Which of the following BEST describes this attack?
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company. Which of...
Which of the following will BEST increase the amount of effective storage on the SAN?
A SAN that holds VM files is running out of storage space. Which of the following will BEST increase the amount of effective storage on the SAN?A . Enable encryptionB . Increase IOPSC . Convert the SAN from RAID 50 to RAID 60D . Configure deduplicationView AnswerAnswer: D Explanation: Deduplication...
Which of the following should be configured in between the cloud environment and the DR site?
A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site. Which of the following should be configured in between the cloud environment and the DR site?A . FailbackB . PlaybookC . ZoningD . ReplicationView AnswerAnswer: D Explanation: Replication is a process of...
Which of the following actions should the cloud administrator take FIRST?
A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations. Which of the following actions should the cloud administrator take FIRST?A . Initiate a failoverB . Restore backupsC . Configure the networkD . Perform a failbackView AnswerAnswer: D Explanation:...
Which of the following actions will MOST likely solve this issue?
A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times. Which of the following actions will MOST likely solve this issue?A . Update the quest graphics...
After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)
After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)A . Identify the resources that are accessible to the affected IAM userB . Remove the published plain-text passwordC . Notify users that a data breach has...
Which of the following commands should the administrator run to identify the issue?
An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation: ✑ Production traffic (10.10.0.0/24) ✑ Network backup (10.20.0.0/25) ✑ Virtual IP network (10.20.0.128/25) The following configuration exists on the server: The backup administrator observes that the weekly backup is failing for...
The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.
The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS. Refer to the application dataflow: 1A C The end user accesses the application through a web browser to...
Which of the following RAID levels satisfies this requirement?
A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set. Which of the following RAID levels satisfies this requirement?A . RAID...
Which of the following is the MOST important consideration to ensure a seamless migration?
A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible. Which of the following is the MOST important consideration to ensure a seamless migration?A . The cost of the environmentB . The I/O of the storageC . Feature compatibilityD ....