Which of the following will be the BEST option for an administrator to bring VMs online at a warm site after a natural disaster has occurred at the primary site?
An administrator has provisioned a LUN on a SAN and wants to be able to connect a VM to the new storage using SCSI commands sent across the LAN. Which of the following should be configured on the VM?
A hosting company provides 10 VM web servers for a financial institution. The financial institution recently introduced a new web application and now their web traffic has significantly increased. Which of the following could the administrator implement to assist in reducing the load on the web servers?
Joe, an administrator, is responsible for the maintenance and support of all virtual servers in his environment. He needs to ensure that access to files and folders is optimized. Which of the following should Joe perform to accomplish this goal?
An administrator needs to test the latency between two servers. Which of the following commands should be used?
When working with hypervisors configured in a highly available configuration that provides fail-over capabilities to virtualized servers and applications, which of the following requirements is commonly overlooked?
Which of the following BEST explains why remote access works on a Type I host but not on a Type II host, when both are deployed in a single fully functioning environment as part of a hybrid cloud implementation?
A company is testing a new software product that is intended for auto discovery of assets within a cloud environment. The testing department wants to ensure that initial testing does not allow the product to leave the boundary of the test environment. Which of the following should the network administrator implement in the department test environment?
After a recent outage going unnoticed, an administrator has been tasked to configure monitoring for the Linux-based and Windows-based host operating systems in a hybrid cloud. Which of the following services should the administrator confirm are functional prior to employing centralized monitoring to both types of operating systems? (Select two.)
An administrator is attempting to troubleshoot an issue between a web server in the DMZ and an internal workstation by reviewing packet captures. Upon inspection, the payloads of the packets are unreadable. Which of the following could be the cause of this issue?
A company is experiencing network access errors within one department that operates in a secure environment. The network administrator needs to investigate the configurations of the switches servicing that department to determine the cause of the network access errors. Which of the following tools should be used to directly access the switches in that department?
An administrator has been asked to remotely configure a guest machine while on vacation. The administrator only has access to a hotel kiosk to make the necessary changes. Which of the following can be used to securely meet this request?
A user in the human resource (HR) department has reported slow response time to the company personnel database when trying to process new hires to the company. The administrator reviews the department VMs and resource pools to determine the cause of the slow access. The memory and CPU for the host machines in this resource pool have recently been upgraded. Other HR users that do not access the database are not reporting any problems. Which of the following is the cause of the slow response time?
Joe, a new administrator, is asked to enter his mobile phone number into a log management system. Which of the following alert features is MOST likely being edited?
The administrator wants to have central storage for all of the files to be stored for each VM. Which of the following is used to connect a host to a SAN utilizing a fiber connection?
An administrator has enabled monitoring for a new tenant environment. The administrator checks 24 hours after the new environment has been added and sees data for other tenants’ environments but no data for the new environment. Which of the following has NOT been properly configured?
Which of the following is used in Object-Based Storage to reference the servers that provide services to store, retrieve, and manage data in the Object-Based Storage system?
The Chief Information Officer (CIO) has established the requirement to limit data loss to within two hours of a disaster. Which of the following terms describes this requirement?
Which of the following describes a community string?
Which of the following encryption types would be used to protect company information when stored on a cloud server being shared by multiple companies?
Which of the following server types would be an ideal candidate for virtualization? (Select two.)
A storage administrator has 100 terabytes of physical storage space within the SAN. Which of the following is used to enable access to the storage space?
Which of the following uses the business model of shared resources in a cloud environment?
Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?
A technician wants to configure a server for storage redundancy so that if any two of the four drives fail, the server is still operational. Which of the following should the technician configure?
Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?
In which of the following cloud services will the customer be responsible for securing provisioned hosts?
Which of the following access control types allows users to assign security attributes to objects such as files and directories?
Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?
Which of the following MUST be in a zone? (Select TWO).
A small startup wins a contest giving them advertising time during a major sporting event. Which of the following cloud characteristics should be in place to handle the possible spike in demand?
Which of the following is true about a Type II hypervisor?
Which of the following is MOST important when factoring network level security in a public cloud environment?
Which of the following access control methods could allow for a network user to sign onto their corporate network and their supplier’s network portal without having to enter their ID and password more than once?
Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?
An external USB hard drive physically attached to a server is a:
Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?
Which of the following cloud delivery models is deployed over a company intranet or company-hosted datacenter?
Which of the following only uses Fibre Channel to implement a storage infrastructure?
An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration?
Which of the following should be installed on VMs to report and take action against potential threats?
An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently. Which of the following is MOST likely the issue with the new servers?
A new host has been bought to be a part of a new cluster. The purchase order specifies this server has four physical CPUs with eight cores each. After the administrator boots the host, there are only 24 logical processors available for VM allocation. Which of the following BEST describes this problem?
A programmer removes OS software from a laptop during development of a new prototype for the company. After the code is promoted from development to QA, none of the QA testers can get the application to work. Which of the following is MOST likely the cause of the application not working properly in QA?
An administrator has been reviewing a cloud provider’s website and would like to view the current information about all services available. Which of the following should the administrator analyze?
Which of the following would an administrator implement between a host and a guest to allow the virtual server to connect to a third party USB drive license key?
Which of the following describes the combination of a disk, computer, and a network into a pool of resources to efficiently allocate resources?
Which of the following offers 128, 192, and 256 bit encryption?
Which of the following tables would an administrator use to find a list of paths to network nodes?
Which of the following goals are met by multi-port link aggregation? (Select TWO).
A client was unable to connect to the cloud provider for over an hour on Saturday. Which of the following is the FIRST thing an operations manager should check?
Which of the following backup types will enable scheduled point-in-time recovery of data and is accessible to end-users?
Which of the following protocols allows fibre channel to be transmitted over the network?
An administrator is responsible for maintenance and support of servers in the cloud environment. There are over 500 virtual servers spanning across ten physical hosts. The administrator deploys a new application server. The administrator allocated the appropriate virtual resources for the application. Users report slow response after the new server was deployed. Which of the following is the cause of this issue?
A corporate office allows employees to work remotely, using their personal computers to access network resources through a browser-based gateway. Which of the following settings should be applied to the virtualized application running on the gateway to reduce the risk of company information being transferred to employees’ personal machines?
In order for a company to transition to a cloud solution, which of the following should the company check FIRST before transitioning? (Select TWO).
Which of the following virtualization implementations yields the HIGHEST performance of the same hardware configuration?
Which of the following is an example of vertical scaling?
The Chief Information Officer (CIO) of a company is tasked to save costs by reducing datacenter space. The administrator explains that virtualization of servers will support this task as a benefit of migrating to a cloud environment known as:
Which of the following is the BEST answer for implementing a feature that will remove a single point of failure between a SAN and host?
A JBOD is being monitored and an administrator notices that a high number of writes occur in short timeframes in the last 24 hours. Which of the following BEST describes this issue?
The administrator is required to accommodate 200GB of online (near-line) storage for the monthly backups while minimizing cost. Which of the following disk types should be purchased?
Which of the following is the BEST means of ensuring resource utilization remains even across the hosts?
Which of the following may be used to provide certificate management within an organization?
Which of the following is often used by a certificate to keep the contents of the page confidential?
A company that provides cloud-based storage services wants to ensure that if underlying hard disk drives are sent to the disposal facility, they will not contain any data in clear-text format. Which of the following should be done to accomplish this task?
Which of the following protocols would allow data to be transferred securely through the cloud?
Two independent organizations want to share authentication and other employees’ attributes to leverage a central online collaboration tool for a common project. Which of the following will allow the two companies to keep their internal authentication system while allowing visibility into the other company’s employees’ attributes?
The BEST way to compare daily performance metrics against a “normal” operational metric is to first establish:
An administrator is working on a guest operating system and needs access to the CD-ROM drive from the host operating system to install a driver. Which of the following describes what the administrator should use to accomplish this goal?
Which of the following is a concern when migrating from a private cloud to a public cloud?
In which of the following situations would a network administrator optimize a company’s WAN?
Which of the following is used for keeping track of all logical and physical data?
Users report that they are unable to access a virtual server. Which of the following commands would allow the network administrator to verify the current network settings within the virtual server?
Which of the following BEST describes the process of mapping storage initiators to targets?
Which of the following could an administrator perform to restore confidential data housed within a VM server in case the data becomes corrupted or overwritten?
An administrator has been tasked with the collection of all errors and events on the servers. These must be centralized and emailed directly from the central server. Which of the following is the BEST solution?
An administrator is designing a VM cluster to support a new testing department in the company. This department will require high availability and the ability to migrate VMs with little impact to other network functions within the department. The infrastructure available for the department supports a 1GB internal backbone upon which virtual switches are being configured. Which of the following network designs would meet the criteria for the department?
The corporate security department is recommending that the administrator deploys Type I hypervisor versus Type II. Which of the following is a security concern in regards to deploying a Type II hypervisor?
Which of the following refers to the maximum amount of data that can be lost due to a system failure?
Which of the following services can an administrator disable to prevent remote access to a system?
A software development team is looking for a sandbox environment to test new releases before deploying to production and has requested several virtual machines for this purpose. Which of the following virtual components could be utilized to help isolate these virtual machines from the production infrastructure?
A system administrator is planning storage infrastructure to store backup copies of virtual machines that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select TWO).
Joe, a system administrator, has noticed that a remote facility has entries in his 3-year-old slave LDAP server that has not been updated from its master in about a month. Which of the following failures is MOST likely to have occurred?