Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

CompTIA CV0-003 CompTIA Cloud+ Certification Exam Exam Practice Test

Page: 1 / 45
Total 452 questions

CompTIA Cloud+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPU resources

F.

License issues

Question 2

An IaaS application has a two-hour RTO and a four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy.

Which of the following should the administrator configure to achieve the application requirements with the LEAST cost?

Options:

A.

Back up to long-term storage every night

B.

Back up to object storage every three hours

C.

Back up to long-term storage every four hours

D.

Back up to object storage every hour

Question 3

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance.

Which of the following licensing models is the application MOST likely using?

Options:

A.

Per device

B.

Per user

C.

Core-based

D.

Volume-based

Question 4

Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A’s cloud resources while retaining its IAM solution.

Which of the following should be implemented?

Options:

A.

Multifactor authentication

B.

Single sign-on

C.

Identity federation

D.

Directory service

Question 5

A company has decided to get multiple compliance and security certifications for its public cloud environment. However, the company has few staff members to handle the extra workload, and it has limited knowledge of the current infrastructure.

Which of the following will help the company meet the compliance requirements as quickly as possible?

Options:

A.

DLP

B.

CASB

C.

FIM

D.

NAC

Question 6

A SaaS provider wants to maintain maximum availability for its service.

Which of the following should be implemented to attain the maximum SLA?

Options:

A.

A hot site

B.

An active-active site

C.

A warm site

D.

A cold site

Question 7

A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage.

Which of the following RAID types should the administrator choose?

Options:

A.

5

B.

6

C.

10

D.

50

Question 8

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

Options:

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Question 9

A systems administrator is creating a playbook to run tasks against a server on a set schedule.

Which of the following authentication techniques should the systems administrator use within the playbook?

Options:

A.

Use the server’s root credentials

B.

Hard-code the password within the playbook

C.

Create a service account on the server

D.

Use the administrator’s SSO credentials

Question 10

Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?

Options:

A.

Using only open-source technologies

B.

Keeping all resources up to date

C.

Creating a standby environment with a different cloud provider

D.

Having a detailed incident response plan

Question 11

The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other’s work.

Which of the following did the team MOST likely forget to implement?

Options:

A.

Incident type categories

B.

A calling tree

C.

Change management

D.

Roles and responsibilities

Question 12

An organization will be deploying a web application in a public cloud with two web servers, two database servers, and a load balancer that is accessible over a single public IP.

Taking into account the gateway for this subnet and the potential to add two more web servers, which of the following will meet the minimum IP requirement?

Options:

A.

192.168.1.0/26

B.

192.168.1.0/27

C.

192.168.1.0/28

D.

192.168.1.0/29

Question 13

A systems administrator would like to reduce the network delay between two servers.

Which of the following will reduce the network delay without taxing other system resources?

Options:

A.

Decrease the MTU size on both servers

B.

Adjust the CPU resources on both servers

C.

Enable compression between the servers

D.

Configure a VPN tunnel between the servers

Question 14

A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well.

Which of the following should the administrator recommend the user do FIRST?

Options:

A.

Disable antivirus/anti-malware software

B.

Turn off the software firewall

C.

Establish a VPN tunnel between the computer and the web server

D.

Update the web browser to the latest version

Question 15

A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content.

Which of the following solutions will assist with the increased workload?

Options:

A.

DoH

B.

WAF

C.

IPS

D.

CDN

Question 16

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

Options:

A.

Performance testing

B.

Penetration testing

C.

Vulnerability testing

D.

Regression testing

Question 17

A systems administrator is deploying a solution that requires a virtual network in a private cloud environment. The solution design requires the virtual network to transport multiple payload types.

Which of the following network virtualization options would BEST satisfy the requirement?

Options:

A.

VXLAN

B.

STT

C.

NVGRE

D.

GENEVE

Question 18

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Question 19

Which of the following cloud deployment models allows a company to have full control over its IT infrastructure?

Options:

A.

Private

B.

Cloud within a cloud

C.

Hybrid

D.

Public

Question 20

Lateral-moving malware has infected the server infrastructure.

Which of the following network changes would MOST effectively prevent lateral movement in the future?

Options:

A.

Implement DNSSEC in all DNS servers

B.

Segment the physical network using a VLAN

C.

Implement microsegmentation on the network

D.

Implement 802.1X in the network infrastructure

Question 21

An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources.

Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?

Options:

A.

Dedicated

B.

Shared

C.

Passthrough

D.

vGPU

Question 22

An organization has the following requirements that need to be met when implementing cloud services:

    SSO to cloud infrastructure

    On-premises directory service

    RBAC for IT staff

Which of the following cloud models would meet these requirements?

Options:

A.

Public

B.

Community

C.

Hybrid

D.

Multitenant

Question 23

A systems administrator needs to convert ten physical servers to virtual.

Which of the following would be the MOST efficient conversion method for the administrator to use?

Options:

A.

Rebuild the servers from scratch

B.

Use the vendor’s conversion tool

C.

Clone the hard drive

D.

Restore from backup

Question 24

A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal.

Which of the following should the administrator do to fix this issue?

Options:

A.

Change the database application IP

B.

Create a database cluster between the primary site and the DR site

C.

Update the connection string

D.

Edit the DNS record at the DR site for the application servers

Question 25

A company has deployed a new cloud solution and is required to meet security compliance.

Which of the following will MOST likely be executed in the cloud solution to meet security requirements?

Options:

A.

Performance testing

B.

Regression testing

C.

Vulnerability testing

D.

Usability testing

Question 26

Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?

Options:

A.

Implement whole-disk encryption

B.

Deploy the latest OS patches

C.

Deploy an anti-malware solution

D.

Implement mandatory access control

Question 27

A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency.

Which of the following services should the technician deploy to eliminate the latency issue?

Options:

A.

Auto-scaling

B.

Cloud bursting

C.

A content delivery network

D.

A new cloud provider

Question 28

A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible.

Which of the following will BEST achieve this goal?

Options:

A.

Configure CPU passthrough

B.

Oversubscribe CPU resources

C.

Switch from a Type 1 to a Type 2 hypervisor

D.

Increase instructions per cycle

E.

Enable simultaneous multithreading

Question 29

A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible.

Which of the following is the MOST important consideration to ensure a seamless migration?

Options:

A.

The cost of the environment

B.

The I/O of the storage

C.

Feature compatibility

D.

Network utilization

Question 30

Which of the following is relevant to capacity planning in a SaaS environment?

Options:

A.

Licensing

B.

A hypervisor

C.

Clustering

D.

Scalability

Question 31

A systems administrator is provisioning VMs in a cloud environment and has been told to select an OS build with the furthest end-of-life date.

Which of the following OS builds would be BEST for the systems administrator to use?

Options:

A.

Open-source

B.

LTS

C.

Canary

D.

Beta

E.

Stable

Question 32

A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data.

Which of the following migration methods would be the BEST to use?

Options:

A.

Conduct a V2V migration

B.

Perform a storage live migration

C.

Rsync the data between arrays

D.

Use a storage vendor migration appliance

Question 33

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments.

Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?

Options:

A.

Chain

B.

Star

C.

Mesh

D.

Hub and spoke

Question 34

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations.

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?

Options:

A.

Integrity

B.

Versioning

C.

Classification

D.

Segmentation

Question 35

One of the web applications in a public subnet is vulnerable to a newly discovered zero-day vulnerability. Which of the following actions can a security engineer perform to reduce the risk of exploitation and application downtime?

Options:

A.

Stop the web server in the affected host.

B.

Insert a deny rule in the host firewall.

C.

Add a new signature in the network IDS.

D.

Implement a virtual patch in the WAF.

Question 36

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to BEST reduce cost?

Options:

A.

Scaling of the environment after work hours

B.

Implementing access control after work hours

C.

Shutting down the environment after work hours

D.

Blocking external access to the environment after work hours

Question 37

Which of the following are advantages of a public cloud? (Select TWO).

Options:

A.

Full control of hardware

B.

Reduced monthly costs

C.

Decreased network latency

D.

Pay as you use

E.

Availability of self-service

F.

More secure data

Question 38

A systems administrator has verified that a physical switchport that is connected to a virtualization host is using all available bandwidth. Which of the following would best address this issue?

Options:

A.

Port mirroring

B.

Link aggregation

C.

Spanning tree

D.

Microsegmentation

Question 39

A company is using laaS services from two different providers: one for its primary site, and the other for a secondary site. The primary site is completely inaccessible, and the management team has decided to run through the BCP procedures. Which of the following will provide the complete asset information?

Options:

A.

DR replication document

B.

DR playbook

C.

DR policies and procedures document

D.

DR network diagram

Question 40

A cloud engineer needs to perform a database migration. The database has a restricted SLA and cannot be offline for more than ten minutes per month. The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps Which of the following is the best option to perform the migration?

Options:

A.

Copy the database to an external device and ship the device to the CSP.

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-party tool to back up and restore the data to the new database.

D.

Use the database import/export method and copy the exported file.

Question 41

A cloud administrator for a retail business identified a significant month-to-month increase in the cost of storage. The current IaaS instances are hosting the organization's ERP solution. Which of the following is the most likely cause for the cost increase?

Options:

A.

The database (DB) data drive size is set to 512GB, and the DB size is 384GB.

B.

The virtual memory in IaaS instances is utilizing space from the OS drive.

C.

The storage tiers for the archival data have a suboptimal configuration.

D.

The DB backup drive is reaching 80% of utilization and needs to be cleaned up.

Question 42

A cloud engineer is troubleshooting a performance issue for a high-traffic, cloud-based application that provides static content to its geographically distributed users. The engineer needs to:

    Improve the performance of an application.

    Implement a static content caching mechanism.

    Protect against DDoS attacks.

    Maintain low cost.

Which of the following strategies would best accomplish this task?

Options:

A.

Implementing a site-to-site VPN tunnel between multiple availability zones of a cloud provider by intelligently routing network traffic through global networks and edge locations

B.

Implementing a server-based caching mechanism to store and provide faster delivery of static content across multiple availability zones within the cloud network close to the end-user locations

C.

Implementing a CDN that allows caching and quick transfer of an application's assets needed to load on a browser of the end-user based on the location

D.

Implementing a cross-region, DNS-based load balancing and caching mechanism in the cloud DNS system that can provide faster delivery of static content based on end-user locations

Question 43

An IT administrator is implementing security controls on an OS. Which of the following will provide the best protection against a brute-force attack? (Select two).

Options:

A.

Implementing MFA

B.

Enforcing strong passwords

C.

Configuring user passwords to change every 30 days

D.

Limiting failed log-in requests

E.

Using API keys

F.

Implementing SSH keys

Question 44

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?

Options:

A.

Upgrading the physical server NICs to support 10Gbps

B.

Adding more vCPU

C.

Enabling SR-IOV capability

D.

Increasing the VM swap/paging size

Question 45

A company is moving its entire infrastructure to the cloud. The infrastructure consists of:

    100 virtual desktops

    10 database servers

    10 web servers

    15 application servers

    15 development servers

    7 VDI servers

Each server, except for web, application, and database servers, needs to be on an isolated subnet. The CSP has allocated a /24 subnet. Which of the following would best divide the IP space to meet these requirements?

Options:

Options:

A.

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

B.

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

C.

VDI: /25Web, application, and database: /27Development: /27VDI servers: /28

D.

VDI: /26Web, application, and database: /26Development: /26VDI servers: /28

Question 46

A systems administrator is deploying a new version of a website. The website is deployed in the cloud using a VM cluster. The administrator must then deploy the new version into one VM first. After a period of time, if there are no issues detected, a second VM will be updated. This process must continue until all the VMS are updated. Which of the following upgrade methods is being implemented?

Options:

A.

Canary

B.

Blue-green

C.

Rolling

D.

Staging

Question 47

A cloud engineer is configuring automated backups for a database. The engineer wants to ensure that backups can be restored quickly and consistently to meet the SLA. Which of the following backup methods would be the most appropriate?

Options:

A.

Incremental.

B.

Differential.

C.

Full.

D.

Synthetic full.

Question 48

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled? (Select TWO).

Options:

A.

Telnet

B.

FTP

C.

Remote login

D.

DNS

E.

DHCP

F.

LDAP

Question 49

A cloud administrator needs to verify domain ownership with a third party. The third party has provided a secret that must be added to the DNS server. Which of the following DNS records does the administrator need to update to include the secret?

Options:

A.

NS

B.

TXT

C.

AAAA

D.

SOA

Question 50

A cloud engineer is required to move legacy systems to a public cloud. The system configuration is provided below:

Server Name

Cores

OS Disk (Used)

Data Disk (Used)

Encryption

Web1

2

500GB (45%)

1TB (20%)

OS

Web2

2

500GB (40%)

1TB (90%)

OS

App1

4

250GB (90%)

2TB (65%)

No

App2

4

250GB (70%)

2TB (95%)

No

DB1

16

250GB (25%)

4TB (65%)

Data

The public cloud provider VMs support a maximum OS disk size of 250GB and a data disk size of 2TB. Which of the following tasks will contribute to a successful migration to the cloud environment? (Select two).

Options:

A.

Clean up Web1's OS disk.

B.

Shrink the OS disk for Web1 and Web2.

C.

Migrate DB1 to DBaaS.

D.

Clean up App1's OS Disk.

E.

Decrypt DB1.

F.

Convert DB1 to a clustered database.

Question 51

A company is concerned it will run out of VLANs on its private cloud platform in the next couple months, and the product currently offered to customers requires the company to allocate three dedicated, segmented tiers. Which of the following can the company implement to continue adding new customers and to maintain the required level of isolation from other tenants?

Options:

A.

GRE

B.

SR-IOV

C.

VXLAN

D.

IPSec

Question 52

A company that performs passive vulnerability scanning at its transit VPC has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the company use to verify if this is a true positive with the least effort and cost? (Select two).

Options:

A.

A network-based scan

B.

An agent-based scan

C.

A port scan

D.

A red-team exercise

E.

A credentialed scan

F.

A blue-team exercise

G.

Unknown environment penetration testing

Question 53

A company is comparing an application environment to be hosted on site versus a SaaS model of the same application. Which of the following SaaS-based licensing models should the administrator consider?

Options:

A.

Per core

B.

Per socket

C.

Per instance

D.

Per user

Question 54

A cloud administrator created four VLANs to autoscale the container environment. Two of the VLANs are on premises, while two VLANs are on a public cloud provider with a direct link between them. Firewalls are between the links with an additional subnet for communication, which is 192.168.5.0/24.

The on-premises gateways are:

192.168.1.1/24

192.168.2.1/24

The cloud gateways are:

192.168.3.1/24

192.168.4.1/24

The orchestrator is unable to communicate with the cloud subnets. Which Of the following should the administrator do to resolve the issue?

Options:

A.

Allow firewall traffic to 192.168.5.0/24.

B.

Set both firewall interfaces to 192.168.5.1/24.

C.

Add interface 192.168.3.1/24 on the local firewall.

D.

Add interface 192.168.1.1/24 on the cloud firewall.

Question 55

A systems administrator needs to implement a way for users to verify software integrity. Which of the following tools would BEST meet the administrator's needs?

Options:

A.

TLS 1.3

B.

CRC32

C.

AES-256

D.

SHA-512

Question 56

A company has entered into a business relationship with another organization and needs to provide access to internal resources through directory services. Which of the following should a systems administrator implement?

Options:

A.

sso

B.

VPN

C.

SSH

D.

SAML

Question 57

A cloud administrator is assessing the scaling of an infrastructure stack. When viewing the configuration, the cloud administrator notices that the servers have a maximum limit of three. Which of the following is a way to increase throughput for the three servers without adjusting the maximum scaling limits?

Options:

A.

Selecting a machine with more resources.

B.

Reducing the size of the image being deployed.

C.

Using faster block storage on the machines.

D.

Increasing the scaling minimum to three.

Question 58

A company uses multiple SaaS-based cloud applications. All the applications require authentication upon access. An administrator has been asked to address this issue and enhance security. Which of the following technologies would be the BEST solution?

Options:

A.

Single sign-on

B.

Certificate authentication

C.

Federation

D.

Multifactor authentication

Question 59

A cloud administrator is reviewing the performance of a database cluster hosted in a public cloud and sees that the CPU and memory utilization is high during periods of non-peak usage. The administrator wants to proactively prevent any performance issues during periods of high-peak usage. The database software is using an instance-based licensing model. Which of the following scaling strategies should the administrator consider?

Options:

A.

Horizontal scaling

B.

Affinity-based scaling

C.

Vertical scaling

D.

Cloud bursting

Question 60

A systems administrator is troubleshooting a VDI deployment that is used to run high-frame-rate rendering. Users are reporting frequent application crashes. After running a benchmark, the administrator discovers the following:

Which of the following should the administrator do to resolve this issue?

Options:

A.

Configure the GPU to run in compute mode.

B.

Allocate more RAM in the VM template.

C.

Select a higher vGPU profile.

D.

Configure the GPU to run in graphics mode.

Question 61

A systems administrator is diagnosing performance issues on a web application. The web application sends thousands of extremely complex SQL queries to a database server, which has trouble retrieving the information in time. The administrator checks the database server and notes the following resource utilization:

    CPU: 64%

    RAM: 97%

    Network throughput: 384/1000 Kbps

    Disk throughput: 382,700 Kbps

The administrator also notices that the storage for the database server is consistently near its IOPS limit. Which of the following will best resolve these performance issues?

Options:

A.

Increase CPU resources on the database server.

B.

Increase caching on the database server.

C.

Put the storage and the database on the same VLAN.

D.

Enable compression on storage traffic.

E.

Enable deduplication on the storage appliance.

Question 62

A cloud administrator notices an e-commerce website was recently warned that the connection is not private. Which of the following is most likely the cause?

Options:

A.

An expired certificate.

B.

A misconfigured IPS.

C.

A broken trust relationship.

D.

Limited connectivity.

Question 63

A systems administrator has a redundant backup system in place. Which of the following should the systems administrator perform to maintain efficient operation and comply with the global standard in the corporate backup policies?

Options:

A.

Modify RTO policies.

B.

Confirm completion of the backups.

C.

Test the backups.

D.

Modify RPO policies.

Question 64

A cloud engineer receives an alert that a newly provisioned server is running a non-supported Linux version. The automation scripts are performing as expected on the server. Which of the following should the engineer check first?

Options:

A.

Provisioning script indentation

B.

Template selection

C.

API version

D.

Script account

Question 65

A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:

    secure connectivity that minimizes user login

    tracks user activity and monitors for anomalous activity

    requires secondary authentication

INSTRUCTIONS

Select controls and servers for the proper control points.

Options:

Question 66

A cloud administrator is configuring a CDN for an organization’s website to improve performance for users in remote regions. Which of the following CDN features will help achieve this goal?

Options:

A.

Compression of content.

B.

Content replication to edge locations.

C.

Dynamic request routing.

D.

Content deduplication.

Question 67

A VDI administrator is deploying 512 desktops for remote workers. Which of the following would meet the minimum number of IP addresses needed for the desktops?

Options:

A.

/22

B.

/23

C.

/24

D.

/25

Question 68

A systems administrator received a report stating resumes submitted through the company's website are being exposed at the URL Which of the following actions should the administrator take to fix the issue?

Options:

A.

Remove write permissions to the folder /upload/.

B.

Implement file integrity monitoring.

C.

Reconfigure the folder /upload/ to request authentication.

D.

Implement a DLP solution.

E.

Implement encryption in transit.

Question 69

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).

Options:

A.

A load balancer

B.

SON

C.

A firewall

D.

SR-IOV

E.

Storage replication

F.

A VPN

Question 70

A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality?

Options:

A.

NAC

B.

IDS

C.

DLP

D.

EDR

Question 71

A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement?

Options:

A.

Create /25 subnets in two regions and run 80 instances on each one.

B.

Create /26 subnets in two regions and run 40 instances on each one.

C.

Create /26 subnets in three regions and run 40 instances on each one.

D.

Create /26 subnets in three regions and run 80 instances on each one.

Question 72

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

Options:

A.

A firewall

B.

Switches

C.

Ballooning

D.

Autoscaling

Question 73

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?

Options:

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Question 74

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?

Options:

A.

MTTF

B.

SLA

C.

RTO

D.

RPO

Question 75

A systems administrator is setting up a backup solution to follow the 3-2-1 policy. Currently, the solution is set to back up from the servers to an on-site storage server. Which of the following should the administrator configure to comply with the 3-2-1 policy?

Options:

A.

Weekly lull backups, with daily incremental backups

B.

A second on-site storage server for backups

C.

Storage snapshots

D.

An off-site storage server for backups

Question 76

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?

Options:

A.

Consult the law for the country where the company’s headquarters is located

B.

Consult the regulatory requirements for the company’s industry

C.

Consult the law for the country where the cloud services provider is located

D.

Consult the cloud services provider's policies and guidelines

Question 77

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

Options:

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Question 78

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?

Options:

A.

Create a directory security group.

B.

Create a resource group.

C.

Create separate VLANs.

D.

Create a network security group.

Question 79

A company has hired a security firm to perform a vulnerability assessment of its environment. In the first phase, an engineer needs to scan the network services exposed by the hosts. Which of the following will help achieve this with the LEAST privileges?

Options:

A.

An agent-based scan

B.

A credentialed scan

C.

A network-based scan

D.

An application scan

Question 80

An administrator needs to back up all the data from each VM daily while also saving space. Which of the following backup types will BEST fit this scenario?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Full

Question 81

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?

Options:

A.

Store the credentials in a variable on every worker node

B.

Store the credentials on a shared volume using whole-disk encryption

C.

Store the credentials in a configuration file using SHA-256 inside the container image

D.

Store the credentials using the orchestrator secret manager

Question 82

A cloud administrator is responsible for managing a VDI environment that provides end users with access to limited applications. Which of the following should the administrator make changes to when a new application needs to be provided?

Options:

A.

Application security policy

B.

Application whitelisting policy

C.

Application hardening policy

D.

Application testing policy

Question 83

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?

Options:

A.

Insufficient guest bandwidth

B.

Overwhelmed vCPU

C.

A storage error on the guest

D.

Incorrect VLAN assignment

E.

Inadequate memory allocation

Question 84

A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows:

Options:

A.

• Three public cloud hosts with four cores• 120GB of RAM• 100GB of storage• 1Gbps

B.

• Three public cloud hosts with six cores• 80GB of RAM• 180GB of storage• 150Mbps

C.

• Three public cloud hosts with six cores• 80GB of RAM• 1TB of storage• 200Mbps

D.

• Four public cloud hosts with four cores• 140GB of RAM• 200GB of storage

Question 85

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

Options:

A.

Reboot all the servers in the green stack

B.

Failback to the blue stack

C.

Restore from backups

D.

Troubleshoot and resolve the application issues

Question 86

A large pharmaceutical company needs to ensure it is in compliance with the following requirements:

• An application must run on its own virtual machine.

• The hardware the application is hosted on does not change.

Which of the following will BEST ensure compliance?

Options:

A.

Containers

B.

A firewall

C.

Affinity rules

D.

Load balancers

Question 87

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

Options:

A.

Firewall outbound rules

B.

Firewall inbound rules

C.

Load balancer certificates

D.

Load balancer stickiness

E.

WAF transaction throttling

Question 88

A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Incorrect permissions

B.

Insufficient storage

C.

Billing issues with the cloud provider

D.

No connectivity to the public cloud

E.

Expired API token

F.

Disabled autoscaling

Question 89

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

Options:

A.

Require the user's source IP to be an RFC1918 address.

B.

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.

Require the use of a password and a physical token.

D.

Require the password to be ten characters long.

Question 90

A financial industry services firm was the victim of an internal data breach, and the perpetrator was a member of the company's development team. During the investigation, one of the security administrators accidentally deleted the perpetrator's user data. Even though the data is recoverable, which of the following has been violated?

Options:

A.

Chain of custody

B.

Evidence acquisition

C.

Containment

D.

Root cause analysis

Question 91

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?

Options:

A.

Implement a secret management solution.

B.

Create autoscaling capabilities.

C.

Develop CI/CD tools.

D.

Deploy a CMDB tool.

Question 92

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment?

Options:

A.

The regional area

B.

Cloud bursting

C.

Lower costs

D.

Scalability

Question 93

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

Options:

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Question 94

A cloud administrator needs to coordinate and automate the management of a company's secrets and keys for all its cloud services with minimal effort and low cost. Which of the following is the BEST option to achieve the goal?

Options:

A.

Implement database as a service

B.

Configure Key Vault

C.

Use password as a service

D.

Implement KeePass

Question 95

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public laaS. The team identifies the following rule as a potential

A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IR" Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the

server from their locations?

Options:

A.

Modify the outbound rule to allow the company's external IP address as a source.

B.

Add an inbound rule to use the IP address for the company's main office as a source.

C.

Modify the inbound rule to allow the company's external IP address as a source.

D.

Delete the inbound rule to allow the company's external IP address as a source.

Question 96

A systems administrator must ensure confidential company information is not leaked to competitors. Which of the following services will BEST accomplish this goal?

Options:

A.

CASB

B.

IDS

C.

FIM

D.

EDR

E.

DLP

Question 97

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the MOST likely cause of the issue?

Options:

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Question 98

A company has two primary offices, one in the United States and one in Europe. The company uses a public laaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

Options:

A.

Add an application load balancer to the applications to spread workloads.

B.

Integrate a CDN solution to distribute web content globally.

C.

Upgrade the bandwidth of the dedicated connection to the laaS provider.

D.

Migrate the applications to a region hosted in Europe.

Question 99

After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?

Options:

A.

One 32 vCPU node with CDN caching

B.

Two 8 vCPU nodes with load balancing

C.

Three to six 8 vCPU nodes autoscaling group

D.

Four 8 vCPU nodes with DNS round robin

Question 100

A cloud solutions architect has received guidance to migrate an application from on premises to a public cloud. Which of the following requirements will help predict the operational expenditures in the cloud?

Options:

A.

Average resource consumption

B.

Maximum resource consumption

C.

Minimum resource consumption

D.

Actual hardware configuration

Question 101

An organization is hosting its dedicated email infrastructure with unlimited mailbox creation capability. The management team would like to migrate to a SaaS-based solution. Which of the following must be considered before the migration?

Options:

A.

The SaaS provider's licensing model

B.

The SaaS provider's reputation

C.

The number of servers the SaaS provider has

D.

The number of network links the SaaS provider has

Question 102

A cloud administrator would like to maintain file integrity checks through hashing on a cloud object store. Which of the following is MOST suitable from a performance perspective?

Options:

A.

SHA-256

B.

SHA-512

C.

MD5

D.

AES

Question 103

Which of the following will provide a systems administrator with the MOST information about potential attacks on a cloud IaaS instance?

Options:

A.

Network flows

B.

FIM

C.

Software firewall

D.

HIDS

Question 104

A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.)

Options:

A.

Install TLS certificates on the server.

B.

Forward port 80 traffic to port 443.

C.

Disable TLS 1.0/1.1 and SSL.

D.

Disable password authentication.

E.

Enable SSH key access only.

F.

Provision the server in a separate VPC.

G.

Disable the superuser/administrator account.

Question 105

A system administrator supports an application in the cloud, which includes a restful API that receives an encrypted message that is passed to a calculator system. The administrator needs to ensure the proper function of the API using a new automation tool. Which of the following techniques would be BEST for the administrator to use to accomplish this requirement?

Options:

A.

Functional testing

B.

Performance testing

C.

Integration testing

D.

Unit testing

Question 106

A technician needs to deploy two virtual machines in preparation for the configuration of a financial application next week. Which of the following cloud deployment models should the technician use?

Options:

A.

XaaS

B.

IaaS

C.

PaaS

D.

SaaS

Question 107

A systems administrator is deploying a new cloud application and needs to provision cloud services with minimal effort. The administrator wants to reduce the tasks required for maintenance, such as OS patching, VM and volume provisioning, and autoscaling configurations. Which of the following would be the BEST option to deploy the new application?

Options:

A.

A VM cluster

B.

Containers

C.

OS templates

D.

Serverless

Question 108

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols should the company use? (Choose two.)

Options:

A.

CIFS

B.

FTP

C.

iSCSI

D.

RAID 10

E.

NFS

F.

FC

Question 109

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL Which of the following would MOST likely resolve the issue?

Options:

A.

Renewing the expired certificate

B.

Updating the web-server software

C.

Changing the crypto settings on the web server

D.

Upgrading the users' browser to the latest version

Question 110

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

Options:

A.

Internet of Things

B.

Digital transformation

C.

Artificial intelligence

D.

DNS over TLS

Question 111

Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization?

Options:

A.

Auto-scaling of compute

B.

Oversubscription

C.

Dynamic memory allocations on guests

D.

Affinity rules in the hypervisor

Question 112

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed.

Which of the following actions will make the server fully operational?

Options:

A.

Restart the RAID resynchronization process

B.

Perform a P2V migration of the server

C.

Swap the failed hard drive with a fresh one

D.

Restore the server from backup

Question 113

A systems administrator is examining a managed hosting agreement and wants to determine how much data would be lost if a server had to be restored from backups. To which of the following metrics should the administrator refer?

Options:

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Question 114

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?

Options:

A.

Deploy web servers into an laaS provider.

B.

Implement a cloud-based VDI solution.

C.

Provision web servers in a container environment.

D.

Use PaaS components in the cloud to implement the product.

Question 115

A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring the VM uses only the storage if needs. Which of the following will BEST achieve this goal?

Options:

A.

Compression

B.

Deduplication

C.

RAID

D.

Thin provisioning

Question 116

A technician is trying to delete six decommissioned VMs. Four VMs were deleted without issue. However, two of the VMs cannot be deleted due to an error. Which of the following would MOST likely enable the technician to delete the VMs?

Options:

A.

Remove the snapshots

B.

Remove the VMs' IP addresses

C.

Remove the VMs from the resource group

D.

Remove the lock from the two VMs

Question 117

An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?

Options:

A.

Logs on the VM

B.

Firewall on the VM

C.

Memory on the VM

D.

vGPU performance on the VM

Question 118

After a hardware upgrade on a private cloud system, the systems administrator notices a considerable drop in network performance. Which of the following is MOST likely the cause?

Options:

A.

The driver

B.

The memory

C.

The cluster placement

D.

The CPU

Question 119

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Which of the following actions should the analyst take to accomplish the objective?

Options:

A.

Remove rules 1, 2, and 5.

B.

Remove rules 1, 3, and 4.

C.

Remove rules 2, 3, and 4.

D.

Remove rules 3, 4, and 5.

Question 120

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

Options:

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Question 121

A systems administrator adds servers to a round-robin, load-balanced pool, and then starts receiving reports of the website being intermittently unavailable. Which of the following is the MOST likely cause of the issue?

Options:

A.

The network is being saturated.

B.

The load balancer is being overwhelmed.

C.

New web nodes are not operational.

D.

The API version is incompatible.

E.

There are time synchronization issues.

Question 122

A cloud administrator needs to reduce the cost of cloud services by using the company's off-peak period. Which of the following would be the BEST way to achieve this with minimal effort?

Options:

A.

Create a separate subscription.

B.

Create tags.

C.

Create an auto-shutdown group.

D.

Create an auto-scaling group.

Question 123

A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other. Which of the following should an administrator perform to comply with the security requirement?

Options:

A.

Create separate virtual networks for production, QA, and development servers.Move the servers to the appropriate virtual network.Apply a network security group to each virtual network that denies all traffic except for the firewall.

B.

Create separate network security groups for production, QA, and development servers.Apply the network security groups on the appropriate production, QA, and development servers.Peer the networks together.

C.

Create separate virtual networks for production, QA, and development servers.Move the servers to the appropriate virtual network.Peer the networks together.

D.

Create separate network security groups for production, QA, and development servers.Peer the networks together.Create static routes for each network to the firewall.

Question 124

A company needs to migrate the storage system and batch jobs from the local storage system to a public cloud provider. Which of the following accounts will MOST likely be created to run the batch processes?

Options:

A.

User

B.

LDAP

C.

Role-based

D.

Service

Question 125

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

Options:

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Question 126

A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?

Options:

A.

API version incompatibility

B.

Misconfigured script account

C.

Wrong template selection

D.

Incorrect provisioning script indentation

Question 127

A cloud administrator would like to deploy a cloud solution to its provider using automation techniques. Which of the following must be used? (Choose two.)

Options:

A.

Auto-scaling

B.

Tagging

C.

Playbook

D.

Templates

E.

Containers

F.

Serverless

Question 128

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

Options:

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Question 129

A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue?

Options:

A.

Check the FAQ section of the vendor's documentation.

B.

Ask the user if the client device or access location has changed.

C.

Reboot the user's virtual desktop.

D.

Request permission to log in to the device remotely.

Question 130

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly.

Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?

Options:

A.

Tier pricing

B.

Licensing

C.

Estimated consumption

D.

Feature compatibility

Question 131

A company is considering consolidating a number of physical machines into a virtual infrastructure that will be located at its main office. The company has the following requirements:

High-performance VMs

More secure

Has system independence

Which of the following is the BEST platform for the company to use?

Options:

A.

Type 1 hypervisor

B.

Type 2 hypervisor

C.

Software application virtualization

D.

Remote dedicated hosting

Question 132

A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM?

Options:

A.

CDN

B.

DNS

C.

NTP

D.

IPAM

Question 133

Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?

Options:

A.

A business continuity plan

B.

Incident response/disaster recovery documentation

C.

A tabletop exercise

D.

A root cause analysis

Question 134

A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?

Options:

A.

Alternate location

B.

Rolling

C.

Storage live migration

D.

In-place

Question 135

A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?

Options:

A.

DLP

B.

WAF

C.

FIM

D.

ADC

Page: 1 / 45
Total 452 questions