Which of the following should be installed on VMs to report and take action against potential threats?A . NIDSB . HIPSC . NIPSD . HIDS View Answer Answer: B...
Which of the following describes the combination of a disk, computer, and a network into a pool of resources to efficiently allocate resources?
Which of the following describes the combination of a disk, computer, and a network into a pool of resources to efficiently allocate resources?A . Virtual resource reservationB . ZoningC . Load balancingD . Converged infrastructure View Answer Answer: D...
Which of the following is MOST important when factoring network level security in a public cloud environment?
Which of the following is MOST important when factoring network level security in a public cloud environment?A . Ensuring good user experienceB . Ensuring confidentialityC . Ensuring redundancyD . Ensuring high availability View Answer Answer: B...
Which of the following describes the access control method where data owners authorize who is granted access to their files?
Which of the following describes the access control method where data owners authorize who is granted access to their files?A . Mandatory access controlB . Role-based access controlC . Access control listD . Discretionary access control View Answer Answer: D...
Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?
Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?A . Blob dataB . Object IDC . ReplicasD . Metadata View Answer Answer: D...
Which of the following should the administrator do to accomplish this task?
An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system. Which of the following should the administrator do to accomplish this task?A . Install the patch on a development serverB ....
Continue readingWhich of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?
Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?A . NASB . DASC . LUND . HBA View Answer Answer: D...
Which of the following switch technologies can be used to provide twice the bandwidth?
Network statistics show that the 1Gbps switch port used for storage traffic is fully saturated. Which of the following switch technologies can be used to provide twice the bandwidth?A . NATB . MultipathingC . Link aggregationD . VLAN View Answer Answer: C...
Which of the following steps should the administrator perform FIRST before the migration?
An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration?A . Harden the operating systemB . Migrate the server in a development environmentC . Contact the vendor for compatibility requirementsD . Establish a performance baseline View Answer Answer:...
Continue readingWhich of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?
Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?A . Bridge the vNICB . Set the vNIC speed to half-duplexC . Add an addition vNICD . Set the vNIC speed to full-duplex View Answer Answer: A...