Which of the following considerations should be given to upgrade firmware and make the change as transparent as possible to users?
A company has implemented a change management process that allows standard changes during business hours. The company’s private cloud hardware needs firmware updates and supports rolling upgrades. Which of the following considerations should be given to upgrade firmware and make the change as transparent as possible to users?A . Implement...
Which of the following is the MOST efficient way for a cloud systems administrator to fulfill this request?
The IT department receives a client request to build multiple file server instances. Which of the following is the MOST efficient way for a cloud systems administrator to fulfill this request?A . Build file server instances with the OEM DVDB . Restore a file server base image from backupC ....
Which of the following describes the MOST likely reason why the user cannot access the SaaS resources?
A user cannot consume SaaS services while working remotely. IP whitelisting is implemented to connect to a SaaS provider as a security mechanism. Which of the following describes the MOST likely reason why the user cannot access the SaaS resources?A . The user is not utilizing VPN to connect to...
Identify the problematic device(s).
Identify the problematic device(s). Instructions: If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to...
Which of the following should be deployed to secure the personal information?
A company is using storage-as-a-service from an IaaS provider for application services. The company has a mandate to protect personal information being stored on the cloud. The service provided includes encryption for in-transit data and requires a security solution for data-at-rest. Which of the following should be deployed to secure...
Which of the following should be deployed to secure the personal information?
A company is using storage-as-a-service from an IaaS provider for application services. The company has a mandate to protect personal information being stored on the cloud. The service provided includes encryption for in-transit data and requires a security solution for data-at-rest. Which of the following should be deployed to secure...
Which of the following should the technician consider doing FIRST?
A company has hired a technician to build a cloud infrastructure for a massively parallel application. Which of the following should the technician consider doing FIRST?A . Add a GPU to the VMsB . Configure the VMs to scale up automaticallyC . Allocate maximum bandwidth to the VMsD . Select...
Which of the following technologies BEST fits the customer’s needs?
A customer has requirements for its application data to be copied into a second location for failover possibilities. Latency should be minimized, while RPO and RTO are over 15 minutes. Which of the following technologies BEST fits the customer’s needs?A . Data mirroringB . Snapshot copiesC . Storage cloningD ....
Which of the following backups should be chosen?
A VM was deleted by mistake today at 11:05 a.m. Below are the backups currently available for the VM: Crash-consistent restore is acceptable. Which of the following backups should be chosen?A . Snapshot from today at 11:00B . Full from three days ago at 00:00C . Incremental from today at...
Which of the following cloud components should the administrator update?
A cloud administrator is managing a VPC within an IaaS service model and needs to install quarterly updates. Which of the following cloud components should the administrator update? (Choose three.)A . Network switchesB . HypervisorC . Storage arrayD . Storage switchesE . Operating systemF . ApplicationG . AntivirusH . Load...