Which of the following is the best step for the administrator to take NEXT?
A cloud administrator recently noticed that a number of files stored at a SaaS provider’s file-sharing service were deleted. As part of the root cause analysis, the administrator noticed the parent folder permissions were modified last week. The administrator then used a test user account and determined the permissions on...
Which of the following can be performed as a quick method to roll back to an earlier state, if necessary?
An administrator is performing an in-place upgrade on a quest VM operating system. Which of the following can be performed as a quick method to roll back to an earlier state, if necessary?A . A configuration file backupB . A full backup of the databaseC . A differential backupD ....
Which of the following testing techniques would be BEST to use?
A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities. Which of the following testing techniques would be BEST to use?A . Usability testingB...
Which of the following protocols would be MOST useful for this task?
A cloud administrator has built a new private cloud environment and needs to monitor all computer, storage, and network components of the environment. Which of the following protocols would be MOST useful for this task?A . SMTPB . SCPC . SNMPD . SFTPView AnswerAnswer: C Explanation: Simple Network Management Protocol...
Which of the following should be implemented to improve application performance?
An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time. Which of the following should be implemented to improve application performance?A . Increase disk capacityB . Increase the memory and network bandwidthC . Upgrade the applicationD . Upgrade...
Which of the following authentication techniques should the systems administrator use within the playbook?
A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook?A . Use the server’s root credentialsB . Hard-code the password within the playbookC . Create a service account on...
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host. This is an example...
Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?
Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?A . Implement whole-disk encryptionB . Deploy the latest OS patchesC . Deploy an anti-malware solutionD . Implement mandatory access controlView AnswerAnswer: D Explanation: Mandatory access control (MAC) is a type...
Which of the following provides the BEST mechanism to achieve this goal?
A systems administrator needs to configure an email client to ensure data integrity of the email messages. Which of the following provides the BEST mechanism to achieve this goal?A . Cyclic redundancy checkB . SHA-1 hashesC . SHA-256 hashesD . Digital signatureView AnswerAnswer: D Explanation: A digital signature is a...
Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?
Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?A . Using only open-source technologiesB . Keeping all resources up to dateC . Creating a standby environment with a different cloud providerD . Having a detailed incident response planView AnswerAnswer: D Explanation: An incident response...