221-230 Flashcards
A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?
A. .yaml
B. .txt
C. .conf
D. .etcd
C. .conf
An organization is conducting a performance test of a public application. The following actions have already been completed:
- The baseline performance has been established
- A load test has passed.
- A benchmark report has been generated
Which of the following needs to be done to conclude the performance test?
A. Verify the application works well under an unexpected volume of requests.
B. Assess the application against vulnerabilities and/or misconfiguration exploitation.
C. Test how well the application can resist a DDoS attack.
D. Conduct a test with the end users and collect feedback.
D. Conduct a test with the end users and collect feedback.
Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?
A. There is a configuration failure in the syslog solution
B. The application servers were migrated to the cloud as IaaS instances
C. The application administrators have not performed any activity in those servers
D. There is a local firewall policy restriction on the syslog server
C. The application administrators have not performed any activity in those servers
A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?
A. Create a directory security group
B. Create a resource group
C. Create separate VLANs
D. Create a network security group
D. Create a network security group
A large pharmaceutical company needs to ensure it is in compliance with the following requirements:
- An application must run on its own virtual machine.
- The hardware the application is hosted on does not change.
Which of the following will BEST ensure compliance?
A. Containers
B. A firewall
C. Affinity rules
D. Load balancers
C. Affinity rules
A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application’s resource requirements. Which of the following scaling techniques can the cloud administrator implement to accommodate 100% of the application’s requirements?
A. Horizontal
B. Vertical
C. Cloud bursting
D. Autoscaling
C. Cloud bursting
A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?
A. RAID 5
B. RAID 6
C. RAID 10
D. RAID 50
C. RAID 10
A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?
A. MTTF
B. SLA
C. RTO
D. RPO
C. RTO
A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?
A. Site-to-site
B. Client-to-site
C. Point-to-site
D. Point-to-point
A. Site-to-site
A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?
A. Implement a secret management solution
B. Create autoscaling capabilities
C. Develop CI/CD tools
D. Deploy a CMDB tool
C. Develop CI/CD tools