Categories
CV0-002 Dumps

CV0-002 Real Exam Dumps Questions and answers 51-60

Get Full Version of the Exam
http://www.EnsurePass.com/CV0-002.html

Question No.51

A new private cloud platform is being deployed by an engineer. SLA requirements state that any clusters should have a baseline redundancy sufficient to handle the failure of at least two hosts. The engineer records the following metrics after the deployment:

image

Which of the following metrics is MOST likely to represent a violation of SLA?

  1. RAM utilization

  2. NIC utilization

  3. CPU utilization

  4. Disk utilization

Correct Answer: D

Question No.52

A development team released a new version of an application and wants to deploy it to the cloud environment with a faster rollback and minimal downtime. Which of the following should the cloud administrator do to achieve this goal?

  1. Use a rolling deployment to update all the servers in the PROD cloud environment with the new application. To switch to the previous version, repeat the process.

  2. Deploy the application to the PROD cloud environment and the previous version to QA. To switch to the previous version, promote the QA environment to PROD.

  3. Deploy the application to a subset of servers in the environment and route traffic to these servers. To switch to the previous version, change the route to the non-updated servers.

  4. Deploy the application to a staging environment and force a failover to this environment. To restore the previous version, create a backup and restore from the previous night#39;s backup.

Correct Answer: A

Question No.53

A company is implementing a SaaS solution with a large user base. SaaS solution licensing is user based, and user management is critical to keep the cost in check. Which of the following is the MOST efficient way to meet this requirement?

  1. Have the administrator of the SaaS solution keep track of user activities.

  2. Have a nightly upload to the SaaS provider of the current user base based on API call.

  3. Have users remove their SaaS accounts when they no longer need the service.

  4. Have a weekly user management script maintain the SaaS user base.

Correct Answer: A

Question No.54

Due to a competitor#39;s unlimited data plan, a service provider is struggling and wants to transform its business services to be more hosting oriented. A cloud architect is tasked to review current cloud resource capacity and provide recommendations and a plan for better resource utilization. Given the following report:

image

Which of the following is the BEST option for the architect to suggest?

  1. Downsize by migrating all media services to one server and decommission two servers.

  2. Downsize by decommissioning servers 2 and 3 and reallocate media servers to hosts.

  3. Downsize by migrating all media services to one server, add one host server, and decommission one server.

  4. Upsize the hosting services by turning server 1 into a host server.

Correct Answer: A

Question No.55

A company is migrating some of its consumer-facing services to a cloud provider. The company has been getting more customers since its competitors have gone bankrupt. Which of the following actions would BEST meet the company#39;s increased resource needs?

  1. Increase the company#39;s network bandwidth to 10Gbps.

  2. Install additional load balancers.

  3. Deploy additional web servers to the cloud.

  4. Deploy a local database within the company#39;s datacenter.

Correct Answer: B

Question No.56

cloud administrator uses a script to automatically restart all the servers running in the public cloud provider environment, which hosts e-commerce applications. The administrator decides to implement the same script for a similar environment that hosts the finance applications. After verifying the script is deployed to the public cloud environment for finance, the administrator schedules a job to run at 9:00 a.m. After 9:00 a.m., the administrator receives a report from the e- commerce team that the application is experiencing outages. Which of the following should the administrator do to resolve the issue?

  1. Update the version of the CLI tool for the public cloud provider.

  2. Copy the script up to a bastion host in the environment and run it from there.

  3. Validate the access credentials for the cloud provider are correct.

  4. Debug the script and modify it to remove the flawed logic.

Correct Answer: C

Question No.57

A small clinic is moving its health and accounting systems to a SaaS solution. The clinic holds patient- and business-sensitive information. Which of the following is the company expected to do to protect its data?

  1. Document, configure, and enforce strong account management policies.

  2. Disable and document unneeded ports and protocols on the SaaS servers.

  3. Install antivirus and disable unneeded services on all SaaS servers.

  4. Harden the underlying infrastructure: servers, firewalls, and load balancers.

Correct Answer: B

Question No.58

A cloud administrator for a state government agency is tasked with giving access to the voter registration application to a government agency in another state. Only authorized officials from each state should access the application. These agencies have a common environment where applications have been deployed in the past. Which of the following should the cloud administrator do to give access to the application?

  1. Deploy part of the application into a public cloud and establish secure connections to a private cloud environment.

  2. Deploy the application to a community cloud that is shared with multiple state government agencies only.

  3. Deploy the application to a public cloud and implement ACLs and security access policies to limit access.

  4. Deploy the application to the state#39;s private cloud and give authentication credentials to the other state#39;s authorized officials.

Correct Answer: C

Question No.59

After scheduled network maintenance, users report that an externally hosted web application is particularly slow to load. Small items on the page load such as text documents and markup, but larger multimedia files do not load. Which of the following is the MOST likely cause of the reported issues?

  1. Incorrect MTU in the network segment

  2. Misconfiguration of QoS settings

  3. Incorrect VLAN for the affected PCs

  4. Excessive latency on the local LAN segment

Correct Answer: B

Question No.60

A user has submitted a ticket to request additional VMs due to long wait times for online ordering. Given the snapshot of the resources in the table below:

image

Which of the following is the BEST option for the administrator to resolve the ticket?

  1. Add vCPU to the database server to increase capacity.

  2. Add disks to the database server to increase capacity.

  3. Add virtual network ports to the web server to increase capacity.

  4. Add memory to the web server to increase capacity.

Correct Answer: D

Get Full Version of CV0-002 Dumps

Categories
CV0-002 Dumps

CV0-002 Real Exam Dumps Questions and answers 61-70

Get Full Version of the Exam
http://www.EnsurePass.com/CV0-002.html

Question No.61

An application server, which uses a SaaS fax provider, is determined to cost too much money. An upgrade to the application allows for use of a physical fax card so the company only has to pay for a phone line. This is a production application; therefore, downtime must be minimized. Which of the following types of migration is MOST efficient in facilitating this application upgrade?

  1. Virtual-to-physical migration

  2. Storage migration

  3. Cloud migration

  4. Offline migration

Correct Answer: A

Question No.62

A cloud administrator is tasked with ensuring redundancy and high availability of an IaaS cloud platform environment. The administrator is given the following requirements:

image

image

Two web servers must share the same configurations and service client connections evenly. Two database servers must share data and configurations, with only one being used at a time.

Given the above, which of the following should the administrator propose to BEST meet these requirements? (Select TWO).

  1. The web server should be configured with a round-robin DNS with a CNAME record.

  2. The web server should be configured with a load balancer with a virtual IP address.

  3. The database server should be configured as an active-active cluster.

  4. The database server should be configured as an active-passive cluster.

  5. The availability aspect of the request does not currently exist in the IaaS cloud platform.

  6. The redundancy aspect of the request does not currently exist in the IaaS cloud platform.

Correct Answer: AD

Question No.63

A cloud architect created a new delivery controller for a large VM farm to scale up according to organizational needs. The old and new delivery controllers now form a cluster. However, the new delivery controller returns an error when entering the license code. Which of the following is the MOST likely cause?

  1. A firewall is blocking the port on the license server.

  2. The existing license is for a lower version.

  3. The existing license is not supported for clusters.

  4. The existing license has expired.

Correct Answer: A

Question No.64

A manufacturing company#39;s current security policy mandates PII is not stored in the SaaS solution. Which of the following configuration controls should be used to block sensitive information from being stored in the SaaS solution?

  1. Implement file-level encryption.

  2. Implement a network ACL.

  3. Implement an IPS.

  4. Implement content filtering.

Correct Answer: B

Question No.65

A multinational corporation needs to migrate servers, which are supporting a national defense project, to a new datacenter. The data in question is approximately 20GB in size. The engineer

on the project is considering datacenters in several countries as possible destinations. All sites in consideration are on a high-speed MPLS network (10Gb connections). Which of the following environmental constraints is MOST likely to rule out a possible site as an option?

  1. Downtime impact

  2. Legal restrictions

  3. Peak time frames

  4. Bandwidth

Correct Answer: B

Question No.66

A technician is configuring a new web application to be highly available. The technician has configured multiple web servers in different availability zones at a public cloud provider. The application requires users to be directed to the same server each time they visit. Which of the following network components is MOST likely to accomplish this?

  1. Network firewall

  2. Intrusion prevention system

  3. Global load balancer

  4. Virtual private network

Correct Answer: D

Question No.67

An administrator is deploying a new application platform with the following resource utilization:

image

Company policy requires that no resource utilization surpasses 80%. Which of the following resources will need to be upgraded prior to deployment?

  1. Disk

  2. IOPS

  3. CPU

  4. Network

  5. RAM

Correct Answer: A

Question No.68

An engineer is configuring the monitoring for a new application server. During the day, the CPU on the server is baselined at approximately 30% utilization. At midnight, a batch job is scheduled

to run that will drive the CPU utilization up to 75% for approximately an hour. Any time the CPU utilization is at 40% or higher for longer than ten minutes, administrators will receive an alert.

Which of the following is the BEST method to ensure administrators do not experience message fatigue due to false alerts?

  1. Set a different threshold during the batch peak time.

  2. Increase the alert time threshold to 65 minutes.

  3. Increase the alert utilization threshold to 80%.

  4. Manually disable monitoring during the batch job.

Correct Answer: A

Question No.69

A critical new security update has been released to fix an identified zero-day vulnerability with the SSH server process. Due to its severity, all development and staging servers must have this update applied immediately. Which of the following is the FASTEST way for the administrator to apply the patch and ensure all systems are configured consistently?

  1. Shut down all servers and use the server provisioning tools to deploy new ones that have the latest patch applied.

  2. Create a master inventory list of servers that must be patched. Log in to each server and deploy the patch, making sure to check off each server on the list.

  3. Use the existing tooling to clone the existing servers. Update each clone with the latest patch and shut down the original system.

  4. Update the set of configuration management scripts to include the latest patch. Execute these scripts against a master inventory of servers.

Correct Answer: D

Question No.70

A cloud administrator is looking at business requirements that specify the data available at the disaster recovery site must not be more than 24 hours old. Which of the following metrics correctly relates to these requirements?

  1. RTO

  2. MTBF

  3. MTTR

  4. RPO

Correct Answer: A

Get Full Version of CV0-002 Dumps

Categories
CV0-002 Dumps

CV0-002 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam
http://www.EnsurePass.com/CV0-002.html

Question No.1

A company#39;s security policy requires full disk encryption on all clients with preboot enabled. The encryption server is hosted, and the requirement is to push an update to all endpoints. Which of the following is the BEST method to test and apply the update with minimal disruption to end users?

  1. Access the API of the encryption server, develop a custom script, and then update all endpoints.

  2. Access the web UI portal of the encryption server, apply the update to the test group, validate, and then update all endpoints.

  3. Add the update to the standard desktop configuration image, apply the update to a test VM, and then reimage clients.

  4. Access the web UI of the encryption server and disable preboot, apply the update, test, and then deploy the update to all endpoints.

Correct Answer: B

Question No.2

A cloud administrator is configuring a bastion host. The bastion host will be used to administer systems in the cloud remotely from the administrator#39;s on-premises desktop. The administrator is given the following requirements:

image

Ensure port 22 is open on the host and only allow the public IP of the on-premises router/firewall.

image

Ensure port 3389 is open on the host and only allow the public IP of the on-premises router/firewall.

image

Harden these services with PKI (where applicable).

Given this scenario, which of the following should the administrator utilize to BEST address these requirements? (Select THREE).

  1. RDP protocol from the desktop to the bastion host

  2. Telnet protocol from the desktop to the bastion host

  3. SSH protocol from the desktop to the bastion host

  4. MD5 and RC4 with a signed certificate

  5. RSA and AES with a signed certificate

  6. Blowfish and SHA-1 with a signed certificate

  7. VNC protocol from the desktop to the bastion host

Correct Answer: ACD

Question No.3

A cloud administrator is analyzing usage trends for a website housed within an IaaS cloud platform. The administrator notices that traffic and visitors to the site quadrupled from the normal baseline during the holiday season. The environment has a load balancer that uses standardized VMs to host the applications. Given this scenario, which of the following would be the MOST efficient, provide no downtime, and address the temporary spike in traffic?

  1. Implement an upward vertical scaling solution.

  2. Implement a downward vertical scaling solution.

  3. Implement an inward horizontal scaling solution.

  4. Implement an outward horizontal scaling solution.

Correct Answer: A

Question No.4

A private cloud customer is considering using the public cloud to accommodate the peak utilization workload. Which of the following would be considered the ideal scaling solution?

  1. Cloud bursting

  2. Load balancing

  3. Horizontal scaling

  4. Vertical scaling

Correct Answer: A

Question No.5

A company purchased a SaaS CRM application. The signed SLA meets year-round performance requirements. Three months after deployment, customers start reporting a slow application response time. System availability, connectivity, and proper functionality still meet the SLA. Which of the following is MOST likely the reason for the poor response time?

  1. Incorrect business requirements are invalidating the testing results.

  2. Bandwidth restrictions are causing poor performance.

  3. The application version is causing compatibility issues.

  4. Inadequate documentation is affecting the user interface.

Correct Answer: C

Question No.6

A cloud provider is evaluating an insider threat. A resource from the company operations team has access to the servers#39; virtual disks. This poses a risk that someone could copy and move the virtual server image and have access to the data. Which of the following solutions would help mitigate this problem?

  1. Tokenization

  2. Encryption

  3. Virtual firewall

  4. Hashing

Correct Answer: A

Question No.7

A cloud administrator updates the syslog forwarder configuration on a local server in production to use a different port. The development team is no longer receiving the audit logs from that server. However, the security team can retrieve and search the logs for the same server. Which of the following is MOST likely the issue?

  1. The development team is not looking at the correct server when querying for the logs.

  2. The security team has greater permissions than the development team.

  3. The audit logging service has been disabled on the server.

  4. The development team#39;s syslog server is configured to listen on the wrong port.

Correct Answer: B

Question No.8

A new startup company is growing and wants to deploy a human resources management system on a private cloud that is only accessible to the human resources department. Which of the following is the BEST method of access control?

  1. Discretionary access control

  2. Mandatory access control

  3. Non-discretionary access control

  4. Comprehensive access control

Correct Answer: A

Question No.9

A technician receives a report of system utilization:

image

Which of the following additional resources should the technician add FIRST given the trend data shown above?

  1. CPU

  2. Disk

  3. Bandwidth

  4. RAM

Correct Answer: B

Question No.10

Ann, the lead product developer for a company, just hired three new developers. Ann asked the cloud administrator to give these developers access to the fileshares in the public cloud environment. Which of the following is the BEST approach for the cloud administrator to take?

  1. Clone Ann#39;s account to create three new developer accounts.

  2. Distribute the credentials of Ann#39;s shared account to the three new developers.

  3. Copy the fileshares to each new developer#39;s laptop.

  4. Create a new role to access the fileshares and assign the three new developers.

Correct Answer: D

Get Full Version of CV0-002 Dumps

Categories
CV0-002 Dumps

CV0-002 Real Exam Dumps Questions and answers 11-20

Get Full Version of the Exam
http://www.EnsurePass.com/CV0-002.html

Question No.11

An e-commerce business recently experienced a two-hour outage from its hosted web service provider. According to the SLA, the business needs to determine how much data can be restored. On which of the following service-level components should the business focus?

  1. MTTR

  2. RPO

  3. MTBF

  4. RTO

Correct Answer: C

Question No.12

A cloud architect is tasked with isolating traffic between subnets in an IaaS platform. The networks should be able to statefully communicate with each other. Given this scenario, which of the following should the architect implement?

  1. Configure security groups.

  2. Configure HIPS policies.

  3. Configure IDS policies.

  4. Configure a network ACL.

Correct Answer: A

Question No.13

A cloud administrator configures a new web server for the site https://companyname.com. The administrator installs a wildcard SSL certificate for *.companyname.com. When users attempt to access the site, a certificate error is received. Which of the following is the MOST likely cause of the error?

  1. Certificate misconfigured

  2. Certificate expired

  3. Certificate revoked

  4. Certificate not signed

Correct Answer: A

Question No.14

A cloud service administrator is consuming PaaS services and is performing baseline configuration tests. Which of the following is part of the PaaS consumer#39;s responsibility with respect to the baseline confirmation tests?

  1. Application versions

  2. CPU utilization

  3. RAM utilization

  4. Operating system versions

Correct Answer: B

Question No.15

In a private cloud environment, which of the following is the BEST way to update 20 VMs with the same patch that has been regression tested and approved for rollout?

  1. Automate the distribution of the patch and use an orchestration tool to roll it out.

  2. Roll out the patch manually to the 20 VMs and reboot the system.

  3. Deploy the patch to ten VMs for testing and then install it on the remaining VMs.

  4. Install the patch on as many VMs as possible during the next maintenance window.

Correct Answer: D

Question No.16

A large finance firm processes three times as many transactions in December of each year. The transactions are processed in a private cloud. Management wants to avoid adding permanent resources to accommodate the single month increase. Which of the following is the BEST way to meet the need?

  1. Migrate all transaction processing to a public cloud and size capacity for the largest seasonal needs.

  2. Keep current capacity for processing, but implement cloud bursting to auto scale the resources without having to invest in infrastructure.

  3. Determine usage patterns over time and virtualize the processing traffic to give room for seasonal changes in resource demand.

  4. Determine usage patterns for the seasonal capacity needs and add physical resources to allow additional processing.

Correct Answer: B

Question No.17

A cloud administrator has deployed a new all-flash storage array with deduplication and compression enabled, and moved some of the VMs into it. The goal was to achieve 4:1 storage efficiency while maintaining sub-millisecond latency. Which of the following results would BEST suit the requirements?

  1. Compression 1:1Deduplication 4:1Overall savings 4:1Average latency 1.0ms

  2. Compression 1.5:1Deduplication 1.8:1Overall savings 2.2:1Average latency 600us

  3. Compression 1.3:1Deduplication 3.1:1Overall savings 4.3:1Average latency 900us

  4. Compression 1.8:1Deduplication 2.7:1Overall savings 4.2:1Average latency 1.2ms

Correct Answer: D

Question No.18

Several suspicious emails are being reported from end users. Organizational email is hosted by a SaaS provider. Upon investigation, the URL in the email links to a phishing site where users are prompted to enter their domain credentials to reset their passwords. Which of the following should the cloud administrator do to protect potential account compromise?

  1. Forward the email to the systems team distribution list and provide the compromised user list.

  2. Click on the URL link to verify the website and enter false domain credentials.

  3. Change the encryption key for the entire organization and lock out all users from using email until the issue is remediated.

  4. Notify users who received the email to reset their passwords regardless of whether they click on the URL.

Correct Answer: C

Question No.19

A cloud deployment engineer is modifying versions of the existing template image to instantiate new VMs. The engineer accomplishes this through the cloud self-service portal. After the version is changed and a new VM is successfully started, it does not have any connectivity, and all ping tests to other VMs fail. Which of the following would be the BEST approach to solve the problem?

  1. Start the console session to the VM; check network static routes; test the ping to default gateway and next hop; and reconfigure the gateway IP.

  2. Delete the VM; create a new flavor; turn on network service; add the new image to the template manager; and reinstantiate the VM using this new image.

  3. Delete the VM; check the IP assignment and planning; modify configuration in the deployment template; and instantiate the VM again using the new template.

  4. Assign new IPs to the newly created VMs by changing and running the deployment template; and check the connectivity on the cloud self-service portal afterward.

Correct Answer: D

Question No.20

A new SaaS timecard application that is being tested will be used by all employees at a large corporation. The following process was used to test the application:

  1. Three users from each site used the application for three weeks.

  2. The new application was used side by side with the existing application.

  3. The outputs of the old and new applications were compared side by side. Which of the following requirements did the testing plan confirm? (Select two.)

  1. High availability

  2. Performance

  3. Connectivity

  4. Data integrity

  5. Sizing

  6. Security

Correct Answer: BDE

Get Full Version of CV0-002 Dumps

Categories
CV0-002 Dumps

CV0-002 Real Exam Dumps Questions and answers 21-30

Get Full Version of the Exam
http://www.EnsurePass.com/CV0-002.html

Question No.21

A cloud service company is proposing a solution to a major sporting venue. The solution offers 99.999% availability during special events, which is proven through specialized testing. Which of the following techniques should be applied to confirm the high availability claimed by the company? (Select TWO.)

  1. Vulnerability testing

  2. Penetration testing

  3. Load testing

  4. Failover testing

  5. Integration testing

Correct Answer: BD

Question No.22

A physical server with SSD drives that hosts an IO-intensive database has been migrated into a private cloud to ensure further growth possibilities and accommodate quarterly load spikes (up to 10,000 IOPs). The requirement is to have log partition latency below 5ms and data partition latency below 10ms, irrespective of the load spikes. A cloud administrator has conducted extensive tests after the migration. Which of the following test results would ensure the migration is successful?

image

  1. Option A

  2. Option B

  3. Option C

  4. Option D

Correct Answer: A

Question No.23

A cloud administrator is required to implement a solution to handle data-at-rest encryption requirements for a database. Which of the following would BEST satisfy the requirements?

  1. Install an SSL certificate and only allow secure connections to the server.

  2. Enable two-factor authentication on connections to the database server and log activities.

  3. Activate memory encryption on the virtual server and store the certificates remotely.

  4. Create a virtual encrypted disk, add it to the virtual server, and have the database write to it.

Correct Answer: A

Question No.24

A new application with availability SLA requirements of 99.99% has been deployed in a cloud. For a test spanning a month, which of the following unavailability times would mean the test was successful? (Select TWO).

  1. 1 minute

  2. 4 minutes

  3. 10 minutes

  4. 30 minutes

  5. 60 minutes

Correct Answer: AB

Question No.25

In an IaaS environment, the security team issues a new signature file to prevent specific malware threats from infiltrating the company network. Which of the following describes where the security team should deploy the updated signatures?

  1. IDS

  2. Spam filter

  3. WAF

  4. NIPS

  5. HIPS

Correct Answer: C

Question No.26

A company wants to take advantage of cloud benefits while retaining control of and maintaining compliance with all its security policy obligations. Based on the non-functional requirements, which of the following should the company use?

  1. Hybrid cloud, as use is restricted to trusted customers

  2. IaaS, as the cloud provider has a minimal level of security responsibility

  3. PaaS, as the cloud customer has the most security responsibility

  4. SaaS, as the cloud provider has less security responsibility

Correct Answer: B

Question No.27

In an IaaS model, to which of the following methodologies would the client apply a list of OS patches, assuming approval from CAB has been given?

  1. Using a patch management system, identify the hypervisor type, select a group of hypervisors to be patched, and perform a rolling application of patches.

  2. Using a patch management system, identify the guests that require patching, and select and apply the patches.

  3. Using a patch management system, identify the applications needing the patch, select the required application in a patch management console, and apply the patches.

  4. Using a patch management system, identify the services that require patching, and select and apply the patches.

Correct Answer: A

Question No.28

The legal department requires eDiscovery of hosted file shares. To set up access, which of the following is the BEST method to ensure the eDiscovery analyst only has the ability to search but not change configuration or settings?

  1. PKI

  2. SSO

  3. MFA

  4. RBAC

Correct Answer: D

Question No.29

A new browser version has been deployed to all users at a company. After the deployment, users report that they can no longer access the company#39;s secure time-card system, which is hosted by a SaaS provider. A technician investigates and discovers a security error is received upon opening the site. If the browser is rolled back to the older version, the site is accessible again.

Which of the following is the MOST likely cause of the security error users are seeing?

  1. SSL certificate expiration on the SaaS load balancers

  2. Federation issues between the SaaS provider and the company

  3. Obsolete security technologies implemented on the SaaS servers

  4. Unencrypted communications between the users and the application

Correct Answer: C

Question No.30

A cloud-based web store is experiencing poor website performance and unavailability. Which of the following approaches would prevent the issue without administrator intervention?

  1. Install and deploy a load balancer in the front of the web server.

  2. Increase the computing resources to the web server.

  3. Increase the network#39;s bandwidth to handle the spike.

  4. Partner with a cloud provider to scale the required resources as needed.

Correct Answer: A

Get Full Version of CV0-002 Dumps

Categories
CV0-002 Dumps

CV0-002 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Exam
http://www.EnsurePass.com/CV0-002.html

Question No.31

A cloud administrator notices one of the servers is using the wrong set of NTP servers. The administrator needs to avoid the same issue in the future but needs to minimize administration resources. Which of the following tools should a cloud administrator deploy to meet this requirement?

  1. Patching tools

  2. Monitoring tools

  3. Configuration tools

  4. Deployment tools

Correct Answer: D

Question No.32

The CASB report indicates several unsanctioned SaaS applications are being used in an organization. Which of the following is the MOST likely cause?

  1. VPN bypass

  2. Shadow IT

  3. Web proxy bypass

  4. CAB approval

Correct Answer: B

Question No.33

A CSA needs to bring a client#39;s public cloud site online at another location in the same region after a disaster. The RPO is eight hours, and the RTO is four hours. Which of the following is the BEST way to accomplish this goal?

  1. Restore the site at the new location within six hours by using backups from the failed public cloud site from eight hours earlier. Switch users from the failed site to the online regional public cloud site.

  2. Restore the site at the new location within two hours by using backups from the failed public cloud site from two hours earlier. Switch users from the failed site to the online regional public cloud site.

  3. Restore the site at the new location within eight hours by using backups from the failed public cloud site from six hours earlier. Switch users from the failed site to the online regional public cloud site.

  4. Restore the site at the new location within four and half hours by using backups from the failed public cloud site from a half hour earlier. Switch users from the failed site to the online regional public cloud site.

Correct Answer: C

Question No.34

A cloud administrator works for an online gaming company that is hosting its multiplayer servers in a public IaaS cloud. The following metrics are reported during a controlled beta test:

RAM usage 80%

Bandwidth usage 50% Average ping 800ms

The beta test shows poor performance for gamers. Which of the following should the cloud administrator implement FIRST to improve the gamers#39; experience?

  1. Scale the deployment of multiplayer servers by doubling the number of VMs.

  2. Increase network bandwidth on the multiplayer servers.

  3. Increase the RAM on the multiplayer servers.

  4. Deploy multiplayer servers in public cloud locations closer to the user base.

Correct Answer: B

Question No.35

The CSA needs to install a patch on 58 virtual server instances during the Friday evening maintenance window. Which of the following is the MOST efficient way to get the patches installed?

  1. Use the patch management tool to automate and orchestrate the patch installation.

  2. Use a security vulnerability scanning tool to apply the patch automatically.

  3. Schedule the patch to install from a remote file server upon server reboot.

  4. Connect the server instances to the Internet to download the patch automatically.

Correct Answer: A

Question No.36

A cloud administrator reports a problem with the maximum number of users reached in one of the pools. There are ten VMs in the pool, each with a software capacity to handle ten users. Based on the dashboard metrics, 15% of the incoming new service requests are failing. Which of the following is the BEST approach to resolve the issue?

  1. Check compute, storage, and networking utilization in the dashboard and increase capacity by adding more resources.

  2. Check current licensed capacity and purchase additional licenses to add more users.

  3. Check the DHCP scope and increase the number of available IP addresses by extending the pool.

  4. Check the rate-of-load increase to determine if the cloud capacity boundary has been exceeded and enable bursting to the pubic cloud.

Correct Answer: A

Question No.37

The InfoSec team has directed compliance database activity monitoring without agents on a hosted database server in the public IaaS. Which of the following configurations is needed to ensure this requirement is achieved?

  1. Configure the agent configuration file to log to the syslog server.

  2. Configure sniffing mode on database traffic.

  3. Implement built-in database tracking functionality.

  4. Implement database encryption and secure copy to the NAS.

Correct Answer: B

Question No.38

IaaS users are reporting longer than expected wait times when accessing the virtual file repository. There are more than 2TB of free disk space, and vCPU and vRAM do not reach more than 75% utilization. In which of the following ways should the cloud systems administrator analyze this issue?

  1. Access the cloud services portal and increase the amount of available disk space by 25%.

  2. Access the cloud services portal and check the amount of CPU and RAM on the host machine.

  3. Access the cloud services portal and look at the historical performance numbers.

  4. Access the cloud services portal and check the security log for access denied requests.

Correct Answer: B

Question No.39

A customer wants a cloud systems administrator to adjust the backup schedule after month-end to ensure the data can be restored as fast as possible while minimizing the time needed to perform the backup. Which of the following backup types should be scheduled?

  1. Synthetic full

  2. Incremental

  3. Differential

  4. Full

Correct Answer: A

Question No.40

A software development company is building cloud-ready applications and needs to determine the best approach for releasing software. Which of the following approaches should be used?

  1. Perform QA, develop, test, and release to production

  2. Test, perform QA, develop, and release to production

  3. Develop, perform QA, test, and release to production

  4. Develop, test, perform QA, and release to production

Correct Answer: D

Get Full Version of CV0-002 Dumps

Categories
CV0-002 Dumps

CV0-002 Real Exam Dumps Questions and answers 41-50

Get Full Version of the Exam
http://www.EnsurePass.com/CV0-002.html

Question No.41

Email users report that it takes more than one minute to open emails, including those without attachments. There are three email instances in three different regions hosted by the same CSP. Other applications hosted by the same CSP have no reported issues. Which of the following solutions BEST resolves the issue?

  1. Confirm that the email instances have sufficient bandwidth.

  2. Install monitoring software on the email instances.

  3. Check the antivirus software settings and disable real-time message scanning.

  4. Ensure the requested IOPS are being provided to the email instances.

Correct Answer: C

Question No.42

A file server is being migrated from physical hardware into a private cloud. Baselining of the server shows the disks average 90% full at all times. The contents of the file server consist mostly of compressed audio files. Multiple copies of the same files are often saved in different locations on the same disk. Which of the following storage technologies is MOST likely to help minimize storage utilization when moving this server to the private cloud?

  1. Compression

  2. Thin provisioning

  3. Deduplication

  4. Tokenization

Correct Answer: C

Question No.43

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday. The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations. The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully. Review the network architecture and supporting documents and fulfill these requirements:

  1. Analyze the configuration of the following components: DNS, Firewall1, Firewall2, Router1, Rouler2, VPN and Orchestrator Server.

  2. Identify the problematic device(s).

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

image

image

image

Instruction:

Only select a maximum of TWO options from the multiple choice question.

  1. Deploy a Replica of the Database Server in the Cloud Provider

  2. Update the PSK (Pre-shared key in Router2)

  3. Update the A record on the DNS from 2.2.2.2 to 1.1.1.1

  4. Promote deny All to allow All in Firewall1 and Firewall2

  5. Change the Address Space on Router2

  6. Change internal IP Address of Router1

  7. Reverse the Weight property in the two CNAME records on the DNS

  8. Add the Application Server at on-premises to the Load Balancer

Correct Answer: AH

Question No.44

A company is deploying a new instant messaging app to allow for communications with external vendors. Each entity will host its own version of the application, but users must be able to talk between the companies. Which of the following security techniques would MOST likely be used to allow this to happen?

  1. User synchronization

  2. Password synchronization

  3. Public federation

  4. Multifactor authentication

Correct Answer: D

Question No.45

A company uses SaaS and IaaS solutions from multiple cloud providers. Users report that this requires them to manage and remember multiple user accounts and passwords. Which of the following solutions should be implemented to fix this issue?

  1. SSO

  2. Federation

  3. Password synchronization

  4. Lowered password complexity

  5. Multifactor authentication

Correct Answer: A

Question No.46

A security and risk team requires a weekly report to detect VM file system changes and validate the integrity of the OS. Which of the following is the BEST solution for this requirement?

  1. Configure a FIM agent on the VM and forward syslogs to a central location.

  2. Configure debugging on the VM and forward syslogs to a central location.

  3. Configure an antivirus agent on the VM and create the report through the web GUI.

  4. Configure a FIM agent on the VM and create the report through the web GUI.

Correct Answer: B

Question No.47

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday. The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations. The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully. Review the network architecture and supporting documents and fulfill these requirements: Part1:

  1. Analyze the configuration of the following components: DNS, Firewall1, Firewall2, Router1, Rouler2, VPN and Orchestrator Server.

  2. Identify the problematic device(s).

Instructions:

If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

Simulation

image

image

image

image

image

Correct Answer: See the solution below.

Explanation:

Solution given below with details.

image

Question No.48

Company A just acquired Company B and needs to migrate critical applications to Company A#39;s private cloud infrastructure. Company B#39;s applications are running on legacy servers and cannot be removed from the current datacenter where they reside. Which of the following migration strategies should the cloud administrator use?

  1. V2V

  2. B.P2V

  3. V2P

  4. P2P

Correct Answer: C

Question No.49

A company uses its own private cloud, which has few available resources. Mission-critical systems and other information systems are running on it. A new system will be deployed on the private cloud. The following tests are included in the test plan:

image

image

image

image

Load test (2h) Backup/restore test (6h) Functional test (8h) Failover test (1h)

The work schedule of the existing system is shown below.

image

To minimize the effect to the existing system, which of the following schedules is MOST suitable for the load test?

A. 02:00-04:00

B. 09:00-12:00

C. 18:00-20:00

D. 22:00-00:00

Correct Answer: C

Question No.50

A customer recently provisioned a new server on the IaaS. The IP address assigned from the pool resolves to another hostname. Some user traffic is being dumped or is causing slowness because of this issue. Which of the following maintenance activities does the provider need to perform to prevent this issue?

  1. Use cloud provider tools to remove orphaned resources.

  2. Initiate resource reclamation.

  3. Run a script to remove stale DNS entries.

  4. Update outdated security firewall configurations.

Correct Answer: C

Get Full Version of CV0-002 Dumps