down the environment after work hours

D.

Blocking external access to the environment after work hours

Full Access
Question # 105

A cloud administrator created four VLANs to autoscale the container environment. Two of the VLANs are on premises, while two VLANs are on a public cloud provider with a direct link between them. Firewalls are between the links with an additional subnet for communication, which is 192.168.5.0/24.

The on-premises gateways are:

192.168.1.1/24

192.168.2.1/24

The cloud gateways are:

192.168.3.1/24

192.168.4.1/24

The orchestrator is unable to communicate with the cloud subnets. Which Of the following should the administrator do to resolve the issue?

A.

Allow firewall traffic to 192.168.5.0/24.

B.

Set both firewall interfaces to 192.168.5.1/24.

C.

Add interface 192.168.3.1/24 on the local firewall.

D.

Add interface 192.168.1.1/24 on the cloud firewall.

Full Access
Question # 106

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments.

Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?

A.

Chain

B.

Star

C.

Mesh

D.

Hub and spoke

Full Access
Question # 107

A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times.

Which of the following actions will MOST likely solve this issue?

A.

Update the quest graphics drivers from the official repository

B.

Add more vGPU licenses to the host

C.

Instruct users to access virtual workstations only on the VLAN

D.

Select vGPU profiles with higher video RAM

Full Access
Question # 108

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

A.

Performance testing

B.

Penetration testing

C.

Vulnerability testing

D.

Regression testing

Full Access
Question # 109

Which of the following enables CSPs to offer unlimited capacity to customers?

A.

Adequate budget

B.

Global data center distribution

C.

Economies of scale

D.

Agile project management

Full Access
Question # 110

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?

A.

Upgrading the physical server NICs to support IOGbps

B.

Adding more vCPU

C.

Enabling SR-IOV capability

D.

Increasing the VM swap/paging size

Full Access
Question # 111

A systems administrator is reviewing the logs from a company's IDS and notices a large amount of outgoing traffic from a particular server. The administrator then runs a scan on the server, which detects malware that cannot be removed. Which of the following should the administrator do first?

A.

Determine the root cause.

B.

Disconnect the server from the network.

C.

Perform a more intrusive scan.

D.

Restore the server from a backup.

Full Access
Question # 112

A cloud engineer receives an alert that a newly provisioned server is running a non-supported Linux version. The automation scripts are performing as expected on the server. Which of the following should the engineer check first?

A.

Provisioning script indentation

B.

Template selection

C.

API version

D.

Script account

Full Access
Question # 113

A company's marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?

A.

GPU passthrough

B.

Increased memory

C.

Converged infrastructure

D.

An additional CPU core

Full Access
Question # 114

An application deployment team has observed delays in deployments and has asked the cloud administrator to evaluate the issue. Below is the result of a latency test that was conducted by the cloud administrator from offices located in the following regions:

• Asia-Pacific (APAC)

• Europe, the Middle East, and Africa (EMEA)

• Americas

Tests were conducted from each location, and the results are shown below:

Which of the following locations needs to be investigated further?

A.

• Connectivity from APAC to APAC regions• Connectivity from APAC to EMEA and US - North

B.

• Connectivity from APAC to all regions• Connectivity from Americas to all regions

C.

• Connectivity from EMEA to all regions• Connectivity from APAC to APAC and EMEA regions

D.

• Connectivity from APAC to EMEA and Americas regions• Connectivity from EMEA to all regions

Full Access
Question # 115

A systems administrator needs to provide information for a capacity-planning document. Which of the following is the most relevant baseline and capacity information?

A.

vCPU, vGPU, subscriptions, geographical, storage, user density, firewall settings.

B.

vGPU, storage, networking, user density, firewall, budgetary.

C.

vCPU, subscriptions, storage, DDoS, licensing, user density.

D.

vCPU, vGPU, subscriptions, storage, bandwidth, licensing.

Full Access
Question # 116

A corporation is evaluating an offer from a CSP to take advantage of volume discounts on a shared platform. The finance department is concerned about cost allocation transparency, as the current structure splits projects into dedicated billing accounts. Which of the following can be used to address this concern?

A.

Implementing resource tagging

B.

Defining a cost baseline

C.

Consolidating the billing accounts

D.

Using a third-party accounting tool

Full Access
Question # 117

An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions.

Which of the following would be suitable to optimize the network for this requirement?

A.

Implement CDN for overall cloud application

B.

Implement auto-scaling of the compute resources

C.

Implement SR-IOV on the server instances

D.

Implement an application container solution

Full Access
Question # 118

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

Identify the problematic device(s).

Part 2:

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

Part 2:

Only select a maximum of TWO options from the multiple choice question

Full Access
Question # 119

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Full Access
Question # 120

A company has applications that need to remain available in the event of the data center being unavailable. The company's cloud architect needs to find a solution to maintain business continuity. Which of following should the company implement?

A.

A DR solution for the application between different data centers

B.

An off-site backup solution with a third-party vendor

C.

laC techniques to recreate the system at a new provider

D.

An HA solution for the application inside the data center

Full Access
Question # 121

A systems administrator is planning the storage requirements for a two-disk mirror of a server OS disk partition. Which of the following is the amount of disk space available in the mirrored volume?

A.

30%

B.

50%

C.

75%

D.

100%

Full Access
Question # 122

A systems administrator has verified that a physical switchport that is connected to a virtualization host is using all available bandwidth. Which of the following would best address this issue?

A.

Port mirroring

B.

Link aggregation

C.

Spanning tree

D.

Microsegmentation

Full Access
Question # 123

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator most likely use?

A.

An API gateway

B.

An IPS/IDS

C.

A reverse proxy

D.

A WAF

Full Access
Question # 124

After an infrastructure-as-code cloud migration to an laaS environment, the cloud engineer discovers that configurations on DB servers have drifted from the corporate standard baselines. Which of the following should the cloud engineer do to best ensure configurations are restored to the baselines?

A.

Utilize a template to automate and update the DB configuration.

B.

Create an image of the DB, delete the previous DB server, and restore from the image.

C.

Manually log in to the DB servers and update the configurations.

D.

Rename and change the IP of the old DB server and rebuild a new DB server.

Full Access
Question # 125

An organization will be deploying a web application in a public cloud with two web servers, two database servers, and a load balancer that is accessible over a single public IP.

Taking into account the gateway for this subnet and the potential to add two more web servers, which of the following will meet the minimum IP requirement?

A.

192.168.1.0/26

B.

192.168.1.0/27

C.

192.168.1.0/28

D.

192.168.1.0/29

Full Access
Question # 126

A cloud administrator is choosing a backup schedule for a new application platform that creates many small files. The backup process impacts the performance of the application, and backup times should be minimized during weekdays. Which of the following backup types best meets the weekday requirements?

A.

Database dump

B.

Differential

C.

Incremental

D.

Full

Full Access
Question # 127

A cloud engineer is troubleshooting RSA key-based authentication from a local computer to a cloud-based server, which is running SSH service on a default port. The following file

permissions are set on the authorized keys file:

-rw-rw-rw-1 ubuntu ubuntu 391 Mar S 01:36 authorized _ keys

Which Of the following security practices are the required actions the engineer Should take to gain access to the server? (Select TWO).

A.

Fix the file permissions with execute permissions to the owner of the file.

B.

Open port 21 access for the computer's public IP address.

C.

Fix the file permissions with read-only access to the owner Of the file.

D.

Open port 22 access for the computer's public IP address.

E.

Open port 21 access for 0.0.0.0/0 CIDR.

F.

open port 22 access for 0.0.0.0/0 CIDR.

Full Access
Question # 128

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Which Of the following actions Should the analyst take to accomplish the Objective?

A.

Remove rules I, 2. and 5.

B.

Remove rules I, 3, and 4.

C.

Remove rules 2.3. and 4.

D.

Remove rules 3.4. and 5.

Full Access
Question # 129

A DevOps engineer needs to provide sensitive information to applications running as containers. The sensitive information will be updated based on the environment in which the container will be deployed. Which of the following should the engineer leverage to ensure the data remains protected?

A.

Secrets

B.

Tokens

C.

Image scanning

D.

Variables

Full Access
Question # 130

A systems administrator is deploying a new version of a website. The website is deployed in the cloud using a VM cluster. The administrator must then deploy the new version into one VM first. After a period of time, if there are no issues detected, a second VM will be updated. This process must continue until all the VMS are updated. Which of the following upgrade methods is being implemented?

A.

Canary

B.

Blue-green

C.

Rolling

D.

Staging

Full Access
Question # 131

Different healthcare organizations have agreed to collaborate and build a cloud infrastructure that should minimize compliance costs and provide a high degree of security and privacy, as per regulatory requirements. This is an example of a:

A.

private cloud.

B.

community cloud.

C.

hybrid cloud.

D.

public cloud.

Full Access
Question # 132

A company has a large environment with multiple VPCs across three regions in a public cloud. The company is concerned about connectivity within the regions. Which of the following should the cloud administrator implement?

A.

Peering

B.

A firewall

C.

Network access control

D.

A load balancer

Full Access
Question # 133

A company is using laaS services from two different providers: one for its primary site, and the other for a secondary site. The primary site is completely inaccessible, and the management team has decided to run through the BCP procedures. Which of the following will provide the complete asset information?

A.

DR replication document

B.

DR playbook

C.

DR policies and procedures document

D.

DR network diagram

Full Access
Question # 134

A systems administrator is diagnosing performance issues on a web application. The web application sends thousands of extremely complex SQL queries to a database server, which has trouble retrieving the information in time. The administrator checks the database server and notes the following resource utilization:

    CPU: 64%

    RAM: 97%

    Network throughput: 384/1000 Kbps

    Disk throughput: 382,700 Kbps

The administrator also notices that the storage for the database server is consistently near its IOPS limit. Which of the following will best resolve these performance issues?

A.

Increase CPU resources on the database server.

B.

Increase caching on the database server.

C.

Put the storage and the database on the same VLAN.

D.

Enable compression on storage traffic.

E.

Enable deduplication on the storage appliance.

Full Access
Question # 135

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?

A.

Log monitoring

B.

Patch management

C.

Vulnerability scanning

D.

System hardening

Full Access