Which of the following is the MOST efficient and secure method for shipment of the data to the CSP with minimal downtime?

A newly established CSP allows for drive shipping to upload new data into the environment. Sensitive data on 40TB of storage needs to be transferred within one week. Which of the following is the MOST efficient and secure method for shipment of the data to the CSP with minimal downtime?A...

August 8, 2020 No Comments READ MORE +

Which of the following storage technologies is MOST likely to help minimize storage utilization when moving this server to the private cloud?

A file server is being migrated from physical hardware into a private cloud. Baselining of the server shows the disks average 90% full at all times. The contents of the file server consist mostly of compressed audio files. Multiple copies of the same files are often saved in different locations...

August 8, 2020 No Comments READ MORE +

Which of the following is the MOST likely cause of the security error users are seeing?

A new browser version has been deployed to all users at a company. After the deployment, users report that they can no longer access the company's secure time-card system, which is hosted by a SaaS provider. A technician investigates and discovers a security error is received upon opening the site....

August 8, 2020 No Comments READ MORE +

Which of the following is the FASTEST way for the administrator to apply the patch and ensure all systems are configured consistently?

A critical new security update has been released to fix an identified zero-day vulnerability with the SSH server process. Due to its severity, all development and staging servers must have this update applied immediately. Which of the following is the FASTEST way for the administrator to apply the patch and...

August 7, 2020 No Comments READ MORE +

Which of the following is the MOST likely problem?

A cloud implementation engineer successfully created a new VM. However, the engineer notices the new VM is not accessible from another network. A ping test works from another VM on the same subnet. Which of the following is the MOST likely problem?A . Incorrect subnetB . Incorrect host IP addressC...

August 7, 2020 No Comments READ MORE +

Which of the following metrics correctly relates to these requirements?

A cloud administrator is looking at business requirements that specify the data available at the disaster recovery site must not be more than 24 hours old. Which of the following metrics correctly relates to these requirements?A . RTOB . MTBFC . MTTRD . RPOView AnswerAnswer: D

August 6, 2020 No Comments READ MORE +

To set up access, which of the following is the BEST method to ensure the eDiscovery analyst only has the ability to search but not change configuration or settings?

The legal department requires eDiscovery of hosted file shares. To set up access, which of the following is the BEST method to ensure the eDiscovery analyst only has the ability to search but not change configuration or settings?A . PKIB . SSOC . MFAD . RBACView AnswerAnswer: D

August 6, 2020 No Comments READ MORE +

Given the information above, which of the following should a cloud administrator do to BEST accommodate failover and redundancy requirements?

A company has deployed a four-node cluster in a COLO environment with server configurations listed below. The company wants to ensure there is 50% overhead for failover and redundancy. There are currently eight VMs running within the cluster with four vCPUs x32GB each. The company wants to better utilize its...

August 6, 2020 No Comments READ MORE +

Which of the following is the BEST method to test and apply the update with minimal disruption to end users?

A company's security policy requires full disk encryption on all clients with preboot enabled. The encryption server is hosted, and the requirement is to push an update to all endpoints. Which of the following is the BEST method to test and apply the update with minimal disruption to end users?A...

August 6, 2020 No Comments READ MORE +

Which of the following configuration controls should be used to block sensitive information from being stored in the SaaS solution?

A manufacturing company's current security policy mandates PII is not stored in the SaaS solution. Which of the following configuration controls should be used to block sensitive information from being stored in the SaaS solution?A . Implement file-level encryption.B . Implement a network ACD . Implement an IPF . Implement...

August 6, 2020 No Comments READ MORE +