Cloud+ Questions Flashcards

(631 cards)

1
Q

A sysadmin recently set up a new tenant in Office 365 for email and productivity needs. The sysadmin is looking to cut down on the number of applications installed. As well, the email cloud provider includes cloud-based productivity applications that are system agnostic and accessible regardless of where an employee is.

What kind of cloud-based service best describes what the sysadmin is hoping to implement?

1.1.11 Lesson Review

A

Software as a Service

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of cloud service is Microsoft Office 365?

1.1.11 Lesson Review

A

SaaS

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Considering the shared responsibility model, which of the following scenarios best demonstrates a consumer effectively fulfilling their security responsibilities?

1.1.11 Lesson Review

A

A consumer regularly audits their data access logs, implements encryption, and ensures strong access controls while trusting the CSP to manage physical security

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EcoTech Solutions, a medium-sized company specializing in sustainable technologies, has been experiencing challenges with its cloud infrastructure, including frequent downtime, security vulnerabilities, and compliance issues. The in-house IT team is skilled but overwhelmed by the increasing demands of managing the cloud environment. The company is considering outsourcing its cloud services to a Managed Service Provider (MSP) and needs to analyze the potential impacts on its operations.Analyze the potential impacts of outsourcing cloud services to an MSP for EcoTech Solutions.

Which of the following analyses best captures the potential outcomes?

1.1.11 Lesson Review

A

An MSP can provide specialized expertise in cloud management, which can reduce downtime and improve security and compliance, but it may require a significant initial investment and ongoing costs

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Evaluate the potential benefits and drawbacks of outsourcing cloud services to a Managed Service Provider (MSP) for a medium-sized organization.

Which of the following statements best captures the overall impact?

1.1.11 Lesson Review

A

MSPs can provide expertise beyond what in-house staff can achieve, but this may come at a higher cost and potential loss of control over certain IT functions

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company is looking to move away from on-premises deployment of an application. They wish to move to the cloud and rapidly deploy the application without setting up or maintaining the operating system, hardware, or network.

Which type of cloud service provider would best fit the company’s needs?

1.1.11 Lesson Review

A

Platform-as-a-Service

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following services is categorized as Storage as a Service (STaaS) by Google Cloud Platform (GCP)?

1.1.11 Lesson Review

A

Cloud Storage

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A server administrator is researching cloud deployment models and virtualization. The server administrator needs to be able to manage everything from the hypervisor and above.

Which of the following solutions should they choose?

1.1.11 Lesson Review

A

Infrastructure as a Service (IaaS)

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following would NOT be an example of appropriate consumer responsibility when patching cloud resources running on an infrastructure as a service (IaaS) solution?

1.1.11 Lesson Review

A

Patch virtual host hypervisor

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term “serverless” imply in the context of Function as a Service (FaaS)?

1.1.11 Lesson Review

A

Compute resources are allocated on demand and no resources are reserved when the application is not in use

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A healthcare startup is developing a new telemedicine application that requires high availability and scalability. The startup has a small IT team and wants to focus on developing the application rather than managing the underlying infrastructure.

Which cloud service model should they choose?

1.1.11 Lesson Review

A

Platform as a Service (PaaS)

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does “Anything as a Service” (XaaS) refer to?

1.1.11 Lesson Review

A

A catch-all phrase for technology solutions moved to the cloud

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A mid-sized retail company experiences significant fluctuations in website traffic throughout the year, particularly during holiday seasons. They are considering moving their e-commerce platform to the cloud to better handle these variations in demand.

Which cloud service model characteristic would be most beneficial for them to manage these fluctuations efficiently, and why?

1.1.11 Lesson Review

A

Rapid elasticity

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which cloud service model provides the highest level of control over the underlying infrastructure to the consumer?

1.1.11 Lesson Review

A

Infrastructure as a Service (IaaS)

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A startup company is experiencing rapid growth and needs to scale its IT services quickly to accommodate new employees and customers. They are considering different service models to support their expansion.

Which of the following options would best support the startup’s need for rapid scalability and cost management?

1.1.11 Lesson Review

A

Use XaaS solutions for key services such as email, storage, and customer support

1.1.11 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following best describes the primary difference between virtual machines (VMs) and containers?

1.2.6 Lesson Review

A

VMs virtualize at the hardware layer, while containers virtualize at the operating system layer

1.2.6 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An administrator is configuring virtual servers for a help desk department. All servers will operate using virtualization and require the exact same level of compute power, memory, and applications.

What would be the most efficient and consistent means of deploying the needed configurations?

1.2.6 Lesson Review

A

VM templates

1.2.6 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Evaluate the benefits of the subscription services payment model.

Which of the following is the most significant advantage for consumers?

1.2.6 Lesson Review

A

The ability to access services immediately upon subscription

1.2.6 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A startup company began operations with employees working from home on individual workstations. As demand for their services increased, the company faced rapidly increasing capital expenditure costs to build out an on-premises model. Instead, they opted for a cloud-based platform that can scale rapidly to meet their exact requirements. The new license structure is billed monthly based on the number of employees using the platform.

Which licensing models apply?

1.2.6 Lesson Review

A
  • Per-User
  • Subscription

1.2.6 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Evaluate the effectiveness of organizing user accounts into groups within the context of identity management.

Which of the following best describes its impact?

1.2.6 Lesson Review

A

It simplifies the management process by allowing bulk assignment of permissions

1.2.6 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What process controls the access to resources on a cloud platform?

1.2.6 Lesson Review

A

Identity management

1.2.6 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following best evaluates the effectiveness of auto-scaling in a cloud environment?

1.2.6 Lesson Review

A

Auto-scaling allows resources to be scaled up or down based on demand, optimizing cost and resource utilization

1.2.6 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A sysadmin recently set up a configuration file for a virtual machine farm that specified hardware allocation, such as memory and processing power. The sysadmin is using this template to simplify virtual machine deployment.

What type of virtual machine template is the sysadmin implementing?

1.2.6 Lesson Review

A

Operating system

1.2.6 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which factor would be least relevant when deciding to adopt cloud applications?

1.2.6 Lesson Review

A

The preference for applications that do not require network access

1.2.6 Lesson Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Where does the installation and processing of cloud applications occur? ## Footnote 1.2.6 Lesson Review
In the cloud ## Footnote 1.2.6 Lesson Review
26
Which of the following scenarios would most likely benefit from using Deep Learning (DL) over traditional Machine Learning (ML)? ## Footnote 1.3.4 Lesson Review
Diagnosing diseases from medical images ## Footnote 1.3.4 Lesson Review
27
A hospital is deploying a new IoT-based patient monitoring system that requires real-time data analysis and minimal latency. Which IoT architecture should they prioritize to achieve these goals? ## Footnote 1.3.4 Lesson Review
Edge computing with Gateway communication ## Footnote 1.3.4 Lesson Review
28
A company is setting up small hardware devices used to collect data about foot traffic in their stores. They are looking to optimize the layout of the stores to allow for higher sales. These hardware devices have tiny sensors and are linked together through the network to their data aggregation application. These sensors represent what type of device? ## Footnote 1.3.4 Lesson Review
Internet of Things ## Footnote 1.3.4 Lesson Review
29
A media company wants to develop a system that can automatically generate news articles based on current events data. Which AI technology should they implement? ## Footnote 1.3.4 Lesson Review
Generative AI ## Footnote 1.3.4 Lesson Review
30
What does sentiment analysis, also known as opinion mining, process to identify and quantify subjective information? ## Footnote 1.3.4 Lesson Review
Language and text ## Footnote 1.3.4 Lesson Review
31
A cloud technician receives a complaint that one employee cannot access certain cloud resources. The scope of the problem is limited to this particular user. Which of the following troubleshooting steps should the technician try next? ## Footnote 1.4.4 Lesson Review
Investigate and determine how the user's access has changed ## Footnote 1.4.4 Lesson Review
32
A server technician is alerted that a cluster of database servers has crashed. They researched change tickets, and isolated a test server which worked when changes were reverted. Which of the following should the technician perform next? ## Footnote 1.4.4 Lesson Review
Revert production ## Footnote 1.4.4 Lesson Review
33
A server technician has been diligently troubleshooting a critical service that crashed. They isolated the issue and implemented a possible resolution. What next step should the technician perform? ## Footnote 1.4.4 Lesson Review
Verify full system functionality ## Footnote 1.4.4 Lesson Review
34
If a CSP were to experience a significant service outage that resulted in organizational revenue losses, which document would assist the organization in determining the eligibility for a reduction in service fees? ## Footnote 1.4.4 Lesson Review
SLA ## Footnote 1.4.4 Lesson Review
35
An IT technician is revisiting an issue that was previously marked as resolved a week prior by a different technician. The cause and resolution of the issue were documented. Considering the issue has recurred, what could the previous technician have done additionally to ensure a more enduring resolution? ## Footnote 1.4.4 Lesson Review
Implement preventive measures to mitigate future recurrences ## Footnote 1.4.4 Lesson Review
36
A single user is having trouble downloading files from the CSP's server. The download fails with a message stating the files were blocked. Frustrated, the user claims that resolving this matter falls on the CSP. Which of the following best represents who should initiate for this incident to be resolved? ## Footnote 1.6 Module Quiz
The user ## Footnote 1.6 Module Quiz
37
A media company wants to develop a system that can automatically generate news articles based on current events data. Which AI technology should they implement? ## Footnote 1.6 Module Quiz
Generative AI ## Footnote 1.6 Module Quiz
38
Which of the following applications of AI relies MOST on cloud-based generative AI for real-time operations? ## Footnote 1.6 Module Quiz
Creating a chatbot that answers customer queries based on company knowledge ## Footnote 1.6 Module Quiz
39
A systems administrator responded to an important web service crashing. They analyzed logs to determine the issue, restarted the service, and were able to verify system functionality. What is the next step the administrator should take? ## Footnote 1.6 Module Quiz
Implement preventative measures ## Footnote 1.6 Module Quiz
40
A company wants to deploy a private cloud on-premises but onto the latest hardware that combines compute, storage, and network resources into a single component. This requirement will streamline upgrade paths and future resource expansion when needed. Which solution supports the company's plans for a private cloud? ## Footnote 1.6 Module Quiz
Hyperconverged infrastructure ## Footnote 1.6 Module Quiz
41
Considering the shared responsibility model, which of the following scenarios best demonstrates a consumer effectively fulfilling their security responsibilities? ## Footnote 1.6 Module Quiz
A consumer regularly audits their data access logs, implements encryption, and ensures strong access controls while trusting the CSP to manage physical security ## Footnote 1.6 Module Quiz
42
A company has recently deployed a new cloud-based application. The IT team needs to ensure that the application meets the required service levels and functions correctly after deployment. Which process should the IT team focus on to achieve this? ## Footnote 1.6 Module Quiz
Post-deployment validation to confirm service levels and functionality ## Footnote 1.6 Module Quiz
43
What platforms provide a consistent experience with cloud applications? ## Footnote 1.6 Module Quiz
Windows, Linux, macOS, Android, and iOS ## Footnote 1.6 Module Quiz
44
An IT support technician discovers that a Windows-based cloud instance requires a new driver to resolve an issue. Installing the driver pertains to which step in the troubleshooting process? ## Footnote 1.6 Module Quiz
Implement the Solution ## Footnote 1.6 Module Quiz
45
A company is looking to move away from on-premises deployment of an application. They wish to move to the cloud and rapidly deploy the application without setting up or maintaining the operating system, hardware, or network. Which type of cloud service provider would best fit the company's needs? ## Footnote 1.6 Module Quiz
Platform-as-a-Service ## Footnote 1.6 Module Quiz
46
Which of the following would NOT be an example of appropriate consumer responsibility when patching cloud resources running on an infrastructure as a service (IaaS) solution? ## Footnote 1.6 Module Quiz
Patch virtual host hypervisor ## Footnote 1.6 Module Quiz
47
A company wants to migrate its existing on-premises database to the cloud but still wants to manage the database itself. Which cloud service model should they choose? ## Footnote 1.6 Module Quiz
Infrastructure as a Service (IaaS) ## Footnote 1.6 Module Quiz
48
A retail company wants to implement a system to predict future sales based on historical data. Which machine learning tool should they use, and why? ## Footnote 1.6 Module Quiz
TensorFlow, because it is an open-source library that creates, trains, and manages AI and ML applications ## Footnote 1.6 Module Quiz
49
An IT technician is revisiting an issue that was previously marked as resolved a week prior by a different technician. The cause and resolution of the issue were documented. Considering the issue has recurred, what could the previous technician have done additionally to ensure a more enduring resolution? ## Footnote 1.6 Module Quiz
Implement preventive measures to mitigate future recurrences ## Footnote 1.6 Module Quiz
50
A healthcare startup is developing an application to assist doctors in diagnosing diseases from medical images. Which tool would be most appropriate to use for this application, and why? ## Footnote 1.6 Module Quiz
Keras, because it is a neural-network API that can be used with deep neural networks ## Footnote 1.6 Module Quiz
51
A sysadmin recently set up a configuration file for a virtual machine farm that specified hardware allocation, such as memory and processing power. The sysadmin is using this template to simplify virtual machine deployment. What type of virtual machine template is the sysadmin implementing? ## Footnote 1.6 Module Quiz
Operating system ## Footnote 1.6 Module Quiz
52
You are designing a microservices-based application where Microservice-A needs to communicate with Microservice-B. Both microservices are dynamically created and destroyed based on workload demands. Which approach should you take to ensure Microservice-A can reliably find Microservice-B? ## Footnote 2.1.6 Lesson Review
Use a service registry where Microservice-B registers itself and Microservice-A queries it ## Footnote 2.1.6 Lesson Review
53
What term is used to describe how microservices find each other in a dynamic environment? ## Footnote 2.1.6 Lesson Review
Service discovery ## Footnote 2.1.6 Lesson Review
54
Given the benefits of microservices, which scenario would most likely benefit from adopting a microservices architecture? ## Footnote 2.1.6 Lesson Review
A new cloud-based application requiring frequent updates and scalability ## Footnote 2.1.6 Lesson Review
55
What is the primary characteristic of serverless architectures? ## Footnote 2.1.6 Lesson Review
They abstract hardware, operating system, and service maintenance away from developers ## Footnote 2.1.6 Lesson Review
56
Which design pattern would be more efficient for processing large amounts of data in parallel, and why? ## Footnote 2.1.6 Lesson Review
Fan-out/fan-in, because it allows multiple functions to run simultaneously and aggregate results ## Footnote 2.1.6 Lesson Review
57
What is a function in the context of serverless architectures? ## Footnote 2.1.6 Lesson Review
A single programmatic capability triggered by an event ## Footnote 2.1.6 Lesson Review
58
What is the main focus of cloud-native design? ## Footnote 2.1.6 Lesson Review
To maximize the benefits and strengths of cloud services ## Footnote 2.1.6 Lesson Review
59
What is a primary characteristic of traditional applications? ## Footnote 2.1.6 Lesson Review
They are closely tied to operating systems and supporting infrastructure ## Footnote 2.1.6 Lesson Review
60
Which technology is associated with cloud-native design? ## Footnote 2.1.6 Lesson Review
DevOps and Continuous Integration and Continuous Delivery (CI/CD) principles ## Footnote 2.1.6 Lesson Review
61
Which of the following is a potential advantage of cloud-native designs? ## Footnote 2.1.6 Lesson Review
Higher availability ## Footnote 2.1.6 Lesson Review
62
Your company, Tech Innovators Inc., is planning to migrate its IT infrastructure to the cloud. The company requires a solution that offers high scalability and does not want to invest in managing physical hardware. However, the company also needs to ensure that its cloud resources are isolated from other companies for security reasons. Which cloud deployment model should Tech Innovators Inc. choose? ## Footnote 2.2.10 Lesson Review
Virtual Private Cloud (VPC) ## Footnote 2.2.10 Lesson Review
63
What is a key characteristic of a Virtual Private Cloud (VPC)? ## Footnote 2.2.10 Lesson Review
It involves logical isolation within a public cloud provider's infrastructure ## Footnote 2.2.10 Lesson Review
64
Which cloud service provider offers scalable and quickly deployable resources and is known for simplicity? ## Footnote 2.2.10 Lesson Review
Digital Ocean ## Footnote 2.2.10 Lesson Review
65
A company is moving to rebuild its primary business application and wants to minimize the cost of ownership and maintenance. The company is looking towards moving its application to the cloud. Security and regulatory restrictions are not important as the application does not handle confidential information. What cloud option would best suit their needs? ## Footnote 2.2.10 Lesson Review
Public ## Footnote 2.2.10 Lesson Review
66
Which of the following is a reason an organization might choose to implement a private cloud? ## Footnote 2.2.10 Lesson Review
To comply with industry regulations and ensure data security ## Footnote 2.2.10 Lesson Review
67
What is multitenancy in the context of cloud computing? ## Footnote 2.2.10 Lesson Review
Multiple consumers share computing resources ## Footnote 2.2.10 Lesson Review
68
A sysadmin needs to deploy a cloud application that does not rely on a single vendor. The sysadmin requires greater flexibility and disaster mitigation. Which cloud option best fits this need? ## Footnote 2.2.10 Lesson Review
Multi-cloud ## Footnote 2.2.10 Lesson Review
69
Which of the following is a use case for hybrid cloud solutions? ## Footnote 2.2.10 Lesson Review
Disaster recovery ## Footnote 2.2.10 Lesson Review
70
Which of the following scenarios best justifies the use of a community cloud over a public cloud? ## Footnote 2.2.10 Lesson Review
A group of healthcare organizations needing to share sensitive patient data securely ## Footnote 2.2.10 Lesson Review
71
Which of the following BEST describes a Hybrid Cloud deployment model? ## Footnote 2.2.10 Lesson Review
A combination of two or more private, public, or community deployments ## Footnote 2.2.10 Lesson Review
72
Which environment is primarily used for validating cloud applications and services? ## Footnote 2.3.8 Lesson Review
Staging environment ## Footnote 2.3.8 Lesson Review
73
A company is experiencing issues with their rolling deployment strategy, where updates are causing unexpected downtime. What could be a potential reason for this issue? ## Footnote 2.3.8 Lesson Review
Lack of proper testing and analysis during the updates ## Footnote 2.3.8 Lesson Review
74
Which scenario would be least suitable for an in-place deployment strategy? ## Footnote 2.3.8 Lesson Review
A mission-critical application that requires high availability ## Footnote 2.3.8 Lesson Review
75
How does an in-place deployment strategy differ from a canary deployment strategy? ## Footnote 2.3.8 Lesson Review
In-place deployments do not require changes to the underlying infrastructure ## Footnote 2.3.8 Lesson Review
76
In one part of the IT environment, programmers code various projects (such as web apps), detect bugs, manage code versions, and implement code-level security. In which part of the IT environment does this occur? ## Footnote 2.3.8 Lesson Review
Development ## Footnote 2.3.8 Lesson Review
77
A critical aspect of cloud computing is the ability to protect data and allow access to the right users to that data. A sysadmin just set up secure shell (SSH) access to the back end of an application server with 256-bit encryption. What category of business requirement was the sysadmin specifically targeting? ## Footnote 2.3.8 Lesson Review
Security ## Footnote 2.3.8 Lesson Review
78
A cloud technician has constructed and hardened an image but needs to make incremental changes and frequently push due to a highly dynamic development environment. What stage of the build is the image at? ## Footnote 2.3.8 Lesson Review
Canary ## Footnote 2.3.8 Lesson Review
79
A company is about to release a new accounting software. The company would like to begin follow-up versions of the software as the current version is immediately released to maximize development and market efficiency. What best characterizes how this company plans to iterate its software development and release schedule? ## Footnote 2.3.8 Lesson Review
Blue-Green model ## Footnote 2.3.8 Lesson Review
80
An organization prepares to release a cloud-based service to the public. In which environment do engineers perform quality assurance testing? ## Footnote 2.3.8 Lesson Review
Staging ## Footnote 2.3.8 Lesson Review
81
Considering the need for automation in application releases to avoid human error, which DevOps practice is the MOST critical for achieving reliable deployments? ## Footnote 2.3.8 Lesson Review
Continuous Integration/Continuous Deployment (CI/CD) ## Footnote 2.3.8 Lesson Review
82
A company is planning to migrate its on-premises application to the cloud. They want to ensure that the application is thoroughly tested for performance and security before making it available to end-users. Which sequence of environments should the company use to achieve this goal? ## Footnote 2.5 Module Quiz
Development environment > Staging environment > Production environment ## Footnote 2.5 Module Quiz
83
In a rolling deployment, what role do load balancers or cluster managers play? ## Footnote 2.5 Module Quiz
They direct traffic to updated systems gradually ## Footnote 2.5 Module Quiz
84
Which of the following storage solutions is used in private clouds? ## Footnote 2.5 Module Quiz
Internal Storage Area Network (SAN) solutions ## Footnote 2.5 Module Quiz
85
Which environment is primarily used for validating cloud applications and services? ## Footnote 2.5 Module Quiz
Staging environment
86
A development team is tasked with creating a new application that needs to be highly scalable and quickly adaptable to changes. They are debating between a traditional monolithic design and a cloud-native design. Which aspects should they analyze to make the BEST decision? ## Footnote 2.5 Module Quiz
The need for loosely coupled components ## Footnote 2.5 Module Quiz
87
Which cloud service provider offers scalable and quickly deployable resources and is known for simplicity? ## Footnote 2.5 Module Quiz
Digital Ocean ## Footnote 2.5 Module Quiz
88
What is the main focus of cloud-native design? ## Footnote 2.5 Module Quiz
To maximize the benefits and strengths of cloud services ## Footnote 2.5 Module Quiz
89
A multinational corporation needs to ensure that its cloud services are highly available and can withstand regional outages. They also need to comply with various data sovereignty laws that require data to be stored within specific countries. Which cloud deployment model should they consider and why? ## Footnote 2.5 Module Quiz
Hybrid Cloud, because it can combine the benefits of both private and public clouds ## Footnote 2.5 Module Quiz
90
How do service consumers find service providers in a microservices architecture? ## Footnote 2.5 Module Quiz
By querying a service registry ## Footnote 2.5 Module Quiz
91
A real estate investment company has multiple applications used to manage resident information and work orders. Some of their applications need increased security and others do not. Which cloud option best allows a company to maintain costs, allow for some applications to be more security-conscious, and other applications to be less security-conscious? ## Footnote 2.5 Module Quiz
Hybrid ## Footnote 2.5 Module Quiz
92
A sysadmin is doing a business needs assessment to see where gaps are in the company. After completing detailed research, the sysadmin received the main improvement feedback, easier user interface, better scalability, and easier cloud reporting. What type of business need should the sysadmin focus on? ## Footnote 2.5 Module Quiz
Software ## Footnote 2.5 Module Quiz
93
What is a key characteristic of a Virtual Private Cloud (VPC)? ## Footnote 2.5 Module Quiz
It involves logical isolation within a public cloud provider's infrastructure ## Footnote 2.5 Module Quiz
94
Which type of storage is an option for VM instances? ## Footnote 3.1.16 Lesson Review
* Network-attached storage (NAS) * Solid-state Drive (SSD) ## Footnote 3.1.16 Lesson Review
95
Which of the following strategies would be most effective for a company primarily concerned with protecting its intellectual property? ## Footnote 3.1.16 Lesson Review
Implementing a private or hybrid cloud environment ## Footnote 3.1.16 Lesson Review
96
A designer working from a remote office location is experiencing latency issues while rendering and exporting company designs on a graphics editing application. Currently, the designer utilizes office resources back at the main data center. What would best allow the designer to leverage faster performance from the remote location? ## Footnote 3.1.16 Lesson Review
Pass through vGPU ## Footnote 3.1.16 Lesson Review
97
An entertainment company deploys a virtual server farm for a cloud-based gaming event. Which configuration do engineers use to ensure the highest visual experience possible? ## Footnote 3.1.16 Lesson Review
Pass-through graphics processing unit ## Footnote 3.1.16 Lesson Review
98
How would engineers reconfigure memory for a server instance using AWS? ## Footnote 3.1.16 Lesson Review
Change the instance type ## Footnote 3.1.16 Lesson Review
99
A cloud administrator is creating instances for databases that data scientists will use to manage big data analytics. What is the best type of optimization the administrator should consider for these instances? ## Footnote 3.1.16 Lesson Review
Memory-optimized ## Footnote 3.1.16 Lesson Review
100
Which of the following scenarios best demonstrates the effective use of cloud virtual networks for a growing e-commerce business? ## Footnote 3.1.16 Lesson Review
The business integrates its cloud-based virtual network with its on-premises network to ensure seamless communication and scalability ## Footnote 3.1.16 Lesson Review
101
A network technician would like to configure a series of virtual machines that possess the highest possible speed and efficiency. What controlling device should the technician install to manage this high-speed virtualization? ## Footnote 3.1.16 Lesson Review
Type 1 hypervisor ## Footnote 3.1.16 Lesson Review
102
A server administrator requested new hardware to run a new SharePoint farm on multiple virtual machines (VMs). The hardware must be expandable and combine compute, storage, and network resources into a single component for easier management. What type of solution is the administrator most likely going to deploy for this SharePoint farm? ## Footnote 3.1.16 Lesson Review
Hyperconverged infrastructure ## Footnote 3.1.16 Lesson Review
103
Considering the general steps outlined for deploying a t2.micro instance on AWS, which step would you evaluate as the most critical for ensuring the security of the instance? ## Footnote 3.1.16 Lesson Review
Defining authentication key pairs, network settings, and storage requirements ## Footnote 3.1.16 Lesson Review
104
Given the shift from CapEx to OpEx in cloud services, how might a company evaluate the financial impact of moving to a cloud-based infrastructure? ## Footnote 3.1.16 Lesson Review
By assessing the scalability and flexibility benefits against the potential increase in operational costs ## Footnote 3.1.16 Lesson Review
105
A cloud engineer configures virtualized services for a new cloud-based application rollout. Which resource area does the engineer focus attention on to determine general I/O functionality requirements? ## Footnote 3.1.16 Lesson Review
Compute ## Footnote 3.1.16 Lesson Review
106
An organization needs to periodically adjust the resources allocated to their VMs based on changing business requirements and performance data. What is the BEST approach for the sysadmin to manage these adjustments in AWS? ## Footnote 3.1.16 Lesson Review
Change the instance type while the instance is powered off to resize memory or vCPU configurations ## Footnote 3.1.16 Lesson Review
107
Which of the following is an example of a nation-specific compliance requirement? ## Footnote 3.1.16 Lesson Review
FedRAMP ## Footnote 3.1.16 Lesson Review
108
A company experiences frequent interruptions in employee access to organizational data, which is impacting productivity. They currently rely on a single server for their database and web services. Which solution best addresses the company's need for uninterrupted employee access to data? ## Footnote 3.1.16 Lesson Review
Implementing server clusters to ensure availability of all components ## Footnote 3.1.16 Lesson Review
109
A cloud consultant arrives at a Fortune 500 company to help devise their migration strategy to the cloud. Which of the following migrations are the most common that the consultant will need to help prepare for them? ## Footnote 3.2.5 Lesson Review
Physical to virtual ## Footnote 3.2.5 Lesson Review
110
What is the final phase of the cloud migration process? ## Footnote 3.2.5 Lesson Review
Optimization and Security ## Footnote 3.2.5 Lesson Review
111
Your company currently uses a multi-cloud environment with services hosted in AWS for web applications and Azure for developer Platform as a Service (PaaS). The management is considering consolidating all services into a single CSP to simplify administration and reduce costs. Which of the following should be analyzed first to determine the feasibility of this consolidation? ## Footnote 3.2.5 Lesson Review
The compatibility of existing applications and services with the chosen CSP ## Footnote 3.2.5 Lesson Review
112
Engineers at an organization prepare for cloud migration. The services that will move are internal and proprietary in nature. What migration type and cloud type result from this move? ## Footnote 3.2.5 Lesson Review
On premises-to-cloud, Private cloud ## Footnote 3.2.5 Lesson Review
113
Which cloud migration strategy involves making some modifications to an application to take advantage of cloud benefits, but does not require a complete redevelopment? ## Footnote 3.2.5 Lesson Review
Replatforming ## Footnote 3.2.5 Lesson Review
114
A company is considering moving its data to a new cloud service provider. Which factor should be given the highest priority to minimize the risk of vendor lock-in? ## Footnote 3.3.9 Lesson Review
The new provider's support for open standards ## Footnote 3.3.9 Lesson Review
115
Given the need to migrate a large amount of data with minimal downtime, which factor should be prioritized to ensure a successful migration? ## Footnote 3.3.9 Lesson Review
Speed of the data transfer ## Footnote 3.3.9 Lesson Review
116
Your organization has experienced downtime due to a single data center failure. To prevent this in the future, what should your organization do when migrating to the cloud? ## Footnote 3.3.9 Lesson Review
Implement redundant systems and failover solutions across multiple regions ## Footnote 3.3.9 Lesson Review
117
Which of the following best explains why service availability generally increases when migrating applications to the cloud? ## Footnote 3.3.9 Lesson Review
Cloud providers support immense networks and data centers that optimize uptime and quick access ## Footnote 3.3.9 Lesson Review
118
What is one of the platform requirements to confirm when considering cloud service providers? ## Footnote 3.3.9 Lesson Review
Virtual machine (VM) compute resources ## Footnote 3.3.9 Lesson Review
119
Which of the following strategies would be most effective in ensuring continuous access to cloud-hosted resources for both employees and customers? ## Footnote 3.3.9 Lesson Review
Using a backup ISP and designing robust access control mechanisms ## Footnote 3.3.9 Lesson Review
120
Your company is transitioning to cloud services and you are tasked with reducing the environmental impact of your IT operations. Which of the following actions should you implement to achieve this goal? ## Footnote 3.3.9 Lesson Review
Utilize cloud service providers that invest in renewable energy resources ## Footnote 3.3.9 Lesson Review
121
What is a key consideration regarding data storage when migrating to cloud services? ## Footnote 3.3.9 Lesson Review
Data sovereignty and compliance with local regulations ## Footnote 3.3.9 Lesson Review
122
What should organizations do to optimize cloud hosting costs? ## Footnote 3.3.9 Lesson Review
Work with the service provider ## Footnote 3.3.9 Lesson Review
123
Given the need for a highly flexible and cost-effective cloud deployment, which billing model would be most appropriate? ## Footnote 3.3.9 Lesson Review
Spot ## Footnote 3.3.9 Lesson Review
124
An organization needs to periodically adjust the resources allocated to their VMs based on changing business requirements and performance data. What is the BEST approach for the sysadmin to manage these adjustments in AWS? ## Footnote 3.5 Module Quiz
Change the instance type while the instance is powered off to resize memory or vCPU configurations ## Footnote 3.5 Module Quiz
125
A cloud architect plans a big migration for a company that wants to keep the migration fast and easy. Which of the following application types would provide this type of migration? ## Footnote 3.5 Module Quiz
Rehosting ## Footnote 3.5 Module Quiz
126
Your company currently uses a multi-cloud environment with services hosted in AWS for web applications and Azure for developer Platform as a Service (PaaS). The management is considering consolidating all services into a single CSP to simplify administration and reduce costs. Which of the following should be analyzed first to determine the feasibility of this consolidation? ## Footnote 3.5 Module Quiz
The compatibility of existing applications and services with the chosen CSP ## Footnote 3.5 Module Quiz
127
Which of the following is a reason for a business to deploy a private or hybrid cloud environment? ## Footnote 3.5 Module Quiz
To retain greater control over proprietary data and intellectual property ## Footnote 3.5 Module Quiz
128
What is a characteristic of object storage that makes it less suitable for databases? ## Footnote 3.5 Module Quiz
It is not efficient for writing tasks ## Footnote 3.5 Module Quiz
129
An AWS technician is provisioning six virtual servers to assist with an anticipated increase in workload. Each server's processor possesses eight cores. Using standard vCPU provisioning and multi-threading, how many total threads will the technician utilize in this effort? ## Footnote 3.5 Module Quiz
96 ## Footnote 3.5 Module Quiz
130
What is a common prerequisite for using migration tools to perform a P2V migration? ## Footnote 3.5 Module Quiz
The physical server must have remote management capabilities like RDP or SSH enabled ## Footnote 3.5 Module Quiz
131
A company has an application hosted in a single data center in North America. They are considering migrating to the cloud to improve service availability. Analyze the following scenarios and determine which one best illustrates the benefit of cloud migration for global service availability. ## Footnote 3.5 Module Quiz
After migration, the application is hosted in multiple data centers across North America, Europe, and Asia, allowing users to access the application from the nearest data center ## Footnote 3.5 Module Quiz
132
An organization is considering a cloud-to-cloud migration to consolidate its services from AWS and Azure to Google Cloud Platform (GCP). Which of the following factors should be most critically evaluated before proceeding with the migration? ## Footnote 3.5 Module Quiz
The cost implications and potential downtime during the migration process ## Footnote 3.5 Module Quiz
133
A server administrator requested new hardware to run a new SharePoint farm on multiple virtual machines (VMs). The hardware must be expandable and combine compute, storage, and network resources into a single component for easier management. What type of solution is the administrator most likely going to deploy for this SharePoint farm? ## Footnote 3.5 Module Quiz
Hyperconverged infrastructure ## Footnote 3.5 Module Quiz
134
A company is considering migrating its data to a cloud service. The data is currently stored in a file storage system and needs to be accessible over the network. Which cloud service tool should the company use to ensure a smooth migration? ## Footnote 3.5 Module Quiz
AWS Storage Gateway ## Footnote 3.5 Module Quiz
135
Your organization is currently using a private cloud with a specific hypervisor. The development team wants to test applications on a different hypervisor provided by a cloud service provider (CSP) without disrupting the current setup. ## Footnote 3.5 Module Quiz
Virtual to Virtual (V2V), because it allows for migrating VMs between different hypervisors ## Footnote 3.5 Module Quiz
136
You are tasked with developing a cloud-native application that involves multiple microservices. One of the requirements is that the application must scale dynamically based on the workload. Which design principle should you apply to ensure that the microservices can communicate effectively as they scale? ## Footnote 3.6 Checkpoint Review
Implement a service discovery mechanism ## Footnote 3.6 Checkpoint Review
137
An organization prepares to release a cloud-based service to the public. In which environment do engineers perform quality assurance testing? ## Footnote 3.6 Checkpoint Review
Staging ## Footnote 3.6 Checkpoint Review
138
What is the primary focus of in-place deployments? ## Footnote 3.6 Checkpoint Review
Eliminating infrastructure changes ## Footnote 3.6 Checkpoint Review
139
A company is using a rolling deployment to update its database servers. After updating the first few servers, they notice a performance degradation in the application. What could be the most likely cause of this performance issue? ## Footnote 3.6 Checkpoint Review
The updated servers are not properly integrated with the load balancer ## Footnote 3.6 Checkpoint Review
140
Assess the importance of regulatory and compliance considerations in cloud migration. Which of the following actions would best ensure compliance with data sovereignty and residency requirements? ## Footnote 3.6 Checkpoint Review
Conducting thorough research and managing data according to local regulations ## Footnote 3.6 Checkpoint Review
141
Which cloud migration strategy involves making some modifications to an application to take advantage of cloud benefits, but does not require a complete redevelopment? ## Footnote 3.6 Checkpoint Review
Replatforming ## Footnote 3.6 Checkpoint Review
142
Which method places content near users who need it? ## Footnote 3.6 Checkpoint Review
Using content delivery networks (CDNs) ## Footnote 3.6 Checkpoint Review
143
An administrator is attempting to login to an Amazon Web Services EC2 virtual machine instance. As technical support lead, plan the first step of the troubleshooting process. ## Footnote 3.6 Checkpoint Review
Identify the problem ## Footnote 3.6 Checkpoint Review
144
Which design pattern would be more efficient for processing large amounts of data in parallel, and why? ## Footnote 3.6 Checkpoint Review
Fan-out/fan-in, because it allows multiple functions to run simultaneously and aggregate results ## Footnote 3.6 Checkpoint Review
145
A company wants to migrate its existing on-premises database to the cloud but still wants to manage the database itself. Which cloud service model should they choose? ## Footnote 3.6 Checkpoint Review
Infrastructure as a Service (IaaS) ## Footnote 3.6 Checkpoint Review
146
An application developer would like to work on new versions for a recent gaming app release. To streamline operations, the developer will use a separate virtual machine (VM) from their primary VM due to better sound and graphics quality. Which of the following options would facilitate better performance while remaining at a relatively cheap price? ## Footnote 3.6 Checkpoint Review
Shared vGPU ## Footnote 3.6 Checkpoint Review
147
An organization is considering a cloud-to-cloud migration to consolidate its services from AWS and Azure to Google Cloud Platform (GCP). Which of the following factors should be most critically evaluated before proceeding with the migration? ## Footnote 3.6 Checkpoint Review
The cost implications and potential downtime during the migration process ## Footnote 3.6 Checkpoint Review
148
A systems administrator responded to an important web service crashing. They analyzed logs to determine the issue, restarted the service, and were able to verify system functionality. What is the next step the administrator should take? ## Footnote 3.6 Checkpoint Review
Implement preventative measures ## Footnote 3.6 Checkpoint Review
149
An organization is evaluating different vendors for their new hyperconverged infrastructure deployment. They need a solution that supports hybrid cloud environments and integrates well with their existing VMware vSphere setup. Which vendor should the organization consider and why? ## Footnote 3.6 Checkpoint Review
VMware, because it offers an HCI hybrid cloud solution that works with vSphere ## Footnote 3.6 Checkpoint Review
150
What is one benefit of migrating applications to the cloud? ## Footnote 3.6 Checkpoint Review
Increased service availability ## Footnote 3.6 Checkpoint Review
151
Which of the following is a benefit of microservices? ## Footnote 3.6 Checkpoint Review
Easier scalability ## Footnote 3.6 Checkpoint Review
152
Which of the following strategies would be most effective in ensuring continuous access to cloud-hosted resources for both employees and customers? ## Footnote 3.6 Checkpoint Review
Using a backup ISP and designing robust access control mechanisms ## Footnote 3.6 Checkpoint Review
153
A company, TechSecure, is using a cloud service provider (CSP) to host its sensitive customer data. The CSP ensures robust physical security for its data centers. However, TechSecure recently experienced a data breach due to weak user access controls. Based on the shared responsibility model, what was the primary cause of the data breach at TechSecure? ## Footnote 3.6 Checkpoint Review
TechSecure did not implement strong enough user access controls for their data ## Footnote 3.6 Checkpoint Review
154
An Apache administrator receives several calls that the website is no longer accessible. Which of the following should the administrator do at this point? ## Footnote 3.6 Checkpoint Review
* Identify changes * Question the user that performed the changes ## Footnote 3.6 Checkpoint Review
155
Your organization is currently using a private cloud with a specific hypervisor. The development team wants to test applications on a different hypervisor provided by a cloud service provider (CSP) without disrupting the current setup. ## Footnote 3.6 Checkpoint Review
Virtual to Virtual (V2V), because it allows for migrating VMs between different hypervisors ## Footnote 3.6 Checkpoint Review
156
An engineer configures cloud storage access for a variety of data purposes. Which access type is appropriate for frequently used project files? ## Footnote 4.1.10 Lesson Review
Hot ## Footnote 4.1.10 Lesson Review
157
A team migrating its data to a new cloud component requires the fastest, most efficient read-write storage, and expense is not a primary concern. Which of the following formats would best suit this team? ## Footnote 4.1.10 Lesson Review
Block ## Footnote 4.1.10 Lesson Review
158
Systems administrators need to configure cloud storage to handle large amounts of audio and video data that will be accessed frequently. The solution should be scalable and provide highly detailed metadata. Which storage type will provide the required capabilities? ## Footnote 4.1.10 Lesson Review
Object ## Footnote 4.1.10 Lesson Review
159
A backup administrator is researching options to store backup data in the cloud. Other than the cloud's potential to become an offsite storage solution in a disaster recovery scenario, what would not benefit from using a Storage as a Service (STaaS) cloud subscription? ## Footnote 4.1.10 Lesson Review
* Vendor lock-in * Data control ## Footnote 4.1.10 Lesson Review
160
An organization has tasked a cloud administrator with provisioning storage for a new technical team. The team will be directly supporting various business elements across the company, and, as such, the company has prioritized performance over cost savings. The business elements operate out of geographically disparate locations, so the most demanding periods are often followed by slower, less resource-intensive workloads. Which of the following solutions would make the most sense for the administrator to implement? ## Footnote 4.1.10 Lesson Review
Thick storage ## Footnote 4.1.10 Lesson Review
161
A cloud administrator is experiencing high latency in their storage system. Which factor should they prioritize addressing to improve performance, and why? ## Footnote 4.1.10 Lesson Review
Reduce the queue depth, because fewer queued requests will decrease wait times ## Footnote 4.1.10 Lesson Review
162
A large organization is updating its technology infrastructure by department. Currently, administrators manage all IT assets via server closets in an isolated building on the organization's campus. Following the most business-critical departments, the organizational leadership would like to reduce expenditures and streamline operations by migrating its sales and marketing teams. Which available method would make the most sense? ## Footnote 4.1.10 Lesson Review
On-premises to cloud ## Footnote 4.1.10 Lesson Review
163
A research team is working on a project that involves processing large datasets. The team needs an instance type that provides substantial local storage capacity to store these datasets and is cost-effective. Performance is not the highest priority, but storage capacity and cost savings are crucial. Which AWS instance type should the research team choose? ## Footnote 4.1.10 Lesson Review
d2.xlarge ## Footnote 4.1.10 Lesson Review
164
An enterprise is planning to archive a large amount of historical data that is rarely accessed but must be retained for regulatory compliance. They need a cost-effective storage solution. Which storage option should they choose? ## Footnote 4.1.10 Lesson Review
sc1 ## Footnote 4.1.10 Lesson Review
165
A cloud administrator must ensure a thick-provisioned cloud allocation does not exceed a certain storage amount until a given point in a billing period. This is to prevent overuse prior to the busiest period of the month. How could the administrator configure the client so that storage does not exceed self-imposed limits? ## Footnote 4.1.10 Lesson Review
Set a hard quota ## Footnote 4.1.10 Lesson Review
166
A storage technician needs a fast and efficient means of storage and doesn't mind the cost. Which of the following storage solutions would best suit the technician's needs? ## Footnote 4.3 Module Quiz
Block ## Footnote 4.3 Module Quiz
167
To control costs, an administrator needs to set storage quotas for file shares on a Windows cloud-based server. What options exist to set quotas? ## Footnote 4.3 Module Quiz
* By partition * By user * By group ## Footnote 4.3 Module Quiz
168
A cloud administrator is experiencing high latency in their storage system. Which factor should they prioritize addressing to improve performance, and why? ## Footnote 4.3 Module Quiz
Reduce the queue depth, because fewer queued requests will decrease wait times ## Footnote 4.3 Module Quiz
169
A cloud administrator must ensure a thick-provisioned cloud allocation does not exceed a certain storage amount until a given point in a billing period. This is to prevent overuse prior to the busiest period of the month. How could the administrator configure the client so that storage does not exceed self-imposed limits? ## Footnote 4.3 Module Quiz
Set a hard quota ## Footnote 4.3 Module Quiz
170
Which of the following is a potential solution to service and application issues in cloud environments? ## Footnote 5.1.10 Lesson Review
Update the software to the current version ## Footnote 5.1.10 Lesson Review
171
A server technician is considering oversubscribing cloud instances as they set up a new environment. What issues would this lead to? ## Footnote 5.1.10 Lesson Review
Performance degradation ## Footnote 5.1.10 Lesson Review
172
A cloud virtualization manager working for a publicly traded software company is performing capacity planning for a migration to a new cloud service provider (CSP) during the new CSP's free-trial period of service and is considering how to most efficiently measure network capacity and resource utilization. Determine the best single source for monitoring cloud resource utilization including CPU, GPU, memory utilization, and network capacity including bandwidth and latency, all in one display interface. ## Footnote 5.1.10 Lesson Review
Cloud management console ## Footnote 5.1.10 Lesson Review
173
Your company has deployed a cloud-based application in Region A. After deployment, you discover that a critical service required for your application is not available in Region A due to geopolitical restrictions. What should be your first step in analyzing and addressing this issue? ## Footnote 5.1.10 Lesson Review
Check the service provider's regional service list to confirm the unavailability ## Footnote 5.1.10 Lesson Review
174
Which factor would you prioritize when selecting a region for deploying a cloud service, and why? ## Footnote 5.1.10 Lesson Review
The geopolitical stability of the region ## Footnote 5.1.10 Lesson Review
175
Which of the following is a potential solution if a standard user cannot access a resource they should be authorized to? ## Footnote 5.1.10 Lesson Review
Check if the account is a member of the necessary group or role ## Footnote 5.1.10 Lesson Review
176
A server technician is attempting to migrate services to the cloud but the migration fails. What should the technician check? ## Footnote 5.1.10 Lesson Review
* Version compatibility * Legacy application * Remote administration enabled ## Footnote 5.1.10 Lesson Review
177
Your organization experiences a sudden cloud service outage. Initial checks reveal that the local power and Internet are functioning correctly. What should be your next step in analyzing the outage? ## Footnote 5.1.10 Lesson Review
Check failover and fault-tolerant systems for functionality ## Footnote 5.1.10 Lesson Review
178
Your cloud-deployed application is experiencing performance issues. You suspect API throttling might be the cause. How would you evaluate this hypothesis? ## Footnote 5.1.10 Lesson Review
Check the API source for throttling and request an increase if justified ## Footnote 5.1.10 Lesson Review
179
Evaluate the rationale behind combining deprecated services with other offerings. Which statement best justifies this approach? ## Footnote 5.1.10 Lesson Review
It helps in maintaining a streamlined and cost-effective service portfolio ## Footnote 5.1.10 Lesson Review
180
A company is experiencing frequent service outages with their cloud provider, which is affecting their business operations. They have already reviewed the service level agreement (SLA) details. What should they analyze next to understand the cause of the service outages? ## Footnote 5.2.9 Lesson Review
Confirm Application Programming Interface (API) request limits ## Footnote 5.2.9 Lesson Review
181
Which cloud service provider feature can help avoid unexpected costs? ## Footnote 5.2.9 Lesson Review
AWS CloudWatch monitoring service ## Footnote 5.2.9 Lesson Review
182
A mid-sized company is evaluating its cloud service options and is considering either a subscription model or a pay-as-you-go model for their virtual machine (VM) instances. They anticipate fluctuating compute power requirements throughout the year. Which approach should they consider and why? ## Footnote 5.2.9 Lesson Review
Choose a pay-as-you-go model to match fluctuating requirements ## Footnote 5.2.9 Lesson Review
183
What is one benefit of on-premises virtualization? ## Footnote 5.2.9 Lesson Review
It allows administrators to increase or decrease compute capacity more easily ## Footnote 5.2.9 Lesson Review
184
What type of report benefits from resource tagging by showing utilization without billing the business unit? ## Footnote 5.2.9 Lesson Review
Showback report ## Footnote 5.2.9 Lesson Review
185
What can organizations do with the utilization information provided by resource metering? ## Footnote 5.2.9 Lesson Review
Optimize costs by configuring resources ## Footnote 5.2.9 Lesson Review
186
Which process is described as a continuous analysis of cloud utilization to balance performance and cost? ## Footnote 5.2.9 Lesson Review
Rightsizing ## Footnote 5.2.9 Lesson Review
187
What is one of the benefits of using managed cloud service providers CSPs? ## Footnote 5.2.9 Lesson Review
They offer specific subscription options to maximize your cloud budget ## Footnote 5.2.9 Lesson Review
188
Which cloud billing model allows you to access unused compute capacity at a significant discount but without guaranteed availability? ## Footnote 5.2.9 Lesson Review
Spot instance ## Footnote 5.2.9 Lesson Review
189
A network administrator investigates inflated costs for cloud resources provided by a cloud service provider (CSP) at the direction of the company's Chief Financial Officer (CFO). Suggest an avenue of investigation the administrator can take to determine the reasons for the high costs. ## Footnote 5.2.9 Lesson Review
Check the billing and account dashboard provided by the CSP ## Footnote 5.2.9 Lesson Review
190
A server technician is considering oversubscribing cloud instances as they set up a new environment. What issues would this lead to? ## Footnote 5.4 Module Quiz
Performance degradation ## Footnote 5.4 Module Quiz
191
A company has received a higher-than-expected bill from their cloud service provider. They suspect that unused instances might be accruing compute costs. What action should they take to address this issue? ## Footnote 5.4 Module Quiz
Check the billing and accounting dashboard for unused instances ## Footnote 5.4 Module Quiz
192
What type of report benefits from resource tagging by showing utilization without billing the business unit? ## Footnote 5.4 Module Quiz
Showback report ## Footnote 5.4 Module Quiz
193
What should be considered if the storage capacity is under-utilized in a cloud environment? ## Footnote 5.4 Module Quiz
Billing console for drive space that's no longer necessary ## Footnote 5.4 Module Quiz
194
A network administrator investigates inflated costs for cloud resources provided by a cloud service provider (CSP) at the direction of the company's Chief Financial Officer (CFO). Suggest an avenue of investigation the administrator can take to determine the reasons for the high costs. ## Footnote 5.4 Module Quiz
Check the billing and account dashboard provided by the CSP ## Footnote 5.4 Module Quiz
195
Your organization experiences a sudden cloud service outage. Initial checks reveal that the local power and Internet are functioning correctly. What should be your next step in analyzing the outage? ## Footnote 5.4 Module Quiz
Check failover and fault-tolerant systems for functionality ## Footnote 5.4 Module Quiz
196
A startup company has moved its e-commerce platform to a cloud service provider. The platform experiences significant fluctuations in traffic, with high peaks during sales events and low activity during off-peak times. The IT team wants to ensure that the platform remains cost-effective while maintaining performance during peak times. What strategy should the IT team implement to manage the fluctuating workload effectively? ## Footnote 5.4 Module Quiz
Regularly monitor and adjust resource allocations based on traffic patterns and performance data ## Footnote 5.4 Module Quiz
197
What should you check first when determining the scope of a cloud service outage? ## Footnote 5.4 Module Quiz
Regional or local power and Internet outages ## Footnote 5.4 Module Quiz
198
A company is planning to deploy multiple virtual machines (VMs) for a new cloud-based application. They want to ensure that all VMs have identical hardware configurations to maintain consistency and simplify management. Which approach should the company take? ## Footnote 6.1.9 Lesson Review
Use configuration files as templates to create the VMs ## Footnote 6.1.9 Lesson Review
199
Why might cloud service providers offer options to duplicate or clone VMs? ## Footnote 6.1.9 Lesson Review
To provide redundancy, clustering, or backups ## Footnote 6.1.9 Lesson Review
200
What process improvement benefits would an organization realize by allowing developers to create their own development environments from templates in the cloud, rather than having to wait for on-premises administrators to create the environments for them? ## Footnote 6.1.9 Lesson Review
* Faster deployments * Streamlined processes for greater efficiency ## Footnote 6.1.9 Lesson Review
201
A small business is evaluating its storage options for a new project that requires a simple, cost-effective solution for storing data locally on individual workstations. The project does not require high scalability or the ability to share storage directly with other services. The business is considering Direct Attached Storage (DAS), Network Attached Storage (NAS), Storage Area Network (SAN), and Cloud Storage. Considering the business's requirements for a simple and cost-effective local storage solution, which storage option should they choose and why? ## Footnote 6.1.9 Lesson Review
Direct Attached Storage (DAS), because it is easy to install and configure for local storage needs ## Footnote 6.1.9 Lesson Review
202
What is one of the main advantages of using a Storage Area Network (SAN) over Network Attached Storage (NAS)? ## Footnote 6.1.9 Lesson Review
SANs provide greater scalability, fault tolerance, and performance ## Footnote 6.1.9 Lesson Review
203
What is one of the key advantages of virtual machines (VMs) over traditional physical servers? ## Footnote 6.1.9 Lesson Review
VMs offer more flexibility and scalability ## Footnote 6.1.9 Lesson Review
204
Considering the benefits and disadvantages of overlay networks, which scenario would most justify their implementation? ## Footnote 6.1.9 Lesson Review
A large enterprise requiring extensive network segmentation and scalability ## Footnote 6.1.9 Lesson Review
205
What is the first step in creating a new virtual machine (VM) in the cloud? ## Footnote 6.1.9 Lesson Review
Set name, region, and availability zone options ## Footnote 6.1.9 Lesson Review
206
A sysadmin is setting up a small mockup of a project for a chat feature of their customer-facing services. The project will not necessarily need to focus on processors or memory when setting up virtual machines. The sysadmin does need to ensure connectivity and the ability to store potentially vast data in a system that does not have a single point of failure. What kind of function of cloud virtualization should the sysadmin NOT focus on? ## Footnote 6.1.9 Lesson Review
Compute ## Footnote 6.1.9 Lesson Review
207
A company had one of their virtual machines fail but their application is still running. They attribute this to the fact that their virtual machines that run this application are on multiple hosts. What kind of virtualization did they NOT do? ## Footnote 6.1.9 Lesson Review
Affinity ## Footnote 6.1.9 Lesson Review
208
Considering the need for persistent data storage in a containerized application, which approach would be most effective? ## Footnote 6.2.7 Lesson Review
Implement external storage solutions like volumes or bind mounts ## Footnote 6.2.7 Lesson Review
209
What is the first step in deploying containers on a local system? ## Footnote 6.2.7 Lesson Review
Selecting and installing a container engine ## Footnote 6.2.7 Lesson Review
210
A development team is setting up a new CI/CD pipeline and needs to decide on a container image registry. They want a solution that integrates seamlessly with their cloud-based infrastructure on Microsoft Azure and provides robust automation and orchestration capabilities. Which container image registry should the team choose? ## Footnote 6.2.7 Lesson Review
Azure Container Registry ## Footnote 6.2.7 Lesson Review
211
What is the syntax you need to use to pull an image from a registry using Docker? ## Footnote 6.2.7 Lesson Review
docker pull {image-name} ## Footnote 6.2.7 Lesson Review
212
Given a scenario where a company needs to ensure that data generated by containerized applications is retained even if the containers are stopped or deleted, which storage type should they implement and why? ## Footnote 6.2.7 Lesson Review
Persistent storage, because it retains data beyond the container's lifecycle ## Footnote 6.2.7 Lesson Review
213
What is the main difference between ephemeral and persistent storage in container management? ## Footnote 6.2.7 Lesson Review
Ephemeral storage does not persist between container restarts, while persistent storage does ## Footnote 6.2.7 Lesson Review
214
Your team needs to deploy a container instance in Azure for a demo application. Which steps should you follow to ensure the container is properly set up? ## Footnote 6.2.7 Lesson Review
Select to create container instance, name the container, select an image source registry, and configure network settings ## Footnote 6.2.7 Lesson Review
215
Which cloud service would you recommend for an organization that primarily uses Kubernetes for container orchestration, and why? ## Footnote 6.2.7 Lesson Review
Azure Kubernetes Service, because it is specifically designed for Kubernetes ## Footnote 6.2.7 Lesson Review
216
217
218
Which of the following is a key aspect of the cloud administrator role related to containers? ## Footnote 6.2.7 Lesson Review
Maintaining container infrastructures ## Footnote 6.2.7 Lesson Review
218
An administrator is testing the deployment of a recent software update. The administrator would like to test the update from a single workstation with a premade configuration. What is the administrator most likely utilizing for this test? ## Footnote 6.2.7 Lesson Review
Container ## Footnote 6.2.7 Lesson Review
219
Considering the benefits and limitations of relational databases, which scenario would most likely justify migrating a relational database to a cloud service provider (CSP)? ## Footnote 6.3.6 Lesson Review
A large enterprise requiring high availability, scalability, and the ability to perform complex queries on structured data ## Footnote 6.3.6 Lesson Review
220
What is the primary purpose of a primary key in a relational database? ## Footnote 6.3.6 Lesson Review
To ensure that each row in a table is unique ## Footnote 6.3.6 Lesson Review
221
An agricultural technology company collects data from IoT devices installed on farms. The data includes temperature, humidity, soil hydration, and other sensor-related information. The structure of this data is unpredictable and varies significantly from one sensor to another. The company needs a database that can efficiently store and manage this varied and unstructured data. Why would a non-relational database meet the company's needs? ## Footnote 6.3.6 Lesson Review
It stores unstructured data types and accommodates schema variability ## Footnote 6.3.6 Lesson Review
222
Which statement best justifies the suitability of using a non-relational database for a company's project that involves analyzing customer interactions and relationships on social media? ## Footnote 6.3.6 Lesson Review
Non-relational databases are designed to handle highly interconnected and flexible data structures ## Footnote 6.3.6 Lesson Review
223
What is the difference between direct migrations and cross-service migrations as managed by the AWS Database Migration Service? ## Footnote 6.3.6 Lesson Review
Direct migrations involve moving database contents within the same database design, while cross-service migrations involve data conversions between two different database engines ## Footnote 6.3.6 Lesson Review
224
An organization needs to migrate a number of large databases from an Amazon Web Services (AWS) cloud to an Azure cloud. The databases use tables to store the data and keys to link the data information. What solution will the organization use to migrate the data? ## Footnote 6.3.6 Lesson Review
Direct ## Footnote 6.3.6 Lesson Review
225
A financial services company is considering moving their on-premises database to a cloud-hosted solution. They need to ensure high availability and scalability while maintaining control over their data. What steps should they take? ## Footnote 6.3.6 Lesson Review
Build and manage their own database structure on cloud Infrastructure as a Service (IaaS) solutions ## Footnote 6.3.6 Lesson Review
226
What are the two primary types of databases? ## Footnote 6.3.6 Lesson Review
Relational and Non-relational ## Footnote 6.3.6 Lesson Review
227
What is another term used for provider-managed databases? ## Footnote 6.3.6 Lesson Review
Database as a Service (DBaaS) ## Footnote 6.3.6 Lesson Review
228
Which of the following is an advantage of self-managed databases? ## Footnote 6.3.6 Lesson Review
Control of data ## Footnote 6.3.6 Lesson Review
229
A developer is troubleshooting a Docker container that is not behaving as expected. Which command would be most appropriate to use first to gather detailed information about the container's configuration and state? ## Footnote 6.5 Module Quiz
docker container inspect ## Footnote 6.5 Module Quiz
230
An organization needs to deploy a scalable web application that requires frequent updates and minimal downtime. Which virtualization solution should they analyze for this purpose, and why? ## Footnote 6.5 Module Quiz
Containers, because they are lightweight and support microservices architecture ## Footnote 6.5 Module Quiz
231
A storage technician is preparing their cloud environment for unstructured big data solutions. Which type of database will the technician need? ## Footnote 6.5 Module Quiz
Non-relational ## Footnote 6.5 Module Quiz
232
A development team is working on a microservices architecture using containers. They need to ensure that their containerized applications can scale efficiently, manage scheduling and availability, and automate various management tasks. Which container management approach should the team adopt to achieve these goals? ## Footnote 6.5 Module Quiz
Utilize container orchestration ## Footnote 6.5 Module Quiz
233
What is the difference between direct migrations and cross-service migrations as managed by the AWS Database Migration Service? ## Footnote 6.5 Module Quiz
Direct migrations involve moving database contents within the same database design, while cross-service migrations involve data conversions between two different database engines ## Footnote 6.5 Module Quiz
234
Considering the advantages of container image registries, which scenario best justifies the transition from a public to a private registry? ## Footnote 6.5 Module Quiz
A large enterprise needing to integrate CI/CD processes securely ## Footnote 6.5 Module Quiz
235
What is the syntax you need to use to pull an image from a registry using Docker? ## Footnote 6.5 Module Quiz
docker pull {image-name} ## Footnote 6.5 Module Quiz
236
What type of network consists of physical network cables, Layer 2 switches, and Layer 3 routers? ## Footnote 6.5 Module Quiz
Standard Networks ## Footnote 6.5 Module Quiz
237
What should typically be migrated simultaneously with their back-end databases? ## Footnote 6.5 Module Quiz
Applications ## Footnote 6.5 Module Quiz
238
A company is planning to migrate its on-premises applications to a cloud-based virtual machine (VM) solution. The IT team needs to ensure that the VMs can handle fluctuating workloads efficiently. What should the team analyze to make an informed decision? ## Footnote 6.5 Module Quiz
The scalability options of the cloud-based VM solution ## Footnote 6.5 Module Quiz
239
A virtualization administrator configured nine virtual machines (VMs) on three physical hosts. Each host machine features a set of three identical VMs (file, database, and web servers). Like servers (e.g. file servers) are all configured the same way and perform the same tasks, but each server is an independent device. Which techniques have the administrator applied to support high availability? ## Footnote 6.5 Module Quiz
* Anti-affinity * Failover clusters ## Footnote 6.5 Module Quiz
240
A startup company with limited capital wants to deploy a database solution that minimizes upfront costs and allows them to pay based on usage. They also prefer not to handle maintenance tasks themselves. Which database deployment option should they choose? ## Footnote 6.5 Module Quiz
Provider-managed databases (DBaaS) ## Footnote 6.5 Module Quiz
241
A software development company is experiencing rapid growth and is planning to implement a Continuous Integration/Continuous Deployment (CI/CD) pipeline. They currently use Docker Hub for their container images but are concerned about security and management control as they scale. Which action should the company take to address their concerns while supporting their CI/CD pipeline? ## Footnote 6.6 Checkpoint Review
Transition to a private container image registry ## Footnote 6.6 Checkpoint Review
242
The Chief Information Officer (CIO) has requested that the department replace their private cloud server farm hard drives with faster ones to help asset longevity and end user experience. What kind of hard drives would they most likely be removing from the server farm? ## Footnote 6.6 Checkpoint Review
Spinning Disks ## Footnote 6.6 Checkpoint Review
243
Which of the following data organization schemes are generally recognized and utilize elements, such as tables, to maintain structured data queries? ## Footnote 6.6 Checkpoint Review
Relational databases ## Footnote 6.6 Checkpoint Review
244
What do configuration files define for virtual machines (VMs)? ## Footnote 6.6 Checkpoint Review
The hardware allocations for the VM ## Footnote 6.6 Checkpoint Review
245
What does the term "hyperconverged" refer to in the context of storage? ## Footnote 6.6 Checkpoint Review
Software-defined everything ## Footnote 6.6 Checkpoint Review
246
What does cloning a virtual machine (VM) provide? ## Footnote 6.6 Checkpoint Review
A snapshot of the VM's current configuration and data ## Footnote 6.6 Checkpoint Review
247
A company is experiencing frequent service outages with their cloud provider, which is affecting their business operations. They have already reviewed the service level agreement (SLA) details. What should they analyze next to understand the cause of the service outages? ## Footnote 6.6 Checkpoint Review
Confirm Application Programming Interface (API) request limits ## Footnote 6.6 Checkpoint Review
248
An administrator is testing the deployment of a recent software update. The administrator would like to test the update from a single workstation with a premade configuration. What is the administrator most likely utilizing for this test? ## Footnote 6.6 Checkpoint Review
Container ## Footnote 6.6 Checkpoint Review
249
Your company has deployed a cloud-based application in Region A. After deployment, you discover that a critical service required for your application is not available in Region A due to geopolitical restrictions. What should be your first step in analyzing and addressing this issue? ## Footnote 6.6 Checkpoint Review
Check the service provider's regional service list to confirm the unavailability ## Footnote 6.6 Checkpoint Review
250
What is a potential issue if services are no longer available? ## Footnote 6.6 Checkpoint Review
Cloud service providers have retired the service ## Footnote 6.6 Checkpoint Review
251
A server administrator has recently started managing a container environment in addition to the traditional on premise infrastructure. The administrator receives notice that the container services have stopped running, but other cloud resources are still available. What should the administrator check? ## Footnote 6.6 Checkpoint Review
* Compute resources * Container images valid * Container engine is running ## Footnote 6.6 Checkpoint Review
252
Given the management lifecycle of a virtual machine (VM), which of the following actions would be most appropriate if a VM consistently underperforms and fails to meet its workload requirements? ## Footnote 6.6 Checkpoint Review
Increase the VM's allocated memory and CPU resources ## Footnote 6.6 Checkpoint Review
253
You are a network administrator and have received multiple reports that users cannot access the company's intranet site. You have verified that the web server is running and the network connection is stable. What should be your next step according to the CompTIA Troubleshooting Methodology? ## Footnote 6.6 Checkpoint Review
Check the DNS settings to ensure the domain name resolves correctly ## Footnote 6.6 Checkpoint Review
254
Which of the following scenarios best demonstrates the effective use of resource metering for cost optimization in a cloud environment? ## Footnote 6.6 Checkpoint Review
A company tags resources and uses resource metering data to right-size their virtual machines, reducing costs by 20% ## Footnote 6.6 Checkpoint Review
255
What language is used to query relational databases? ## Footnote 6.6 Checkpoint Review
SQL ## Footnote 6.6 Checkpoint Review
256
You are a cloud administrator managing a data warehouse that processes large volumes of data daily. You need to choose a storage solution that balances cost and performance for these large file transactions. Which storage type should you select? ## Footnote 6.6 Checkpoint Review
Throughput-Optimized HDD ## Footnote 6.6 Checkpoint Review
257
A financial services company is considering moving their on-premises database to a cloud-hosted solution. They need to ensure high availability and scalability while maintaining control over their data. What steps should they take? ## Footnote 6.6 Checkpoint Review
Build and manage their own database structure on cloud Infrastructure as a Service (IaaS) solutions ## Footnote 6.6 Checkpoint Review
258
What type of network consists of physical network cables, Layer 2 switches, and Layer 3 routers? ## Footnote 6.6 Checkpoint Review
Standard Networks ## Footnote 6.6 Checkpoint Review
259
Considering the responsibilities of system administrators in a virtualized environment, which of the following would be the most critical task to ensure the security and functionality of the virtual machines? ## Footnote 6.6 Checkpoint Review
Configuring, maintaining, updating, and securing the OS and applications ## Footnote 6.6 Checkpoint Review
260
What type of account does Google Cloud Platform (GCP) offer for cost management and payment interface? ## Footnote 6.6 Checkpoint Review
Cloud Billing Account ## Footnote 6.6 Checkpoint Review
261
An administrator is concerned about potential security violations while connecting to a cloud VM. Which of the following best describes how SSH mitigates these concerns? ## Footnote 7.1.11 Lesson Review
SSH encrypts data from the administrator's laptop to the cloud VM, ensuring end-to-end protection ## Footnote 7.1.11 Lesson Review
262
What is another name for a Point-to-Site VPN? ## Footnote 7.1.11 Lesson Review
Remote access VPN ## Footnote 7.1.11 Lesson Review
263
If a company needs to implement a VPN solution that prioritizes strong security over speed, which protocol should they choose? ## Footnote 7.1.11 Lesson Review
OpenVPN ## Footnote 7.1.11 Lesson Review
264
Given the security advantages of SSH key-based authentication, evaluate the potential risks if an administrator fails to properly secure their private key. Which of the following is the most significant risk? ## Footnote 7.1.11 Lesson Review
Unauthorized users could gain access to the remote servers ## Footnote 7.1.11 Lesson Review
265
A tech company has developers working from various locations who need to access and manage cloud-based development environments. The company wants to ensure that the data in transit is secure and that developers can securely access the cloud resources. Which approach should the company take to secure data in transit and provide secure access for developers? ## Footnote 7.1.11 Lesson Review
Implement a virtual private network (VPN) and IPsec ## Footnote 7.1.11 Lesson Review
266
An organization is planning to integrate its on-premises network with a new cloud service provider. Which component of the network flow diagram should be critically evaluated to ensure a secure and efficient integration? ## Footnote 7.1.11 Lesson Review
The public and private cloud connections ## Footnote 7.1.11 Lesson Review
267
What is a virtual private cloud (VPC) in the context of cloud networking? ## Footnote 7.1.11 Lesson Review
An isolated network environment within a public cloud ## Footnote 7.1.11 Lesson Review
268
A developer is trying to implement security for an application but wants to implement it at a lower layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) stack. Which of the following would be a solution for the developer? ## Footnote 7.1.11 Lesson Review
IPSec ## Footnote 7.1.11 Lesson Review
269
Which of the following is a rule-based, lower-level security method generally seen as a highly secure means of communication encryption? ## Footnote 7.1.11 Lesson Review
IPsec ## Footnote 7.1.11 Lesson Review
270
Which of the following statements BEST explains why a business might choose a dedicated connection despite higher costs? ## Footnote 7.1.11 Lesson Review
The cost of dedicated connections is offset by the benefits of improved performance, security, and support ## Footnote 7.1.11 Lesson Review
271
A technician successfully pings the internet while configuring the public server component of a hybrid cloud. However, when an employee attempts to connect to the hybrid cloud's public servers, the connection fails. Which of the following might be potential causes? ## Footnote 7.2.4 Lesson Review
* ACL not updated * DNS configuration problem ## Footnote 7.2.4 Lesson Review
272
The virtual instance in one virtual private cloud (VPC) network is unable to ping a virtual instance in another VPC network. However, both instances can communicate properly with other instances in their respective VPC networks. How can a cloud administrator troubleshoot this cross communication between VPCs? ## Footnote 7.2.4 Lesson Review
* Verify ACL permits inbound rule is assigned to the correct security groups * Verify the correct security groups are assigned to the instances ## Footnote 7.2.4 Lesson Review
273
A company has reconfigured their server arrangement to group them together by units possessing the same storage and computing capabilities. If load balancing, which method would make the most sense to utilize? ## Footnote 7.2.4 Lesson Review
Round robin ## Footnote 7.2.4 Lesson Review
274
An administrator is standing up a new website and wants to prevent the instances hosting the website from becoming overwhelmed while also ensuring good performance and redundancy. How can the administrator accomplish this? ## Footnote 7.2.4 Lesson Review
Load balancer ## Footnote 7.2.4 Lesson Review
275
Which type of firewall verifies individual packets without checking the overall communications process? ## Footnote 7.2.4 Lesson Review
Stateless firewall ## Footnote 7.2.4 Lesson Review
276
The web developers are decommissioning a legacy web server on Amazon Web Services (AWS) and want to stand up a newly configured web server in the same location. The developers have not yet configured the new server's network configuration but are requesting that the cloud administrators switch over the same network settings to the new server. What should the cloud administrator do to fulfill the request? ## Footnote 7.3.7 Lesson Review
Reattach vNIC to the new server ## Footnote 7.3.7 Lesson Review
277
A company has recently expanded to occupy an additional floor in their building. They need to ensure that the new floor's network can communicate with the existing network on the other floors. Each floor has its own switch. What should the network administrator do to integrate the new floor's network with the existing network? ## Footnote 7.3.7 Lesson Review
Use a trunk connection to link the new switch with the existing switches ## Footnote 7.3.7 Lesson Review
278
What is the purpose of VLAN tagging in switches? ## Footnote 7.3.7 Lesson Review
7.3.7 Lesson ReviewTo control network communications ## Footnote 7.3.7 Lesson Review
279
What is one major disadvantage of using static routing tables in a network? ## Footnote 7.3.7 Lesson Review
They are difficult to scale ## Footnote 7.3.7 Lesson Review
280
An engineer manages a new cloud deployment. Network routers in the virtual private cloud (VPC) are configured differently depending on the router's role in the network. Which configuration type has manual route entries? ## Footnote 7.3.7 Lesson Review
Static ## Footnote 7.3.7 Lesson Review
281
Cloud engineers microsegment a network to secure sections from each other based on workload. When considering the granularity of the segments, which aspect is critical? ## Footnote 7.3.7 Lesson Review
Independent governance ## Footnote 7.3.7 Lesson Review
282
A Microsoft cloud technician has configured a VPC for a large group project and would now like to connect different, smaller projects to the VPC. What kind of network is the technician setting up? ## Footnote 7.3.7 Lesson Review
Hub-and-spoke ## Footnote 7.3.7 Lesson Review
283
A server administrator is reviewing the advantages of microsegmentation if they move to cloud-based services. Which of the following would the administrator benefit from? ## Footnote 7.3.7 Lesson Review
* Reduced attack surface * Increased containment of security breaches * Increased compliance ## Footnote 7.3.7 Lesson Review
284
Considering the role of BGP in network routing, which scenario best illustrates the importance of BGP in maintaining internet connectivity? ## Footnote 7.3.7 Lesson Review
A multinational corporation needing to route traffic efficiently between its data centers across different continents ## Footnote 7.3.7 Lesson Review
285
What is the difference between external BGP (eBGP) and internal BGP (iBGP)? ## Footnote 7.3.7 Lesson Review
eBGP is used for routing between different Autonomous Systems, while iBGP is used within a single Autonomous System ## Footnote 7.3.7 Lesson Review
286
Which of the following scenarios best justifies the use of a hub-and-spoke Virtual Private Cloud (VPC) design? ## Footnote 7.4.9 Lesson Review
An organization that requires isolated workloads for development, test, and production environments, with centralized management of common services ## Footnote 7.4.9 Lesson Review
287
Which of the following is a component that can be part of a Software-defined Network (SDN) used to create VPCs? ## Footnote 7.4.9 Lesson Review
Subnets ## Footnote 7.4.9 Lesson Review
288
A company is developing a platform to monitor the performance of client cloud data farms. The data collected is not process or memory-intensive. The platform utilizes small virtual switches to minimize costs for customers. What kind of cloud service is this mostly focused on? ## Footnote 7.4.9 Lesson Review
Network ## Footnote 7.4.9 Lesson Review
289
A cloud administrator is extending the use of VLANs in their Azure cloud environment. Which solution should the administrator use? ## Footnote 7.4.9 Lesson Review
Network virtualization using generic routing encapsulation (NVGRE) ## Footnote 7.4.9 Lesson Review
290
A network administrator needs to set up segmentation across multiple cloud platforms using various standards. Which of the following will help the administrator succeed? ## Footnote 7.4.9 Lesson Review
Generic network virtualization encapsulation (GENEVE) ## Footnote 7.4.9 Lesson Review
291
Considering cost implications, which scenario would likely be the most cost-effective for a small business with minimal cloud traffic? ## Footnote 7.4.9 Lesson Review
Relying on a single Virtual Private Cloud (VPC) without additional connections ## Footnote 7.4.9 Lesson Review
292
In which of the following circumstances would a hub-and-spoke SDN (Software Defined Networking) design be an appropriate choice? ## Footnote 7.4.9 Lesson Review
* When the organization needs to centralize the management and analysis of traffic * When the organization needs to isolate workloads ## Footnote 7.4.9 Lesson Review
293
An organization has multiple virtual machines (VMs) running in a Google Cloud Platform (GCP) Virtual Private Cloud (VPC). These VMs need to access the Internet for software updates and external data sources. The organization wants to ensure that the internal IP addresses of these VMs are not exposed to the Internet. Which GCP service should the organization use to achieve this? ## Footnote 7.4.9 Lesson Review
Google Cloud NAT ## Footnote 7.4.9 Lesson Review
294
A cloud technician is setting up an architecture that performs high availability with performance. Which of the following is best suited for the technician's needs? ## Footnote 7.4.9 Lesson Review
* Azure * CloudFront ## Footnote 7.4.9 Lesson Review
295
A website in Asia that sells inexpensive electronics and clothing has become quite popular with teenagers in the United States. What can the cloud administrator configure to ensure that network latency doesn't cause the website to load too slowly for users in the US? ## Footnote 7.4.9 Lesson Review
CDN ## Footnote 7.4.9 Lesson Review
296
Given the importance of time synchronization in network environments, which of the following scenarios would most likely result in communication issues and why? ## Footnote 7.5.5 Lesson Review
An on-premises server using its internal clock without NTP synchronization ## Footnote 7.5.5 Lesson Review
297
A private cloud user routinely uses the company workstation remotely. One day, following an extensive update, the user is suddenly unable to authenticate and thus, unable to access the network. Which of the following could be the most likely cause? ## Footnote 7.5.5 Lesson Review
NTP clock out of sync ## Footnote 7.5.5 Lesson Review
298
A network administrator is hardening a company's Domain Name Services (DNS) server by ensuring that a rogue DNS server does not try to spoof the legitimate server. Which of the following technologies will best help against this? ## Footnote 7.5.5 Lesson Review
Domain Name System Security Extensions (DNSSEC) ## Footnote 7.5.5 Lesson Review
299
Why is tracking IP address assignments critical in hybrid and multi-cloud deployments? ## Footnote 7.5.5 Lesson Review
Because it allows for the search of resources consuming a particular IP address ## Footnote 7.5.5 Lesson Review
300
After configuring a brand new network setup, a network administrator is still unable to successfully connect devices to the network. The administrator investigates and concludes that the problem is related to errors in configuring the IP address space. All IP addresses are dynamically assigned. Deduce what details the administrator may have checked to come to this conclusion. ## Footnote 7.5.5 Lesson Review
* Errors in the IP address or subnet mask * Errors in the DHCP configuration ## Footnote 7.5.5 Lesson Review
301
What type of port is designed to connect one switch to another? ## Footnote 7.6.17 Lesson Review
Trunk port ## Footnote 7.6.17 Lesson Review
302
A Windows virtual instance cannot connect to remote servers in another region in a different virtual private cloud (VPC). What command can a system administrator run to troubleshoot connectivity issues? ## Footnote 7.6.17 Lesson Review
* tracert [remote server name] * route print ## Footnote 7.6.17 Lesson Review
303
A network administrator is troubleshooting a connectivity issue in a multi-segment network. The administrator starts by pinging the remote destination, but the ping fails. The next step is to ping the next router in from that device. What should the administrator do if the ping to the next router also fails? ## Footnote 7.6.17 Lesson Review
Use the traceroute command to identify where the connectivity fails ## Footnote 7.6.17 Lesson Review
304
A company is experiencing issues with outdated routing protocols that are not updating routing tables properly in their cloud environment. The IT team needs to upgrade to modern protocols to ensure efficient routing. Which protocol should the IT team implement to replace the outdated Routing Information Protocol (RIP)? ## Footnote 7.6.17 Lesson Review
OSPF ## Footnote 7.6.17 Lesson Review
305
Given a scenario where a network administrator needs to identify unauthorized devices and services on a network, which tool would be most appropriate to use and why? ## Footnote 7.6.17 Lesson Review
Nmap, because it scans for advertised or available services ## Footnote 7.6.17 Lesson Review
306
Where do VMs hosted on servers get their time from? ## Footnote 7.6.17 Lesson Review
From the host system ## Footnote 7.6.17 Lesson Review
307
What is latency in the context of network configuration? ## Footnote 7.6.17 Lesson Review
The time between request and service, reflecting delays that impact performance and user experience ## Footnote 7.6.17 Lesson Review
308
Which of the following is listed as a potential result of network configuration errors? ## Footnote 7.6.17 Lesson Review
Configuration file errors ## Footnote 7.6.17 Lesson Review
309
Users at an organization complain that access to a new cloud service is very slow. The organization manages the service infrastructure through a contract with a CSP. As there are no on-premises servers or services, which cloud-based service areas do the engineers investigate? ## Footnote 7.6.17 Lesson Review
* Virtual infrastructure * Data location ## Footnote 7.6.17 Lesson Review
310
A company is experiencing issues with their VPN connectivity to their VPC environments. The internal IP addresses are being mishandled by NAT. Which of the following actions would be the most effective solution to address this issue? ## Footnote 7.6.17 Lesson Review
Verify and adjust NAT protocols and configuration ## Footnote 7.6.17 Lesson Review
311
Which of the following scenarios BEST explains why a device is unable to communicate outside its subnet? ## Footnote 7.6.17 Lesson Review
The device's default gateway is set to 127.0.0.1 ## Footnote 7.6.17 Lesson Review
312
A company's web application is experiencing intermittent "500 Internal Server Error" messages. What should the IT team analyze to diagnose the root cause of this issue? ## Footnote 7.6.17 Lesson Review
The web server's performance and resource utilization ## Footnote 7.6.17 Lesson Review
313
What should you confirm first when troubleshooting DNS service availability? ## Footnote 7.6.17 Lesson Review
The DNS server is powered on and the service is enabled ## Footnote 7.6.17 Lesson Review
314
What is a scope in the context of a DHCP server? ## Footnote 7.6.17 Lesson Review
A pool of available IP addresses to lease to client devices ## Footnote 7.6.17 Lesson Review
315
What should you confirm if there is limited or no connectivity to network segments or microsegments? ## Footnote 7.6.17 Lesson Review
Confirm IP address configurations ## Footnote 7.6.17 Lesson Review
316
A company has reconfigured their server arrangement to group them together by units possessing the same storage and computing capabilities. If load balancing, which method would make the most sense to utilize? ## Footnote 7.8 Module Quiz
Round robin ## Footnote 7.8 Module Quiz
317
What is a common issue that can arise if NAT is misconfigured? ## Footnote 7.8 Module Quiz
No Internet or cloud connectivity ## Footnote 7.8 Module Quiz
318
Considering the benefits of vNICs in a virtualized environment, which scenario best demonstrates their advantage in network management? ## Footnote 7.8 Module Quiz
Configuring multiple vNICs to separate data transfer traffic from network management traffic ## Footnote 7.8 Module Quiz
319
What is the primary function of network scanners? ## Footnote 7.8 Module Quiz
Scanning for advertised or available services ## Footnote 7.8 Module Quiz
320
An organization hired a new administrator to upgrade the VPN (Virtual Private Network) that employees use for off-site connections to the organization's network. The VPN is currently using PPTP (Point-to-Point Tunneling Protocol) to encapsulate the data packets and provide encryption. What tunneling protocol will the administrator implement for the upgraded VPN? ## Footnote 7.8 Module Quiz
L2TP/IPsec ## Footnote 7.8 Module Quiz
321
A sysadmin is setting up a direct private connection between the company's various locations to a cloud provider's data center. What kind of network configuration or service would best fit this work? ## Footnote 7.8 Module Quiz
Site-to-Site VPN ## Footnote 7.8 Module Quiz
322
Multiple virtual instances were deployed into a virtual private cloud (VPC) with default settings for Windows images. A cloud administrator was then able to remote console into one of them and communicate with the other instances immediately after deployment. What network service on the cloud platform made it possible for these instances to communicate with each other within the VPC? ## Footnote 7.8 Module Quiz
DHCP ## Footnote 7.8 Module Quiz
323
Which of the following scenarios best demonstrates the effectiveness of using NAT in a Virtual Private Cloud (VPC) for security purposes? ## Footnote 7.8 Module Quiz
A company uses NAT to allow multiple internal servers to access the Internet using a single public IP address, thereby hiding internal IP addresses from external threats ## Footnote 7.8 Module Quiz
324
Your company has departments that handle sensitive financial data and general marketing information. You are tasked with designing a network segmentation strategy to ensure that these two types of data are isolated from each other. Which design would be most appropriate? ## Footnote 7.8 Module Quiz
Single virtual network with subnets ## Footnote 7.8 Module Quiz
325
A network administrator notices that several devices on the network are unable to access external websites. Upon investigation, the administrator finds that these devices have IP addresses in the 169.254.0.0 range. What is the most likely cause of this issue? ## Footnote 7.8 Module Quiz
The DHCP server is not functioning properly ## Footnote 7.8 Module Quiz
326
What is a key reason for NOT using DHCP for network devices and services that must be easily and consistently found on the network? ## Footnote 7.8 Module Quiz
DHCP-assigned IP addresses may change over time ## Footnote 7.8 Module Quiz
327
Why is tracking IP address assignments critical in hybrid and multi-cloud deployments? ## Footnote 7.8 Module Quiz
Because it allows for the search of resources consuming a particular IP address ## Footnote 7.8 Module Quiz
328
A Microsoft cloud technician has configured a VPC for a large group project and would now like to connect different, smaller projects to the VPC. What kind of network is the technician setting up? ## Footnote 7.8 Module Quiz
Hub-and-spoke ## Footnote 7.8 Module Quiz
329
An Amazon Web Services (AWS) Virtual Private Cloud (VPC) in the U.S. West region has virtual instances using an IP space of 10.120.1.0/20. Another AWS VPC in the U.S. East region has virtual instances using an IP space of 172.25.10.0/24. What can a cloud administrator do to allow instances from both VPCs to communicate with each other? ## Footnote 7.8 Module Quiz
* Setup static routes to VPC route table * Setup a VPC peering connection ## Footnote 7.8 Module Quiz
330
A security administrator wants to enhance security by creating a flexible and scalable policy that separates infrastructure at the workload level. Which of the following solutions is best applicable to the administrator? ## Footnote 7.8 Module Quiz
Microsegmentation ## Footnote 7.8 Module Quiz
331
A company wants the ability to have each virtual network in a different Azure region. Which of the following network segmentations could be used? ## Footnote 7.8 Module Quiz
* Multiple virtual networks in a hub-and-spoke topology * Multiple Virtual Networks Configured as Peers ## Footnote 7.8 Module Quiz
332
Which type of systems frequently use SSH? ## Footnote 7.8 Module Quiz
Linux systems ## Footnote 7.8 Module Quiz
333
What should you check first if HTTP connections are failing? ## Footnote 7.8 Module Quiz
Ensure port 80/tcp is open on the firewall ## Footnote 7.8 Module Quiz
334
A technical manager frequently travels to remote locations for work. Most of the manager's work takes place on a company-issued laptop that connects to the company's virtual private network (VPN). What kind of connection is the manager utilizing to conduct remote work? ## Footnote 7.8 Module Quiz
Point-to-site ## Footnote 7.8 Module Quiz
335
A security administrator is providing an extra layer of protection for externally facing web servers in their demilitarized zone. They are implementing security at Layer 7 of the OSI model. Which of the following will provide protection at Layer 7? ## Footnote 7.8 Module Quiz
* Web application firewall * Intrusion detection system ## Footnote 7.8 Module Quiz
336
Which load balancing method is best for a cluster of web servers that will have variable workloads? ## Footnote 7.8 Module Quiz
Dynamic ## Footnote 7.8 Module Quiz
337
What is one advantage of using Amazon Web Services (AWS) Elastic Network Interface (ENI) in virtual machines? ## Footnote 7.8 Module Quiz
It allows the vNIC to be detached from one instance and reattached to another, maintaining its configuration ## Footnote 7.8 Module Quiz
338
An organization has implemented a hub-and-spoke VPC design. They notice that traffic between spoke networks is not being routed efficiently. What could be the reason for this issue, and how should it be addressed? ## Footnote 7.8 Module Quiz
The hub network may not be properly configured to route traffic between spoke networks, and this configuration needs to be reviewed ## Footnote 7.8 Module Quiz
339
Employees are unable to reach internal web services hosted on the on-premises cloud environment. Multiple web servers are supporting all users and users do not need to pay or register for the service. Select the best course of action in assisting these employees? ## Footnote 7.8 Module Quiz
* Check service load balancing * Check web service configuration ## Footnote 7.8 Module Quiz
340
Your company has decided to adopt a new versioning method to improve clarity and simplicity in software releases. Which practice should your team prioritize to ensure the new versioning method is effective? ## Footnote 8.1.8 Lesson Review
Be consistent with the chosen versioning method ## Footnote 8.1.8 Lesson Review
341
Which aspect of semantic versioning makes it particularly effective in communicating software updates to users and developers? ## Footnote 8.1.8 Lesson Review
Its ability to identify major, minor, and patch levels ## Footnote 8.1.8 Lesson Review
342
What is the role of testing in CI/CD-based deployment methods? ## Footnote 8.1.8 Lesson Review
To identify changes and catch failures ## Footnote 8.1.8 Lesson Review
343
Which of the following is a challenge in maintaining documentation? ## Footnote 8.1.8 Lesson Review
Challenges with writing, especially in multiple languages ## Footnote 8.1.8 Lesson Review
344
Assess the role of Configuration as Code (CaC) in a Continuous Integration/Continuous Deployment (CI/CD) pipeline. Which statement best evaluates its contribution? ## Footnote 8.1.8 Lesson Review
CaC integrates with the CI/CD pipeline to ensure consistent application settings across environments ## Footnote 8.1.8 Lesson Review
345
Which of the following scenarios best illustrates the use of Configuration as Code (CaC)? ## Footnote 8.1.8 Lesson Review
Deploying a cluster of web servers with consistent application settings ## Footnote 8.1.8 Lesson Review
346
You need to create a JSON configuration file that describes an object with three top-level properties: "apple", "color", and "taste". Which of the following JSON snippets correctly accomplishes this task? ## Footnote 8.1.8 Lesson Review
{"apple": "honeycrisp", "color": "red", "taste": "yummy"} ## Footnote 8.1.8 Lesson Review
347
Which of the following is a general syntax rule for JSON files? ## Footnote 8.1.8 Lesson Review
JSON files use commas to separate data ## Footnote 8.1.8 Lesson Review
348
A technician has updated a series of drivers, however since the update, the system appears to lag and certain applications will periodically not work as expected. Which of the following is the most likely cause? ## Footnote 8.1.8 Lesson Review
The replacement drivers are generic ## Footnote 8.1.8 Lesson Review
349
Which tool includes drift detection features? ## Footnote 8.1.8 Lesson Review
Terraform ## Footnote 8.1.8 Lesson Review
350
A newly configured Ansible workflow job fails midway when trying to reconfigure a virtual instance in the cloud. Other single automation tasks targeting other instances are completing successfully. What can an IT administrator troubleshoot to resolve this issue? ## Footnote 8.2.8 Lesson Review
* Check target's startup processes * Check configuration sequence ## Footnote 8.2.8 Lesson Review
351
An orchestration workflow combines five automated steps to deploy a cloud-based conferencing server. What does an administrator ensure when using the workflow? ## Footnote 8.2.8 Lesson Review
That testing is performed between each automation step ## Footnote 8.2.8 Lesson Review
352
Which of the following practices would you recommend discontinuing to improve the security of automation scripts? ## Footnote 8.2.8 Lesson Review
Storing passwords directly in the scripts ## Footnote 8.2.8 Lesson Review
353
What is the primary difference between automation and orchestration? ## Footnote 8.2.8 Lesson Review
Automation sets a single task to run on its own, while orchestration configures a series of automated tasks to run as a workflow ## Footnote 8.2.8 Lesson Review
354
Which of the following BEST describes the effectiveness of using Docker containers versus virtual machine images for application deployment in terms of resource efficiency and deployment speed? ## Footnote 8.2.8 Lesson Review
Docker containers are more resource-efficient and faster to deploy than virtual machine images ## Footnote 8.2.8 Lesson Review
355
Which practice is CI/CD strongly tied to? ## Footnote 8.2.8 Lesson Review
DevOps ## Footnote 8.2.8 Lesson Review
356
A project manager wants to make sample configuration file templates available to the public for educational purposes. The templates should be easily accessible and downloadable by anyone on the Internet. Which type of repository should the project manager use? ## Footnote 8.2.8 Lesson Review
Public repository on GitHub ## Footnote 8.2.8 Lesson Review
357
Which of the following BEST describes the suitability of using public repositories for storing configuration file templates and samples intended for educational purposes? ## Footnote 8.2.8 Lesson Review
Highly suitable ## Footnote 8.2.8 Lesson Review
358
A cloud administrator scheduled an automation task to update a few virtual instances. The email reports for these tasks would usually arrive in the administrator's inbox after an hour. The automation logs do not show any changes in the past hour. What could be most likely wrong with the automation? ## Footnote 8.2.8 Lesson Review
The automation job did not start ## Footnote 8.2.8 Lesson Review
359
An administrator is troubleshooting a failed orchestration job. Where should the administrator check for clues as to why the workflow failed and where to begin troubleshooting efforts? ## Footnote 8.2.8 Lesson Review
The administrator should check the last successful automation job ## Footnote 8.2.8 Lesson Review
360
What is the primary function of Terraform? ## Footnote 8.3.11 Lesson Review
To orchestrate Infrastructure as Code (IaC) deployments ## Footnote 8.3.11 Lesson Review
361
What is the suitability of Kubernetes to be used by an organization to manage sensitive configuration files and secrets securely? ## Footnote 8.3.11 Lesson Review
Kubernetes is suitable because it can manage configuration files, including related secrets ## Footnote 8.3.11 Lesson Review
362
What is one of the key features of Jenkins that enhances its customization capabilities? ## Footnote 8.3.11 Lesson Review
Jenkins relies on an extensive plugin library created by its active community ## Footnote 8.3.11 Lesson Review
363
Which of the following is the MOST compelling reason for using Grafana's enterprise license over its open-source version? ## Footnote 8.3.11 Lesson Review
The enterprise license supports additional features that enhance Grafana's existing capabilities ## Footnote 8.3.11 Lesson Review
364
Which component of the ELK stack is responsible for creating visualizations and dashboards? ## Footnote 8.3.11 Lesson Review
Kibana ## Footnote 8.3.11 Lesson Review
365
Your team needs to ensure that the Docker container images for your application are always up-to-date with the latest code changes. Which feature of DockerHub should you utilize to achieve this? ## Footnote 8.3.11 Lesson Review
Automated builds ## Footnote 8.3.11 Lesson Review
366
A DevOps team is looking to streamline the deployment of applications by packaging them with all their dependencies to ensure consistency across different environments. Which tool should they prioritize implementing? ## Footnote 8.3.11 Lesson Review
Docker ## Footnote 8.3.11 Lesson Review
367
Which of the following best describes the primary advantage of using Ansible playbooks over ad hoc commands? ## Footnote 8.3.11 Lesson Review
Playbooks allow for the execution of multiple related tasks in a structured manner ## Footnote 8.3.11 Lesson Review
368
What is a common issue that can prevent Ansible configurations from being applied as expected? ## Footnote 8.3.11 Lesson Review
The server or instance is not a member of the group to which the configuration is applied ## Footnote 8.3.11 Lesson Review
369
A systems administrator is troubleshooting issues with deployment from Ansible. Which of the following should the administrator check? ## Footnote 8.3.11 Lesson Review
* Typo in configuration file * Applied to wrong group ## Footnote 8.3.11 Lesson Review
370
What is the primary purpose of version control in collaborative development environments? ## Footnote 8.4.12 Lesson Review
To maintain code integrity and track changes ## Footnote 8.4.12 Lesson Review
371
Your organization uses Docker for containerization and stores Dockerfile configurations in a Git repository. Multiple developers are working on different features and frequently update the Dockerfile. What is the best approach to ensure that changes made by different developers do not conflict and the Dockerfile remains consistent? ## Footnote 8.4.12 Lesson Review
Developers should work on separate branches and merge changes after thorough testing ## Footnote 8.4.12 Lesson Review
372
What is the primary purpose of using Git in the context of automation and configuration management? ## Footnote 8.4.12 Lesson Review
To track changes and maintain version control of files ## Footnote 8.4.12 Lesson Review
373
What is the purpose of the **git status** command? ## Footnote 8.4.12 Lesson Review
To retrieve the current status of changed files ## Footnote 8.4.12 Lesson Review
374
Which of the following is a potential drawback of using an online solution like GitHub for storing Git repositories? ## Footnote 8.4.12 Lesson Review
It may pose security risks if not properly managed ## Footnote 8.4.12 Lesson Review
375
A software developer is in the process of writing a code update for a software library with new functionality. Git is being used for version control, and scripting is being used to orchestrate automatic actions using Git commands. Deduce what the command git push does. ## Footnote 8.4.12 Lesson Review
Uploads new code to the repository ## Footnote 8.4.12 Lesson Review
376
You are responsible for managing the configuration files of multiple network devices using Ansible. How would you apply Git to ensure that the configuration files are consistently available to all Ansible servers, even on isolated network segments? ## Footnote 8.4.12 Lesson Review
Use Git to maintain a centralized repository of configuration files that Ansible servers can pull from ## Footnote 8.4.12 Lesson Review
377
What is one of the primary benefits of using Git for version control? ## Footnote 8.4.12 Lesson Review
It offers support for nonlinear and collaborative development ## Footnote 8.4.12 Lesson Review
378
You have just finished working on a new feature and committed your changes locally. You now need to share these changes with your team by updating the remote repository. What sequence of Git commands should you use to accomplish this, and why? ## Footnote 8.4.12 Lesson Review
git commit, git push ## Footnote 8.4.12 Lesson Review
379
What is the new name for the master branch in Git? ## Footnote 8.4.12 Lesson Review
main ## Footnote 8.4.12 Lesson Review
380
You are collaborating with a team on a project. One of your teammates has pushed a new branch called feature-UI to the remote repository. You need to review and test the changes locally before merging them into the main branch. Which sequence of commands should you use to analyze the changes made in the feature-UI branch? ## Footnote 8.4.12 Lesson Review
git fetch origin, git checkout feature-UI, git log ## Footnote 8.4.12 Lesson Review
381
Which Git command is used to integrate changes from one branch into another? ## Footnote 8.4.12 Lesson Review
git merge ## Footnote 8.4.12 Lesson Review
382
Considering the features of GitHub Actions, which of the following BEST describes its role in enhancing code security? ## Footnote 8.4.12 Lesson Review
GitHub Actions enhance code security by detecting vulnerabilities and secrets in the code ## Footnote 8.4.12 Lesson Review
383
What is another term for code reviews? ## Footnote 8.4.12 Lesson Review
Peer reviews ## Footnote 8.4.12 Lesson Review
384
Which of the following is a characteristic of static code review? ## Footnote 8.4.12 Lesson Review
It checks the code without executing it ## Footnote 8.4.12 Lesson Review
385
An administrator has written a Bash script to automate the process of generating daily reports. The script includes several complex commands that are not immediately understandable. How should the administrator ensure that the script is maintainable and understandable by other team members? ## Footnote 8.5.8 Lesson Review
Add comments to explain the purpose of the script and complex commands ## Footnote 8.5.8 Lesson Review
386
Which of the following is a benefit of using scripts for system administration tasks? ## Footnote 8.5.8 Lesson Review
Scripts allow for scheduling tasks to run automatically ## Footnote 8.5.8 Lesson Review
387
Which statement best describes variable assignment in a script? ## Footnote 8.5.8 Lesson Review
Variable assignment is the act of defining a variable as having a certain value ## Footnote 8.5.8 Lesson Review
388
You are writing a Bash script to compare two sets of variables. You need to ensure that var1 is greater than var2 and var3 is not equal to var4. Which of the following expressions correctly implements this logic? ## Footnote 8.5.8 Lesson Review
[ $var1 -gt $var2 ] && [ $var3 -ne $var4 ] ## Footnote 8.5.8 Lesson Review
389
Which of the following operators is used for logical negation in Bash? ## Footnote 8.5.8 Lesson Review
! ## Footnote 8.5.8 Lesson Review
390
Evaluate the following until loop script. What will be the output and why? var=1until [ $var -ge 5 ]doecho "The current number is $var."((var++))done ## Footnote 8.5.8 Lesson Review
The script will print numbers from 1 to 4 because the loop runs until var is greater than or equal to 5 ## Footnote 8.5.8 Lesson Review
391
What is the primary difference between a while loop and an until loop in Bash? ## Footnote 8.5.8 Lesson Review
A while loop executes a block of code repeatedly as long as a specified condition is true, whereas an until loop executes a block of code repeatedly until a specified condition becomes true ## Footnote 8.5.8 Lesson Review
392
You are writing a script to automate the backup of files. You have identified that the backup process involves several repetitive steps. Analyze the following code snippet and determine the best way to refactor it using functions: Original Code tar -czf backup1.tar.gz /path/to/files1 tar -czf backup2.tar.gz /path/to/files2 tar -czf backup3.tar.gz /path/to/files3 ## Footnote 8.5.8 Lesson Review
Create a function to handle the backup process and call it for each file path ## Footnote 8.5.8 Lesson Review
393
What is required to define a function in a script? ## Footnote 8.5.8 Lesson Review
A unique identifier ## Footnote 8.5.8 Lesson Review
394
What is the role of the else segment in an if.else statement in Bash scripting? ## Footnote 8.5.8 Lesson Review
To execute a block of code if the initial condition is false ## Footnote 8.5.8 Lesson Review
395
You are developing an e-commerce platform that requires real-time updates on inventory levels and user interactions. Which API would you implement to ensure efficient real-time communication between the client and server? ## Footnote 8.6.3 Lesson Review
WebSockets API ## Footnote 8.6.3 Lesson Review
396
What is a key benefit of using SOAP for web services? ## Footnote 8.6.3 Lesson Review
* Platform independence between Windows, macOS, and Linux * Programming language independence ## Footnote 8.6.3 Lesson Review
397
You are developing a new feature for an e-commerce platform that uses an event-driven architecture. The feature involves sending a promotional email to customers who add items to their online cart but do not complete the purchase within 24 hours. Which event should you use to trigger the sending of the promotional email? ## Footnote 8.6.3 Lesson Review
The event when the customer adds an item to the online cart ## Footnote 8.6.3 Lesson Review
398
Which aspect of event-driven architectures would you consider most critical for ensuring scalability in a web application? ## Footnote 8.6.3 Lesson Review
The ability to define specific triggers for events ## Footnote 8.6.3 Lesson Review
399
What is a primary characteristic of event-driven architectures? ## Footnote 8.6.3 Lesson Review
They define specific triggers to initiate communication between decoupled services and applications ## Footnote 8.6.3 Lesson Review
400
Your team is tasked with deploying a new application across multiple servers. To ensure consistency and reduce deployment time, which approach should you take? ## Footnote 8.8 Module Quiz
Use Infrastructure as Code (IaC) tools like Puppet or Chef ## Footnote 8.8 Module Quiz
401
An administrator scripted all the steps needed to create and deploy new database servers for the organization's applications. After the administrator tested the scripts to ensure they worked properly, the administrator then created a workflow to start and run all the automated steps in order. What is this an example of? ## Footnote 8.8 Module Quiz
Orchestration ## Footnote 8.8 Module Quiz
402
What is a key benefit of using SOAP for web services? ## Footnote 8.8 Module Quiz
* Platform independence between Windows, macOS, and Linux * Programming language independence ## Footnote 8.8 Module Quiz
403
Which tools rely on files that may be stored in central repositories? ## Footnote 8.8 Module Quiz
Ansible and Docker ## Footnote 8.8 Module Quiz
404
Which of the following BEST describes the impact of repeatability on disaster recovery processes? ## Footnote 8.8 Module Quiz
Repeatability simplifies disaster recovery by allowing quick restoration of configurations ## Footnote 8.8 Module Quiz
405
What symbol is used to indicate a comment in a Bash script? ## Footnote 8.8 Module Quiz
# ## Footnote 8.8 Module Quiz
406
Given a scenario where a CI/CD pipeline frequently fails during the Code Testing phase, which of the following would be the most effective first step to evaluate the root cause? ## Footnote 8.8 Module Quiz
Examine the automated test scripts for errors ## Footnote 8.8 Module Quiz
407
What is the primary purpose of Grafana? ## Footnote 8.8 Module Quiz
To provide graphs and charts based on data from compatible sources ## Footnote 8.8 Module Quiz
408
Which API allows two-way communication between a client web browser and a remote web server? ## Footnote 8.8 Module Quiz
WebSockets API ## Footnote 8.8 Module Quiz
409
An administrator is troubleshooting a failed orchestration job. Where should the administrator check for clues as to why the workflow failed and where to begin troubleshooting efforts? ## Footnote 8.8 Module Quiz
The administrator should check the last successful automation job ## Footnote 8.8 Module Quiz
410
What is the purpose of the git log command? ## Footnote 8.8 Module Quiz
To view the commit history ## Footnote 8.8 Module Quiz
411
A technician has updated a series of drivers, however since the update, the system appears to lag and certain applications will periodically not work as expected. Which of the following is the most likely cause? ## Footnote 8.8 Module Quiz
The replacement drivers are generic ## Footnote 8.8 Module Quiz
412
Which of the following BEST describes the effectiveness of using Docker containers versus virtual machine images for application deployment in terms of resource efficiency and deployment speed? ## Footnote 8.8 Module Quiz
Docker containers are more resource-efficient and faster to deploy than virtual machine images ## Footnote 8.8 Module Quiz
413
You are tasked with writing a script to automate the backup of a directory every night at midnight. Which feature of scripting would you use to achieve this, and how would you implement it? ## Footnote 8.8 Module Quiz
Scheduling; use a cron job to run the script at midnight ## Footnote 8.8 Module Quiz
414
A DevOps team is looking to streamline the deployment of applications by packaging them with all their dependencies to ensure consistency across different environments. Which tool should they prioritize implementing? ## Footnote 8.8 Module Quiz
Docker ## Footnote 8.8 Module Quiz
415
Considering the use of Git for version control in automation and configuration management, which of the following best evaluates its impact on collaboration among team members? ## Footnote 8.8 Module Quiz
Git enhances collaboration by allowing multiple team members to track and merge changes efficiently ## Footnote 8.8 Module Quiz
416
Which aspect of event-driven architectures would you consider most critical for ensuring scalability in a web application? ## Footnote 8.8 Module Quiz
The ability to define specific triggers for events ## Footnote 8.8 Module Quiz
417
What is a significant consequence of not integrating documentation management into the CI/CD process? ## Footnote 8.8 Module Quiz
Poor implementation and reduced development efficiency ## Footnote 8.8 Module Quiz
418
What is the primary purpose of version control in collaborative development environments? ## Footnote 8.8 Module Quiz
To maintain code integrity and track changes ## Footnote 8.8 Module Quiz
419
You are tasked with rebooting a Linux server named server42 using Ansible. Which of the following commands would you use? ## Footnote 8.8 Module Quiz
$ ansible server42 -a "/sbin/reboot" ## Footnote 8.8 Module Quiz
420
Your team has decided to mark significant points in the project development for easier rollbacks and version management. You need to evaluate which command would be most appropriate for this task. Which command should you use and why? ## Footnote 8.8 Module Quiz
git tag ## Footnote 8.8 Module Quiz
421
Which of the following is a Boolean operator in Bash? ## Footnote 8.8 Module Quiz
&& ## Footnote 8.8 Module Quiz
422
Your development team is working on a new microservices application that requires efficient load balancing to ensure high availability and performance. You are considering using Kubernetes for this project. Which Kubernetes feature would you use to achieve efficient load balancing for your microservices application? ## Footnote 8.8 Module Quiz
Offering load balancing capabilities ## Footnote 8.8 Module Quiz
423
Which of the following events is part of an event-driven architecture in an e-commerce purchasing system? ## Footnote 8.8 Module Quiz
The purchaser adds an item to an online cart ## Footnote 8.8 Module Quiz
424
Your organization is transitioning to a hybrid cloud environment and needs to ensure that applications can run seamlessly across different platforms. You are tasked with selecting a technology that will provide platform independence and development flexibility. Which technology should you choose and why? ## Footnote 9.1.9 Lesson Review
Common Language Infrastructure (CLI), because it provides platform independence and development flexibility ## Footnote 9.1.9 Lesson Review
425
Evaluate the security implications of using APIs for cloud resource management. Which of the following is the most critical security measure to implement, and why? ## Footnote 9.1.9 Lesson Review
Securing API access keys and limiting privileges ## Footnote 9.1.9 Lesson Review
426
A Public Key Infrastructure (PKI) administrator has been given greater responsibilities from just key management to secret management. What are some considerations that the administrator must account for that they were not already part of their responsibility? ## Footnote 9.1.9 Lesson Review
* Passwords * SSH keys * API token ## Footnote 9.1.9 Lesson Review
427
An Identity and Access Management (IAM) administrator is reviewing policies that support the overall goal. Which of the following are goals that IAM seeks to achieve? ## Footnote 9.1.9 Lesson Review
* Authentication * Authorization * Auditing ## Footnote 9.1.9 Lesson Review
428
A systems administrator is setting up permissions based on a user group, which is organized by their job role. What type of permissions structure is this? ## Footnote 9.1.9 Lesson Review
Role-based Access Control (RBAC) ## Footnote 9.1.9 Lesson Review
429
A server technician is setting up directory services for the environment. Which of the following solutions could the technician use? ## Footnote 9.1.9 Lesson Review
* Active Directory * NetIQ eDirectory * OpenLDAP ## Footnote 9.1.9 Lesson Review
430
A systems technician is creating a stronger authentication policy for critical servers. What are some authentication factors that could be used to set up a secure authentication solution? ## Footnote 9.1.9 Lesson Review
* Time * One-time password generators * Location ## Footnote 9.1.9 Lesson Review
431
How would you assess the importance of removing or disabling user accounts for former employees and contractors? ## Footnote 9.1.9 Lesson Review
It prevents unauthorized access to the system ## Footnote 9.1.9 Lesson Review
432
A company has recently undergone a reorganization, and several employees have changed roles. As an IT administrator, you need to update their access permissions. Which of the following actions should you prioritize to ensure proper account management? ## Footnote 9.1.9 Lesson Review
Update group memberships according to the new job functions ## Footnote 9.1.9 Lesson Review
433
Which of the following is a likely consequence of not disabling a user account immediately after the user leaves the company? ## Footnote 9.1.9 Lesson Review
The user may still have access to sensitive business resources ## Footnote 9.1.9 Lesson Review
434
A company has deployed a WAF to protect its web application servers. They have configured an allow list to permit traffic only from specific IP addresses. However, they notice that some legitimate traffic is being blocked. Which of the following is the most likely reason for this issue? ## Footnote 9.2.8 Lesson Review
The allow list is not properly configured to include all legitimate IP addresses ## Footnote 9.2.8 Lesson Review
435
A company has applied a virtual patch to their WAF, but it is not working as intended. Which of the following is the MOST likely reason? ## Footnote 9.2.8 Lesson Review
The virtual patch is not applied to all WAF devices ## Footnote 9.2.8 Lesson Review
436
What is the primary function of Network Security Groups (NSGs)? ## Footnote 9.2.8 Lesson Review
To filter communication between cloud resources using Access Control Lists (ACLs) ## Footnote 9.2.8 Lesson Review
437
A systems administrator wants to try and monitor a cluster of sensitive servers but has concerns that actively blocking traffic might affect critical services. Which of the following is best suited for this? ## Footnote 9.2.8 Lesson Review
Host-based intrusion detection systems (HIDSs) ## Footnote 9.2.8 Lesson Review
438
Which of the following is a characteristic of a stateless firewall? ## Footnote 9.2.8 Lesson Review
It matches individual network packets against the rules ## Footnote 9.2.8 Lesson Review
439
A security administrator is trying to increase host-based security by going with a solution that continually monitors the system for changes that indicate threats or exploits. Which of the following solutions will accomplish this? ## Footnote 9.2.8 Lesson Review
Endpoint detection and response (EDR) ## Footnote 9.2.8 Lesson Review
440
A client is using Amazon Web Services (AWS) for their cloud infrastructure and is concerned about potential DDoS attacks. They have asked you to analyze their current setup and suggest an additional service to enhance their DDoS protection. Which AWS service would you recommend to the client to enhance their DDoS protection? ## Footnote 9.2.8 Lesson Review
AWS Shield ## Footnote 9.2.8 Lesson Review
441
Which of the following BEST describes the effectiveness of using Web Application Firewalls (WAFs) in conjunction with load balancing to prevent DDoS attacks? ## Footnote 9.2.8 Lesson Review
Implementing a comprehensive DDoS protection service ## Footnote 9.2.8 Lesson Review
442
A company has recently experienced a data breach where sensitive customer information was exfiltrated by an employee who accidentally sent the data to an unauthorized external email address. The company is now looking to implement a Data Loss Prevention (DLP) solution to prevent such incidents in the future. Which of the following actions would best address the company's need to prevent accidental data exfiltration by employees? ## Footnote 9.2.8 Lesson Review
Setting up a DLP system to monitor and control data in use, in transit, and at rest ## Footnote 9.2.8 Lesson Review
443
A Hollywood company with a business model based on scouting, buying, and monetizing intellectual properties is performing a business impact analysis (BIA). They ask the technical lead to deliver a report regarding potential vulnerabilities some of their valuable files may have while at rest. Elaborate upon possible sources of vulnerability for sensitive files. ## Footnote 9.2.8 Lesson Review
* If stored data is not encrypted * If all data storage is not covered by data loss prevention (DLP) software ## Footnote 9.2.8 Lesson Review
444
A cloud administrator is developing a security posture dashboard which tracks identified risks and mitigation efforts. Which of the following does the administrator need to set up? ## Footnote 9.3.4 Lesson Review
Risk register ## Footnote 9.3.4 Lesson Review
445
Your organization has implemented a vulnerability management tool that includes agent-based scanning capabilities. You need to deploy this tool to monitor the security of your virtual machines (VMs) running Windows Server. What steps should you take to effectively use agent-based scans for monitoring your VMs? ## Footnote 9.3.4 Lesson Review
Install agents on each VM to scan for recognized vulnerabilities and report the results to a central storage area ## Footnote 9.3.4 Lesson Review
446
An administrator is installing a vulnerability scanner. In which instances can the administrator use the standard administrative console provided by the CSP? ## Footnote 9.3.4 Lesson Review
* Hybrid cloud instance * Public cloud instance ## Footnote 9.3.4 Lesson Review
447
You are a cybersecurity analyst at a company that has recently implemented a new vulnerability scanning tool. The tool uses the Security Content Automation Protocol (SCAP) to obtain feed updates. You need to ensure that the tool is correctly configured to receive the latest vulnerability information. Which action should you take to ensure the vulnerability scanning tool receives the latest updates? ## Footnote 9.3.4 Lesson Review
Configure the tool to automatically receive SCAP feed updates ## Footnote 9.3.4 Lesson Review
448
What does the Common Vulnerability Scoring System (CVSS) measure? ## Footnote 9.3.4 Lesson Review
The criticality of a vulnerability based on specific characteristics ## Footnote 9.3.4 Lesson Review
449
Which of the following statements supports the effectiveness of using automation tools in mitigating vulnerabilities? ## Footnote 9.4.10 Lesson Review
Automation tools can provide consistent configuration management and reduce human error ## Footnote 9.4.10 Lesson Review
450
Which tool is commonly used by administrators to identify misconfigurations related to open ports? ## Footnote 9.4.10 Lesson Review
Nmap ## Footnote 9.4.10 Lesson Review
451
Which of the following scenarios best demonstrates the effectiveness of a phishing attack? ## Footnote 9.4.10 Lesson Review
A user receives an email from their bank, clicks on a link, and enters their login credentials on a fake website ## Footnote 9.4.10 Lesson Review
452
Which protocol uses port number 53 for its operations? ## Footnote 9.4.10 Lesson Review
DNS ## Footnote 9.4.10 Lesson Review
453
Your company has detected a data exfiltration incident. Which of the following is the first step you should take to effectively respond to this incident? ## Footnote 9.4.10 Lesson Review
Understand what information has been taken ## Footnote 9.4.10 Lesson Review
454
What should be done first if a data exfiltration or breach is detected? ## Footnote 9.4.10 Lesson Review
Understand what information has been taken ## Footnote 9.4.10 Lesson Review
455
Which of the following BEST describes the impact of metadata on social engineering attacks? ## Footnote 9.4.10 Lesson Review
Metadata can provide attackers with detailed information about users, making social engineering attacks more convincing ## Footnote 9.4.10 Lesson Review
456
A company has noticed a sudden increase in network activity and wants to determine if this is due to unauthorized access. Which aspect of cloud event monitoring should they focus on to investigate this issue? ## Footnote 9.4.10 Lesson Review
Analyzing user account activity ## Footnote 9.4.10 Lesson Review
457
Your organization has implemented a cloud-based infrastructure. Recently, you have noticed that some systems are performing poorly and suspect they might be infected with cryptojacking software. What steps should you take to confirm and mitigate this issue? ## Footnote 9.4.10 Lesson Review
Review log files and use performance monitoring to identify abnormal system utilization ## Footnote 9.4.10 Lesson Review
458
Since a version update, a web application has turned in continuously slower performance ratings. To best fix this, which of the following components should the developer pay the most attention to? ## Footnote 9.4.10 Lesson Review
* Patterns * Baselines ## Footnote 9.4.10 Lesson Review
459
When considering identity and access management (IAM), what is the goal of authorization? ## Footnote 9.6 Module Quiz
Access ## Footnote 9.6 Module Quiz
460
Your company's website has been defaced, and you are responsible for coordinating the response. Which sequence of actions should you prioritize to effectively address the incident? ## Footnote 9.6 Module Quiz
Notify the web development team, notify impacted parties, restore the site from a known good backup, notify legal and HR departments ## Footnote 9.6 Module Quiz
461
A network technician is troubleshooting and needs to check security devices in line with network traffic. Which of the following should the technician check? ## Footnote 9.6 Module Quiz
* Web proxies * Web Application Firewalls (WAFs) * Intrusion Prevention Systems (IPSs) ## Footnote 9.6 Module Quiz
462
An organization has a policy that requires multifactor authentication (MFA) for accessing sensitive data. Sarah, an employee, tries to access a confidential financial report from her company laptop. She first enters her username and password and then receives a code on her mobile device, which she must enter to gain access. Which IAM policy is being enforced in this scenario? ## Footnote 9.6 Module Quiz
Authentication requirements for multifactor authentication ## Footnote 9.6 Module Quiz
463
A directory services administrator receives scheduled reports of users that are no longer employed with their company. What are some of the configurations that could be taken for deprovisioning accounts? ## Footnote 9.6 Module Quiz
* Reset password * Disable the account * Unlink from applications ## Footnote 9.6 Module Quiz
464
You are a cloud administrator responsible for managing the security of your organization's IaaS resources. During a routine vulnerability assessment, you discover that several virtual machines (VMs) running Red Hat Enterprise Linux (RHEL) have unpatched vulnerabilities. You need to decide the best course of action to ensure these systems meet Data Loss Prevention (DLP) and availability goals. Which of the following actions should you take to address the discovered vulnerabilities? ## Footnote 9.6 Module Quiz
Apply the necessary patches and updates to the RHEL VMs and reconfigure security baselines ## Footnote 9.6 Module Quiz
465
A security researcher has identified a new vulnerability in your company's software and reported it to Mitre. The vulnerability has been assigned the identifier CVE-2023-1234. You need to gather more information about this vulnerability to assess its impact on your systems. Which of the following steps should you take to gather comprehensive information about CVE-2023-1234? ## Footnote 9.6 Module Quiz
Check the CVE dictionary for a brief description and reference URLs ## Footnote 9.6 Module Quiz
466
Your organization has implemented a new web application server. After deployment, you need to ensure that the server is secure by verifying that only the necessary ports are open. The server should only allow web traffic and no other services. Which ports should you verify are open to meet this requirement? ## Footnote 9.6 Module Quiz
80 and 443 ## Footnote 9.6 Module Quiz
467
A Hollywood company with a business model based on scouting, buying, and monetizing intellectual properties is performing a business impact analysis (BIA). They ask the technical lead to deliver a report regarding potential vulnerabilities some of their valuable files may have while at rest. Elaborate upon possible sources of vulnerability for sensitive files. ## Footnote 9.6 Module Quiz
* If stored data is not encrypted * If all data storage is not covered by data loss prevention (DLP) software ## Footnote 9.6 Module Quiz
468
A cloud administrator extended the on-premises network to a public cloud solution in AWS. Instead of using Amazon Inspector, the administrator opted to use Burp Suite with the AWS cloud. What are some possible reasons why the administrator made this decision? ## Footnote 9.6 Module Quiz
* The administrator wanted to use the same tool for both the on-premises and cloud solutions * Burp Suite's integration into CI/CD pipelines * The administrator wanted to centralize the scanning results for auditing purposes ## Footnote 9.6 Module Quiz
469
A client is using Amazon Web Services (AWS) for their cloud infrastructure and is concerned about potential DDoS attacks. They have asked you to analyze their current setup and suggest an additional service to enhance their DDoS protection. Which AWS service would you recommend to the client to enhance their DDoS protection? ## Footnote 9.6 Module Quiz
AWS Shield ## Footnote 9.6 Module Quiz
470
A company wants to enhance its network security by ensuring that all remote command-line access is encrypted. Which protocol and port combination should they enforce? ## Footnote 9.6 Module Quiz
SSH on port 22 ## Footnote 9.6 Module Quiz
471
A company is using Nessus to scan for any weaknesses that may potentially be in the network. Which of the following solutions is Nessus? ## Footnote 9.6 Module Quiz
Vulnerability Scanners ## Footnote 9.6 Module Quiz
472
Which of the following best describes the purpose of cloud event monitoring? ## Footnote 9.6 Module Quiz
To track changes to cloud resources and ensure they align with planned deployments and baselines ## Footnote 9.6 Module Quiz
473
What is the default state of most firewalls and server operating systems regarding ports? ## Footnote 9.6 Module Quiz
All ports closed ## Footnote 9.6 Module Quiz
474
A cloud security technician needs to provide a risk assessment to the organization on the risk posture of their cloud environment. Which of the following will give the best possible view of the status of their environment? ## Footnote 9.6 Module Quiz
Credentialed scan ## Footnote 9.6 Module Quiz
475
What is the syntax used to define a function in Bash? ## Footnote 9.7 Checkpoint Review
function my_func { code; } ## Footnote 9.7 Checkpoint Review
476
You are designing a web application that needs to handle a large number of client requests efficiently. The application must be able to scale easily to accommodate increasing traffic and should be flexible enough to integrate with various front-end technologies. Which API design would be most suitable for your needs? ## Footnote 9.7 Checkpoint Review
REST API, because it is scalable and flexible ## Footnote 9.7 Checkpoint Review
477
A directory services administrator receives scheduled reports of users that are no longer employed with their company. What are some of the configurations that could be taken for deprovisioning accounts? ## Footnote 9.7 Checkpoint Review
* Reset password * Disable the account * Unlink from applications ## Footnote 9.7 Checkpoint Review
478
What is the primary advantage of using orchestration workflows for virtual machine deployments? ## Footnote 9.7 Checkpoint Review
They ensure that virtual machine deployments are consistent, repeatable, and scalable ## Footnote 9.7 Checkpoint Review
479
Your organization has implemented a vulnerability management tool that includes agent-based scanning capabilities. You need to deploy this tool to monitor the security of your virtual machines (VMs) running Windows Server. What steps should you take to effectively use agent-based scans for monitoring your VMs? ## Footnote 9.7 Checkpoint Review
Install agents on each VM to scan for recognized vulnerabilities and report the results to a central storage area ## Footnote 9.7 Checkpoint Review
480
What symbol is used to indicate a comment in a Bash script? ## Footnote 9.7 Checkpoint Review
# ## Footnote 9.7 Checkpoint Review
481
A cloud administrator is developing a security posture dashboard which tracks identified risks and mitigation efforts. Which of the following does the administrator need to set up? ## Footnote 9.7 Checkpoint Review
Risk register ## Footnote 9.7 Checkpoint Review
482
How can Git be utilized in Infrastructure as Code (IaC)? ## Footnote 9.7 Checkpoint Review
Git can serve as a repository for standardized automation and orchestration files to manage server and network device configurations ## Footnote 9.7 Checkpoint Review
483
You are developing a new feature for an e-commerce platform that uses an event-driven architecture. The feature involves sending a promotional email to customers who add items to their online cart but do not complete the purchase within 24 hours. Which event should you use to trigger the sending of the promotional email? ## Footnote 9.7 Checkpoint Review
The event when the customer adds an item to the online cart ## Footnote 9.7 Checkpoint Review
484
A security architect wants to set up permissions dynamically based on assigned functions within the company. What type of permissions structure would best suit their objective? ## Footnote 9.7 Checkpoint Review
Role-based Access Control (RBAC) ## Footnote 9.7 Checkpoint Review
485
Which of the following is an example of an artifact generated by a CI/CD workflow? ## Footnote 9.7 Checkpoint Review
Virtual machine image ## Footnote 9.7 Checkpoint Review
486
A software developer is in the process of writing a code update for a software library with new functionality. The developer is using Git for version control and scripting to orchestrate automatic upload of weekly update patches to Git. Select the Git command that would, in the automation scripts, update the main repository with the update patch. ## Footnote 9.7 Checkpoint Review
git push ## Footnote 9.7 Checkpoint Review
487
What command is used to create a Docker container from a Dockerfile? ## Footnote 9.7 Checkpoint Review
docker build imagename ## Footnote 9.7 Checkpoint Review
488
A company is reviewing its security policies to ensure compliance with the principle of least privilege. An employee needs to access the MarketingReports folder to read and edit reports and manage the printer named MarketingPrinter. The employee works Monday through Friday from 9 am to 6 pm. Which of the following scenarios BEST adheres to the principle of least privilege? ## Footnote 9.7 Checkpoint Review
The employee's account is authenticated only during work hours, and they are granted Read and Write permissions to the MarketingReports folder and Manage permission to MarketingPrinter ## Footnote 9.7 Checkpoint Review
489
A technician is installing a vulnerability scanner software for an organization. The organization wants the type of vulnerability scanner to provide vulnerability information on Windows and Linux instances and PaaS-level services. Which of the following is being used? ## Footnote 9.7 Checkpoint Review
Azure Defender and Azure Security Center ## Footnote 9.7 Checkpoint Review
490
You have defined the stages in your Jenkins pipeline, including code checkout, code builds, code tests, and deployments. However, you need to ensure that Jenkins can notify your team of build failures. What should you do? ## Footnote 9.7 Checkpoint Review
Integrate Jenkins with a notification system using plugins ## Footnote 9.7 Checkpoint Review
491
Which of the following best describes the purpose of GitHub Actions? ## Footnote 9.7 Checkpoint Review
To enable development workflows within the repository to simplify code management ## Footnote 9.7 Checkpoint Review
492
Which API allows two-way communication between a client web browser and a remote web server? ## Footnote 9.7 Checkpoint Review
WebSockets API ## Footnote 9.7 Checkpoint Review
493
An administrator has written a Bash script to automate the process of generating daily reports. The script includes several complex commands that are not immediately understandable. How should the administrator ensure that the script is maintainable and understandable by other team members? ## Footnote 9.7 Checkpoint Review
Add comments to explain the purpose of the script and complex commands ## Footnote 9.7 Checkpoint Review
494
A DevOps team is looking to streamline the deployment of applications by packaging them with all their dependencies to ensure consistency across different environments. Which tool should they prioritize implementing? ## Footnote 9.7 Checkpoint Review
Docker ## Footnote 9.7 Checkpoint Review
495
What is the primary purpose of Data Localization? ## Footnote 10.1.6 Lesson Review
Legal structures protecting citizens' personal data by keeping it within the country ## Footnote 10.1.6 Lesson Review
496
Industry requirements for datasets containing personally identifiable information (PII) raise immediate concerns for organizations in which regard? ## Footnote 10.1.6 Lesson Review
Compliance ## Footnote 10.1.6 Lesson Review
497
A financial institution is concerned about the potential exposure of personal data and intellectual property when using cloud services. The institution wants to mitigate these risks while still leveraging the benefits of cloud computing. Which of the following measures should the institution implement to address these concerns? ## Footnote 10.1.6 Lesson Review
Implement strong encryption for data at rest and in transit, and review CSP contracts for compliance with data privacy laws ## Footnote 10.1.6 Lesson Review
498
An organization has received formal notice that it must not allow any modifications to specific information within the organization. What kind of process is this? ## Footnote 10.1.6 Lesson Review
Legal hold ## Footnote 10.1.6 Lesson Review
499
A cloud service provider wants to reassure potential customers about their security stance by making their internal control reports publicly available. Which standard should the cloud service provider use to achieve this? ## Footnote 10.1.6 Lesson Review
SOC3 ## Footnote 10.1.6 Lesson Review
500
What is the primary purpose of the Payment Card Industry Data Security Standards (PCI DSS)? ## Footnote 10.1.6 Lesson Review
To define secure practices around credit and debit card transactions ## Footnote 10.1.6 Lesson Review
501
A company is facing a legal dispute and needs to implement a legal hold. They have identified several potential storage locations for relevant data. Which of the following locations should be prioritized to ensure compliance with the legal hold? ## Footnote 10.1.6 Lesson Review
Financial records stored in the company's central database ## Footnote 10.1.6 Lesson Review
502
An organization's records management group is going through the data to see what needs to be moved or deleted. What records process must they look at, which shows how long data must be kept and how to dispose of certain data when it's no longer needed? ## Footnote 10.1.6 Lesson Review
Data retention ## Footnote 10.1.6 Lesson Review
503
Which of the following BEST describes the potential risks of not having a properly configured data classification system in place within an organization? ## Footnote 10.1.6 Lesson Review
Misclassification can lead to improper handling of sensitive data, increasing the risk of security breaches ## Footnote 10.1.6 Lesson Review
504
During a security audit, a secure government datacenter discovered sensitive files to have been misclassified. Prescribes steps for troubleshooting data classification processes ## Footnote 10.1.6 Lesson Review
* Check that automated data classification processes exist and are correctly configured * Automated data classification processes are applied to the correct storage area * Manual data classification, if used, is accurate ## Footnote 10.1.6 Lesson Review
505
Given the principles of zero-trust security, which of the following approaches would be most effective in reducing the risk of unauthorized access to cloud resources? ## Footnote 10.2.13 Lesson Review
Using microsegmentation and continuous authentication verification ## Footnote 10.2.13 Lesson Review
506
An administrator is looking into security patches and noticed that applying individual patches is very time consuming; however, this one patching method combines a series of patches into a single unit. Which of the following is this method? ## Footnote 10.2.13 Lesson Review
Rollups ## Footnote 10.2.13 Lesson Review
507
You are a DevOps engineer responsible for deploying an application using Ansible playbooks. You need to ensure that the deployment process is secure and that sensitive information is not exposed. Which of the following actions should you take to securely manage SSH keys required for the deployment? ## Footnote 10.2.13 Lesson Review
Use AWS Secrets Manager to store and retrieve the SSH keys during the deployment process ## Footnote 10.2.13 Lesson Review
508
Which permission should be granted to an employee who needs to print reports from ColorPrinter7 but does not need to manage the printer? ## Footnote 10.2.13 Lesson Review
Print ## Footnote 10.2.13 Lesson Review
509
Which of the following best describes the principle of least privilege? ## Footnote 10.2.13 Lesson Review
Users should be given the minimum level of access necessary to accomplish their tasks ## Footnote 10.2.13 Lesson Review
510
An administrator is reviewing the roles and features installed on the organization's servers, comparing them to what each server's purpose is, and removing the roles and features that are unnecessary. What practice is the administrator engaged in? ## Footnote 10.2.13 Lesson Review
Hardening ## Footnote 10.2.13 Lesson Review
511
You are tasked with securing a new cloud-based object storage system for your organization. One of your primary concerns is ensuring that data at rest is protected from unauthorized access. Which of the following actions should you apply to achieve this goal? ## Footnote 10.2.13 Lesson Review
Implementing encryption for data at rest ## Footnote 10.2.13 Lesson Review
512
When a user is using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that should not change? ## Footnote 10.2.13 Lesson Review
File Integrity Monitoring (FIM) ## Footnote 10.2.13 Lesson Review
513
A user can send an encrypted email to ensure that data is accessed only to those who are authorized. What are the goals of encryption? ## Footnote 10.2.13 Lesson Review
* Confidentiality * Integrity * Non-repudiation ## Footnote 10.2.13 Lesson Review
514
A security technician is employing a hashing algorithm to transmit classified data to guarantee that there are no changes made to the data and not generate a collision. Which of the following should be applied? ## Footnote 10.2.13 Lesson Review
SHA256 ## Footnote 10.2.13 Lesson Review
515
Which of the following statements BEST describes the effectiveness of IPsec in network security compared to application-layer encryption methods like HTTPS? ## Footnote 10.2.13 Lesson Review
IPsec is more effective because it encrypts all data at the network layer, regardless of the application ## Footnote 10.2.13 Lesson Review
516
An employee saved a file to the cloud network and then made a hash of the file. Two weeks later, the employee ran another hash on the same file. When the employee compared the values of the two hashes, they were exactly the same. Which goal of encryption has the employee demonstrated? ## Footnote 10.2.13 Lesson Review
Integrity ## Footnote 10.2.13 Lesson Review
517
What is the primary security concern with running privileged containers? ## Footnote 10.2.13 Lesson Review
They can escape the container with root privileges, compromising the entire host ## Footnote 10.2.13 Lesson Review
518
Your organization is planning to deploy a new application on a public cloud platform. You are tasked with ensuring the security of this deployment. Which initial step should you take to align with CIS Benchmarks? ## Footnote 10.2.13 Lesson Review
Assess the organization's current security stance before reviewing benchmark settings ## Footnote 10.2.13 Lesson Review
519
While automating tasks for an existing cloud application, the development team working on automating the cloud application tasks write their own internal application programming interface (API). Evaluate the function of the API the team is developing in-house. ## Footnote 10.2.13 Lesson Review
To access internal resources from the main application ## Footnote 10.2.13 Lesson Review
520
Your organization has recently detected unauthorized software on several cloud VM instances. As part of the IT team, you need to analyze the situation and determine the underlying cause. Which of the following is the most likely reason for the presence of unauthorized software on these instances? ## Footnote 10.3.11 Lesson Review
Users have installation privileges on the cloud VM instances ## Footnote 10.3.11 Lesson Review
521
An organization discovers unauthorized software on several client workstations. Which of the following actions is the MOST appropriate initial step to secure the computing environment? ## Footnote 10.3.11 Lesson Review
Conduct a software audit to identify the extent of unauthorized software presence ## Footnote 10.3.11 Lesson Review
522
What should be done if vulnerabilities are found in software developed in-house? ## Footnote 10.3.11 Lesson Review
Submit a ticket to the dev team ## Footnote 10.3.11 Lesson Review
523
Which of the following actions should be taken if security audits discover software vulnerabilities? ## Footnote 10.3.11 Lesson Review
Ensure that software versions are current, match baseline requirements, and are patched ## Footnote 10.3.11 Lesson Review
524
What should be checked if there is no connectivity to one or more VM instances in a cloud deployment? ## Footnote 10.3.11 Lesson Review
Ensure the instance has the correct security group assigned ## Footnote 10.3.11 Lesson Review
525
When troubleshooting access issues to a file or folder in a Windows environment, which of the following should you consider? ## Footnote 10.3.11 Lesson Review
Whether the user is a member of the appropriate security group ## Footnote 10.3.11 Lesson Review
526
A cloud resources administrator is assisting a user with troubleshooting access issues. The user is trying to access an Amazon Web Services EC2 virtual machine (VM) instance and finds they cannot log in to that specific instance, though they can still access other instances on the server. Decide the first detail the administrator should check. ## Footnote 10.3.11 Lesson Review
Security group rules ## Footnote 10.3.11 Lesson Review
527
Which of the following is a potential reason why a Network Access Control (NAC) system is not checking all devices? ## Footnote 10.3.11 Lesson Review
The devices are not associated with the NAC system ## Footnote 10.3.11 Lesson Review
528
During a security review, it is discovered that the company's web servers are using HTTP for client connections. The security team needs to analyze the potential risks and recommend a solution. What should the team do to ensure secure web communications? ## Footnote 10.3.11 Lesson Review
Block HTTP connections and require HTTPS connections ## Footnote 10.3.11 Lesson Review
529
A company is currently using Telnet for remote access and FTP for file transfers. After evaluating the security risk associated with using these resources, which of the following is the BEST recommendation for a course of action? ## Footnote 10.3.11 Lesson Review
Replace Telnet with SSH and FTP with SFTP to enhance security ## Footnote 10.3.11 Lesson Review
530
Which issue is associated with unencrypted network traffic? ## Footnote 10.3.11 Lesson Review
Data exfiltration ## Footnote 10.3.11 Lesson Review
531
What should organizations do to ensure compliance with current security standards for cipher suites? ## Footnote 10.3.11 Lesson Review
Regularly audit their systems and update outdated connections ## Footnote 10.3.11 Lesson Review
532
Which of the following best describes the principle of least privilege? ## Footnote 10.3.11 Lesson Review
Granting users the minimum level of access necessary to perform their tasks ## Footnote 10.3.11 Lesson Review
533
A user is unable to access a cloud-based admin console. You need to apply troubleshooting steps to resolve the issue. The user confirms that their credentials are correct and that they have been assigned the appropriate role for the resource. Which of the following should be your next step? ## Footnote 10.3.11 Lesson Review
Verify that the user's group memberships are correct ## Footnote 10.3.11 Lesson Review
534
What should be considered if multifactor authentication fails? ## Footnote 10.3.11 Lesson Review
Certificates on the smart card have not expired or been revoked ## Footnote 10.3.11 Lesson Review
535
During a security review, it is discovered that the company's web servers are using HTTP for client connections. The security team needs to analyze the potential risks and recommend a solution. What should the team do to ensure secure web communications? ## Footnote 10.5 Module Quiz
Block HTTP connections and require HTTPS connections ## Footnote 10.5 Module Quiz
536
A security technician was prioritizing their data protection efforts to improve data security and regulatory compliances. The analyst identified how the information is used and what type of label should be applied (confidential, internal, use, public). How did the analyst manage this? ## Footnote 10.5 Module Quiz
Data Classification ## Footnote 10.5 Module Quiz
537
An administrator is reviewing the roles and features installed on the organization's servers, comparing them to what each server's purpose is, and removing the roles and features that are unnecessary. What practice is the administrator engaged in? ## Footnote 10.5 Module Quiz
Hardening ## Footnote 10.5 Module Quiz
538
Which protocol is used to add encryption capabilities to HTTP transfers, ensuring data confidentiality and integrity? ## Footnote 10.5 Module Quiz
HTTPS ## Footnote 10.5 Module Quiz
539
Which permission should be granted to an employee who needs to print reports from ColorPrinter7 but does not need to manage the printer? ## Footnote 10.5 Module Quiz
Print ## Footnote 10.5 Module Quiz
540
A financial institution is concerned about the potential exposure of personal data and intellectual property when using cloud services. The institution wants to mitigate these risks while still leveraging the benefits of cloud computing. Which of the following measures should the institution implement to address these concerns? ## Footnote 10.5 Module Quiz
Implement strong encryption for data at rest and in transit, and review CSP contracts for compliance with data privacy laws ## Footnote 10.5 Module Quiz
541
An administrator is using an operating system to encrypt stored data. Which of the following often necessitates the encryption of entire volumes and normally uses a computer's hardware to store encryption keys? ## Footnote 10.5 Module Quiz
Legal Hold ## Footnote 10.5 Module Quiz
542
You are responsible for securing data storage in your organization's cloud environment. Which CIS Benchmark recommendation should you apply to enhance security? ## Footnote 10.5 Module Quiz
Ensure data storage and encryption ## Footnote 10.5 Module Quiz
543
An organization has received formal notice that it must not allow any modifications to specific information within the organization. What kind of process is this? ## Footnote 10.5 Module Quiz
Legal hold ## Footnote 10.5 Module Quiz
544
Which of the following is a deprecated cipher suite that should not be used? ## Footnote 10.5 Module Quiz
SSL 3.0 ## Footnote 10.5 Module Quiz
545
A company is currently using Telnet for remote access and FTP for file transfers. After evaluating the security risk associated with using these resources, which of the following is the BEST recommendation for a course of action? ## Footnote 10.5 Module Quiz
Replace Telnet with SSH and FTP with SFTP to enhance security ## Footnote 10.5 Module Quiz
546
Industry requirements for datasets containing personally identifiable information (PII) raise immediate concerns for organizations in which regard? ## Footnote 10.5 Module Quiz
Compliance ## Footnote 10.5 Module Quiz
547
What is the primary benefit of using adaptive optimization in cloud storage? ## Footnote 11.1.11 Lesson Review
It automatically adjusts storage tiers based on data access patterns ## Footnote 11.1.11 Lesson Review
548
A server administrator is establishing metrics for cloud servers and wants to target metrics that will help analyze storage. Which of the following metrics will be the most helpful? ## Footnote 11.1.11 Lesson Review
IOPs ## Footnote 11.1.11 Lesson Review
549
What is the primary focus of orchestration optimization in workflow management? ## Footnote 11.1.11 Lesson Review
Ensuring tasks run in the right order and at the right time within the overall workflow ## Footnote 11.1.11 Lesson Review
550
A cloud service provider (CSP) is setting up a new virtualized environment for a client that requires high network throughput for their applications. The client's applications include high-performance web servers and databases that need to handle large volumes of data traffic efficiently. Which type of VM instance should the CSP apply to meet the client's requirements? ## Footnote 11.1.11 Lesson Review
Network-optimized instances ## Footnote 11.1.11 Lesson Review
551
Which of the following best describes network bandwidth? ## Footnote 11.1.11 Lesson Review
The theoretical measure of network data transfer capacity ## Footnote 11.1.11 Lesson Review
552
An engineer monitors a system for excessive system load as it relates to processes. Which metric does the engineer record when considering the number of logical processors in the system? ## Footnote 11.1.11 Lesson Review
Queue length ## Footnote 11.1.11 Lesson Review
553
What is a primary benefit of using tools like Docker and Kubernetes for container management? ## Footnote 11.1.11 Lesson Review
They help administrators deploy, manage, and optimize containers at scale ## Footnote 11.1.11 Lesson Review
554
Which of the following best describes the relationship between vCPU and the number of cores and threads in a virtual machine? ## Footnote 11.1.11 Lesson Review
vCPU = Number of cores x number of threads/core ## Footnote 11.1.11 Lesson Review
555
Which of the following statements best describes the difference between containers and serverless workloads? ## Footnote 11.1.11 Lesson Review
Serverless workloads are specific to cloud environments, while containers can run on both cloud and on-premises resources ## Footnote 11.1.11 Lesson Review
556
A company is deploying multiple service-based applications using container-optimized instances. They notice that some applications are not performing as expected. Upon investigation, they find that the applications are running, but performance is inconsistent. What should the company analyze to improve performance? ## Footnote 11.1.11 Lesson Review
The auto-scaling configuration for the container instances ## Footnote 11.1.11 Lesson Review
557
Your company's cloud-based application is experiencing intermittent performance issues. You suspect that the auto-scaling configuration might not be optimized. The application has both CPU-intensive and memory-intensive tasks. Which action would best optimize the auto-scaling configuration for this application? ## Footnote 11.2.4 Lesson Review
Configure separate auto-scaling policies for CPU and memory utilization to ensure both types of tasks are adequately supported ## Footnote 11.2.4 Lesson Review
558
Which of the following scenarios best indicates that auto-scaling is not achieving the desired results? ## Footnote 11.2.4 Lesson Review
The auto-scaling configuration is set, but the system does not scale up despite high resource utilization ## Footnote 11.2.4 Lesson Review
559
A systems administrator working for a small startup has tracked data usage and has seen certain periods that show lower activity. Which of the following would make the most sense to recommend to the company's leadership? ## Footnote 11.2.4 Lesson Review
Auto-scale based on tracked resource utilization ## Footnote 11.2.4 Lesson Review
560
The company's datacenter is set up to work with a cloud service provider (CSP) as a hybrid cloud environment. IT management wants to leverage cloud resources to support on-premises web servers during peak hours. What cloud feature or service can the company take advantage of to fulfill this requirement? ## Footnote 11.2.4 Lesson Review
Cloud bursting ## Footnote 11.2.4 Lesson Review
561
An on-premises cloud network usually has enough resources to handle all the online traffic for a busy department store. However, when the department store has special sales, the on-premises network becomes oversaturated with traffic. To mitigate this issue, the administrator configured the network to add virtual machines from a public cloud network as necessary. What type of right-sizing model does this represent? ## Footnote 11.2.4 Lesson Review
Cloud bursting ## Footnote 11.2.4 Lesson Review
562
What does tracing in cloud services primarily focus on? ## Footnote 11.3.10 Lesson Review
Providing detailed information about each step of the application's processing ## Footnote 11.3.10 Lesson Review
563
A cloud administrator wants to set up dashboard information for a holistic view of service availability, instance, and network performance, capacity planning, and incident management. Which of the following would help the administrator accomplish this? ## Footnote 11.3.10 Lesson Review
* CloudWatch * Monitor ## Footnote 11.3.10 Lesson Review
564
A cloud administrator needs to estimate the performance and stability of the cloud network's instances housing the big data databases. What process can the administrator perform to discover this information? ## Footnote 11.3.10 Lesson Review
Monitoring baseline ## Footnote 11.3.10 Lesson Review
565
What is log scrubbing primarily used for? ## Footnote 11.3.10 Lesson Review
To remove, hide, or encrypt sensitive information in log files ## Footnote 11.3.10 Lesson Review
566
A system administrator notices that the disk space on a server is rapidly decreasing. They have set up logging automation to handle such scenarios. What is the most likely action that the automation will take? ## Footnote 11.3.10 Lesson Review
Launch scripts to compress or archive data ## Footnote 11.3.10 Lesson Review
567
Which of the following methods of log aggregation would you recommend for an organization with both Linux and Windows servers, and why? ## Footnote 11.3.10 Lesson Review
Use a hybrid approach with both on-premises and cloud-based aggregation ## Footnote 11.3.10 Lesson Review
568
Which of the following best describes the primary function of the rsyslog service in a Linux system? ## Footnote 11.3.10 Lesson Review
To collect and log system, application, and user events, and forward them to a central point ## Footnote 11.3.10 Lesson Review
569
You are a cloud administrator tasked with ensuring that your organization's data is stored in the appropriate regions to comply with data residency requirements. Which report would you utilize to achieve this? ## Footnote 11.3.10 Lesson Review
Network connectivity reports ## Footnote 11.3.10 Lesson Review
570
Cloud computing offers centralized administration as a primary function. Which of the following benefits result from this type of architecture? ## Footnote 11.3.10 Lesson Review
* Environment health * Resource consumption ## Footnote 11.3.10 Lesson Review
571
Which service does AWS use for alert notifications? ## Footnote 11.3.10 Lesson Review
Simple Notification Service (SNS) ## Footnote 11.3.10 Lesson Review
572
Which of the following statements BEST supports the importance of automating testing in the update and patch process? ## Footnote 11.4.6 Lesson Review
Automating testing helps streamline the process and confirm functionality efficiently ## Footnote 11.4.6 Lesson Review
573
An administrator applies an operating system patch using data from a previous capture to a cloud VM instance, but the patch broke some of the system's functionality. How can the administrator return the system back to pre-patch configuration? ## Footnote 11.4.6 Lesson Review
The administrator can revert to the snapshot taken before patching ## Footnote 11.4.6 Lesson Review
574
A company has decided to add new Windows servers to its fleet. The model currently comprises a sizeable portion of the current fleet that has recently become unavailable for purchase, and the already-owned servers no longer receive updates. These servers are in which phase of the lifecycle? ## Footnote 11.4.6 Lesson Review
Deprecation ## Footnote 11.4.6 Lesson Review
575
A cloud administrator is migrating services from the on-premises network to the cloud network. What phase of the lifecycle roadmap does this activity fall in? ## Footnote 11.4.6 Lesson Review
Maintenance ## Footnote 11.4.6 Lesson Review
576
A security administrator is reviewing the asset inventory and identifying components that may not have been in the normal patch procedures. Which of the following might be out of band considerations for patching? ## Footnote 11.4.6 Lesson Review
* Hypervisors * Firmware ## Footnote 11.4.6 Lesson Review
577
Which update type does an engineer use to apply numerous patches to a system at one time? ## Footnote 11.4.6 Lesson Review
Rollup ## Footnote 11.4.6 Lesson Review
578
An IT department is tasked with maintaining a critical business application. They receive a notification from the software vendor about an upcoming update that will move the application from version 4.2 to 4.3. What type of update is this likely to be, and what actions should the IT department take? ## Footnote 11.4.6 Lesson Review
It is a minor update, and the IT department can expect it to include bug fixes and incremental changes ## Footnote 11.4.6 Lesson Review
579
Which of the following best describes a minor update in software versioning? ## Footnote 11.4.6 Lesson Review
It is designed to work with existing applications without changing functionality ## Footnote 11.4.6 Lesson Review
580
Your company is developing a new application that temporarily stores user session data and cached information to improve performance. What type of data management practices should you prioritize for this application, and why? ## Footnote 11.4.6 Lesson Review
Cache management and session expiration policies, because the data is ephemeral ## Footnote 11.4.6 Lesson Review
581
Which of the following practices is most critical (and why) for managing persistent data? ## Footnote 11.4.6 Lesson Review
Encryption ## Footnote 11.4.6 Lesson Review
582
A cloud administrator receives a "Suspicious activity" alert from Microsoft Azure for alerts. What are the next steps the administrator should take? ## Footnote 11.6 Module Quiz
Complete further investigation to determine the cause of the alert ## Footnote 11.6 Module Quiz
583
A company has noticed that their employees working from home are experiencing slow access to cloud services. Upon investigation, it is found that the issue is not with the home internet connections. Which of the following could be a potential cause of the slow access, and what would be the best initial step to analyze the issue? ## Footnote 11.6 Module Quiz
The company's HQ office network is congested; analyze the network topology and performance ## Footnote 11.6 Module Quiz
584
A development team is building a stateless web application that needs to scale automatically based on incoming traffic. They are considering using either containers or serverless functions. Which option should they choose and why? ## Footnote 11.6 Module Quiz
Serverless functions, because they are specific to cloud environments and support stateless applications ## Footnote 11.6 Module Quiz
585
What is the primary purpose of configuring on-premises and cloud-based servers to forward their logs to a central location? ## Footnote 11.6 Module Quiz
To make auditing and archiving easier ## Footnote 11.6 Module Quiz
586
What is a common way of testing major revisions to operating systems, services, or applications? ## Footnote 11.6 Module Quiz
Blue-green deployment environments ## Footnote 11.6 Module Quiz
587
Which of the following practices is most critical (and why) for managing persistent data? ## Footnote 11.6 Module Quiz
Encryption ## Footnote 11.6 Module Quiz
588
An administrator manages a cluster containing six virtual servers. To better accommodate peak business hours, the administrator has requested a solution that will provision additional memory to the virtual server cluster. What solutions would serve these purposes? ## Footnote 11.6 Module Quiz
* Horizontal scaling * Vertical scaling * Auto scaling ## Footnote 11.6 Module Quiz
589
A server technician is setting up a patching process for virtual machines but is worried about affecting services and availability. What is a good practice to help quickly restore services? ## Footnote 11.6 Module Quiz
* Rolling upgrades * Snapshots ## Footnote 11.6 Module Quiz
590
A cloud administrator is developing a scalability strategy for servers that are expected to anticipate change frequently. Which strategy should the administrator utilize? ## Footnote 11.6 Module Quiz
Auto-scaling ## Footnote 11.6 Module Quiz
591
To expand a marketing business, the owner asked a sysadmin to build a social media platform for clients to use for communicating with their customers. After the system was built, it kept failing to load. The owner asked the sysadmin to research how to keep the application running. What feature of cloud computing would best help resolve the application's workload issues? ## Footnote 11.6 Module Quiz
Auto-scaling ## Footnote 11.6 Module Quiz
592
Your company is developing a new application that temporarily stores user session data and cached information to improve performance. What type of data management practices should you prioritize for this application, and why? ## Footnote 11.6 Module Quiz
Cache management and session expiration policies, because the data is ephemeral ## Footnote 11.6 Module Quiz
593
What is one of the purposes of audit log retention? ## Footnote 11.6 Module Quiz
To verify Service Level Agreements (SLAs) ## Footnote 11.6 Module Quiz
594
A cloud technician is receiving an overwhelming amount of alerts regarding thresholds for the servers. Which of the following will help regulate alerts to a manageable level? ## Footnote 11.6 Module Quiz
Maintenance mode ## Footnote 11.6 Module Quiz
595
What is a primary benefit of using tools like Docker and Kubernetes for container management? ## Footnote 11.6 Module Quiz
They help administrators deploy, manage, and optimize containers at scale ## Footnote 11.6 Module Quiz
596
What is the primary benefit of using adaptive optimization in cloud storage? ## Footnote 11.6 Module Quiz
It automatically adjusts storage tiers based on data access patterns ## Footnote 11.6 Module Quiz
597
Which update type does an engineer use to apply numerous patches to a system at one time? ## Footnote 11.6 Module Quiz
Rollup ## Footnote 11.6 Module Quiz
598
A user in your organization has accidentally deleted a critical project file. You need to restore this specific file to the user's project directory without affecting other files. Which recovery type should you use? ## Footnote 12.1.11 Lesson Review
Granular File Restoral ## Footnote 12.1.11 Lesson Review
599
An administrator needs to restore data to a server, but the data owner wants to compare the files that are on the server to the restored files, to determine which version of the data to keep. What kind of restore should the administrator perform? ## Footnote 12.1.11 Lesson Review
Side-by-side restoral ## Footnote 12.1.11 Lesson Review
600
What method is commonly used to ensure data integrity during backup and restore processes? ## Footnote 12.1.11 Lesson Review
Hashing ## Footnote 12.1.11 Lesson Review
601
Your company needs to ensure compliance with industry regulations for data retention. You have been tasked with implementing a cloud backup retention policy that includes automation. Which action should you take to align with the best practices of data retention? ## Footnote 12.1.11 Lesson Review
Implement a data classification system and automate data deletion ## Footnote 12.1.11 Lesson Review
602
Which of the following BEST describes the effectiveness of a cloud backup retention policy in maintaining compliance and managing storage costs? ## Footnote 12.1.11 Lesson Review
The policy automates data deletion and backup purging ## Footnote 12.1.11 Lesson Review
603
A virtualization server copies VM snapshots to a secondary server so that it can failover to the second server if the first fails. When the data is copied, an acknowledgment of the transaction is not sent until both servers have a copy of the data. Assert a term that describes the procedure described. ## Footnote 12.1.11 Lesson Review
Synchronous replication ## Footnote 12.1.11 Lesson Review
604
Which of the following BEST describes the effectiveness of encryption for cloud backup solutions? ## Footnote 12.1.11 Lesson Review
Encryption, combined with access controls, provides a robust security solution for cloud backups ## Footnote 12.1.11 Lesson Review
605
Which type of encryption helps protect data residing on storage media? ## Footnote 12.1.11 Lesson Review
At rest encryption ## Footnote 12.1.11 Lesson Review
606
A cloud administrator is configuring a server cluster that works collectively to operate as the central database backup. The administrator would like to back up the data in such a way that results in minimal downtime while still reproducing maximum data, as new backups will be created regularly. Which method would provide the administrator with the best option? ## Footnote 12.1.11 Lesson Review
Synthetic full ## Footnote 12.1.11 Lesson Review
607
What type of backup job is not created from the original data but is aggregated from other backup jobs? ## Footnote 12.1.11 Lesson Review
Synthetic Full Backup ## Footnote 12.1.11 Lesson Review
608
Which type of storage media is known for having a good cost-to-capacity ratio and excellent long-term archive ability? ## Footnote 12.1.11 Lesson Review
Tape Media ## Footnote 12.1.11 Lesson Review
609
Why is it important to back up configuration files any time edits or configuration changes are made? ## Footnote 12.1.11 Lesson Review
It guarantees that the latest configurations are recoverable ## Footnote 12.1.11 Lesson Review
610
An organization is planning to migrate its on-premises Microsoft SQL Server to Azure Cloud SQL. Which backup method would be most appropriate for this scenario and why? ## Footnote 12.1.11 Lesson Review
Database Dumps ## Footnote 12.1.11 Lesson Review
611
Your company has recently experienced a data loss incident due to accidental file deletion. You have backups stored on a local server, a tape drive in a third-party storage facility, and in a cloud storage service. You need to restore the deleted files as quickly as possible. Which backup location should you use to restore the files most efficiently? ## Footnote 12.1.11 Lesson Review
Local server ## Footnote 12.1.11 Lesson Review
612
According to the 3-2-1 rule, why is at least one copy kept off-site? ## Footnote 12.1.11 Lesson Review
To keep it safe from on-site disasters ## Footnote 12.1.11 Lesson Review
613
A tech company has deployed hundreds of IoT sensors in a remote location to gather environmental data. They are experiencing delays in data processing due to the time it takes to send data to a centralized server. Which solution should they implement to improve data processing efficiency, and why? ## Footnote 12.2.6 Lesson Review
Implement edge computing to process data near the IoT sensors ## Footnote 12.2.6 Lesson Review
614
What is cloud bursting primarily used for? ## Footnote 12.2.6 Lesson Review
To bring additional resources online from the public cloud when on-premises resources are overwhelmed ## Footnote 12.2.6 Lesson Review
615
Which of the following BEST describes how effective NIC teaming is in a data center with frequent network interface card (NIC) failures? ## Footnote 12.2.6 Lesson Review
Highly effective, as it eliminates the NIC as a single point of failure ## Footnote 12.2.6 Lesson Review
616
Which type of load balancer is installed directly on the servers? ## Footnote 12.2.6 Lesson Review
Software load balancer ## Footnote 12.2.6 Lesson Review
617
A company is experiencing frequent outages with its current cloud service provider, which is affecting its e-commerce website's availability. The IT team is considering a multi-cloud strategy. Which of the following actions would BEST address the company's issue? ## Footnote 12.2.6 Lesson Review
Redundantly hosting the e-commerce website across multiple cloud service providers ## Footnote 12.2.6 Lesson Review
618
What is cloud-bursting? ## Footnote 12.2.6 Lesson Review
Redirecting demand spikes to cloud resources when on-premises resources are consumed ## Footnote 12.2.6 Lesson Review
619
Your organization has decided to use a warm site for disaster recovery. A recent disaster has occurred, and you need to get the warm site operational. What steps should you take to ensure the warm site is ready to resume business operations? ## Footnote 12.2.6 Lesson Review
Migrate data and configure additional equipment ## Footnote 12.2.6 Lesson Review
620
An organization has plans to lease an off-site complex capable of running operations in the event of a disaster scenario. The location is far away from any remotely likely natural disasters or mass power outages but, it will not house any of the essential hardware or data. Which of the following is this organization establishing? ## Footnote 12.2.6 Lesson Review
Cold site ## Footnote 12.2.6 Lesson Review
621
Top level engineers compile a document to address disaster recovery management techniques. Of interest to stakeholders is the recovery time objective (RTO). How do engineers describe this metric? ## Footnote 12.2.6 Lesson Review
The time needed to maintain an organization's business continuity ## Footnote 12.2.6 Lesson Review
622
While deploying an online eCommerce server, an organization states that in the event of a system crash, 8-10 hours of data loss is all that it can tolerate. When documenting a disaster recovery plan, engineers use this information for which metric? ## Footnote 12.2.6 Lesson Review
RPO ## Footnote 12.2.6 Lesson Review
623
Top level engineers compile a document to address disaster recovery management techniques. Of interest to stakeholders is the recovery time objective (RTO). How do engineers describe this metric? ## Footnote 12.4 Module Quiz
The time needed to maintain an organization's business continuity ## Footnote 12.4 Module Quiz
624
A financial services company needs to ensure that their online banking services remain available even during regional power outages. Which cloud computing feature should they utilize to achieve this, and how should it be implemented? ## Footnote 12.4 Module Quiz
Deploy services across multiple availability zones within a region ## Footnote 12.4 Module Quiz
625
Which type of load balancer is installed directly on the servers? ## Footnote 12.4 Module Quiz
Software load balancer ## Footnote 12.4 Module Quiz
626
What do data retention policies govern? ## Footnote 12.4 Module Quiz
The duration data must be stored and the maximum time it can be retained ## Footnote 12.4 Module Quiz
627
A user in your organization has accidentally deleted a critical project file. You need to restore this specific file to the user's project directory without affecting other files. Which recovery type should you use? ## Footnote 12.4 Module Quiz
Granular File Restoral ## Footnote 12.4 Module Quiz
628
While deploying an online eCommerce server, an organization states that in the event of a system crash, 8-10 hours of data loss is all that it can tolerate. When documenting a disaster recovery plan, engineers use this information for which metric? ## Footnote 12.4 Module Quiz
RPO ## Footnote 12.4 Module Quiz
629
An organization has decided to migrate part of its cloud solution housing client PII to an on-site storage area. Which of the following is the most likely reason for this migration? ## Footnote 12.4 Module Quiz
Security concerns ## Footnote 12.4 Module Quiz
630
Which type of encryption helps protect data residing on storage media? ## Footnote 12.4 Module Quiz
At rest encryption ## Footnote 12.4 Module Quiz