Given an expected increase in workload, which of the following is the BEST solution to improve application performance?

A recent advertisement campaign has increased traffic to an e-commerce application that is hosted within a public cloud environment. Customers are reporting that it takes too long to load their pages and submit orders. A cloud administrator looks at the metrics from the environment and sees high utilization of the...

October 9, 2020 No Comments READ MORE +

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

Identify the correct options to provide adequate configuration for hybrid cloud architecture. Instructions : If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the...

October 9, 2020 No Comments READ MORE +

Which of the following resources will need to be upgraded prior to deployment?

An administrator is deploying a new application platform with the following resource utilization: Company policy requires that no resource utilization surpasses 80%. Which of the following resources will need to be upgraded prior to deployment?A . DiskB . IOPSC . CPUD . NetworkE . RAMView AnswerAnswer: A

October 9, 2020 No Comments READ MORE +

Which of the following storage types would BEST suit the engineer's needs?

When designing a new private cloud platform, a cloud engineer wants to make sure the new hypervisor can be configured as fast as possible by cloning the OS from the other hypervisor. The engineer does not want to use local drives for the hypervisors. Which of the following storage types...

October 9, 2020 No Comments READ MORE +

Which of the following is the MOST likely cause?

A cloud administrator has finished building a virtual server template in a public cloud environment. The administrator is now cloning six servers from that template. Each server is configured with one private IP address and one public IP address. After starting the server instances, the cloud administrator notices that two...

October 9, 2020 No Comments READ MORE +

Which of the following would BEST assist in enabling federation?

Several SaaS providers support identity federation for authentication. Which of the following would BEST assist in enabling federation?A . SAMLB . NTLMC . MFAD . PKIView AnswerAnswer: A Reference: https://aws.amazon.com/blogs/apn/identity-federation-and-sso-for-saas-on-aws/

October 8, 2020 No Comments READ MORE +

Given these requirements, which of the following security controls is BEST suited?

A company security policy mandates education and training for new employees. The policy must outline acceptable use policies for SaaS applications. Given these requirements, which of the following security controls is BEST suited?A . PreventiveB . DetectiveC . CorrectiveD . PhysicalView AnswerAnswer: C

October 8, 2020 No Comments READ MORE +

Which of the following is the MOST likely reason the logs are not being published after noon?

A cloud engineer is using a hosted service for aggregating the logs for all the servers in a public cloud environment. Each server is configured via syslog to send its logs to a central location. A new version of the application was recently deployed, and the SaaS server now stops...

October 8, 2020 No Comments READ MORE +

Given the above, which of the following should the administrator propose to BEST meet these requirements?

A cloud administrator is tasked with ensuring redundancy and high availability of an IaaS cloud platform environment. The administrator is given the following requirements: - Two web servers must share the same configurations and service client connections evenly. - Two database servers must share data and configurations, with only one...

October 7, 2020 No Comments READ MORE +

Which of the following describes where the security team should deploy the updated signatures?

In an IaaS environment, the security team issues a new signature file to prevent specific malware threats from infiltrating the company network. Which of the following describes where the security team should deploy the updated signatures?A . IDSB . Spam filterC . WAFD . NIPSE . HIPSView AnswerAnswer: C

October 7, 2020 No Comments READ MORE +