Which of the following should be implemented to improve application performance?
An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time. Which of the following should be implemented to improve application performance?A . Increase disk capacityB . Increase the memory and network bandwidthC . Upgrade the applicationD . Upgrade...
Which of the following authentication techniques should the systems administrator use within the playbook?
A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook?A . Use the server’s root credentialsB . Hard-code the password within the playbookC . Create a service account on...
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host. This is an example...
Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?
Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?A . Implement whole-disk encryptionB . Deploy the latest OS patchesC . Deploy an anti-malware solutionD . Implement mandatory access controlView AnswerAnswer: D Explanation: Mandatory access control (MAC) is a type...
Which of the following provides the BEST mechanism to achieve this goal?
A systems administrator needs to configure an email client to ensure data integrity of the email messages. Which of the following provides the BEST mechanism to achieve this goal?A . Cyclic redundancy checkB . SHA-1 hashesC . SHA-256 hashesD . Digital signatureView AnswerAnswer: D Explanation: A digital signature is a...
Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?
Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?A . Using only open-source technologiesB . Keeping all resources up to dateC . Creating a standby environment with a different cloud providerD . Having a detailed incident response planView AnswerAnswer: D Explanation: An incident response...
Which of the following should the company implement?
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?A . Performance testingB . Penetration testingC . Vulnerability testingD . Regression testingView AnswerAnswer: C Explanation: Vulnerability testing is a type of testing that identifies and evaluates the weaknesses or...
Which of the following will BEST achieve this goal?
A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible. Which of the following will BEST achieve this goal?A . Configure CPU passthroughB . Oversubscribe CPU resourcesC . Switch from a Type 1 to a Type 2 hypervisorD . Increase instructions...
Which of the following should the systems administrator implement to achieve this objective?
A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet. Which of the following should the systems administrator implement to achieve this objective?A . A stateful firewallB . DLPC . DNSSECD . Network flowsView AnswerAnswer:...
Which of the following is the MOST likely cause of the issue?
A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of...