Which of the following should the administrator verify NEXT?
After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message. Which of the following...
Which of the following solutions will resolve the issue the FASTEST?
Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps. Which of the following solutions will resolve the issue the FASTEST?A . Change the connection to point-to-site VPNB...
Which of the following will help the cloud provider secure the environment and limit consumers’ activity?
A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity?A . Patch managementB . HardeningC . ScalingD . Log and event...
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host. This is an example...
Which of the following should be deployed?
An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?A . Two load balancers behind a single firewallB ....
Which of the following should the cloud administrator configure to solve this issue?
A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should...
Which of the following should be implemented to achieve ease of management?
An organization is hosting a DNS domain with private and public IP ranges. Which of the following should be implemented to achieve ease of management?A . Network peeringB . A CDN solutionC . A SDN solutionD . An IPAM solutionView AnswerAnswer: D Explanation: An IP address management (IPAM) solution is...
Which of the following protocols should the company use?
A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols should the company use? (Choose two.)A . CIFSB . FTPC . iSCSID ....
Which of the following should the company implement?
A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).A . A load balancerB . SONC . A firewallD . SR-IOVE . Storage replicationF...
GET http://gateway.securetransaction.com/privileged/api/v1/changeResource?
A security audit related to confidentiality controls found the following transactions occurring in the system: GET http://gateway.securetransaction.com/privileged/api/v1/changeResource?id=123&user=277 Which of the following solutions will solve the audit finding?A . Using a TLS-protected API endpointB . Implementing a software firewallC . Deploying a HIDS on each systemD . Implementing a Layer 4...