Which of the following licensing models is the application MOST likely using?
A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance. Which of the following licensing models is the application MOST likely using? A. Per device B. Per user C. Core-based D. Volume-based Reference: https://download.microsoft.com/download/3/d/4/3d42bdc2-6725-4b29-b75a-a5b04179958b/percorelicensing_definitions_vlbrief.pdf
Which of the following solutions would help the company accommodate the new workload in the SHORTEST amount of
A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below: The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions […]
This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host. This is an example of: A. a storage area […]
Which of the following is the MOST suitable method to meet the requirements?
An organization requires the following to be achieved between the finance and marketing departments: • Allow HTTPS/HTTP. • Disable FTP and SMB traffic. Which of the following is the MOST suitable method to meet the requirements? A. Implement an ADC solution to load balance the VLAN traffic B. Configure an ACL between the VLANs C. […]
Which of the following is the MOST likely cause?
Due to a policy change, a few of a customer’s application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%. Which of the following is the MOST likely […]
Which of the following should the administrator troubleshoot FIRST?
A VDI administrator has received reports of poor application performance. Which of the following should the administrator troubleshoot FIRST? A. The network environment B. Container resources C. Client devices D. Server resources
Which of the following is the MOST likely reason for not sending all the emails?
A marketing team is using a SaaS-based service to send emails to large groups of potential customers. The internally managed CRM system is configured to generate a list of target customers automatically on a weekly basis, and then use that list to send emails to each customer as part of a marketing campaign. Last week, […]
Which of the following testing techniques would be BEST to use?
A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities. Which of the following testing techniques would be BEST to use? A. Usability testing B. Regression testing C. Vulnerability […]
Which of the following BEST describes this attack?
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company. Which of the following BEST describes this […]
Which of the following should the company implement?
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement? A. Performance testing B. Penetration testing C. Vulnerability testing D. Regression testing Reference: https://pure.security/services/technical-assurance/external-penetration-testing/