PrepAway - Latest Free Exam Questions & Answers

Author: admin

A VDI administrator has received reports from the drafting department that rendering is slower than normal.

A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure? A. GPU B. CPU C. Storage D. Memory Reference: https://www.computer.org/publications/tech-news/trends/7-tips-for-faster-3d-rendering

A cloud administrator is building a new VM for machine-learning training.

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it. Which of the following configuration options would BEST meet this requirement? A. Virtual GPU B. External GPU C. Passthrough GPU D. Shared GPU Reference: https://blogs.vmware.com/apps/2018/09/using-gpus-with-virtual-machines-on-vsphere-part-2-vmdirectpath-i-o.html

An organization suffered a critical failure of its primary datacenter and made the decision to switch to the D

An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations. Which of the following is the MOST efficient way to bring the block storage in the primary datacenter […]

A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to en

A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking. After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run? A. Protecting B. Permissive […]

A small company recently developed prototype technology for a military program.

A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively? A. Join an information-sharing community that is relevant to the company. B. Leverage the […]

A security engineer thinks the development team has been hard-coding sensitive environment variables in its co

A security engineer thinks the development team has been hard-coding sensitive environment variables in its code. Which of the following would BEST secure the company’s CI/CD pipeline? A. Utilizing a trusted secrets manager B. Performing DAST on a weekly basis C. Introducing the use of container orchestration D. Deploying instance tagging Reference: https://about.gitlab.com/blog/2021/04/09/demystifying-ci-cd-variables/

A technician is reviewing the logs and notices a large number of files were transferred to remote sites over t

A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites. The technician will define this threat as: A. a […]

A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel

A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services. Which of the following should be modified to prevent the issue from reoccurring? A. Recovery point objective B. Recovery time objective C. Mission-essential functions D. Recovery […]

A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure.

A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company’s services to ensure false positives do not drop legitimate traffic. Which of the following would satisfy the requirement? A. NIDS B. NIPS C. WAF D. Reverse proxy Reference: https://subscription.packtpub.com/book/networking-and-servers/9781782174905/5/ch05lvl1sec38/differentiating-between-nids-and-nips


Page 6 of 461« First...45678...203040...Last »