Which of the following is the MOST likely cause of the issue?
A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue?...
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host. This is an example...
Which of the following authentication techniques should the systems administrator use within the playbook?
A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook?A . Use the server’s root credentialsB . Hard-code the password within the playbookC . Create a service account on...
Which of the following would be suitable to optimize the network for this requirement?
An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?A . Implement CDN for overall cloud applicationB ....
Which of the following is the BEST option to execute this task with minimal effort?
A cloud administrator needs to implement a mechanism to monitor the expense of the company’s cloud resources. Which of the following is the BEST option to execute this task with minimal effort?A . Ask the cloud provider to send a daily expense reportB . Set custom notifications for exceeding budget...
Which of the following is the best step for the administrator to take NEXT?
A cloud administrator recently noticed that a number of files stored at a SaaS provider’s file-sharing service were deleted. As part of the root cause analysis, the administrator noticed the parent folder permissions were modified last week. The administrator then used a test user account and determined the permissions on...
Which of the following will BEST achieve this goal?
A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible. Which of the following will BEST achieve this goal?A . Configure CPU passthroughB . Oversubscribe CPU resourcesC . Switch from a Type 1 to a Type 2 hypervisorD . Increase instructions...
Which of the following should the company implement?
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?A . Performance testingB . Penetration testingC . Vulnerability testingD . Regression testingView AnswerAnswer: C Explanation: Vulnerability testing is a type of testing that identifies and evaluates the weaknesses or...
Which of the following MOST likely needs to be analyzed before rehosting the ERP?
A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections. Which of the following MOST likely needs to be analyzed before rehosting the ERP?A . SoftwareB . LicensingC . Right-sizingD . The...
Which of the following should the administrator troubleshoot FIRST?
A VDI administrator has received reports of poor application performance. Which of the following should the administrator troubleshoot FIRST?A . The network environmentB . Container resourcesC . Client devicesD . Server resourcesView AnswerAnswer: A Explanation: The network environment is the set of network devices, connections, protocols, and configurations that enable...