Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?A . HybridB . CommunityC . PublicD . PrivateView AnswerAnswer: D

October 6, 2018 No Comments READ MORE +

Which of the following will allow the network administrator to verify that one IP is assigned to one VM?

Which of the following will allow the network administrator to verify that one IP is assigned to one VM?A . Virtual Local Area NetworkB . ReservationsC . Resource PoolingD . Storage allocationView AnswerAnswer: B

October 5, 2018 No Comments READ MORE +

Which of the following can be used by the cloud consumer and provides a visualization of key service metrics?

Which of the following can be used by the cloud consumer and provides a visualization of key service metrics?A . DashboardB . APIC . Home PageD . InterfaceView AnswerAnswer: A

October 4, 2018 No Comments READ MORE +

Which of the following storage technologies can leverage switches in its implementation?

Which of the following storage technologies can leverage switches in its implementation?A . HBAB . DASC . SCSID . SANView AnswerAnswer: D

September 30, 2018 No Comments READ MORE +

Which of the following types of virtualization would be used to meet this requirement?

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?A . Type IB . Type IIC . Bare MetalD . NativeView AnswerAnswer: B

September 29, 2018 No Comments READ MORE +

Ubiquitous access to cloud computing means:

Ubiquitous access to cloud computing means:A . access by any personB . access by any device through any network connectionC . access by authorized personnel onlyD . international access across country bordersView AnswerAnswer: B

September 27, 2018 No Comments READ MORE +

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?A . Defrag systemB . Update driversC . Disable firewallD . Patch systemView AnswerAnswer: D

September 24, 2018 No Comments READ MORE +

Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?

Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?A . USBB . TapeC . HDDD . SSDView AnswerAnswer: D

September 22, 2018 No Comments READ MORE +

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?A . Port ZoningB . SAN ZoningC . LUN MaskingD . MultipathingView AnswerAnswer: C

September 19, 2018 No Comments READ MORE +

An administrator needs to provide Internet access to all internal systems using a single IP address. Which of the following should the administrator implement?

An administrator needs to provide Internet access to all internal systems using a single IP address. Which of the following should the administrator implement?A . NATB . Virtual switchingC . VLAN taggingD . PATView AnswerAnswer: A

September 17, 2018 No Comments READ MORE +