DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Success in the CompTIA Cloud+ Exam with CV0-003 Practice Tests

Gear up for the CompTIA Cloud+ CV0-003 exam with our comprehensive exam preparation materials. Developed by seasoned cloud computing experts, our study resources provide an in-depth exploration of the exam objectives, ensuring you're fully equipped to tackle the challenging CV0-003 exam. Our meticulously crafted exam questions and answers simulate the real test environment, allowing you to identify your strengths and weaknesses, and focus your efforts accordingly. Our mock exams mirror the actual exam format, helping you develop effective time-management strategies and boosting your confidence. Invest in our proven CV0-003 study materials and gain the competitive edge you need to excel. Our resources are regularly updated to reflect the latest exam objectives, keeping you ahead of the curve in the rapidly evolving cloud computing landscape. Embark on your journey today and experience the difference our comprehensive exam preparation resources can make. With our help, you'll be well-equipped to conquer the CV0-003 exam and validate your expertise in cloud infrastructure, services, and security.
Take other online exams

Question #1
A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?
A. BaaS
B. aaS
C. aaS
D. aaS
View answer
Correct Answer: B
Question #2
An organization is hosting a DNS domain with private and public IP ranges. Which of the following should be implemented to achieve ease of management?
A. etwork peering
B. CDN solution
C. SDN solution
D. n IPAM solution
View answer
Correct Answer: D
Question #3
An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?
A. ogs on the VM
B. irewall on the VM
C. emory on the VM
D. GPU performance on the VM
View answer
Correct Answer: A
Question #4
A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?
A. reate a VPC and peer the networks
B. mplement dynamic routing
C. nable DHCP on the networks
D. btain a new IPAM subscription
View answer
Correct Answer: A
Question #5
Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps. Which of the following solutions will resolve the issue the FASTEST?
A. hange the connection to point-to-site VPN
B. rder a direct link to the provider
C. nable quality of service
D. pgrade the link to 200Mbps
View answer
Correct Answer: C
Question #6
A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?
A. service availability scan
B. n agent-based vulnerability scan
C. default and common credentialed scan
D. network port scan
View answer
Correct Answer: C
Question #7
An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations.Which of the following is the MOST efficient way to bring the block storage in the primary datacenter up to date with the DR site?
A. irtual GPU
B. xternal GPU
C. assthrough GPU
D. hared GPU
View answer
Correct Answer: A
Question #8
A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found. Which of the following is the MOST likely cause of the script failure?
A. ccount mismatches
B. P address changes
C. PI version incompatibility
D. erver name changes
View answer
Correct Answer: C
Question #9
A systems administrator is configuring a storage array. Which of the following should the administrator configure to set up mirroring on this array?
A. AID 0
B. AID 1
C. AID 5
D. AID 6
View answer
Correct Answer: B
Question #10
After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?
A. ne 32 vCPU node with CDN caching
B. wo 8 vCPU nodes with load balancing
C. hree to six 8 vCPU nodes autoscaling group
D. our 8 vCPU nodes with DNS round robin
View answer
Correct Answer: D
Question #11
A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?
A. TTPS
B. PSec
C. LS
D. SH
View answer
Correct Answer: B
Question #12
A cloud administrator is designing a multiregion network within an IaaS provider. The business requirements for configuring the network are as follows:-Use private networking in and between the multisites for data replication.-Use low latency to avoid performance issues.Which of the following solutions should the network administrator use within the IaaS provider to connect multiregions?
A. eering
B. ateways
C. PN
D. ub and spoke
View answer
Correct Answer: A
Question #13
A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site. Which of the following should be configured in between the cloud environment and the DR site?
A. allback
B. laybook
C. oning
D. eplication
View answer
Correct Answer: D
Question #14
Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A's cloud resources while retaining its 1AM solution. Which of the following should be implemented?
A. ultifactor authentication
B. ingle sign-on
C. dentity federation
D. irectory service
View answer
Correct Answer: C
Question #15
A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed. Which of the following actions will make the server fully operational?
A. Restart the RAID resynchronization process
B. Perform a P2V migration of the server
C. Swap the failed hard drive with a fresh one
D. Restore the server from backup
View answer
Correct Answer: A
Question #16
A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way?
A. ubmit the upgrade to the CAB
B. erform a full backup
C. ake a snapshot of the system
D. est the upgrade in a preproduction environment
View answer
Correct Answer: C
Question #17
A cloud administrator is responsible for managing a cloud-based content management solution. According to the security policy, any data that is hosted in the cloud must be protected against data exfiltration. Which of the following solutions should the administrator implement?
A. IDS
B. IM
C. LP
D. AF
View answer
Correct Answer: D
Question #18
A company needs to access the cloud administration console using its corporate identity. Which of the following actions would MOST likely meet the requirements?
A. mplement SSH key-based authentication
B. mplement cloud authentication with local LDAP
C. mplement multifactor authentication
D. mplement client-based certificate authentication
View answer
Correct Answer: B
Question #19
A financial industry services firm was the victim of an internal data breach, and the perpetrator was a member of the company's development team. During the investigation. one of the security administrators accidentally deleted the perpetrator’s user data. Even though the data is recoverable, which of the following has been violated?
A. hain of custody
B. vidence acquisition
C. ontainment
D. oot cause analysis
View answer
Correct Answer: A
Question #20
A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it. Which of the following configuration options would BEST meet this requirement?
A. irtual GPU
B. xternal GPU
C. assthrough GPU
D. hared GPU
View answer
Correct Answer: C
Question #21
A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information:-The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.-The cloud management console does not show an IP address for that server.-A DNS lookup shows the hostname resolves to an IP address.-The serv
A. he network driver updates did not apply successfully, and the interface is in a down state
B. he ACL policy for the server was updated as part of the server reboot, preventing login access
C. he server was assigned a new IP address, and DNS entry for the server name was not updated
D. he update caused an increase in the output to the logs, and the server is too busy to respond
View answer
Correct Answer: A
Question #22
A systems administrator is trying to reduce storage consumption. Which of the following file types would benefit the MOST from compression?
A. ystem files
B. ser backups
C. elational database
D. ail database
View answer
Correct Answer: B
Question #23
An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations. Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?
A. Solutions to perform NAC and DLP
B. DDoS protection
C. QoS on the network
D. A solution to achieve microsegmentation
View answer
Correct Answer: B
Question #24
A systems administrator is troubleshooting issues with network slowness. Traffic analysis shows that uplink bandwidth on the core switch is often sustained at125Mbps due to acombination of production traffic from other sources. Which of the following would BEST resolve the issue?
A. urn off the servers that use the most bandwidth
B. nable QoS to prioritize production traffic
C. ncrease the buffer size on the core switch
D. eboot the core switch
View answer
Correct Answer: C
Question #25
A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit?
A. An SLA report
B. Tagging
C. Quotas
D. Showback
View answer
Correct Answer: D
Question #26
A Chief Information Security Officer (CISO) is evaluating the company's security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?
A. n SLA document
B. DR plan
C. OC procedures
D. risk register
View answer
Correct Answer: D
Question #27
Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue?
A. erform a memory dump of the OS
B. erform a packet capture during authentication
C. nalyze the storage system IOPS
D. valuate the OS ACLs
View answer
Correct Answer: B
Question #28
An IaaS provider has numerous devices and services that are commissioned and decommissioned automatically on an ongoing basis. The cloud administrator needs to implement a solution that will help reduce administrative overhead. Which of the following will accomplish this task?
A. PAM
B. AC
C. TP
D. NS
View answer
Correct Answer: A
Question #29
A cloud administrator wants to have a central repository for all the logs in the company's private cloud. Which of the following should be implemented to BEST meet this requirement?
A. NMP
B. og scrubbing
C. MDB
D. syslog server
View answer
Correct Answer: D
Question #30
An organization is using multiple SaaS-based business applications, and the systems administrator is unable to monitor and control the use of these subscriptions.The administrator needs to implement a solution that will help the organization apply security policies and monitor each individual SaaS subscription. Which of the following should be deployed to achieve these requirements?
A. LP
B. ASB
C. PS
D. IDS
View answer
Correct Answer: B
Question #31
A systems administrator notices several VMs are constantly ballooning, while the memory usage of several other VMs is significantly lower than their resource allocation. Which of the following will MOST likely solve the issue?
A. ight-sizing
B. andwidth increase
C. luster placement
D. torage tiers
View answer
Correct Answer: A
Question #32
A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency. Which of the following services should the technician deploy to eliminate the latency issue?
A. uto-scaling
B. loud bursting
C. content delivery network
D. new cloud provider
View answer
Correct Answer: C
Question #33
A company recently subscribed to a SaaS collaboration service for its business users. The company also has an on-premises collaboration solution and would like users to have a seamless experience regardless of the collaboration solution being used. Which of the following should the administrator implement?
A. DAP
B. AF
C. DI
D. SO
View answer
Correct Answer: D
Question #34
A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments. Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?
A. hain
B. tar
C. esh
D. ub and spoke
View answer
Correct Answer: D
Question #35
A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configuration
A. et up replication
B. opy the data across both sites
C. estore incremental backups
D. estore full backups
View answer
Correct Answer: AD
Question #36
A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?
A. ncorrect encryption ciphers
B. roken trust relationship
C. nvalid certificates
D. xpired password
View answer
Correct Answer: D
Question #37
An organization's web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization's web server infrastructure. Which of the following should be implemented to prevent this in the future as a mitigation method?
A. nable DLP
B. onfigure microsegmentation
C. nable DNSSE
D. eploy a vADC appliance
View answer
Correct Answer: D
Question #38
A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:-High availability -Horizontal auto-scaling-60 nodes peak capacity per region-Five reserved network IP addresses per subnet-/24 rangeWhich of the following would BEST meet the above requirements?
A. reate two /25 subnets in different regions
B. reate three /25 subnets in different regions
C. reate two /26 subnets in different regions
D. reate three /26 subnets in different regions
E. reate two /27 subnets in different regions
View answer
Correct Answer: A
Question #39
A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues. Which of the following is the MOST likely cause of this issue?
A. hange management failure
B. ervice overload
C. atching failure
D. ob validation issues
E. eprecated features
View answer
Correct Answer: E
Question #40
A cloud administrator would like to deploy a cloud solution to its provider using automation techniques. Which of the following must be used? (Choose two.)
A. Auto-scaling
B. Tagging
C. Playbook
D. Templates
E. Containers
F. Serverless
View answer
Correct Answer: BD
Question #41
A cloud administrator has deployed a new VM. The VM cannot access the Internet or the VMs on any other subnet. The administrator runs a network command and sees the following output:The new VM can access another VM at 172.16.31.39. The administrator has verified the IP address is correct. Which of the following is the MOST likely cause of the connectivity issue?
A. he cost of the environment
B. he I/O of the storage
C. eature compatibility
D. etwork utilization
View answer
Correct Answer: D
Question #42
An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort.Which of the following ports needs to be opened to fulfill this requirement?
A. 3
B. 7
C. 23
D. 61
View answer
Correct Answer: C
Question #43
An IaaS application has a two-hour RTO and four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy. Which of the following should the administrator configure to achieve the application requirements with the LEAST cost?
A. ack up to long-term storage every night
B. ack up to object storage every three hours
C. ack up to long-term storage every four hours
D. ack up to object storage every hour
View answer
Correct Answer: B
Question #44
A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior. Which of the following is MOST likely the cause?
A. PI provider rate limiting
B. nvalid API token
C. epleted network bandwidth
D. nvalid API request
View answer
Correct Answer: B
Question #45
A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?
A. erformance testing
B. sability testing
C. ulnerability testing
D. egression testing
View answer
Correct Answer: C
Question #46
A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator checkFIRST to optimize the performance of the VDI infrastructure?
A. PU
B. PU
C. torage
D. emory
View answer
Correct Answer: D
Question #47
A company had a system compromise, and the engineering team resolved the issue after 12 hours. Which of the following information will MOST likely be requested by the Chief Information Officer (CIO) to understand the issue and its resolution?
A. root cause analysis
B. pplication documentation
C. cquired evidence
D. pplication logs
View answer
Correct Answer: A
Question #48
An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall.The SLA for the firewall is 99.999%. Which of the following should be deployed?
A. wo load balancers behind a single firewall
B. irewalls in a blue-green configuration
C. wo firewalls in a HA configuration
D. web application firewall
View answer
Correct Answer: C
Question #49
A support engineer wants to prevent users from running malware on several IaaS compute instances. Which of the following will BEST achieve this objective?
A. ncrypt all applications that users should not access
B. et the execute filesystem permissions on the desired applications only
C. mplement an application whitelisting policy
D. isable file sharing on the instance
View answer
Correct Answer: C
Question #50
Lateral-moving malware has infected the server infrastructure. Which of the following network changes would MOST effectively prevent lateral movement in the future?
A. mplement DNSSEC in all DNS servers
B. egment the physical network using a VLAN
C. mplement microsegmentation on the network
D. mplement 802
View answer
Correct Answer: C
Question #51
An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?
A. nsufficient memory on the hypervisor
B. perating system memory limit
C. emory mismatch error
D. ynamic memory allocation
View answer
Correct Answer: A
Question #52
A cloud administrator is designing a multiregion network within an IaaS provider. The business requirements for configuring the network are as follows:? Use private networking in and between the multisites for data replication.? Use low latency to avoid performance issues.Which of the following solutions should the network administrator use within the IaaS provider to connect multiregions?
A. Peering
B. Gateways
C. VPN
D. Hub and spoke
View answer
Correct Answer: C
Question #53
A cloud architect is deploying a web application that contains many large images and will be accessed on two containers. Which of the following will MOST improve the user experience while keeping costs low?
A. mplement web servers in both continents and set up a VPN between the VPCs
B. mplement web servers on both continents and peer the VPCs
C. mplement a CDN and offload the images to an object storage
D. mplement a replica of the entire solution on every continent
View answer
Correct Answer: C
Question #54
A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?
A. 2V
B. 2P
C. 2P
D. 2V
View answer
Correct Answer: D
Question #55
A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate theBEST solution?
A. nternet of Things
B. igital transformation
C. rtificial intelligence
D. NS over TLS
View answer
Correct Answer: C
Question #56
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?
A. erformance testing
B. enetration testing
C. ulnerability testing
D. egression testing
View answer
Correct Answer: C
Question #57
A vendor is installing a new retail store management application for a customer. The application license ensures software costs are low when the application is not being used, but costs go up when use is higher. Which of the following licensing models is MOST likely being used?
A. ocket-based
B. ore-based
C. ubscription
D. olume-based
View answer
Correct Answer: C
Question #58
Which of the following will provide a systems administrator with the MOST information about potential attacks on a cloud IaaS instance?
A. etwork flows
B. IM
C. oftware firewall
D. IDS
View answer
Correct Answer: A
Question #59
An administrator has been informed that some requests are taking a longer time to respond than other requests of the same type. The cloud consumer is using multiple network service providers and is performing link load balancing for bandwidth aggregation. Which of the following commands will help the administrator understand the possible latency issues?
A. ing
B. pconfig
C. raceroute
D. etstat
View answer
Correct Answer: C
Question #60
A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?
A. 2V
B. 2P
C. 2P
D. 2V
View answer
Correct Answer: D
Question #61
After analyzing a web server's log, a systems administrator sees that users are connecting to the company's application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message. Which of the following should the administrator verify NEXT?
A. he TLS certificate
B. he firewall rules
C. he concurrent connection limit
D. he folder permissions
View answer
Correct Answer: A
Question #62
A company recently adjusted its load-balancer encryption policies to support only TLSv1.3. Soon after the change was made, several customers began reporting they could not access their website. Which of the following is the MOST likely cause of the issue?
A. he certificate is expired
B. here is a mismatch between the key and the certificate
C. he customers are using an unsupported OS
D. he load balancer was misconfigured
View answer
Correct Answer: C
Question #63
A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on theInternet. Which of the following should the systems administrator implement to achieve this objective?
A. stateful firewall
B. LP
C. NSSEC
D. etwork flows
View answer
Correct Answer: D
Question #64
An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations. Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?
A. olutions to perform NAC and DLP
B. DoS protection
C. oS on the network
D. solution to achieve microsegmentation
View answer
Correct Answer: B
Question #65
A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers' activity?
A. atch management
B. ardening
C. caling
D. og and event monitoring
View answer
Correct Answer: B
Question #66
A systems administrator adds servers to a round-robin, load-balanced pool, and then starts receiving reports of the website being intermittently unavailable. Which of the following is the MOST likely cause of the issue?
A. he network is being saturated
B. he load balancer is being overwhelmed
C. ew web nodes are not operational
D. he API version is incompatible
E. here are time synchronization issues
View answer
Correct Answer: C
Question #67
A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier. Which of the following access control rules should be changed?
A. iscretionary-based
B. ttribute-based
C. andatory-based
D. ole-based
View answer
Correct Answer: D
Question #68
A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed. Which of the following actions will make the server fully operational?
A. estart the RAID resynchronization process
B. erform a P2V migration of the server
C. wap the failed hard drive with a fresh one
D. estore the server from backup
View answer
Correct Answer: D
Question #69
After a hardware upgrade on a private cloud system, the systems administrator notices a considerable drop in network performance. Which of the following isMOST likely the cause?
A. he driver
B. he memory
C. he cluster placement
D. he CPU
View answer
Correct Answer: A
Question #70
A cloud administrator is planning to migrate a globally accessed application to the cloud. Which of the following should the cloud administrator implement to BEST reduce latency for all users?
A. egions
B. uto-scaling
C. lustering
D. loud bursting
View answer
Correct Answer: C
Question #71
An organization is required to set a custom registry key on the guest operating system. Which of the following should the organization implement to facilitate this requirement?
A. configuration management solution
B. log and event monitoring solution
C. file integrity check solution
D. n operating system ACL
View answer
Correct Answer: A
Question #72
A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations. Which of the following should the administrator implement to ensure DLP efficiency prevents the exposure of sensitive data in a cloud environment?
A. Integrity
B. Versioning
C. Classification
D. Segmentation
View answer
Correct Answer: C
Question #73
The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other's work. Which of the following did the team MOST likely forget to implement?
A. ncident type categories
B. calling tree
C. hange management
D. oles and responsibilities
View answer
Correct Answer: D
Question #74
A cloud administrator is working in a secure government environment. The administrator needs to implement corrective action due to recently identified security issue on the OS of a VM that is running a facility-management application in a cloud environment. The administrator needs to consult the application vendor, so it might take some time to resolve the issue. Which of the following is the FIRST action the administrator should take while working on the resolution?
A. irtual machines
B. oftware as a service
C. erverless computing
D. ontainers
View answer
Correct Answer: D
Question #75
A systems administrator is examining a managed hosting agreement and wants to determine how much data would be lost if a server had to be restored from backups. To which of the following metrics should the administrator refer?
A. TO
B. TBF
C. PO
D. TTR
View answer
Correct Answer: C
Question #76
A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configuration
A. pdate the PSK (Pre-shared key) in Router 2
B. pdate the A record on the DNS from 2
C. romote deny All to allow All in Firewall 1 and Firewall 2
D. hange the Address Space on Router 2
E. hange internal IP Address of Router 1
F. everse the Weight property in the two CNAME records on the DNS
G. dd the Application Server at on-premises to the Load Balancer
View answer
Correct Answer: AD
Question #77
A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?
A. CDN solution
B. n MPLS connection between datacenters
C. DNS round robin
D. site-to-site VPN between datacenters
View answer
Correct Answer: A
Question #78
A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook?
A. se the server's root credentials
B. ard-code the password within the playbook
C. reate a service account on the server
D. se the administrator's SSO credentials
View answer
Correct Answer: C
Question #79
A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance. Which of the following licensing models is the application MOST likely using?
A. Per device
B. Per user
C. Core-based
D. Volume-based
View answer
Correct Answer: C
Question #80
A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?
A. ompute
B. torage
C. icensing
D. cripts
View answer
Correct Answer: A
Question #81
Due to a policy change, a few of a customer's application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%. Which of the following is the MOST likely cause?
A. here is not enough vCPU assigned
B. he application is not compatible with the new settings
C. he new configuration is adding latency
D. he memory of the VM is underallocated
View answer
Correct Answer: C
Question #82
Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue?
A. ?€¢ Perform a memory dump of the OS
B. ?€¢ Perform a packet capture during authentication
C. ?€¢ Analyze the storage system IOPS
D. ?€¢ Evaluate the OS ACLs
View answer
Correct Answer: C
Question #83
A web application has been configured to use auto-scaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new Cl/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now, the auto-scaling configuration is creating a new VM every five minutes. Which of the following actions will MOST likely resolve the issue?
A. educing the maximum threshold in the auto-scaling configuration
B. ebugging the script and redeploying it
C. hanging the automation tool because it is incompatible
D. odifying the script to shut down the VM after five minutes
View answer
Correct Answer: A
Question #84
A cloud administrator is setting up a new coworker for API access to a public cloud environment. The administrator creates a new user and gives the coworker access to a collection of automation scripts. When the coworker attempts to use a deployment script, a 403 error is returned. Which of the following is the MOST likely cause of the error?
A. onnectivity to the public cloud is down
B. ser permissions are not correct
C. he script has a configuration error
D. versubscription limits have been exceeded
View answer
Correct Answer: B
Question #85
A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error. Which of the following will MOST likely solve the issue?
A. hecking user passwords
B. onfiguring QoS rules
C. nforcing TLS authentication
D. pening TCP port 3389
View answer
Correct Answer: D
Question #86
A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it. Which of the following configuration options would BEST meet this requirement?
A. aaS
B. aaS
C. aaS
D. aaS
View answer
Correct Answer: C
Question #87
A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator checkFIRST to optimize the performance of the VDI infrastructure?
A. PU
B. PU
C. torage
D. emory
View answer
Correct Answer: D
Question #88
A company has hired a security firm to perform a vulnerability assessment of its environment. In the first phase, an engineer needs to scan the network services exposed by the hosts. Which of the following will help achieve this with the LEAST privileges?
A. n agent-based scan
B. credentialed scan
C. network-based scan
D. n application scan
View answer
Correct Answer: C
Question #89
A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements. Which of the following solutions will be BEST to help the administrator achieve the requirements?
A. ontainers
B. nfrastructure as a code
C. esktop virtualization
D. irtual machines
View answer
Correct Answer: A
Question #90
A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue?
A. pgrade the virtual database server
B. ove the virtual machine to flash storage and test again
C. heck if other machines on the same storage are having issues
D. ocument the findings and place them in a shared knowledge base
View answer
Correct Answer: B
Question #91
Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?
A. PAM
B. oH
C. LAN
D. DN
View answer
Correct Answer: A
Question #92
A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations. Which of the following should the administrator implement to ensure DLP efficiency prevents the exposure of sensitive data in a cloud environment?
A. ntegrity
B. ersioning
C. lassification
D. egmentation
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: