Which of the following commands should the administrator run to identify the issue?

An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation: ✑ Production traffic (10.10.0.0/24) ✑ Network backup (10.20.0.0/25) ✑ Virtual IP network (10.20.0.128/25) The following configuration exists on the server: The backup administrator observes that the weekly backup is failing for...

December 7, 2023 No Comments READ MORE +

Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?

An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources. Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?A . DedicatedB . SharedC . PassthroughD . vGPUView AnswerAnswer: C Explanation: Passthrough is a type of GPU configuration that...

December 7, 2023 No Comments READ MORE +

Which of the following would be suitable to optimize the network for this requirement?

An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?A . Implement CDN for overall cloud applicationB ....

December 7, 2023 No Comments READ MORE +

Which of the following cloud models would meet these requirements?

An organization has the following requirements that need to be met when implementing cloud services: ✑ SSO to cloud infrastructure ✑ On-premises directory service ✑ RBAC for IT staff Which of the following cloud models would meet these requirements?A . PublicB . CommunityC . HybridD . MultitenantView AnswerAnswer: C Explanation:...

December 7, 2023 No Comments READ MORE +

Which of the following will BEST resolve this issue?

A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention. Which of the following will BEST...

December 7, 2023 No Comments READ MORE +

Which of the following will MOST likely solve the issue?

A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error. Which of the following will MOST likely solve the issue?A . Checking user passwordsB . Configuring QoS rulesC . Enforcing TLS authenticationD . Opening TCP port 3389View...

December 7, 2023 No Comments READ MORE +

Which of the following is the MOST likely cause?

Due to a policy change, a few of a customer’s application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%. Which of the...

December 7, 2023 No Comments READ MORE +

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations. Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?A . IntegrityB . VersioningC . ClassificationD . SegmentationView AnswerAnswer:...

December 7, 2023 No Comments READ MORE +

Which of the following actions will MOST likely solve this issue?

A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times. Which of the following actions will MOST likely solve this issue?A . Update the quest graphics...

December 7, 2023 No Comments READ MORE +

Which of the following authentication techniques should the systems administrator use within the playbook?

A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook?A . Use the server’s root credentialsB . Hard-code the password within the playbookC . Create a service account on...

December 7, 2023 No Comments READ MORE +