A systems administrator is configuring RAID for a new server.
A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage. Which of the following RAID types should the administrator choose? A. 5 B. 6 C. 10 D. 50 Answer: C […]
A systems administrator has migrated an internal application to a public cloud.
A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to […]
Which of the following would be the BEST option for discussion of what individuals should do in an incident re
Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario? A. A business continuity plan B. Incident response/disaster recovery documentation C. A tabletop exercise D. A root cause analysis
A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud.
A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST? A. The firewall B. The subnet C. The gateway D. […]
A company developed a product using a cloud provider’s PaaS platform and many of the platform-based componen
A company developed a product using a cloud provider’s PaaS platform and many of the platform-based components within the application environment. Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider? A. Licensing B. Authentication providers C. Service-level agreement D. Vendor lock-in
A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud
A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier. Which of the following access control […]
A company is utilizing a private cloud solution that is hosted within its datacenter.
A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below: The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions […]
A system administrator is migrating a bare-metal server to the cloud.
A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task? A. V2V B. V2P C. P2P D. P2V
A cloud engineer is responsible for managing a public cloud environment.
A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional […]
A Chief Information Security Officer (CISO) is evaluating the company’s security management program.
A Chief Information Security Officer (CISO) is evaluating the company’s security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements? A. An SLA document B. A DR plan C. SOC procedures D. A risk register