Which of the following attributes BEST describes “elasticity” in cloud computing? (Select TWO).

Which of the following attributes BEST describes “elasticity” in cloud computing? (Select TWO).A . Universal accessB . Multi-tenancyC . PortabilityD . Cost effectivenessE . ScalableF . Off premisesView AnswerAnswer: D,E

June 22, 2021 No Comments READ MORE +

Which of the following is a subcomponent of a virtual machine?

Which of the following is a subcomponent of a virtual machine?A . Virtual switchB . Virtual HBAC . Virtual shieldD . Virtual OSView AnswerAnswer: B

June 22, 2021 No Comments READ MORE +

Which of the following tools can identify which IP has been assigned to a FQDN?

The network administrator creates a DNS A record . Which of the following tools can identify which IP has been assigned to a FQDN?A . arpB . ipconfigC . nslookupD . tracertView AnswerAnswer: C

June 22, 2021 No Comments READ MORE +

Which of the following should the administrator implement NEXT?

An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography . Which of the following should the administrator implement NEXT?A . Access controlsB . RC5C . SSLD . ZoningView AnswerAnswer: A

June 22, 2021 No Comments READ MORE +

Which of the following could be assigned to a virtual CPU?

Which of the following could be assigned to a virtual CPU?A . CoresB . HBAsC . LUNsD . SteppingView AnswerAnswer: A

June 22, 2021 No Comments READ MORE +

Which of the following would be used to satisfy this scenario?

A system administrator wants to be able to use one server to collect all of the logs on the network . Which of the following would be used to satisfy this scenario?A . Firewall loggingB . Change management databaseC . Syslog serviceD . SNMPView AnswerAnswer: C

June 21, 2021 No Comments READ MORE +

Which of the following is used to enable access to the storage space?

A storage administrator has 100 terabytes of physical storage space within the SAN . Which of the following is used to enable access to the storage space?A . Drive mirroringB . LUN creationC . Drive stripingD . RAID configurationView AnswerAnswer: B

June 21, 2021 No Comments READ MORE +

Which of the following can be used to encrypt data at rest on a VM located in the cloud?

Which of the following can be used to encrypt data at rest on a VM located in the cloud?A . AESB . SSLC . TLSD . VPNView AnswerAnswer: A

June 21, 2021 No Comments READ MORE +

Which of the following would satisfy this requirement?

A company is required to provide their customers with zero downtime for its web application . Which of the following would satisfy this requirement?A . Cold siteB . High availabilityC . MultipathingD . Load balancingView AnswerAnswer: B

June 21, 2021 No Comments READ MORE +

Which of the following switch technologies can be used to provide twice the bandwidth?

Network statistics show that the 1Gbps switch port used for storage traffic is fully saturated . Which of the following switch technologies can be used to provide twice the bandwidth?A . NATB . MultipathingC . Link aggregationD . VLANView AnswerAnswer: C

June 20, 2021 No Comments READ MORE +