A resource pool in a cloud tenant has 90 GB of memory and 120 cores.
A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would allow for the maximum number of two-core machines with equal memory? A. 30 VMs, 3GB of memory B. […]
A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing
A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity? A. Patch management B. Hardening C. Scaling D. Log and event monitoring
A company recently experienced a power outage that lasted 30 minutes.
A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST? A. Server power B. Rack power C. Switch power D. SAN power
A cloud architect is designing the VPCs for a new hybrid cloud deployment.
A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following: High availability Horizontal auto-scaling 60 nodes peak capacity per region Five reserved network IP addresses per subnet /24 range Which of the following would BEST meet the above requirements? A. Create two /25 subnets in different regions. […]
A systems administrator is configuring RAID for a new server.
A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage. Which of the following RAID types should the administrator choose? A. 5 B. 6 C. 10 D. 50 Answer: C […]
A systems administrator has migrated an internal application to a public cloud.
A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to […]
Which of the following would be the BEST option for discussion of what individuals should do in an incident re
Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario? A. A business continuity plan B. Incident response/disaster recovery documentation C. A tabletop exercise D. A root cause analysis
A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud.
A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST? A. The firewall B. The subnet C. The gateway D. […]
A company developed a product using a cloud provider’s PaaS platform and many of the platform-based componen
A company developed a product using a cloud provider’s PaaS platform and many of the platform-based components within the application environment. Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider? A. Licensing B. Authentication providers C. Service-level agreement D. Vendor lock-in
A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud
A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier. Which of the following access control […]