لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following cloud services is fully managed?
A. IaaS
B. GPU in the cloud
C. IoT
D. Serverless compute
E. SaaS
عرض الإجابة
اجابة صحيحة: D
السؤال #2
An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation: Production traffic (10.10.0.0/24) Network backup (10.20.0.0/25) Virtual IP network (10.20.0.128/25) The following configuration exists on the server: The backup administrator observes that the weekly backup is failing for this server. Which of the following commands should the administrator run to identify the issue?
A. ROUTE PRINT
B. NETSTAT -A
C. IPCONFIG /ALL
D. NET SM
عرض الإجابة
اجابة صحيحة: A
السؤال #3
An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?
A. Two load balancers behind a single firewall
B. Firewalls in a blue-green configuration
C. Two firewalls in a HA configuration
D. A web application firewall
عرض الإجابة
اجابة صحيحة: D
السؤال #4
An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?
A. Logs on the VM
B. Firewall on the VM
C. Memory on the VM
D. vGPU performance on the VM
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well. Which of the following should the administrator recommend the user do FIRST?
A. Disable antivirus/anti-malware software
B. Turn off the software firewall
C. Establish a VPN tunnel between the computer and the web server
D. Update the web browser to the latest version
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A cloud administrator has built a new private cloud environment and needs to monitor all computer, storage, and network components of the environment. Which of the following protocols would be MOST useful for this task?
A. SMTP
B. SCP
C. SNMP
D. SFTP
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections. Which of the following MOST likely needs to be analyzed before rehosting the ERP?
A. Software
B. Licensing
C. Right-sizing
D. The network
عرض الإجابة
اجابة صحيحة: D
السؤال #8
The human resources department was charged for a cloud service that belongs to another department. All other cloud costs seem to be correct. Which of the following is the MOST likely cause for this error?
A. Misconfigured templates
B. Misconfigured chargeback
C. Incorrect security groups
D. Misconfigured tags
عرض الإجابة
اجابة صحيحة: C
السؤال #9
A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier. Which of the following access control rules should be changed?
A. Discretionary-based
B. Attribute-based
C. Mandatory-based
D. Role-based
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A systems administrator would like to reduce the network delay between two servers. Which of the following will reduce the network delay without taxing other system resources?
A. Decrease the MTU size on both servers
B. Adjust the CPU resources on both servers
C. Enable compression between the servers
D. Configure a VPN tunnel between the servers
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A company has decided to get multiple compliance and security certifications for its public cloud environment. However, the company has few staff members to handle the extra workload, and it has limited knowledge of the current infrastructure. Which of the following will help the company meet the compliance requirements as quickly as possible?
A. DLP
B. CASB
C. FIM
D. NAC
عرض الإجابة
اجابة صحيحة: C
السؤال #12
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?
A. Performance testing
B. Penetration testing
C. Vulnerability testing
D. Regression testing
عرض الإجابة
اجابة صحيحة: C
السؤال #13
A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?
A. API version incompatibility
B. Misconfigured script account
C. Wrong template selection
D. Incorrect provisioning script indentation
عرض الإجابة
اجابة صحيحة: D
السؤال #14
An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team. Which of the following controls will BEST mitigate the risk of exploitation?
A. DLP
B. HIDS
C. NAC
D. WAF
عرض الإجابة
اجابة صحيحة: B
السؤال #15
An organization is required to set a custom registry key on the guest operating system. Which of the following should the organization implement to facilitate this requirement?
A. A configuration management solution
B. A log and event monitoring solution
C. A file integrity check solution
D. An operating system ACL
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: