Which of the following is MOST likely the cause?
After a hardware upgrade on a private cloud system, the systems administrator notices a considerable drop in network performance. Which of the following is MOST likely the cause?A . The driverB . The memoryC . The cluster placementD . The CPUView AnswerAnswer: C
Which of the following should the administrator troubleshoot FIRST?
A VDI administrator has received reports of poor application performance. Which of the following should the administrator troubleshoot FIRST?A . The network environmentB . Container resourcesC . Client devicesD . Server resourcesView AnswerAnswer: D
Which of the following methods would be MOST suitable to achieve this objective?
An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?A . Deploy web servers into an laaS provider.B . Implement a cloud-based VDI solution.C ....
After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)
After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)A . Identify the resources that are accessible to the affected IAM userB . Remove the published plain-text passwordC . Notify users that a data breach has...
Which of the following controls will BEST mitigate the risk of exploitation?
An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team. Which of the following controls will BEST mitigate the risk of exploitation?A . DLPB . HIDSC . NACD . WAFView AnswerAnswer: B...
Which of the following should the company implement?
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?A . Performance testingB . Penetration testingC . Vulnerability testingD . Regression testingView AnswerAnswer: C Explanation: Reference: https://pure.security/services/technical-assurance/external-penetration-testing/
Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?
Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?A . Implement whole-disk encryptionB . Deploy the latest OS patchesC . Deploy an anti-malware solutionD . Implement mandatory access controlView AnswerAnswer: D
Which of the following is the BEST technique to use?
A systems administrator needs to configure SSO authentication in a hybrid cloud environment. Which of the following is the BEST technique to use?A . Access controlsB . FederationC . Multifactor authenticationD . Certificate authenticationView AnswerAnswer: C Explanation: Reference: https://techbeacon.com/security/how-get-single-sign-right-todays-hybrid-it-environments
Which of the following is the MOST likely cause of the issue?
A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the work day, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the...
Which of the following is the MOST likely cause of the script failure?
A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found. Which of the following is the MOST likely cause of the script failure?A . Account mismatchesB...