Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium CompTIA CV0-003 Dumps Questions Answers

Page: 1 / 34
Total 456 questions

CompTIA Cloud+ Certification Exam Questions and Answers

Question 1

A cloud architect is reviewing four deployment options for a new application that will be hosted by a public cloud provider. The application must meet an SLA that allows for no more than five hours of downtime annually. The cloud architect is reviewing the SLAs for the services each option will use:

Based on the information above, which of the following minimally complies with the SLA requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Question 2

A vendor is installing a new retail store management application for a customer. The application license ensures software costs are low when the application is not being used, but costs go up when use is higher.

Which of the following licensing models is MOST likely being used?

Options:

A.

Socket-based

B.

Core-based

C.

Subscription

D.

Volume-based

Question 3

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

Options:

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Question 4

A cloud administrator would like to deploy a cloud solution to its provider using automation techniques. Which of the following must be used? (Choose two.)

Options:

A.

Auto-scaling

B.

Tagging

C.

Playbook

D.

Templates

E.

Containers

F.

Serverless

Question 5

A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?

Options:

A.

The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS

B.

The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor

C.

The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule

D.

Migrating from laaS to on premises, the network traffic between on-premises users and the laaS instance, and the CPU utilization of the hypervisor host

Question 6

A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would all ow for the maximum number of two-core machines with equal memory?

Options:

A.

30 VMs, 3GB of memory

B.

40 VMs, 1,5GB of memory

C.

45 VMs, 2 GB of memory

D.

60 VMs, 1 GB of memory

Question 7

A software development manager is looking for a solution that will allow a team of developers to work in isolated environments that can be spun up and torn down quickly.

Which of the following is the MOST appropriate solution?

Options:

A.

Containers

B.

File subscriptions

C.

Ballooning

D.

Software-defined storage

Question 8

A company wants to move its environment from on premises to the cloud without vendor lock-in. Which of the following would BEST meet this requirement?

Options:

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Question 9

A technician just received the lessons learned from some recent data that was lost due to an on-premises file-server crash. The action point is to change the backup strategy to minimize manual intervention. Which of the following is the BEST approach for the technician to implement?

Options:

A.

Backup as a service

B.

RAID 1

C.

Long-term storage

D.

New backup devices

Question 10

An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort. Which of the following ports needs to be opened to fulfill this requirement?

Options:

A.

53

B.

67

C.

123

D.

161

Question 11

A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues.

Which of the following is the MOST likely cause of this issue?

Options:

A.

Change management failure

B.

Service overload

C.

Patching failure

D.

Job validation issues

E.

Deprecated features

Question 12

A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue?

Options:

A.

Check the FAQ section of the vendor's documentation.

B.

Ask the user if the client device or access location has changed.

C.

Reboot the user's virtual desktop.

D.

Request permission to log in to the device remotely.

Question 13

A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?

Options:

A.

API version incompatibility

B.

Misconfigured script account

C.

Wrong template selection

D.

Incorrect provisioning script indentation

Question 14

An organization is using multiple SaaS-based business applications, and the systems administrator is unable to monitor and control the use of these subscriptions. The administrator needs to implement a solution that will help the organization apply security policies and monitor each individual SaaS subscription. Which of the following should be deployed to achieve these requirements?

Options:

A.

DLP

B.

CASB

C.

IPS

D.

HIDS

Question 15

A cloud administrator is upgrading a cloud environment and needs to update the automation script to use a new feature from the cloud provider. After executing the script, the deployment fails. Which of the following is the MOST likely cause?

Options:

A.

API incompatibility

B.

Location changes

C.

Account permissions

D.

Network failure

Question 16

An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would be MOST useful to accomplish this task?

Options:

A.

VLAN

B.

NIPS

C.

WAF

D.

NAC

Question 17

A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?

Options:

A.

DLP

B.

WAF

C.

FIM

D.

ADC

Question 18

Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud?

Options:

A.

Deploy a new instance using a known-good base image.

B.

Configure a firewall rule to block the traffic on the affected instance.

C.

Perform a forensic analysis of the affected instance.

D.

Conduct a tabletop exercise involving developers and systems administrators.

Question 19

Which of the following service models would be used for a database in the cloud?

Options:

A.

PaaS

B.

laaS

C.

CaaS

D.

SaaS

Question 20

A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue?

Options:

A.

Upgrade the virtual database server.

B.

Move the virtual machine to flash storage and test again.

C.

Check if other machines on the same storage are having issues.

D.

Document the findings and place them in a shared knowledge base.

Question 21

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

Options:

A.

The target system's API functionality has been deprecated

B.

The password for the service account has expired

C.

The IP addresses of the target system have changed

D.

The target system has failed after the updates

Question 22

A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?

Options:

A.

V2V

B.

V2P

C.

P2P

D.

P2V

Question 23

An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?

Options:

A.

Logs on the VM

B.

Firewall on the VM

C.

Memory on the VM

D.

vGPU performance on the VM

Question 24

A cloud administrator wants to have a central repository for all the logs in the company’s private cloud. Which of the following should be implemented to BEST meet this requirement?

Options:

A.

SNMP

B.

Log scrubbing

C.

CMDB

D.

A syslog server

Question 25

A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?

Options:

A.

A service availability scan

B.

An agent-based vulnerability scan

C.

A default and common credentialed scan

D.

A network port scan

Question 26

A cloud administrator is responsible for managing a cloud-based content management solution. According to the security policy, any data that is hosted in the cloud must be protected against data exfiltration. Which of the following solutions should the administrator implement?

Options:

A.

HIDS

B.

FIM

C.

DLP

D.

WAF

Question 27

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?

Options:

A.

Incorrect encryption ciphers

B.

Broken trust relationship

C.

Invalid certificates

D.

Expired password

Question 28

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly.

Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?

Options:

A.

Tier pricing

B.

Licensing

C.

Estimated consumption

D.

Feature compatibility

Question 29

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

Options:

A.

Service-level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Question 30

A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.)

Options:

A.

The fabric interconnects

B.

The virtual appliances

C.

The firmware

D.

The virtual machines

E.

The baselines

F.

The operating system

Question 31

Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?

Options:

A.

A business continuity plan

B.

Incident response/disaster recovery documentation

C.

A tabletop exercise

D.

A root cause analysis

Question 32

A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements:

No downtime

Instant switch to a new version using traffic control for all users

Which of the following deployment strategies would be the BEST solution?

Options:

A.

Hot site

B.

Blue-green

C.

Canary

D.

Rolling

Question 33

A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure?

Options:

A.

GPU

B.

CPU

C.

Storage

D.

Memory

Question 34

An administrator has been informed that some requests are taking a longer time to respond than other requests of the same type. The cloud consumer is using multiple network service providers and is performing link load balancing for bandwidth aggregation. Which of the following commands will help the administrator understand the possible latency issues?

Options:

A.

ping

B.

ipconfig

C.

traceroute

D.

netstat

Question 35

A media company has made the decision to migrate a physical, internal file server to the cloud and use a web- based interface to access and manage the files. The users must be able to use their current corporate logins.

Which of the following is the MOST efficient way to achieve this goal?

Options:

A.

Deploy a VM in a cloud, attach storage, and copy the files across

B.

Use a SaaS service with a directory service federation

C.

Deploy a fileshare in a public cloud and copy the files across

D.

Copy the files to the object storage location in a public cloud

Question 36

A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found.

Which of the following is the MOST likely cause of the script failure?

Options:

A.

Account mismatches

B.

IP address changes

C.

API version incompatibility

D.

Server name changes

Question 37

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

Options:

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Question 38

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections.

Which of the following MOST likely needs to be analyzed before rehosting the ERP?

Options:

A.

Software

B.

Licensing

C.

Right-sizing

D.

The network

Question 39

A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the only group allowed to modify files in the directory.

Which of the following will accomplish the desired objective?

Options:

A.

Remove the file write permissions for the application service account.

B.

Restrict the file write permissions to the development group only.

C.

Add access to the fileshare for the systems administrator’s group.

D.

Deny access to all development user accounts

Question 40

A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data.

Which of the following migration methods would be the BEST to use?

Options:

A.

Conduct a V2V migration

B.

Perform a storage live migration

C.

Rsync the data between arrays

D.

Use a storage vendor migration appliance

Question 41

Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A’s cloud resources while retaining its IAM solution.

Which of the following should be implemented?

Options:

A.

Multifactor authentication

B.

Single sign-on

C.

Identity federation

D.

Directory service

Question 42

A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention.

Which of the following will BEST resolve this issue?

Options:

A.

Ensure all database queries are encrypted

B.

Create an IPSec tunnel between the database server and its clients

C.

Enable protocol encryption between the storage and the hypervisor

D.

Enable volume encryption on the storage

E.

Enable OS encryption

Question 43

Which of the following is relevant to capacity planning in a SaaS environment?

Options:

A.

Licensing

B.

A hypervisor

C.

Clustering

D.

Scalability

Question 44

In an existing IaaS instance, it is required to deploy a single application that has different versions.

Which of the following should be recommended to meet this requirement?

Options:

A.

Deploy using containers

B.

Install a Type 2 hypervisor

C.

Enable SR-IOV on the host

D.

Create snapshots

Question 45

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance.

Which of the following licensing models is the application MOST likely using?

Options:

A.

Per device

B.

Per user

C.

Core-based

D.

Volume-based

Question 46

A company has deployed a new cloud solution and is required to meet security compliance.

Which of the following will MOST likely be executed in the cloud solution to meet security requirements?

Options:

A.

Performance testing

B.

Regression testing

C.

Vulnerability testing

D.

Usability testing

Question 47

A systems administrator needs to configure an email client to ensure data integrity of the email messages.

Which of the following provides the BEST mechanism to achieve this goal?

Options:

A.

Cyclic redundancy check

B.

SHA-1 hashes

C.

SHA-256 hashes

D.

Digital signature

Question 48

A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior.

Which of the following is MOST likely the cause?

Options:

A.

API provider rate limiting

B.

Invalid API token

C.

Depleted network bandwidth

D.

Invalid API request

Question 49

An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team.

Which of the following controls will BEST mitigate the risk of exploitation?

Options:

A.

DLP

B.

HIDS

C.

NAC

D.

WAF

Question 50

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs.

Which of the following should be verified NEXT?

Options:

A.

Application

B.

SAN

C.

VM GPU settings

D.

Network

Question 51

Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?

Options:

A.

Implement whole-disk encryption

B.

Deploy the latest OS patches

C.

Deploy an anti-malware solution

D.

Implement mandatory access control

Question 52

An organization is hosting a DNS domain with private and public IP ranges.

Which of the following should be implemented to achieve ease of management?

Options:

A.

Network peering

B.

A CDN solution

C.

A SDN solution

D.

An IPAM solution

Question 53

Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?

Options:

A.

Using only open-source technologies

B.

Keeping all resources up to date

C.

Creating a standby environment with a different cloud provider

D.

Having a detailed incident response plan

Question 54

A systems administrator is deploying a GPU-accelerated VDI solution. Upon requests from several users, the administrator installs an older version of the OS on their virtual workstations. The majority of the VMs run the latest LTS version of the OS.

Which of the following types of drivers will MOST likely ensure compatibility will all virtual workstations?

Options:

A.

Alternative community drivers

B.

Legacy drivers

C.

The latest drivers from the vendor’s website

D.

The drivers from the OS repository

Question 55

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPU resources

F.

License issues

Question 56

An IaaS provider has numerous devices and services that are commissioned and decommissioned automatically on an ongoing basis. The cloud administrator needs to implement a solution that will help reduce administrative overhead.

Which of the following will accomplish this task?

Options:

A.

IPAM

B.

NAC

C.

NTP

D.

DNS

Question 57

An IaaS application has a two-hour RTO and a four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy.

Which of the following should the administrator configure to achieve the application requirements with the LEAST cost?

Options:

A.

Back up to long-term storage every night

B.

Back up to object storage every three hours

C.

Back up to long-term storage every four hours

D.

Back up to object storage every hour

Question 58

A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information:

    The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.

    The cloud management console does not show an IP address for that server.

    A DNS lookup shows the hostname resolves to an IP address.

    The server is a member of the same security group as the others.

    The cloud administrator is able to log in remotely to the other servers without issue.

Which of the following is the MOST likely cause of the server being unavailable?

Options:

A.

The network driver updates did not apply successfully, and the interface is in a down state.

B.

The ACL policy for the server was updated as part of the server reboot, preventing login access.

C.

The server was assigned a new IP address, and DNS entry for the server name was not updated.

D.

The update caused an increase in the output to the logs, and the server is too busy to respond.

Question 59

A systems administrator is creating a playbook to run tasks against a server on a set schedule.

Which of the following authentication techniques should the systems administrator use within the playbook?

Options:

A.

Use the server’s root credentials

B.

Hard-code the password within the playbook

C.

Create a service account on the server

D.

Use the administrator’s SSO credentials

Question 60

A cloud administrator has built a new private cloud environment and needs to monitor all computer, storage, and network components of the environment.

Which of the following protocols would be MOST useful for this task?

Options:

A.

SMTP

B.

SCP

C.

SNMP

D.

SFTP

Question 61

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations.

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?

Options:

A.

Integrity

B.

Versioning

C.

Classification

D.

Segmentation

Question 62

A systems administrator in a large enterprise needs to alter the configuration of one of the finance department’s database servers.

Which of the following should the administrator perform FIRST?

Options:

A.

Capacity planning

B.

Change management

C.

Backups

D.

Patching

Question 63

A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations.

Which of the following actions should the cloud administrator take FIRST?

Options:

A.

Initiate a failover

B.

Restore backups

C.

Configure the network

D.

Perform a failback

Question 64

A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command,

and notices the following relevant output:

Which of the following actions should the cloud administrator take to resolve the issue?

Options:

A.

Assign a new IP address of 192.168.100.10 to the web server

B.

Modify the firewall on 72.135.10.100 to allow only UDP

C.

Configure the WAF to filter requests from 17.3.130.3

D.

Update the gateway on the web server to use 72.135.10.1

Question 65

A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web- based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.

The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment.

Which of the following is the MOST likely reason for this issue?

Options:

A.

The license limit on the number of server deployments allowed per month was exceeded

B.

The deployment script changes made by the first administrator were not checked in and committed

C.

The new server images were incompatible with the application load-balancer configuration

D.

The application load balancer exceeded the maximum number of servers it could use

Question 66

A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled.

Which of the following techniques would BEST help the administrator assess these business requirements?

Options:

A.

Performance testing

B.

Usability testing

C.

Vulnerability testing

D.

Regression testing

Question 67

A SAN that holds VM files is running out of storage space.

Which of the following will BEST increase the amount of effective storage on the SAN?

Options:

A.

Enable encryption

B.

Increase IOPS

C.

Convert the SAN from RAID 50 to RAID 60

D.

Configure deduplication

Question 68

A systems administrator is configuring a storage array.

Which of the following should the administrator configure to set up mirroring on this array?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 69

Based on the shared responsibility model, which of the following solutions passes the responsibility of patching the OS to the customer?

Options:

A.

PaaS

B.

DBaaS

C.

laaS

D.

SaaS

Question 70

A systems administrator is attempting to gather information about services and resource utilization on VMS in a cloud environment. Which of the following will BEST accomplish this objective?

Options:

A.

Syslog

B.

SNMP

C.

CMDB

D.

Service management

E.

Performance monitoring

Question 71

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

Options:

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Question 72

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

Options:

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Question 73

A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way?

Options:

A.

Submit the upgrade to the CAB.

B.

Perform a full backup.

C.

Take a snapshot of the system.

D.

Test the upgrade in a preproduction environment.

Question 74

A systems administrator is reviewing the logs from a company's IDS and notices a large amount of outgoing traffic from a particular server. The administrator then runs a scan on the server, which detects malware that cannot be removed. Which of the following should the administrator do first?

Options:

A.

Determine the root cause.

B.

Disconnect the server from the network.

C.

Perform a more intrusive scan.

D.

Restore the server from a backup.

Question 75

A cloud administrator must ensure all servers are in compliance with the company's security policy Which of the following should the administrator check FIRST?

Options:

A.

The application version

B.

The OS version

C.

Hardened baselines

D.

Password policies

Question 76

A cloud administrator is assessing the scaling of an infrastructure stack. When viewing the configuration, the cloud administrator notices that the servers have a maximum limit of three. Which of the following is a way to increase throughput for the three servers without adjusting the maximum scaling limits?

Options:

A.

Selecting a machine with more resources.

B.

Reducing the size of the image being deployed.

C.

Using faster block storage on the machines.

D.

Increasing the scaling minimum to three.

Question 77

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?

Options:

A.

Upgrading the physical server NICs to support IOGbps

B.

Adding more vCPU

C.

Enabling SR-IOV capability

D.

Increasing the VM swap/paging size

Question 78

A cloud administrator used a deployment script to recreate a number of servers hosted in a public-cloud provider_ However, after the script completes, the administrator receives the following error when attempting to connect to one of the servers Via SSH from the administrators workstation: CHANGED. Which of the following IS the MOST likely cause of the issue?

Options:

A.

The DNS records need to be updated

B.

The cloud provider assigned a new IP address to the server.

C.

The fingerprint on the server's RSA key is different

D.

The administrator has not copied the public key to the server.

Question 79

A company would like to move all its on-premises platforms to the cloud. The company has enough skilled Linux and web-server engineers but only a couple of skilled database administrators. It also has little expertise in managing email services. Which of the following solutions would BEST match the skill sets of available personnel?

Options:

A.

Run the web servers in PaaS, and run the databases and email in SaaS.

B.

Run the web servers, databases, and email in SaaS.

C.

Run the web servers in laaS, the databases in PaaS, and the email in SaaS.

D.

Run the web servers, databases, and email in laaS.

Question 80

The Chief Information Officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud. The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information. Which of the following should be configured during the migration?

Options:

A.

ACL

B.

VPN

C.

P2V

D.

VDI

Question 81

Following the deployment of a new VM, a cloud engineer notices the backup platform has not added the machine to the appropriate job. The backup platform uses a text-based variable for job configuration. This variable is based on the RPO requirements for the workload. Which of the following did the cloud engineer forget to configure when deploying the virtual machine?

    Tags

Options:

A.

RPO

B.

RTO

C.

Server name

D.

Template

Question 82

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Which Of the following actions Should the analyst take to accomplish the Objective?

Options:

A.

Remove rules I, 2. and 5.

B.

Remove rules I, 3, and 4.

C.

Remove rules 2.3. and 4.

D.

Remove rules 3.4. and 5.

Question 83

A cloud engineer gathered the following requirements for a factory automation system:

    Assembly line systems are latency-sensitive.

    Internet connectivity issues are common and can be prolonged.

    Services must support a 99.999% system uptime.

Which of the following components would be useful in implementing a hybrid model? (Select two).

Options:

A.

Cloud-based orchestration.

B.

Cloud edge devices.

C.

Local services.

D.

Cloud-managed services.

E.

Centralized logging and alerting.

F.

CDN provider.

Question 84

An organization hosts an ERP database in on-premises infrastructure. A recommendation has been made to migrate the ERP solution to reduce operational overhead in the maintenance of the data center. Which of the following should be considered when migrating this on-premises database to DBaaS?

    • Database application version compatibility

• Database IOPS values

• Database storage utilization

    • Physical database server CPU cache value

• Physical database server DAS type

• Physical database server network I/O

    • Database total user count

• Database total number of tables

• Database total number of storage procedures

• Physical database server memory configuration

• Physical database server CPU frequency

Options:

A.

• Physical database server operating system

Question 85

A systems administrator is implementing a new file storage service that has been deployed in the company's private cloud instance. The key requirement is fast read/write times for the targeted users, and the budget for this project is not a concern. Which of the following storage types should the administrator deploy?

Options:

A.

Spinning disks

B.

NVMe

C.

SSD

D.

Hybrid

Question 86

A systems administrator has verified that a physical switchport that is connected to a virtualization host is using all available bandwidth. Which of the following would best address this issue?

Options:

A.

Port mirroring

B.

Link aggregation

C.

Spanning tree

D.

Microsegmentation

Question 87

A cloud engineer needs to perform a database migration_ The database has a restricted SLA and cannot be offline for more than ten minutes per month The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps. Which of the following is the BEST option to perform the migration?

Options:

A.

Copy the database to an external device and ship the device to the CSP

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-patty tool to back up and restore the data to the new database

D.

use the database import/export method and copy the exported file.

Question 88

A cloud administrator deployed new hosts in a private cloud. After a few months elapsed, some of the hypervisor features did not seem to be working. Which of the following was MOST likely causing the issue?

Options:

A.

Incorrect permissions

B.

Missing license

C.

Incorrect tags

D.

Oversubscription

Question 89

A cloud solutions architect is working on a private cloud environment in which storage consumption is increasing daily, resulting in high costs. Which of the following can the architect use to provide more space without adding more capacity? (Select two).

Options:

A.

Tiering

B.

Deduplication

C.

RAID provisioning

D.

Compression

E.

Flash optimization

F.

NVMe

Question 90

An IT administrator is implementing security controls on an OS. Which of the following will provide the best protection against a brute-force attack? (Select two).

Options:

A.

Implementing MFA

B.

Enforcing strong passwords

C.

Configuring user passwords to change every 30 days

D.

Limiting failed log-in requests

E.

Using API keys

F.

Implementing SSH keys

Question 91

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?

Options:

A.

Upgrading the physical server NICs to support 10Gbps

B.

Adding more vCPU

C.

Enabling SR-IOV capability

D.

Increasing the VM swap/paging size

Question 92

Which of the following should be enabled to reduce cloud compute costs when planning hardware capacity?

Options:

A.

Compression and deduplication on the object storage.

B.

Autoscaling with load balancing.

C.

Affinity settings per node.

D.

Lifecycle management on the data storage.

Question 93

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

Options:

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Question 94

A systems administrator needs to implement a way for users to verify software integrity. Which of the following tools would BEST meet the administrator's needs?

Options:

A.

TLS 1.3

B.

CRC32

C.

AES-256

D.

SHA-512

Question 95

A company has a web application that is accessed around the world. An administrator has been notified of performance issues regarding the application. Which of the following will BEST improve performance?

Options:

A.

IPAM

B.

SDN

C.

CDN

D.

VPN

Question 96

A systems administrator is responsible for upgrading operating systems on VMs that are hosted in a cloud environment. The systems administrator wants to ensure the VMs receive updates for as long as possible. Which of the following should the systems administrator choose?

Options:

A.

Stable

B.

Nightly

C.

LTS

D.

Canary

E.

EDR

Question 97

A DevOps team needs to provide a solution that offers isolation, portability, and scalability Which of the following would BEST meet these requirements?

Options:

A.

Virtual machines

B.

Containers

C.

Appliances

D.

Clusters

Question 98

A cloud administrator created four VLANs to autoscale the container environment. Two of the VLANs are on premises, while two VLANs are on a public cloud provider with a direct link between them. Firewalls are between the links with an additional subnet for communication, which is 192.168.5.0/24.

The on-premises gateways are:

192.168.1.1/24

192.168.2.1/24

The cloud gateways are:

192.168.3.1/24

192.168.4.1/24

The orchestrator is unable to communicate with the cloud subnets. Which Of the following should the administrator do to resolve the issue?

Options:

A.

Allow firewall traffic to 192.168.5.0/24.

B.

Set both firewall interfaces to 192.168.5.1/24.

C.

Add interface 192.168.3.1/24 on the local firewall.

D.

Add interface 192.168.1.1/24 on the cloud firewall.

Question 99

A cloud engineer is troubleshooting RSA key-based authentication from a local computer to a cloud-based server, which is running SSH service on a default port. The following file

permissions are set on the authorized keys file:

-rw-rw-rw-1 ubuntu ubuntu 391 Mar S 01:36 authorized _ keys

Which Of the following security practices are the required actions the engineer Should take to gain access to the server? (Select TWO).

Options:

A.

Fix the file permissions with execute permissions to the owner of the file.

B.

Open port 21 access for the computer's public IP address.

C.

Fix the file permissions with read-only access to the owner Of the file.

D.

Open port 22 access for the computer's public IP address.

E.

Open port 21 access for 0.0.0.0/0 CIDR.

F.

open port 22 access for 0.0.0.0/0 CIDR.

Question 100

A company has applications that need to remain available in the event of the data center being unavailable. The company's cloud architect needs to find a solution to maintain business continuity. Which of following should the company implement?

Options:

A.

A DR solution for the application between different data centers

B.

An off-site backup solution with a third-party vendor

C.

laC techniques to recreate the system at a new provider

D.

An HA solution for the application inside the data center

Question 101

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols Should the company use? (Select TWO)

Options:

A.

CIFS

B.

FTP

C.

Iscsi

D.

Raid 10

E.

Nfs

F.

fc

Question 102

A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:

    secure connectivity that minimizes user login

    tracks user activity and monitors for anomalous activity

    requires secondary authentication

INSTRUCTIONS

Select controls and servers for the proper control points.

Options:

Question 103

A storage administrator is reviewing the storage consumption of a SAN appliance that is running a VDI environment. Which of the following features should the administrator implement to BEST reduce the storage consumption of the SAN?

Options:

A.

Deduplication

B.

Thick provisioning

C.

Compression

D.

SDS

Question 104

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

Options:

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Question 105

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?

Options:

A.

IPAM

B.

DoH

C.

VLAN

D.

SDN

Question 106

A company has two identical environments (X and Y) running its core business application. As part of an upgrade, the X environment is patched/upgraded and tested while the Y environment is still serving the consumer workloads. Upon successful testing of the X environment, all workload is sent to this environment, and the Y environment is then upgraded before both environments start to manage the workloads. Which of the following upgrade methods is being used?

Options:

A.

Active-passive

B.

Canary

C.

Development/production

D.

Blue-green

Question 107

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company's security posture?

Options:

A.

SSH

B.

MFA

C.

Certificates

D.

Federation

Question 108

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?

Options:

A.

Implement a secret management solution.

B.

Create autoscaling capabilities.

C.

Develop CI/CD tools.

D.

Deploy a CMDB tool.

Question 109

A company is using a method of tests and upgrades in which a small set of end users are exposed to new services before the majority of other users. Which of the following deployment methods is being used?

Options:

A.

Blue-green

B.

Canary

C.

Big bang

D.

Rolling

Question 110

A systems administrator is setting up a backup solution to follow the 3-2-1 policy. Currently, the solution is set to back up from the servers to an on-site storage server. Which of the following should the administrator configure to comply with the 3-2-1 policy?

Options:

A.

Weekly lull backups, with daily incremental backups

B.

A second on-site storage server for backups

C.

Storage snapshots

D.

An off-site storage server for backups

Question 111

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

Options:

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Question 112

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the MOST likely cause of the issue?

Options:

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Question 113

Users currently access SaaS email with five-character passwords that use only letters and numbers. An administrator needs to make access more secure without changing the password policy. Which of the following will provide a more secure way of accessing email at the lowest cost?

Options:

A.

Change the email service provider.

B.

Enable MFA with a one-time password.

C.

Implement SSO for all users.

D.

Institute certificate-based authentication

Question 114

A cloud architect is deploying a web application that contains many large images and will be accessed on two continents. Which of the following will MOST improve the user experience while keeping costs low?

Options:

A.

Implement web servers in both continents and set up a VPN between the VPCs.

B.

Implement web servers on both continents and peer the VPCs.

C.

Implement a CDN and offload the images to an object storage.

D.

Implement a replica of the entire solution on every continent.

Question 115

A piece of software applies licensing fees on a socket-based model. Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?

Options:

A.

The amount of memory in the server

B.

The number of CPUs in the server

C.

The type of cloud in which the software is deployed

D.

The number of customers who will be using the software

Question 116

A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured?

Options:

A.

Regions

B.

Anti-affinity

C.

Oversubscription

D.

Container

Question 117

A systems administrator received an email from a cloud provider stating that storage is 80% full on the volume that stores VDI desktops. Which of the following is the MOST efficient way to mitigate the situation?

Options:

A.

Deduplication

B.

Compression

C.

Replication

D.

Storage migration

Question 118

A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?

Options:

A.

A CDN solution

B.

An MPLS connection between data centers

C.

A DNS round robin

D.

A site-to-site VPN between data centers

Question 119

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

Options:

A.

Service_level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Question 120

A company has two primary offices, one in the United States and one in Europe. The company uses a public laaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

Options:

A.

Add an application load balancer to the applications to spread workloads.

B.

Integrate a CDN solution to distribute web content globally.

C.

Upgrade the bandwidth of the dedicated connection to the laaS provider.

D.

Migrate the applications to a region hosted in Europe.

Question 121

A cloud administrator has deployed several VM instances that are running the same applications on VDI nodes. Users are reporting that a role instance is looping between STARTED, INITIALIZING, BUSY, and stop. Upon investigation, the cloud administrator can see the status changing every few minutes. Which of the following should be done to resolve the issue?

Options:

A.

Reboot the hypervisor.

B.

Review the package and configuration file.

C.

Configure service healing.

D.

Disable memory swap.

Question 122

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator MOST likely use?

Options:

A.

An API gateway

B.

An IPS/IDS

C.

A reverse proxy

D.

A WAF

Question 123

A web application has been configured to use autoscaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new CI/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now. the autoscaling configuration is creating a new VM ever\ five minutes. Which of the following actions will MOS I like y resolve the issue?

Options:

A.

Reducing the maximum threshold in the autoscaling configuration

B.

Debugging the script and redeploying it

C.

Changing the automation tool because it is incompatible

D.

Modifying the script to shut down the VM after five minutes

Question 124

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following

scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?

Options:

A.

Horizontal

B.

Vertical

C.

Cloud bursting

D.

Autoscaling

Question 125

A systems administrator is diagnosing performance issues on a web application. The web application sends thousands of extremely complex SQL queries to a database server, which has trouble retrieving the information in time. The administrator checks the database server and notes the following resource utilization:

CPU: 64%

RAM: 97%

Network throughput: 384,100Kbps.

Disk throughput: 382,700Kbps

The administrator also looks at the storage for the database server and notices it is consistently near its OPS limit. Which of the following will BEST resolve these performance issues?

Options:

A.

Increase CPU resources on the database server.

B.

Increase caching on the database server.

C.

Put the storage and the database on the same VLAN.

D.

Enable compression on storage traffic.

E.

Enable deduplication on the storage appliance.

Question 126

A cloud administrator is monitoring a database system and notices an unusual increase in the read operations, which is causing a heavy load in the system. The system is using a relational database and is running in a VM. Which of the following should the administrator do to resolve the issue with minimal architectural changes?

Options:

A.

Migrate the relational database to a NoSQL database.

B.

Use a cache system to store reading operations.

C.

Create a secondary standby database instance.

D.

Implement the database system using a DBaaS.

Question 127

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

Options:

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Question 128

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?

Options:

A.

MTTF

B.

SLA

C.

RTO

D.

RPO

Question 129

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment?

Options:

A.

The regional area

B.

Cloud bursting

C.

Lower costs

D.

Scalability

Question 130

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

Options:

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Question 131

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

Options:

A.

Reboot all the servers in the green stack

B.

Failback to the blue stack

C.

Restore from backups

D.

Troubleshoot and resolve the application issues

Question 132

A cloud administrator would like to maintain file integrity checks through hashing on a cloud object store. Which of the following is MOST suitable from a performance perspective?

Options:

A.

SHA-256

B.

SHA-512

C.

MD5

D.

AES

Question 133

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?

Options:

A.

HTTPS

B.

IPSec

C.

TLS

D.

SSH

Question 134

A cloud administrator needs to coordinate and automate the management of a company's secrets and keys for all its cloud services with minimal effort and low cost. Which of the following is the BEST option to achieve the goal?

Options:

A.

Implement database as a service

B.

Configure Key Vault

C.

Use password as a service

D.

Implement KeePass

Question 135

A cloud engineer has deployed a virtual storage appliance into a public cloud environment. The storage appliance has a NAT to a public IP address. An administrator later notices there are some strange files on the storage appliance and a large spike in network traffic on the machine. Which of the following is the MOST likely cause?

Options:

A.

The default password is still configured on the appliance.

B.

The appliance's certificate has expired.

C.

The storage appliance has no firewall.

D.

Data encryption is enabled, and the files are hashed.

Question 136

In an IaaS platform, which of the following actions would a systems administrator take FIRST to identify the scope of an incident?

Options:

A.

Conduct a memory acquisition.

B.

Snapshot all volumes attached to an instance.

C.

Retrieve data from a backup.

D.

Perform a traffic capture.

Page: 1 / 34
Total 456 questions