Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

A.

VPC

B.

Application load balancer

C.

CDN

D.

API gateway

Full Access
Question # 5

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

A.

Resource tagging

B.

Discretionary access control

C.

Multifactor authentication

D.

Role-based access control

E.

Token-based authentication

F.

Bastion host

Full Access
Question # 6

Which of the following requirements are core considerations when migrating a small business's on-premises applications to the cloud? (Select two).

A.

Availability

B.

Hybrid

C.

Testing

D.

Networking

E.

Compute

F.

Logs

Full Access
Question # 7

An e-commerce store is preparing for an annual holiday sale. Previously, this sale has increased the number of transactions between two and ten times the normal level of

transactions. A cloud administrator wants to implement a process to scale the web server seamlessly. The goal is to automate changes only when necessary and with minimal cost.

Which of the following scaling approaches should the administrator use?

A.

Scale horizontally with additional web servers to provide redundancy.

B.

Allow the load to trigger adjustments to the resources.

C.

When traffic increases, adjust the resources using the cloud portal.

D.

Schedule the environment to scale resources before the sale begins.

Full Access
Question # 8

A company wants to combine solutions in a central and scalable environment to achieve the following goals:

• Control

• Visibility

• Automation

• Cost efficiency

Which of the following best describes what the company should implement?

A.

Batch processing

B.

Workload orchestration

C.

Containerization

D.

Application modernization

Full Access
Question # 9

A cloud engineer is developing an operating expense report that will be used to purchase various cloud billing models for virtual machine instances. The cloud billing model must meet the following requirements:

• The instance cannot be ephemeral.

• The minimum life cycle of the instance is expected to be five years.

• The software license is charged per physical CPU count.

Which of the following models would best meet these requirements?

A.

Dedicated host

B.

Spot instance

C.

Pay-as-you-go

D.

Reserved resources

Full Access
Question # 10

A cloud engineer wants to implement a disaster recovery strategy that:

. Is cost-effective.

. Reduces the amount of data loss in case of a disaster.

. Enables recovery with the least amount of downtime.

Which of the following disaster recovery strategies best describes what the cloud engineer wants to achieve?

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Full Access
Question # 11

A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to

recommend?

A.

Using CIS-hardened images

B.

Using watermarked images

C.

Using digitally signed images

D.

Using images that have an application firewall

Full Access
Question # 12

A developer is building a new application version using a CI/CD pipeline. The developer receives the following error message log when the build fails:

Which of the following is the most likely cause of this failure?

A.

Incorrect version

B.

Test case failure

C.

Broken build pipeline

D.

Dependency issue

Full Access
Question # 13

A cloud engineer is designing a high-performance computing cluster for proprietary software. The software requires low network latency and high throughput between cluster nodes.

Which of the following would have the greatest impact on latency and throughput when designing the HPC infrastructure?

A.

Node placement

B.

Node size

C.

Node NIC

D.

Node OS

Full Access
Question # 14

A group of cloud administrators frequently uses the same deployment template to recreate a cloud-based development environment. The administrators are unable to go back and

review the history of changes they have made to the template. Which of the following cloud resource deployment concepts should the administrator start using?

A.

Drift detection

B.

Repeatability

C.

Documentation

D.

Versioning

Full Access
Question # 15

Which of the following service options would provide the best availability for critical applications in the event of a disaster?

A.

Edge computing

B.

Cloud bursting

C.

Availability zones

D.

Multicloud tenancy

Full Access
Question # 16

Users report being unable to access an application that uses TLS 1.1. The users are able to access other applications on the internet. Which of the following is the most likely

reason for this issue?

A.

The security team modified user permissions.

B.

Changes were made on the web server to address vulnerabilities.

C.

Privileged access was implemented.

D.

The firewall was modified.

Full Access
Question # 17

A company's engineering department is conducting a month-long test on the scalability of an in-house-developed software that requires a cluster of 100 or more servers. Which of

the following models is the best to use?

A.

PaaS

B.

SaaS

C.

DBaaS

D.

laaS

Full Access
Question # 18

A cloud administrator is building a company-standard VM image, which will be based on a public image. Which of the following should the administrator implement to secure the image?

A.

ACLs

B.

Least privilege

C.

Hardening

D.

Vulnerability scanning

Full Access
Question # 19

Which of the following is a field of computer science that enables computers to identify and understand objects and people in images and videos?

A.

Image reconstruction

B.

Facial recognition

C.

Natural language processing

D.

Computer vision

Full Access
Question # 20

An DevOps engineer is receiving reports that users can no longer access the company's web application after hardening of a web server. The users are receiving the following error:

ERR_SSLJ/ERSION_OR_CIPHER_MISMATCH.

Which of the following actions should the engineer take to resolve the issue?

A.

Restart the web server.

B.

Configure TLS 1.2 or newer.

C.

Update the web server.

D.

Review logs on the WAF

Full Access
Question # 21

The performance of an e-commerce website decreases dramatically during random periods. The IT team is evaluating available resources to mitigate the situation. Which of the following is the best approach to effectively manage this scenario'?

A.

Migrating to a dedicated host

B.

Purchasing additional servers

C.

Scheduling resource allocation

D.

Configuring automatic elasticity

Full Access
Question # 22

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

A.

Setting up private development, public development, and testing environments

B.

Segregating environments for internal and external teams

C.

Configuring DDoS protection to mitigate the risk of downtime

D.

Using IAM and ACL in order to bolster DLP

Full Access
Question # 23

Department supervisors have requested a report that will help them understand the utilization of cloud resources, make decisions about budgeting for the following year, and reduce

costs. Which of the following are the most important requisite steps to create the report? (Select two).

A.

Set the desired retention of resource logs.

B.

Configure application tracing.

C.

Integrate email alerts with ticketing software.

D.

Enable resource tagging.

E.

Configure the collection of performance/utilization logs.

F.

Configure metric threshold alerts.

Full Access
Question # 24

Which of the following communication methods between on-premises and cloud environments would ensure minimal-to-low latency and overhead?

A.

Site-to-site VPN

B.

Peer-to-peer VPN

C.

Direct connection

D.

peering

Full Access
Question # 25

A company needs to deploy its own code directly in the cloud without provisioning additional infrastructure. Which of the following is the best cloud service model for the company to use?

A.

PaaS

B.

SaaS

C.

laaS

D.

XaaS

Full Access
Question # 26

An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?

A.

Warm

B.

Hot

C.

Archive

D.

Cold

Full Access
Question # 27

A security engineer Identifies a vulnerability m a containerized application. The vulnerability can be exploited by a privileged process to read tie content of the host's memory. The security engineer reviews the following Dockerfile to determine a solution to mitigate similar exploits:

Which of the following is the best solution to prevent similar exploits by privileged processes?

A.

Adding the USER myappuserinstruction

B.

Patching the host running the Docker daemon

C.

Changing FROM alpiner3.17 to FROM alpine:latest

D.

Running the container with the ready-only filesystem configuration

Full Access
Question # 28

A company recently set up a CDN for its photography and image-sharing website. Which of the following is the most likely reason for the company's action?

A.

To eliminate storage costs

B.

To improve site speed

C.

To enhance security of static assets

D.

To prevent unauthorized access

Full Access
Question # 29

A company wants to use a solution that will allow for quick recovery from ransomware attacks, as well as intentional and unintentional attacks on data integrity and availability. Which of the following should the company implement that will minimize administrative overhead?

A.

Object versioning

B.

Data replication

C.

Off-site backups

D.

Volume snapshots

Full Access
Question # 30

A security analyst confirms a zero-day vulnerability was exploited by hackers who gained access to confidential customer data and installed ransomware on the server Which of the following steps should the security analyst take? (Select two).

A.

Contact the customers to inform them about the data breach.

B.

Contact the hackers to negotiate payment lo unlock the server.

C.

Send a global communication to inform all impacted users.

D.

Inform the management and legal teams about the data breach

E.

Delete confidential data used on other servers that might be compromised.

F.

Modify the firewall rules to block the IP addresses and update the ports.

Full Access
Question # 31

A systems administrator needs to configure backups for the company's on-premises VM cluster. The storage used for backups will be constrained on free space until the company

can implement cloud backups. Which of the following backup types will save the most space, assuming the frequency of backups is kept the same?

A.

Snapshot

B.

Ful

C.

Differential

D.

Incremental

Full Access
Question # 32

A cloud architect attempts to modify a protected branch but is unable to do so. The architect receives an error indicating the action cannot be completed. Which of the following should the architect try instead''

A.

Adding a new remote

B.

Creating a pull request

C.

Merging the branch

D.

Rebasing the branch

Full Access
Question # 33

A company has ten cloud engineers working on different manual cloud deployments. In the past, engineers have had difficulty keeping deployments consistent. Which of the following is the best method to address this issue?

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Full Access
Question # 34

A cloud engineer needs to determine a scaling approach for a payroll-processing solution that runs on a biweekly basis. Given the complexity of the process, the deployment to each

new VM takes about 25 minutes to get ready. Which of the following would be the best strategy?

A.

Horizontal

B.

Scheduled

C.

Trending

D.

Event

Full Access
Question # 35

A cloud solution needs to be replaced without interruptions. The replacement process can be completed in phases, but the cost should be kept as low as possible. Which of the

following is the best strategy to implement?

A.

Blue-green

B.

Rolling

C.

In-place

D.

Canary

Full Access
Question # 36

A bank informs an administrator that changes must be made to backups for long-term reporting purposes. Which of the following is the most important change the administrator

should make to satisfy these requirements?

A.

Location of the backups

B.

Type of the backups

C.

Retention of the backups

D.

Schedule of the backups

Full Access
Question # 37

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

A.

Splicing

B.

Rotation

C.

Sampling

D.

Inspection

Full Access
Question # 38

A company that has several branches worldwide needs to facilitate full access to a specific cloud resource to a branch in Spain. Other branches will have only read access. Which of

the following is the best way to grant access to the branch in Spain?

A.

Set up MFA for the users working at the branch.

B.

Create a network security group with required permissions for users in Spain.

C.

Apply a rule on the WAF to allow only users in Spain access to the resource.

D.

Implement an IPS/IDS to detect unauthorized users.

Full Access
Question # 39

A cloud engineer is in charge of deploying a platform in an laaS public cloud. The application tracks the state using session cookies, and there are no affinity restrictions. Which of

the following will help the engineer reduce monthly expenses and allow the application to provide the service?

A.

Resource metering

B.

Reserved resources

C.

Dedicated host

D.

Pay-as-you-go model

Full Access
Question # 40

A cloud engineer is designing a cloud-native, three-tier application. The engineer must adhere to the following security best practices:

• Minimal services should run on all layers of the stack.

• The solution should be vendor agnostic.

• Virealization could be used over physical hardware.

Which of the following concepts should the engineer use to design the system to best meet these requirements?

A.

Virtual machine

B.

Micro services

C.

Fan-out

D.

Cloud-provided managed services

Full Access
Question # 41

An organization's internal security team mandated that public cloud resources must be accessible only by a corporate VPN and not by direct public internet access. Which of the

following would achieve this objective?

A.

WAF

B.

ACL

C.

VPC

D.

SSH

Full Access
Question # 42

A security analyst reviews the daily logs and notices the following suspicious activity:

The analyst investigates the firewall logs and identities the following:

Which of the following steps should the security analyst take next to resolve this issue? (Select two).

A.

Submit an IT support ticket and request Kali Linux be uninstalled from John Smith's computer

B.

Block all inbound connections on port 4444 and block the IP address 201.101.25.121.

C.

Contact John Smith and request the Ethernet cable attached to the desktop be unplugged

D.

Check the running processes to confirm if a backdoor connection has been established.

E.

Upgrade the Windows x64 operating system on John Smith's computer to the latest version.

F.

Block all outbound connections from the IP address 10.150.71.151.

Full Access
Question # 43

A company serves customers globally from its website hosted in North America. A cloud engineer recently deployed new instances of the website in the Europe region. Which of the

following is the most likely reason?

A.

To simplify workflow

B.

To enhance security

C.

To reduce latency

D.

To decrease cost

Full Access
Question # 44

A customer relationship management application, which is hosted in a public cloud laaS network, is vulnerable to a remote command execution vulnerability. Which of the following is

the best solution for the security engineer to implement to prevent the application from being exploited by basic attacks?

A.

IPS

B.

ACL

C.

DLP

D.

WAF

Full Access
Question # 45

A cloud deployment uses three different VPCs. The subnets on each VPC need to communicate with the others over private channels. Which of the following will achieve this objective?

A.

Deploying a load balancer to send traffic to the private IP addresses

B.

Creating peering connections between all VPCs

C.

Adding BGP routes using the VPCs' private IP addresses

D.

Establishing identical routing tables on all VPCs

Full Access
Question # 46

Which of the following types of storage provides the greatest performance advantage for a traditional relational database?

A.

File

B.

Object

C.

Block

D.

Ephemeral

Full Access
Question # 47

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these

requirements?

A.

Cloning

B.

Clustering

C.

Hardware passthrough

D.

Stand-alone container

Full Access
Question # 48

A developer is deploying a new version of a containerized application. The DevOps team wants:

• No disruption

• No performance degradation

* Cost-effective deployment

• Minimal deployment time

Which of the following is the best deployment strategy given the requirements?

A.

Canary

B.

In-place

C.

Blue-green

D.

Rolling

Full Access
Question # 49

A systems administrator is provisioning VMs according to the following requirements:

· A VM instance needs to be present in at least two data centers.

. During replication, the application hosted on the VM tolerates a maximum latency of one second.

· When a VM is unavailable, failover must be immediate.

Which of the following replication methods will best meet these requirements?

A.

Snapshot

B.

Transactional

C.

Live

D.

Point-in-time

Full Access
Question # 50

Which of the following do developers use to keep track of changes made during software development projects?

A.

Code drifting

B.

Code control

C.

Code testing

D.

Code versioning

Full Access
Question # 51

A systems engineer is migrating a batch of 25 VMs from an on-premises compute cluster to a public cloud using the public cloud's migration agent. The migration job shows data

copies at a rate of 250Mbps. After five servers migrate, the data copies at a rate of 25Mbps. Which of the following should the engineer review first to troubleshoot?

A.

The on-premises VM host hardware utilization

B.

The on-premises ISP throttling rate

C.

The IOPS on the SAN backing the on-premises cluster

D.

The compute utilization of the VMs being migrated

Full Access
Question # 52

A cloud administrator deploys new VMs in a cluster and discovers they are getting IP addresses in the range of 169.254.0.0/16. Which of the following is the most likely cause?

A.

The scope has been exhausted.

B.

The network is overlapping.

C.

The VLAN is missing.

D.

The NAT is Improperly configured.

Full Access
Question # 53

A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?

A.

The company should have switched from object storage to file storage.

B.

The company should have hashed the data.

C.

The company should have changed the file access permissions.

D.

The company should have encrypted the data at rest.

Full Access
Question # 54

Which of the following is the most cost-effective way to store data that is infrequently accessed?

A.

Cold site

B.

Hot site

C.

Off-site

D.

Warm site

Full Access
Question # 55

Which of the following is a difference between a SAN and a NAS?

A.

A SAN works only with fiber-based networks.

B.

A SAN works with any Ethernet-based network.

C.

A NAS uses a faster protocol than a SAN

D.

A NAS uses a slower protocol than a SAN.

Full Access
Question # 56

A company wants to optimize cloud resources and lower the overhead caused by managing multiple operating systems. Which of the following compute resources would be best to help to achieve this goal?

A.

VM

B.

Containers

C.

Remote desktops

D.

Bare-metal servers

Full Access
Question # 57

A company wants to build its new platform using a public cloud. The workload requirements include the following:

• Implementation of custom CIS compliance

• Patch for vulnerabilities within 24 hours

• Warrant at least 1,800 IOPS per volume

Which of the following meets the requirements?

A.

SaaS

B.

laaS

C.

FaaS

D.

PaaS

Full Access
Question # 58

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

A.

Rehost

B.

Rearchitect

C.

Refactor

D.

Retain

Full Access
Question # 59

A company migrated its CRM system to a SaaS solution. The security team is updating the RAG matrix for the newly migrated CRM. Given the following table:

Which of the following responsibility assignments best aligns with the shared responsibility model for the new CRM?

A.

Data-center security

B.

CRM software security

C.

CRM server patching

D.

CRM development life cycle

Full Access
Question # 60

A cloud solutions architect needs to have consistency between production, staging, and development environments. Which of the following options will best achieve this goal?

A.

Using Terraform templates with environment variables

B.

Using Grafana in each environment

C.

Using the ELK stack in each environment

D.

Using Jenkins agents in different environments

Full Access
Question # 61

A healthcare organization must follow strict compliance requirements to ensure that Pll is not leaked. The cloud administrator needs to ensure the cloud email system can support this requirement Which of the following should the organization enable?

A.

IPS

B.

OLP

C.

ACL

D.

WAF

Full Access
Question # 62

Which of the following strategies requires the development of new code before an application can be successfully migrated to a cloud provider?

A.

Refactor

B.

Rearchitect

C.

Rehost

D.

Replatform

Full Access
Question # 63

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production

environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

A.

Canary

B.

Blue-green

C.

Rolling

D.

In-place

Full Access
Question # 64

For compliance purposes, a cloud developer at an insurance company needs to save all customer policies for more than ten years. Which of the following options is the most cost-

efficient tier to save the data in the cloud?

A.

Archive

B.

Hot

C.

Cold

D.

Warm

Full Access
Question # 65

Which of the following is true of SSDs?

A.

SSDs do not have self-encrypting capabilities.

B.

SSDs have small storage capacities.

C.

SSDs can be used for high-IOP applications.

D.

SSDs are used mostly in cold storage.

Full Access
Question # 66

A cloud administrator shortens the amount of time a backup runs. An executive in the company requires a guarantee that the backups can be restored with no data loss. Which of th€ following backup features should the administrator lest for?

A.

Encryption

B.

Retention

C.

Schedule

D.

Integrity

Full Access
Question # 67

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to

calculate the severity of the risk from using this component?

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

Full Access
Question # 68

Which of the following models will best reduce the cost of running short-term, non-critical workloads?

A.

Reserved

B.

Spot Instance

C.

Pay-as-you-go

D.

Dedicated host

Full Access