Which of the following methods would be MOST suitable to achieve this objective?

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?A . Deploy web servers into an laaS provider.B . Implement a cloud-based VDI solution.C ....

September 11, 2021 No Comments READ MORE +

After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)

After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)A . Identify the resources that are accessible to the affected IAM userB . Remove the published plain-text passwordC . Notify users that a data breach has...

September 11, 2021 No Comments READ MORE +

Which of the following controls will BEST mitigate the risk of exploitation?

An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team. Which of the following controls will BEST mitigate the risk of exploitation?A . DLPB . HIDSC . NACD . WAFView AnswerAnswer: B...

September 10, 2021 No Comments READ MORE +

Which of the following should the company implement?

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?A . Performance testingB . Penetration testingC . Vulnerability testingD . Regression testingView AnswerAnswer: C Explanation: Reference: https://pure.security/services/technical-assurance/external-penetration-testing/

September 10, 2021 No Comments READ MORE +

Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?

Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?A . Implement whole-disk encryptionB . Deploy the latest OS patchesC . Deploy an anti-malware solutionD . Implement mandatory access controlView AnswerAnswer: D

September 10, 2021 No Comments READ MORE +

Which of the following is the BEST technique to use?

A systems administrator needs to configure SSO authentication in a hybrid cloud environment. Which of the following is the BEST technique to use?A . Access controlsB . FederationC . Multifactor authenticationD . Certificate authenticationView AnswerAnswer: C Explanation: Reference: https://techbeacon.com/security/how-get-single-sign-right-todays-hybrid-it-environments

September 10, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the work day, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the...

September 10, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the script failure?

A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found. Which of the following is the MOST likely cause of the script failure?A . Account mismatchesB...

September 10, 2021 No Comments READ MORE +

Which of the following cloud models would meet these requirements?

An organization has the following requirements that need to be met when implementing cloud services: ✑ SSO to cloud infrastructure ✑ On-premises directory service ✑ RBAC for IT staff Which of the following cloud models would meet these requirements?A . PublicB . CommunityC . HybridD . MultitenantView AnswerAnswer: C

September 10, 2021 No Comments READ MORE +

Which of the following actions will make the server fully operational?

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed. Which of the following actions will make the server fully operational?A . Restart the RAID resynchronization processB . Perform a P2V migration of the serverC...

September 9, 2021 No Comments READ MORE +