Which of the following describes where the security team should deploy the updated signatures?
In an IaaS environment, the security team issues a new signature file to prevent specific malware threats from infiltrating the company network. Which of the following describes where the security team should deploy the updated signatures?A . IDSB . Spam filterC . WAFD . NIPSE . HIPSView AnswerAnswer: C
To minimize the effect to the existing system, which of the following schedules is MOST suitable for the load test?
A company uses its own private cloud, which has few available resources. Mission-critical systems and other information systems are running on it. A new system will be deployed on the private cloud. The following tests are included in the test plan: ✑ Load test (2h) ✑ Backup/restore test (6h) ✑...
Which of the following is the MOST likely cause of the error?
An administrator is creating new severs in a public cloud. The workflow creates and application group with three VMs, one web server, one application server and one database server. The three VMs are all accessible via SSH, but the websites shows a 503-error referring to a database issue. Which of...
Which of the following is the BEST approach for the cloud administrator to take?
Ann, the lead product developer for a company, just hired three new developers. Ann asked the cloud administrator to give these developers access to the fileshares in the public cloud environment. Which of the following is the BEST approach for the cloud administrator to take?A . Clone Ann’s account to...
Which of the following results would BEST suit the requirements?
A cloud administrator has deployed a new all-flash storage array with deduplication and compression enabled, and moved some of the VMs into it. The goal was to achieve 4:1 storage efficiency while maintaining sub- millisecond latency. Which of the following results would BEST suit the requirements?A . Compression 1:1 Deduplication...
Which of the following would BEST minimize backup size?
A company is seeking a new backup solution for its virtualized file servers that fits the following characteristics: ✑ The files stored on the servers are extremely large. ✑ Existing files receive multiple small changes per day. ✑ New files are only created once per month. All backups are being...
Which of the following is the BEST technique for the IaaS provider to apply this to target systems?
Based on demand, an IaaS provider wants to deploy a security application for its customers. Which of the following is the BEST technique for the IaaS provider to apply this to target systems?A . Vendor applicationB . ScriptingC . OrchestrationD . Custom programmingView AnswerAnswer: C
To set up access, which of the following is the BEST method to ensure the eDiscovery analyst only has the ability to search but not change configuration or settings?
The legal department requires eDiscovery of hosted file shares. To set up access, which of the following is the BEST method to ensure the eDiscovery analyst only has the ability to search but not change configuration or settings?A . PKIB . SSOC . MFAD . RBACView AnswerAnswer: D
Which of the following is the MOST likely cause of the new behavior?
After monthly patching, a large number of users who are logged onto the network report that application links from a company’s intranet site, which previously opened directly into the website, are now prompting for logon information. Application administrators confirm that the websites in QUESTION NO: are working properly. Which of...
Which of the following would BEST satisfy the requirements?
A cloud administrator is required to implement a solution to handle data-at-rest encryption requirements for a database. Which of the following would BEST satisfy the requirements?A . Install an SSL certificate and only allow secure connections to the server.B . Enable two-factor authentication on connections to the database server and...