New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA CV0-003 CompTIA Cloud+ Certification Exam Exam Practice Test

Demo: 136 questions
Total 456 questions

CompTIA Cloud+ Certification Exam Questions and Answers

Question 1

A systems administrator needs to provide information for a capacity-planning document. Which of the following is the most relevant baseline and capacity information?

Options:

A.

vCPU, vGPU, subscriptions, geographical, storage, user density, firewall settings.

B.

vGPU, storage, networking, user density, firewall, budgetary.

C.

vCPU, subscriptions, storage, DDoS, licensing, user density.

D.

vCPU, vGPU, subscriptions, storage, bandwidth, licensing.

Question 2

Several users are able to access internal company resources with corporate credentials; however, when they try to log in to external SaaS applications, the users are redirected back to the log-in page. Which of the following is the most likely cause of the issue?

    The SaaS provider is experiencing an outage with its directory service.

    A new company policy requires all users to reset passwords.

    MFA on the internal company authentication service is misconfigured.

    The SSL certificate on the external SaaS application is expired.

Options:

A.

A new security policy turned off cookies on the users' browsers.

Question 3

A cloud engineer needs to perform a database migration. The database has a restricted SLA and cannot be offline for more than ten minutes per month. The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps Which of the following is the best option to perform the migration?

Options:

A.

Copy the database to an external device and ship the device to the CSP.

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-party tool to back up and restore the data to the new database.

D.

Use the database import/export method and copy the exported file.

Question 4

A cloud administrator is reviewing the current private cloud and public laaS environment, and is building an optimization plan. Portability is of great concern for the administrator so resources can be easily moved from one environment to another.

Which of the following should the administrator implement?

Options:

A.

Serverless

B.

CDN

C.

Containers

D.

Deduplication

Question 5

A cloud engineer is designing a new cloud environment for an organization that requires resilient connectivity to cloud resources over diverse mediums. Which of the following is the best way to ensure resilient networking?

Options:

A.

Implement an SD-WAN solution with terrestrial, satellite, and cellular technologies.

B.

Install duplicate commercial circuits for active-passive failover.

C.

Obtain backup satellite connections for failover.

D.

Provide 5G cellular backup circuits with multiple carriers.

Question 6

A company is comparing an application environment to be hosted on site versus a SaaS model of the same application. Which of the following SaaS-based licensing models should the administrator consider?

Options:

A.

Per core

B.

Per socket

C.

Per instance

D.

Per user

Question 7

When designing a three-node. load-balanced application, a systems administrator must ensure each node runs on a different physical server for HA purposes. Which of the following does the systems administrator need to configure?

Options:

A.

Round-robin methods

B.

Live migration

C.

Anti-affinity rule

D.

Priority queues

Question 8

A cloud engineer is troubleshooting poor performance on a corporate website configured behind a cloud application load balancer. The following output was collected on the cloud console:

    CDN status: Configured and content replicated to edge locations.

    WAF status: 10 rules applied; 8,787,638 hits / 37,634 blocks.

    Listening on ports: 80/443.

    Forwarding traffic to instances: 5 (2 healthy).

    Autoscaling events: 25.

Which of the following is the most likely cause of the issue?

Options:

A.

The web servers are not responding properly.

B.

The web firewall is blocking legitimate traffic.

C.

The CDN should not be used during high loads.

D.

Autoscaling events are too high.

Question 9

A non-critical file on a database server was deleted and needs to be recovered. A cloud administrator must use the least disruptive restoration process to retrieve the file, as the database server cannot be stopped during the business day. Which of the following restoration methods would best accomplish this goal?

Options:

A.

Alternate location

B.

Restore from image

C.

Revert to snapshot

D.

In-place restoration

Question 10

An organization is developing a new online product. The product must:

• Minimize organizational infrastructure and comply with security standards.

• Minimize organizational compliance efforts.

• Focus on application development and increase speed to market.

Which of the following should the organization consider, given the requirements listed above?

Options:

A.

Use cloud-native serverless services.

B.

Implement automated compliance scanning tools.

C.

Harden servers using repeatable compliance templates.

D.

Deploy compliance linters in the CI/CD pipeline.

Question 11

A systems administrator is configuring a cloud solution for a vulnerability assessment to test the company's resources that are hosted in a public cloud. The solution must test the company's resources from an external user's perspective. Which of the following should the systems administrator configure?

Options:

A.

An agent-based scan

B.

A network-based scan

C.

A port scan

D.

A credentialed scan

Question 12

Which of the following enables CSPs to offer unlimited capacity to customers?

Options:

A.

Adequate budget

B.

Global data center distribution

C.

Economies of scale

D.

Agile project management

Question 13

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Which Of the following actions Should the analyst take to accomplish the Objective?

Options:

A.

Remove rules I, 2. and 5.

B.

Remove rules I, 3, and 4.

C.

Remove rules 2.3. and 4.

D.

Remove rules 3.4. and 5.

Question 14

A VDI administrator is deploying 512 desktops for remote workers. Which of the following would meet the minimum number of IP addresses needed for the desktops?

Options:

A.

/22

B.

/23

C.

/24

D.

/25

Question 15

Following the deployment of a new VM, a cloud engineer notices the backup platform has not added the machine to the appropriate job. The backup platform uses a text-based variable for job configuration. This variable is based on the RPO requirements for the workload. Which of the following did the cloud engineer forget to configure when deploying the virtual machine?

    Tags

Options:

A.

RPO

B.

RTO

C.

Server name

D.

Template

Question 16

A cloud administrator must ensure all servers are in compliance with the company's security policy Which of the following should the administrator check FIRST?

Options:

A.

The application version

B.

The OS version

C.

Hardened baselines

D.

Password policies

Question 17

A systems administrator deployed a new web application in a public cloud and would like to test it, but the company's network firewall is only allowing outside connections to the cloud provider network using TCP port 22. While waiting for the network administrator to open the required ports, which of the following actions should the systems administrator take to test the new application? (Select two).

Options:

A.

Create an IPSec tunnel.

B.

Create a VPN tunnel.

C.

Open a browser using the default gateway IP address.

D.

Open a browser using the localhost IP address.

E.

Create a GRE tunnel.

F.

Create a SSH tunnel.

Question 18

Which of the following types of incidents requires users to be informed post-incident?

Options:

A.

Data breaches.

B.

Brute-force attacks.

C.

Website hijacking.

D.

DDoS attacks.

Question 19

A cloud architect is receiving complaints from VDI users overseas about slowness, even though the remote office has Gigabit internet. Which of the following will most likely solve the issue?

Options:

A.

Increasing bandwidth.

B.

Enabling compression.

C.

Lowering latency.

D.

Adding redundancy.

Question 20

A systems administrator is planning to migrate to a cloud solution with volume-based licensing. Which of the following is most important when considering licensing costs?

Options:

A.

The number of cores

B.

The number of threads

C.

The number of machines

D.

The number of sockets

Question 21

A systems administrator wants to repurpose and implement a legacy tool that has been used in the past as a multicloud monitoring system. Which of the following will be the most probable challenges in the future caused by this implementation? (Select two).

Options:

A.

Connectivity issues.

B.

Limited staff skill sets.

C.

Licensing issues.

D.

Messaging errors.

E.

Latency issues.

F.

Lack of support.

Question 22

A systems administrator is reviewing the application development process with the development team and notices that the team has no way to collaboratively develop code. Which of the following methods should be implemented to resolve this issue?

Options:

A.

Continuous deployment.

B.

Version control.

C.

Change management.

D.

Configuration management.

Question 23

A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way?

Options:

A.

Submit the upgrade to the CAB.

B.

Perform a full backup.

C.

Take a snapshot of the system.

D.

Test the upgrade in a preproduction environment.

Question 24

A company is concerned it will run out of VLANs on its private cloud platform in the next couple months, and the product currently offered to customers requires the company to allocate three dedicated, segmented tiers. Which of the following can the company implement to continue adding new customers and to maintain the required level of isolation from other tenants?

Options:

A.

GRE

B.

SR-IOV

C.

VXLAN

D.

IPSec

Question 25

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

Options:

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Question 26

A cloud administrator used a deployment script to recreate a number of servers hosted in a public-cloud provider_ However, after the script completes, the administrator receives the following error when attempting to connect to one of the servers Via SSH from the administrators workstation: CHANGED. Which of the following IS the MOST likely cause of the issue?

Options:

A.

The DNS records need to be updated

B.

The cloud provider assigned a new IP address to the server.

C.

The fingerprint on the server's RSA key is different

D.

The administrator has not copied the public key to the server.

Question 27

A cloud service provider is designing an online streaming service that requires an uptime of 99.9%. Which of the following will best meet the uptime requirement?

Options:

A.

Adding additional firewalls

B.

Deploying a failover load balancer

C.

Adding multiple DNS records

D.

Deploying a second API gateway

Question 28

A cloud administrator created a developer desktop image and added it to the VDI farm in a private cloud environment. One of the developers opened a VDI session and noticed that compiling the code was taking up to one hour to complete. However, when the developer compiles the code on a local machine, the job completes in less than five minutes. Which of the following sizing techniques would be best to use to improve the performance of the compile job?

Options:

A.

Add more servers to the VDI environment.

B.

Increase the CPU and the memory on the VDI template.

C.

Configure the VDI environment to increase sessions automatically.

D.

Migrate code compile jobs to a public cloud provider.

Question 29

A systems administrator automates a series of tasks in a playbook and receives the following error during testing:

"Unable to find any of pip2, pip to use. pip needs to be installed."

The administrator verifies that pip is installed correctly. Which of the following actions will most likely resolve this issue?

Options:

A.

Ensure pip is up to date.

B.

Create a firewall rule to allow pip.

C.

Refactor the automation code.

D.

Update the system path.

Question 30

A cloud administrator is performing automated deployment of cloud infrastructure for clients. The administrator notices discrepancies from the baseline in the configuration of infrastructure that was deployed to a new client. Which of the following is most likely the cause?

Options:

A.

The deployment user account changed

B.

The deployment was done to a different resource group.

C.

The deployment was done by a different cloud administrator.

D.

The deployment template was modified.

Question 31

A cloud architect is designing a solution to handle unstructured data with high scalability requirements. Which of the following storage options would be the best fit?

Options:

A.

Block storage.

B.

Object storage.

C.

File storage.

D.

Tiered storage.

Question 32

A systems administrator has been notified of possible illegal activities taking place on the network and has been directed to ensure any relevant emails are preserved for court use.

Which of the following is this MOST likely an example of?

Options:

A.

Email archiving

B.

Version control

C.

Legal hold

D.

File integrity monitoring

Question 33

A systems administrator is implementing a new file storage service that has been deployed in the company's private cloud instance. The key requirement is fast read/write times for the targeted users, and the budget for this project is not a concern. Which of the following storage types should the administrator deploy?

Options:

A.

Spinning disks

B.

NVMe

C.

SSD

D.

Hybrid

Question 34

A systems administrator notices several VMS are constantly ballooning, while the memory usage of several other VMS is significantly lower than their resource allocation. Which of the following will MOST likely solve the issue?

Options:

A.

Rightsizing

B.

Bandwidth increase

C.

Cluster placement

D.

Storage tiers

Question 35

A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality?

Options:

A.

NAC

B.

IDS

C.

DLP

D.

EDR

Question 36

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?

Options:

A.

Log monitoring

B.

Patch management

C.

Vulnerability scanning

D.

System hardening

Question 37

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

Options:

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Question 38

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

Options:

A.

Service_level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Question 39

An administrator manages a file server that has a lot of users accessing and creating many files. As a result, the storage consumption is growing quickly. Which of the following would BEST control storage usage?

Options:

A.

Compression

B.

File permissions

C.

User quotas

D.

Access policies

Question 40

A security analyst is investigating incidents in which attackers are able to access sensitive data from a corporate application's database. The attacks occur periodically and usually

after the release of a new application's version. The following log confirms the compromise:

USER: WebApp access—key accepted

WebApp user assumed DBA role

GetData API call executed

The following actions are made after every incident occurrence:

• Validation of firewall rules

• Scripted rebuild of the database and web instances

• Application deployment from a cloud code repository

Which of the following actions will MOST likely prevent future compromises?

Options:

A.

Rotating the account credentials

B.

Migrating the database to be on premises

C.

Forbidding the use of API calls to retrieve data

D.

Implementing a new database service account

Question 41

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?

Options:

A.

Insufficient guest bandwidth

B.

Overwhelmed vCPU

C.

A storage error on the guest

D.

Incorrect VLAN assignment

E.

Inadequate memory allocation

Question 42

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?

Options:

A.

Consult the law for the country where the company’s headquarters is located

B.

Consult the regulatory requirements for the company’s industry

C.

Consult the law for the country where the cloud services provider is located

D.

Consult the cloud services provider's policies and guidelines

Question 43

A company has two identical environments (X and Y) running its core business application. As part of an upgrade, the X environment is patched/upgraded and tested while the Y environment is still serving the consumer workloads. Upon successful testing of the X environment, all workload is sent to this environment, and the Y environment is then upgraded before both environments start to manage the workloads. Which of the following upgrade methods is being used?

Options:

A.

Active-passive

B.

Canary

C.

Development/production

D.

Blue-green

Question 44

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the BEST action to correct the latency issue?

Options:

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Question 45

An organization recently deployed a private cloud on a cluster of systems that delivers compute, network, and storage resources in a single hardware, managed by an intelligent software. Which of the following BEST describes this type of deployment?

Options:

A.

High-performance computing

B.

Hyperconverged infrastructure

C.

Stand-alone computing

D.

Dynamic allocations

Question 46

A web application has been configured to use autoscaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new CI/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now. the autoscaling configuration is creating a new VM ever\ five minutes. Which of the following actions will MOS I like y resolve the issue?

Options:

A.

Reducing the maximum threshold in the autoscaling configuration

B.

Debugging the script and redeploying it

C.

Changing the automation tool because it is incompatible

D.

Modifying the script to shut down the VM after five minutes

Question 47

A startup online gaming company is designing the optimal graphical user experience for multiplayer scenarios. However, online players have reported latency issues. Which of the following should the company configure as a remediation?

Options:

A.

Additional GPU memory

B.

Faster clock speed

C.

Additional CPU cores

D.

Dynamic allocations

Question 48

A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?

Options:

A.

Compute

B.

Storage

C.

Licensing

D.

Scripts

Question 49

A company is using an laaS environment. Which of the following licensing models would BEST suit the organization from a financial perspective to implement scaling?

Options:

A.

Subscription

B.

Volume-based

C.

per user

D.

Socket-based

Question 50

An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection?

Options:

A.

WAF

B.

EDR

C.

IDS

D.

HIPS

E.

SSL

Question 51

A cloud administrator is responsible for managing a VDI environment that provides end users with access to limited applications. Which of the following should the administrator make changes to when a new application needs to be provided?

Options:

A.

Application security policy

B.

Application whitelisting policy

C.

Application hardening policy

D.

Application testing policy

Question 52

A storage administrator is reviewing the storage consumption of a SAN appliance that is running a VDI environment. Which of the following features should the administrator implement to BEST reduce the storage consumption of the SAN?

Options:

A.

Deduplication

B.

Thick provisioning

C.

Compression

D.

SDS

Question 53

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

Options:

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Question 54

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

Options:

A.

Reboot all the servers in the green stack

B.

Failback to the blue stack

C.

Restore from backups

D.

Troubleshoot and resolve the application issues

Question 55

A cloud solutions architect has received guidance to migrate an application from on premises to a public cloud. Which of the following requirements will help predict the operational expenditures in the cloud?

Options:

A.

Average resource consumption

B.

Maximum resource consumption

C.

Minimum resource consumption

D.

Actual hardware configuration

Question 56

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

Options:

A.

Firewall outbound rules

B.

Firewall inbound rules

C.

Load balancer certificates

D.

Load balancer stickiness

E.

WAF transaction throttling

Question 57

A systems administrator needs to deploy a solution to automate new application releases that come from the development team. The administrator is responsible for provisioning resources at the infrastructure layer without modifying any configurations in the application code. Which of the following would BEST accomplish this task?

Options:

A.

Implementing a CI/CD tool

B.

Configuring infrastructure as code

C.

Deploying an orchestration tool

D.

Employing DevOps methodology

Question 58

A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?

Options:

A.

RAID 5

B.

RAID 6

C.

RAID 10

D.

RAID 50

Question 59

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?

Options:

A.

HTTPS

B.

IPSec

C.

TLS

D.

SSH

Question 60

A systems administrator wants to restrict access to a set of sensitive files to a specific group of users. Which of the following will achieve the objective?

Options:

A.

Add audit rules on the server

B.

Configure data loss prevention in the environment

C.

Change tine permissions and ownership of the files

D.

Implement a HIPS solution on the host

Question 61

A cloud administrator has deployed several VM instances that are running the same applications on VDI nodes. Users are reporting that a role instance is looping between STARTED, INITIALIZING, BUSY, and stop. Upon investigation, the cloud administrator can see the status changing every few minutes. Which of the following should be done to resolve the issue?

Options:

A.

Reboot the hypervisor.

B.

Review the package and configuration file.

C.

Configure service healing.

D.

Disable memory swap.

Question 62

A cloud engineer is performing updates to an application and needs to gracefully stop any new transactions from processing before the updates can be applied. Which of the following steps should the engineer take?

Options:

A.

Enable maintenance mode from the application dashboard

B.

Wait until after business hours to conduct the change when the system is not in use

C.

Run a kill command on the system to stop the application services

D.

Use a load balancer to redirect traffic to other systems serving the application

Question 63

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

Options:

A.

Require the user's source IP to be an RFC1918 address.

B.

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.

Require the use of a password and a physical token.

D.

Require the password to be ten characters long.

Question 64

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company's security posture?

Options:

A.

SSH

B.

MFA

C.

Certificates

D.

Federation

Question 65

After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?

Options:

A.

One 32 vCPU node with CDN caching

B.

Two 8 vCPU nodes with load balancing

C.

Three to six 8 vCPU nodes autoscaling group

D.

Four 8 vCPU nodes with DNS round robin

Question 66

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public laaS. The team identifies the following rule as a potential

A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IR" Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the

server from their locations?

Options:

A.

Modify the outbound rule to allow the company's external IP address as a source.

B.

Add an inbound rule to use the IP address for the company's main office as a source.

C.

Modify the inbound rule to allow the company's external IP address as a source.

D.

Delete the inbound rule to allow the company's external IP address as a source.

Question 67

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

Options:

A.

RPO

B.

MTTR

C.

SLA

D.

RTO

Question 68

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

Options:

A.

A firewall

B.

Switches

C.

Ballooning

D.

Autoscaling

Question 69

A systems administrator needs to configure an email client to ensure data integrity of the email messages.

Which of the following provides the BEST mechanism to achieve this goal?

Options:

A.

Cyclic redundancy check

B.

SHA-1 hashes

C.

SHA-256 hashes

D.

Digital signature

Question 70

A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data.

Which of the following migration methods would be the BEST to use?

Options:

A.

Conduct a V2V migration

B.

Perform a storage live migration

C.

Rsync the data between arrays

D.

Use a storage vendor migration appliance

Question 71

A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.

This is an example of:

Options:

A.

a storage area network

B.

a network file system

C.

hyperconverged storage

D.

thick-provisioned disks

Question 72

Lateral-moving malware has infected the server infrastructure.

Which of the following network changes would MOST effectively prevent lateral movement in the future?

Options:

A.

Implement DNSSEC in all DNS servers

B.

Segment the physical network using a VLAN

C.

Implement microsegmentation on the network

D.

Implement 802.1X in the network infrastructure

Question 73

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

Options:

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Question 74

An IaaS application has a two-hour RTO and a four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy.

Which of the following should the administrator configure to achieve the application requirements with the LEAST cost?

Options:

A.

Back up to long-term storage every night

B.

Back up to object storage every three hours

C.

Back up to long-term storage every four hours

D.

Back up to object storage every hour

Question 75

A company developed a product using a cloud provider’s PaaS platform and many of the platform-based components within the application environment.

Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider?

Options:

A.

Licensing

B.

Authentication providers

C.

Service-level agreement

D.

Vendor lock-in

Question 76

A systems administrator needs to convert ten physical servers to virtual.

Which of the following would be the MOST efficient conversion method for the administrator to use?

Options:

A.

Rebuild the servers from scratch

B.

Use the vendor’s conversion tool

C.

Clone the hard drive

D.

Restore from backup

Question 77

A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company.

Which of the following BEST describes this attack?

Options:

A.

VM escape

B.

Directory traversal

C.

Buffer overflow

D.

Heap spraying

Question 78

A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency.

Which of the following services should the technician deploy to eliminate the latency issue?

Options:

A.

Auto-scaling

B.

Cloud bursting

C.

A content delivery network

D.

A new cloud provider

Question 79

A company has decided to get multiple compliance and security certifications for its public cloud environment. However, the company has few staff members to handle the extra workload, and it has limited knowledge of the current infrastructure.

Which of the following will help the company meet the compliance requirements as quickly as possible?

Options:

A.

DLP

B.

CASB

C.

FIM

D.

NAC

Question 80

A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations.

Which of the following actions should the cloud administrator take FIRST?

Options:

A.

Initiate a failover

B.

Restore backups

C.

Configure the network

D.

Perform a failback

Question 81

A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution.

Which of the following will provide the data to measure business continuity? (Choose two.)

Options:

A.

A service-level agreement

B.

Automation scripts

C.

Playbooks

D.

A network diagram

E.

A backup and restore

F.

A recovery time objective

Question 82

A systems administrator is configuring a storage array.

Which of the following should the administrator configure to set up mirroring on this array?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 83

A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled.

Which of the following techniques would BEST help the administrator assess these business requirements?

Options:

A.

Performance testing

B.

Usability testing

C.

Vulnerability testing

D.

Regression testing

Question 84

An organization has two businesses that are developing different software products. They are using a single cloud provider with multiple IaaS instances. The organization identifies that the tracking of costs for each

business are inaccurate.

Which of the following is the BEST method for resolving this issue?

Options:

A.

Perform segregation of the VLAN and capture egress and ingress values of each network interface

B.

Tag each server with a dedicated cost and sum them based on the businesses

C.

Split the total monthly invoice equally between the businesses

D.

Create a dedicated subscription for the businesses to manage the costs

Question 85

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A – The end user accesses the application through a web browser to enter and view clinical data.

2A – The CTM application server reads/writes data to/from the database server.

1B – The end user accesses the application through a web browser to run reports on clinical data.

2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B – The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 86

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Question 87

A cloud administrator is designing a multiregion network within an IaaS provider. The business requirements for configuring the network are as follows:

    Use private networking in and between the multisites for data replication.

    Use low latency to avoid performance issues.

Which of the following solutions should the network administrator use within the IaaS provider to connect multiregions?

Options:

A.

Peering

B.

Gateways

C.

VPN

D.

Hub and spoke

Question 88

The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other’s work.

Which of the following did the team MOST likely forget to implement?

Options:

A.

Incident type categories

B.

A calling tree

C.

Change management

D.

Roles and responsibilities

Question 89

An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team.

Which of the following controls will BEST mitigate the risk of exploitation?

Options:

A.

DLP

B.

HIDS

C.

NAC

D.

WAF

Question 90

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance.

Which of the following licensing models is the application MOST likely using?

Options:

A.

Per device

B.

Per user

C.

Core-based

D.

Volume-based

Question 91

A systems administrator in a large enterprise needs to alter the configuration of one of the finance department’s database servers.

Which of the following should the administrator perform FIRST?

Options:

A.

Capacity planning

B.

Change management

C.

Backups

D.

Patching

Question 92

A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements.

Which of the following solutions will be BEST to help the administrator achieve the requirements?

Options:

A.

Containers

B.

Infrastructure as code

C.

Desktop virtualization

D.

Virtual machines

Question 93

An administrator is performing an in-place upgrade on a quest VM operating system.

Which of the following can be performed as a quick method to roll back to an earlier state, if necessary?

Options:

A.

A configuration file backup

B.

A full backup of the database

C.

A differential backup

D.

A VM-level snapshot

Question 94

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

Options:

A.

Performance testing

B.

Penetration testing

C.

Vulnerability testing

D.

Regression testing

Question 95

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance has been slow since the images were upgraded from Windows 7 to Windows 10.

This VDI environment is used to run simple tasks, such as Microsoft Office. The administrator investigates the virtual machines and finds the following settings:

    4 vCPU

    16GB RAM

    10Gb networking

    256MB frame buffer

Which of the following MOST likely needs to be upgraded?

Options:

A.

vRAM

B.

vCPU

C.

vGPU

D.

vNIC

Question 96

A systems administrator is provisioning VMs in a cloud environment and has been told to select an OS build with the furthest end-of-life date.

Which of the following OS builds would be BEST for the systems administrator to use?

Options:

A.

Open-source

B.

LTS

C.

Canary

D.

Beta

E.

Stable

Question 97

A systems administrator is troubleshooting network throughput issues following a deployment. The network is currently being overwhelmed by the amount of traffic between the database and the web servers in the environment.

Which of the following should the administrator do to resolve this issue?

Options:

A.

Set up affinity rules to keep web and database servers on the same hypervisor

B.

Enable jumbo frames on the gateway

C.

Move the web and database servers onto the same VXLAN

D.

Move the servers onto thick-provisioned storage

Question 98

An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation:

    Production traffic (10.10.0.0/24)

    Network backup (10.20.0.0/25)

    Virtual IP network (10.20.0.128/25)

The following configuration exists on the server:

The backup administrator observes that the weekly backup is failing for this server. Which of the following commands should the administrator run to identify the issue?

Options:

A.

ROUTE PRINT

B.

NETSTAT -A

C.

IPCONFIG /ALL

D.

NET SM

Question 99

An organization’s web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization’s web server infrastructure.

Which of the following should be implemented to prevent this in the future as a mitigation method?

Options:

A.

Enable DLP

B.

Configure microsegmentation

C.

Enable DNSSEC

D.

Deploy a vADC appliance

Question 100

A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the only group allowed to modify files in the directory.

Which of the following will accomplish the desired objective?

Options:

A.

Remove the file write permissions for the application service account.

B.

Restrict the file write permissions to the development group only.

C.

Add access to the fileshare for the systems administrator’s group.

D.

Deny access to all development user accounts

Question 101

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

Options:

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Question 102

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs.

Which of the following should be verified NEXT?

Options:

A.

Application

B.

SAN

C.

VM GPU settings

D.

Network

Question 103

Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization?

Options:

A.

Auto-scaling of compute

B.

Oversubscription

C.

Dynamic memory allocations on guests

D.

Affinity rules in the hypervisor

Question 104

An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used?

Options:

A.

Thick provisioning

B.

Software-defined storage

C.

User quotas

D.

Network file system

Question 105

Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud?

Options:

A.

Deploy a new instance using a known-good base image.

B.

Configure a firewall rule to block the traffic on the affected instance.

C.

Perform a forensic analysis of the affected instance.

D.

Conduct a tabletop exercise involving developers and systems administrators.

Question 106

A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?

Options:

A.

Create a VPC and peer the networks.

B.

Implement dynamic routing.

C.

Enable DHCP on the networks.

D.

Obtain a new IPAM subscription.

Question 107

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?

Options:

A.

Deploy web servers into an laaS provider.

B.

Implement a cloud-based VDI solution.

C.

Provision web servers in a container environment.

D.

Use PaaS components in the cloud to implement the product.

Question 108

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

Options:

A.

Internet of Things

B.

Digital transformation

C.

Artificial intelligence

D.

DNS over TLS

Question 109

A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST?

Options:

A.

The firewall

B.

The subnet

C.

The gateway

D.

The services

Question 110

A software development manager is looking for a solution that will allow a team of developers to work in isolated environments that can be spun up and torn down quickly.

Which of the following is the MOST appropriate solution?

Options:

A.

Containers

B.

File subscriptions

C.

Ballooning

D.

Software-defined storage

Question 111

An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would be MOST useful to accomplish this task?

Options:

A.

VLAN

B.

NIPS

C.

WAF

D.

NAC

Question 112

A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue?

Options:

A.

Upgrade the virtual database server.

B.

Move the virtual machine to flash storage and test again.

C.

Check if other machines on the same storage are having issues.

D.

Document the findings and place them in a shared knowledge base.

Question 113

An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort. Which of the following ports needs to be opened to fulfill this requirement?

Options:

A.

53

B.

67

C.

123

D.

161

Question 114

A company is currently running a website on site. However, because of a business requirement to reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the company is considering operating in a hybrid environment. The website uses mostly static files and a small relational database. Which of the following should the cloud architect implement to achieve the objective at the LOWEST cost possible?

Options:

A.

Implement a load-balanced environment in the cloud that is equivalent to the current on-premises setup and use DNS to shift the load from on premises to cloud.

B.

Implement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is down. Restore the data from the backups.

C.

Implement a website replica in the cloud with auto-scaling using the smallest possible footprint. Use DNS to shift the load from on premises to the cloud.

D.

Implement a CDN that caches all requests with a higher TTL and deploy the laaS instances manually in case of disaster. Upload the backup on demand to the cloud to restore on the new instances.

Question 115

Which of the following service models would be used for a database in the cloud?

Options:

A.

PaaS

B.

laaS

C.

CaaS

D.

SaaS

Question 116

All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST?

Options:

A.

Peer all the networks from each cloud environment.

B.

Migrate the servers.

C.

Create a VPN tunnel.

D.

Configure network access control lists.

Question 117

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it.

Which of the following configuration options would BEST meet this requirement?

Options:

A.

Virtual GPU

B.

External GPU

C.

Passthrough GPU

D.

Shared GPU

Question 118

Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps.

Which of the following solutions will resolve the issue the FASTEST?

Options:

A.

Change the connection to point-to-site VPN

B.

Order a direct link to the provider

C.

Enable quality of service

D.

Upgrade the link to 200Mbps

Question 119

A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.)

Options:

A.

The fabric interconnects

B.

The virtual appliances

C.

The firmware

D.

The virtual machines

E.

The baselines

F.

The operating system

Question 120

Which of the following definitions of serverless computing BEST explains how it is different from using VMs?

Options:

A.

Serverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP.

B.

Serverless computing uses predictable billing and offers lower costs than VM compute services.

C.

Serverless computing is a scalable, highly available cloud service that uses SDN technologies.

D.

Serverless computing allows developers to focus on writing code and organizations to focus on business.

Question 121

A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would all ow for the maximum number of two-core machines with equal memory?

Options:

A.

30 VMs, 3GB of memory

B.

40 VMs, 1,5GB of memory

C.

45 VMs, 2 GB of memory

D.

60 VMs, 1 GB of memory

Question 122

A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue?

Options:

A.

Check the FAQ section of the vendor's documentation.

B.

Ask the user if the client device or access location has changed.

C.

Reboot the user's virtual desktop.

D.

Request permission to log in to the device remotely.

Question 123

An administrator has been informed that some requests are taking a longer time to respond than other requests of the same type. The cloud consumer is using multiple network service providers and is performing link load balancing for bandwidth aggregation. Which of the following commands will help the administrator understand the possible latency issues?

Options:

A.

ping

B.

ipconfig

C.

traceroute

D.

netstat

Question 124

A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues.

Which of the following is the MOST likely cause of this issue?

Options:

A.

Change management failure

B.

Service overload

C.

Patching failure

D.

Job validation issues

E.

Deprecated features

Question 125

A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?

Options:

A.

V2V

B.

V2P

C.

P2P

D.

P2V

Question 126

A cloud architect is reviewing four deployment options for a new application that will be hosted by a public cloud provider. The application must meet an SLA that allows for no more than five hours of downtime annually. The cloud architect is reviewing the SLAs for the services each option will use:

Based on the information above, which of the following minimally complies with the SLA requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 127

A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring the VM uses only the storage if needs. Which of the following will BEST achieve this goal?

Options:

A.

Compression

B.

Deduplication

C.

RAID

D.

Thin provisioning

Question 128

A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure?

Options:

A.

GPU

B.

CPU

C.

Storage

D.

Memory

Question 129

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols should the company use? (Choose two.)

Options:

A.

CIFS

B.

FTP

C.

iSCSI

D.

RAID 10

E.

NFS

F.

FC

Question 130

After a hardware upgrade on a private cloud system, the systems administrator notices a considerable drop in network performance. Which of the following is MOST likely the cause?

Options:

A.

The driver

B.

The memory

C.

The cluster placement

D.

The CPU

Question 131

A cloud administrator has deployed a new VM. The VM cannot access the Internet or the VMs on any other subnet. The administrator runs a network command and sees the following output:

The new VM can access another VM at 172.16.31.39. The administrator has verified the IP address is correct. Which of the following is the MOST likely cause of the connectivity issue?

Options:

A.

A missing static route

B.

A duplicate IP on the network

C.

Firewall issues

D.

The wrong gateway

Question 132

A systems administrator is deploying a new cloud application and needs to provision cloud services with minimal effort. The administrator wants to reduce the tasks required for maintenance, such as OS patching, VM and volume provisioning, and autoscaling configurations. Which of the following would be the BEST option to deploy the new application?

Options:

A.

A VM cluster

B.

Containers

C.

OS templates

D.

Serverless

Question 133

A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying the CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue?

Options:

A.

Modify the deployment script to delete and recreate the database whenever the CMS application is deployed.

B.

Modify the ACL to allow the staging environment to access the database in the sandbox environment.

C.

Modify the CMS application deployment to use the previous version and redeploy the application.

D.

Modify the configuration settings of the CMS application to connect to the database in the current environment.

Question 134

A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements:

No downtime

Instant switch to a new version using traffic control for all users

Which of the following deployment strategies would be the BEST solution?

Options:

A.

Hot site

B.

Blue-green

C.

Canary

D.

Rolling

Question 135

A cloud security analyst is implementing a vulnerability scan of the web server in the DMZ, which is running in an IaaS compute instance. The default inbound firewall settings are as follows:

Which of the following will provide the analyst with the MOST accurate report?

Options:

A.

An agent-based scan

B.

A network vulnerability scan

C.

A default and common credentialed scan

D.

A network credentialed vulnerability scan

Question 136

A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies.

Which of the following cloud service subscription types would BEST meet these requirements?

Options:

A.

PaaS

B.

SaaS

C.

DBaaS

D.

IaaS

Demo: 136 questions
Total 456 questions