Which of the following is the BEST technique to use?
A systems administrator needs to configure SSO authentication in a hybrid cloud environment. Which of the following is the BEST technique to use?A . Access controls B. Federation C. Multifactor authentication D. Certificate authenticationView AnswerAnswer: B Explanation: Single Sign-On (SSO) in a hybrid cloud environment often involves the need to...
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.
A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host. This is an example...
Which of the following should be verified NEXT?
An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in...
Which of the following should be implemented?
Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A’s cloud resources while retaining its IAM solution. Which of the following should be implemented?A . Multifactor authentication B. Single sign-on C. Identity federation D. Directory serviceView AnswerAnswer:...
Which of the following will reduce the network delay without taxing other system resources?
A systems administrator would like to reduce the network delay between two servers. Which of the following will reduce the network delay without taxing other system resources?A . Decrease the MTU size on both servers B. Adjust the CPU resources on both servers C. Enable compression between the servers D....
Which of the following is MOST likely the cause?
A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior. Which of the following is MOST likely the cause?A . API provider rate limiting B. Invalid API token C. Depleted network bandwidth D. Invalid API requestView AnswerAnswer: A
Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?
An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations. Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?A . Solutions to perform...
Which of the following migration methods would be the BEST to use?
A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data. Which of the following migration methods would be the BEST to use?A . Conduct a V2V migration B. Perform a storage...
Which of the following will provide the data to measure business continuity?
A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution. Which of the following will provide the data to measure business continuity? (Choose two.)A . A service-level agreement B. Automation scripts C. Playbooks D. A network diagram E. A backup and restore...
Which of the following should the company implement?
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?A . Performance testing B. Penetration testing C. Vulnerability testing D. Regression testingView AnswerAnswer: C Explanation: Reference: https://pure.security/services/technical-assurance/external-penetration-testing/