Deck 3 Flashcards
A web server has been deployed in a public IaaS provider and has been assigned the public IP
address of 72.135.10.100. Users are now reporting that when they browse to the website, they
receive a message indicating the service is unavailable. The cloud administrator logs into the server,
runs a netstat command,
and notices the following relevant output:
TCP 17.3.130.3:0 72.135.10.100:5500 TIME_WAIT
TCP 17.3.130.3:0 72.135.10.100:5501 TIME_WAIT
TCP 17.3.130.3:0 72.135.10.100:5502 TIME_WAIT
TCP 17.3.130.3:0 72.135.10.100:5503 TIME_WAIT
TCP 17.3.130.3:0 72.135.10.100:5504 TIME_WAIT
Which of the following actions should the cloud administrator take to resolve the issue?
A. Assign a new IP address of 192.168.100.10 to the web server
B. Modify the firewall on 72.135.10.100 to allow only UDP
C. Configure the WAF to filter requests from 17.3.130.3
D. Update the gateway on the web server to use 72.135.10.1
D. Update the gateway on the web server to use 72.135.10.1
A technician is working with an American company that is using cloud services to provide videobased
training for its customers. Recently, due to a surge in demand, customers in Europe are
experiencing latency.
Which of the following services should the technician deploy to eliminate the latency issue?
A. Auto-scaling
B. Cloud bursting
C. A content delivery network
D. A new cloud provider
A. Auto-scaling
A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute
instance perform application code changes. The development group should be the only group
allowed to modify files in the directory.
Which of the following will accomplish the desired objective?
A. Remove the file write permissions for the application service account.
B. Restrict the file write permissions to the development group only.
C. Add access to the fileshare for the systems administrator’s group.
D. Deny access to all development user accounts
B. Restrict the file write permissions to the development group only.
An SQL injection vulnerability was reported on a web application, and the cloud platform team needs
to mitigate the vulnerability while it is corrected by the development team.
Which of the following controls will BEST mitigate the risk of exploitation?
A. DLP
B. HIDS
C. NAC
D. WAF
B. HIDS
______ is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces, similar to the way a network-based intrusion detection system operates.
DLP
HIDS
NAC
HIDS
A SaaS provider wants to maintain maximum availability for its service.
Which of the following should be implemented to attain the maximum SLA?
A. A hot site
B. An active-active site
C. A warm site
D. A cold site
A. A hot site
A systems administrator in a large enterprise needs to alter the configuration of one of the finance
department’s database servers.
Which of the following should the administrator perform FIRST?
A. Capacity planning
B. Change management
C. Backups
D. Patching
C. Backups
A cloud administrator recently deployed an update to the network drivers of several servers.
Following the update, one of the servers no longer responds to remote login requests. The cloud
administrator investigates the issue and gathers the following information:
The cloud management console shows the VM is running and the CPU and memory utilization is at
or near 0%.
The cloud management console does not show an IP address for that server.
A DNS lookup shows the hostname resolves to an IP address.
The server is a member of the same security group as the others.
The cloud administrator is able to log in remotely to the other servers without issue.
Which of the following is the MOST likely cause of the server being unavailable?
A. The network driver updates did not apply successfully, and the interface is in a down state.
B. The ACL policy for the server was updated as part of the server reboot, preventing login access.
C. The server was assigned a new IP address, and DNS entry for the server name was not updated.
D. The update caused an increase in the output to the logs, and the server is too busy to respond.
A. The network driver updates did not apply successfully, and the interface is in a down state.
A systems administrator is creating a playbook to run tasks against a server on a set schedule.
Which of the following authentication techniques should the systems administrator use within the
playbook?
A. Use the server’s root credentials
B. Hard-code the password within the playbook
C. Create a service account on the server
D. Use the administrator’s SSO credentials
D. Use the administrator’s SSO credentials
An organization is hosting a DNS domain with private and public IP ranges.
Which of the following should be implemented to achieve ease of management?
A. Network peering
B. A CDN solution
C. A SDN solution
D. An IPAM solution
D. An IPAM solution
______ help simplify and automate the administration of several tasks related to IP space management, including writing DNS records and configuring DHCP settings
A CDN solution
A SDN solution
An IPAM solution
An IPAM solution
A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core
when feasible.
Which of the following will BEST achieve this goal?
A. Configure CPU passthrough B. Oversubscribe CPU resources C. Switch from a Type 1 to a Type 2 hypervisor D. Increase instructions per cycle E. Enable simultaneous multithreading
B. Oversubscribe CPU resources
Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?
A. Using only open-source technologies
B. Keeping all resources up to date
C. Creating a standby environment with a different cloud provider
D. Having a detailed incident response plan
D. Having a detailed incident response plan
A systems administrator is troubleshooting network throughput issues following a deployment. The
network is currently being overwhelmed by the amount of traffic between the database and the web
servers in the environment.
Which of the following should the administrator do to resolve this issue?
A. Set up affinity rules to keep web and database servers on the same hypervisor
B. Enable jumbo frames on the gateway
C. Move the web and database servers onto the same VXLAN
D. Move the servers onto thick-provisioned storage
B. Enable jumbo frames on the gateway
A systems administrator needs to configure an email client to ensure data integrity of the email
messages.
Which of the following provides the BEST mechanism to achieve this goal?
A. Cyclic redundancy check
B. SHA-1 hashes
C. SHA-256 hashes
D. Digital signature
A. Cyclic redundancy check
An IaaS provider has numerous devices and services that are commissioned and decommissioned
automatically on an ongoing basis. The cloud administrator needs to implement a solution that will
help reduce administrative overhead.
Which of the following will accomplish this task?
A. IPAM
B. NAC
C. NTP
D. DNS
A. IPAM
A company developed a product using a cloud provider’s PaaS platform and many of the platformbased
components within the application environment.
Which of the following would the company MOST likely be concerned about when utilizing a
multicloud strategy or migrating to another cloud provider?
A. Licensing
B. Authentication providers
C. Service-level agreement
D. Vendor lock-in
D. Vendor lock-in
A storage array that is used exclusively for datastores is being decommissioned, and a new array has
been installed. Now the private cloud administrator needs to migrate the data.
Which of the following migration methods would be the BEST to use?
A. Conduct a V2V migration
B. Perform a storage live migration
C. Resync the data between arrays
D. Use a storage vendor migration appliance
D. Use a storage vendor migration appliance
A SAN that holds VM files is running out of storage space.
Which of the following will BEST increase the amount of effective storage on the SAN?
A. Enable encryption
B. Increase IOPS
C. Convert the SAN from RAID 50 to RAID 60
D. Configure deduplication
D. Configure deduplication
A systems administrator is troubleshooting performance issues with a Windows VDI environment.
Users have reported that VDI performance has been slow since the images were upgraded from
Windows 7 to Windows 10.
This VDI environment is used to run simple tasks, such as Microsoft Office. The administrator
investigates the virtual machines and finds the following settings:
4 vCPU
16GB RAM
10Gb networking
256MB frame buffer
Which of the following MOST likely needs to be upgraded?
A. vRAM
B. vCPU
C. vGPU
D. vNIC
D. vNIC
A cloud administrator is planning to migrate a globally accessed application to the cloud.
Which of the following should the cloud administrator implement to BEST reduce latency for all
users?
A. Regions
B. Auto-scaling
C. Clustering
D. Cloud bursting
A. Regions or Autoscaling.. idk?
After accidentally uploading a password for an IAM user in plain text, which of the following should a
cloud administrator do FIRST? (Choose two.)
A. Identify the resources that are accessible to the affected IAM user
B. Remove the published plain-text password
C. Notify users that a data breach has occurred
D. Change the affected IAM user’s password
E. Delete the affected IAM user
B. Remove the published plain-text password
D. Change the affected IAM user’s password
Company A has acquired Company B and is in the process of integrating their cloud resources.
Company B needs access to Company A’s cloud resources while retaining its IAM solution.
Which of the following should be implemented?
A. Multifactor authentication
B. Single sign-on
C. Identity federation
D. Directory service
C. Identity federation
A cloud administrator has built a new private cloud environment and needs to monitor all computer,
storage, and network components of the environment.
Which of the following protocols would be MOST useful for this task?
A. SMTP
B. SCP
C. SNMP
D. SFTP
C. SNMP
A company just successfully completed a DR test and is ready to shut down its DR site and resume
normal operations.
Which of the following actions should the cloud administrator take FIRST?
A. Initiate a failover
B. Restore backups
C. Configure the network
D. Perform a failback
A. Initiate a failover
A systems administrator is using VMs to deploy a new solution that contains a number of application
VMs.
Which of the following would provide high availability to the application environment in case of
hypervisor failure?
A. Anti-affinity rules
B. Cold migration
C. Live migration
D. Affinity rules
A. Anti-affinity rules
SNMP port
123
161
9903
161
A cloud administrator checked out the deployment scripts used to deploy the sandbox environment
to a public cloud provider. The administrator modified the script to add an application load balancer
in front of the web- based front-end application. The administrator next used the script to recreate a
new sandbox environment successfully, and the application was then using the new load balancer.
The following week, a new update was required to add more front-end servers to the sandbox
environment. A second administrator made the necessary changes and checked out the deployment
scripts. The second administrator then ran the script, but the application load balancer was missing
from the new deployment.
Which of the following is the MOST likely reason for this issue?
A. The license limit on the number of server deployments allowed per month was exceeded
B. The deployment script changes made by the first administrator were not checked in and
committed
C. The new server images were incompatible with the application load-balancer configuration
D. The application load balancer exceeded the maximum number of servers it could use