Lesson 12: Managing Maintenance in the Cloud Flashcards

1
Q

What type of backup job is not created from the original data but is aggregated from other backup jobs?

A.Incremental Backup
B.Differential Backup
C.Full Backup
D.Synthetic Full Backup

A

D.Synthetic Full Backup

A synthetic full backup job is created by combining the most recent full backup and the subsequent incremental backups. The result is a single aggregated backup job. Synthetic full backups are not generated directly from the original data but instead assembled from other backup jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator needs to restore data to a server, but the data owner wants to compare the files that are on the server to the restored files, to determine which version of the data to keep. What kind of restore should the administrator perform?

A.Side-by-side restoral
B.Alternate location restoral
C.File restoral
D.In-place restoral

A

A.Side-by-side restoral

The administrator should perform a side-by-side restoral, which will restore data to the original production server without overwriting the existing data. It will allow the data owner to compare the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A cloud administrator receives a “Suspicious activity” alert from Microsoft Azure for alerts. What are the next steps the administrator should take?

A.Disable the administrator account until further investigation.

B.Complete further investigation to determine the cause of the alert.

C.Ignore the alert as it is just a warning.

D.Confirm a new administrator account identity.

A

B.Complete further investigation to determine the cause of the alert.

A “Suspicious activity” alert indicates that the administrator needs to complete further investigation to determine the cause of the alert. Azure will provide recommendations on how to investigate and remediate threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An incident handler investigates logs on a Linux web server to determine if an attacker successfully breached the server. Which of the logs should the incident handler investigate to review the web logs?

A.Event Viewer Application log
B./var/log/apache
C./var/log/samba
D./var/log

A

B./var/log/apache

/var/log/apache is where Linux would store Apache log files. The question specified that the server was a Linux web server, and Apache is the only service listed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An administrator upgraded the hardware in a server. After the administrator put the server back in service, the system failed. The administrator never received an alert, although alerting worked properly before the administrator upgraded the hardware. What is the most likely reason why the administrator did not receive an alert when the system failed?

A.The administrator originally configured the system for composite alerts.

B.The administrator failed to take alerting out of maintenance mode.

C.The administrator is receiving too many alerts and ignored them.

D.The administrator did not enter the correct email address into the alerting system.

A

B.The administrator failed to take alerting out of maintenance mode.

The administrator most likely failed to take alerting out of maintenance mode, which prevents sending alerts while administrators are working on systems, after the hardware upgrade.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An organization is reviewing options for backup management and determines that a disk solution better suits the needs of the organization than a cloud solution. What are some reasons why the organization may have made this decision? (Select all that apply.)

A.The organization must retain complete control of the data.

B.The organization already owns the disks.

C.The disk solution is globally accessible.

D.The disk solution is more future proof than the cloud solution.

A

A.The organization must retain complete control of the data.

B.The organization already owns the disks

The organization may have decided to use a disk solution if it must retain complete control of the data. It can be difficult to determine exactly where data is stored when it is in the cloud.

The organization may have decided to use a disk solution if the organization already owns the disks. Disk solutions have a higher initial cost than cloud solutions but that is irrelevant in this case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An organization has both Windows and Linux instances running and collecting log file information. What protocol will send the information to the centralized management information base (MIB)?

A.Nmap
B.SSH
C.SNMP
D.TLS

A

C.SNMP

Simple Network Management Protocol (SNMP) will send the log file information to the MIB. Systems use SNMP for monitoring and managing network devices and it utilizes UDP ports 161 and 162 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cloud administrator needs to apply an emergency hotfix to one of the instances. What type of backup should the administrator capture before applying the hotfix to the system?

A.Full backup
B.Synthetic full backup
C.Differential backup
D.Snapshot backup

A

D.Snapshot backup

The administrator should capture a snapshot backup of the system before applying the hotfix. The snapshot will capture all the system settings for an easy restore if the hotfix isn’t successful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IT technicians installed environmental sensors connected to power distribution units (PDUs) throughout a large datacenter. A network design shows an intermediary application receiving sensor logs that are then pushed to a centralized monitoring application in the cloud. How is the data getting to the monitoring solution?

A.Linux server is using syslog logging service.

B.Monitoring thresholds are set up.

C.SNMP is configured on the devices.

D.CSP logging service is running.

A

C.SNMP is configured on the devices.

Simple Network Management Protocol (SNMP) allows network nodes to forward performance utilization information to a central monitor for further analysis. This information enables network administrators to understand devices that are over-or under-utilized, unavailable network paths, and devices that have failed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A server administrator for a small company is running a handful of servers on older equipment that hasn’t been allocated budgeting for maintenance. The administrator is worried about file corruption affecting system files or configurations. Which of the following backups is most suited for the administrator’s concerns?

A.System state
B.Application level
C.File level
D.Database dump

A

A.System state

System state backups duplicate the essential OS configurations. These configurations can then be restored quickly to the same machine in the event of corrupted system files or misconfigurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cloud administrator needs to estimate the performance and stability of the cloud network’s instances housing the big data databases. What process can the administrator perform to discover this information?

A.Monitoring thresholds
B.Log scrubbing
C.Monitoring baseline
D.Continuous monitoring

A

C.Monitoring baseline

The administrator can discover this information by using a monitoring baseline. The monitoring baseline uses vendor guidance and historical information to estimate performance and stability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization has determined that they cannot lose more than 12 hours of data. What does this number represent?

A.RPO
B.MTTR
C.RTO
D.3-2-1 backup rule

A

A.RPO

This number represents the Recovery Point Objective (RPO). RPO measures the amount of data an organization can acceptably lose and defines the frequency of backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An administrator is reviewing logs in Event Viewer. Which of the following is NOT a primary log the administrator will see here?

A.Application
B.Syslog
C.Security
D.System

A

B.Syslog

Linux uses the Syslog logging service, a protocol that allows appliances and applications to send logs or event records to a central server. This is not a primary log in Windows Event Viewer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One of the VMs that houses an organization’s big data analytics database has become corrupted from an operating system misconfiguration. What kind of backup can the administrator use to quickly restore it to the previous state?

A.Filesystem backup
B.Database dump
C.System-state backup
D.Application-level backup

A

C.System-state backup

The administrator can use a system-state backup to restore the VM. Although the server houses a database, the misconfiguration corrupted the VMs operating system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly