Which of the following ports should the administrator open on the monitoring server’s firewall?
A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task. Which of the following ports should the administrator open on the monitoring server’s firewall?A . 53 B. 123 C. 139 D. 161View AnswerAnswer: D Explanation: Reference: https://thwack.solarwinds.com/t5/NPM-Discussions/SNMP-open-ports-on-the-firewall/m-p/168826
Which of the following would provide high availability to the application environment in case of hypervisor failure?
A systems administrator is using VMs to deploy a new solution that contains a number of application VMs. Which of the following would provide high availability to the application environment in case of hypervisor failure?A . Anti-affinity rules B. Cold migration C. Live migration D. Affinity rulesView AnswerAnswer: A Explanation:...
Which of the following solutions will be BEST to help the administrator achieve the requirements?
A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements. Which of the following solutions will be BEST to help the administrator achieve the requirements?A ....
Which of the following would BEST meet the above requirements?
A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following: ✑ High availability ✑ Horizontal auto-scaling ✑ 60 nodes peak capacity per region ✑ Five reserved network IP addresses per subnet ✑ /24 range Which of the following would BEST meet the...
Which of the following types of drivers will MOST likely ensure compatibility will all virtual workstations?
A systems administrator is deploying a GPU-accelerated VDI solution. Upon requests from several users, the administrator installs an older version of the OS on their virtual workstations. The majority of the VMs run the latest LTS version of the OS. Which of the following types of drivers will MOST likely...
Which of the following will MOST likely be executed in the cloud solution to meet security requirements?
A company has deployed a new cloud solution and is required to meet security compliance. Which of the following will MOST likely be executed in the cloud solution to meet security requirements?A . Performance testing B. Regression testing C. Vulnerability testing D. Usability testingView AnswerAnswer: C
Which of the following is the MOST efficient way to achieve this goal?
A media company has made the decision to migrate a physical, internal file server to the cloud and use a web- based interface to access and manage the files. The users must be able to use their current corporate logins. Which of the following is the MOST efficient way to...
Which of the following is the MOST important consideration to ensure a seamless migration?
A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible. Which of the following is the MOST important consideration to ensure a seamless migration?A . The cost of the environment B. The I/O of the storage C. Feature compatibility D....
Which of the following authentication techniques should the systems administrator use within the playbook?
A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook?A . Use the server’s root credentials B. Hard-code the password within the playbook C. Create a service account on...
Which of the following should the systems administrator implement to achieve this objective?
A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet. Which of the following should the systems administrator implement to achieve this objective?A . A stateful firewall B. DLP C. DNSSEC D. Network flowsView AnswerAnswer:...