A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?
Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?
A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses. Which of the following should be implemented?
A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company’s servers. Which of the following should the administrator perform to accomplish this goal?
A user is notified that they will be terminated at the end of the day. As they start cleaning up their workstation, they try to FTP information from their workstation to a cloud-based, personal backup solution. Which of the following hardening techniques would be used to restrict their ability to transfer this information via FTP?
Which of the following is an example of two-factor authentication when accessing a virtual server?
Which of the following should an administrator implement when connecting the company’s existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?
A company is required to provide their customers with zero downtime for its web application. Which of the following would satisfy this requirement?
Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?
Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?
An external USB hard drive physically attached to a server is a:
To avoid the same LUN showing up multiple times in client hosts, an administrator should implement:
Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?
Which of the following is true about a Type II hypervisor?
Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?
Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?
A technician wants to isolate storage from other network traffic. Which of the following MUST the technician implement to ensure storage traffic is securely segregated?
Which of the following could be assigned to a virtual CPU?
Which of the following reduces the risk of known attacks from being successful?
An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration?
An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?
Several clients hosted on a cluster, is BEST referred to as:
An administrator is troubleshooting the cause of multiple VMs which are suddenly going offline. Which of the following is the FIRST step in troubleshooting the issue?
Which of the following disk drive types would be the BEST for a mission critical application with low latency requirements?
Which of the following is the BEST means of ensuring resource utilization remains even across the hosts?
Which of the following ports is generally associated with a UDP based service?
When conducting penetration testing on production systems during business hours, such testing will MOST likely cause disruption to operations when doing which of the following?
A start-up company has recently gone public and is experiencing unexpected growth. Which of the following cloud service models would allow the company to provide internal email quickly to new employees?
Which of the following virtualization implementations yields the HIGHEST performance of the same hardware configuration?
An administrator creates a new VM, but after powering on the VM, the administrator receives the message “no boot device detected”. Which of the following needs to be done to resolve this problem?
A company needs to have a system that allows for high availability access to data for users. Which of the following terms BEST describes how a storage engineer would design the system to allow for that level of redundancy?
After deploying VM guests from a VM template on an NFS datastore, the administrator has discovered misaligned VM guest partition offsets in multiple VM guests. Which of the following represents a complete solution for improving I/O performance?
Which of the following can an administrator implement to achieve boot on SAN?
Which of the following is an example of vertical scaling?
Which of the following would assist in preventing malware from spreading in a cloud environment?
Which of the following locations would a system engineer MOST likely place a NAS storage device for VM image files?
An administrator is investigating performance issues related to database application response time that is not within the baseline. Which of the following is the symptom of the performance issue?
The Chief Information Officer (CIO) tells the IT department that all non business critical production applications can be down for no more than 48 hours. Which of the following has the CIO defined?
An administrator has noticed that a 500MB file is taking over three hours to move over a 10Gbps link. Which of the following is MOST likely responsible for this performance?
A company has two datacenters in different cities. When one of the datacenters loses power, there is near instant failover to the other datacenter. This is an example of which of the following?
In order for a company to transition to a cloud solution, which of the following should the company check FIRST before transitioning? (Select TWO).
Which of the following protocols allows fibre channel to be transmitted over the network?
An administrator is planning to implement multipathing for IP-based storage. Which of the following protocols can be used in this configuration?
An administrator is designing a VM cluster to support a new testing department in the company. This department will require high availability and the ability to migrate VMs with little impact to other network functions within the department. The infrastructure available for the department supports a 1GB internal backbone upon which virtual switches are being configured. Which of the following network designs would meet the criteria for the department?
Which of the following security methods would be used to harden a switch?
A network administrator was tasked with creating several new subnets which will support 30 virtual hosts per subnet. Which of the following VLANs below would be used to support those hosts?
VLAN 100 192.168.1.0/30
VLAN 200 192.168.1.0/29
VLAN 300 192.168.1.0/26
VLAN 400 192.168.1.30/32
A security administrator is being hired to perform a penetration test of a third-party cloud provider as part of an annual security audit. Which of the following is the FIRST step that must be performed?
Which of the following cloud services would MOST likely be used to deliver web applications?
A company that provides IaaS to small business organizations needs to allow customers to control the power state of their virtual machines. Which of the following should be implemented to accomplish this task?
A software development team is looking for a sandbox environment to test new releases before deploying to production and has requested several virtual machines for this purpose. Which of the following virtual components could be utilized to help isolate these virtual machines from the production infrastructure?
A network engineer is investigating slow response times for queries to a cloud-hosted database. The switch configurations show that there are several traffic bottlenecks. Which of the following should the engineer implement to BEST solve the problem and prevent future issues?
A system administrator can no longer easily control a remote hypervisor because the workstation’s mouse is broken. Which of the following remote access tools is the system administrator using?
Virtual switches are:
Which of the following would need to be consistent for a LUN to be considered healthy?
Which of the following are SAN protocols? (Select TWO).
Which of the following would be a deciding factor when choosing a multi-tenant cloud environment over a locally hosted virtual environment?
A company wants to streamline their reporting tools. They have decided to implement a third party SaaS cloud reporting tool to process additional data, but will continue to process confidential data internally. Which of the following deployment models is BEST suited for the company?
Which of the following storage technologies uses file level access?
Which of the following ciphers consists of independent keys providing a key length of 168 bits?
Which of the following would be used to advertise a public IP address on redundant WAN circuits?
The BEST way to compare daily performance metrics against a “normal” operational metric is to first establish:
A system administrator is planning storage infrastructure to store backup copies of virtual machines that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select TWO).
A network administrator needs to manage a virtual switch remotely in a secure manner. Which of the following tools would MOST likely be used?
Which of the following cloud service models would be recommended to a company for hardware capacity to host a production database application?
An organization is converting a physical SQL server into a virtual server. The SQL database has been in use for several years and contains critical data for the organization. Which of the following conversion methods would be MOST appropriate?
Which of the following reduces the amount of data that must be transmitted on a network by keeping a copy of recently transmitted data in memory?
A company is expanding its cloud hosting services to include storage. Prior to upgrading existing customers with the new service, the testing department needs to validate that users can access the new service without seeing other customer data or company sensitive data also hosted in the cloud environment. Which of the following should be conducted prior to deployment of the new service?
Which of the following tools would an administrator use to troubleshoot when users are unable to reach web servers by name to determine if the name is valid?
Which of the following is a benefit of having a virtual versus physical server environment?
An administrator has created a VM on a new virtualization host and notices network speeds are significantly slower than expected. Upon further review, the VM is using a legacy virtual driver for the NIC. Which of the following should the administrator perform?
Joe, a new administrator, is asked to enter his mobile phone number into a log management system. Which of the following alert features is MOST likely being edited?
Which of the following should be implemented to ensure email continuity is not disrupted if one of multiple datacenters experiences an outage?
Which of the following techniques would be used to deliver SLA performance guarantees for a VM in a virtual environment? (Select two.)
A small business owner needs to establish a secure logon to the company database server to troubleshoot an issue while on vacation. Which of the following will allow secure access to manage the server from a remote location?
A cloud solution provider offers services solely to the healthcare industry which meets specific security and government regulations. This is an example of which of the following cloud types?
A system has the ability to automatically provision additional virtual servers in response to a load increase. This is an example of which of the following cloud features?
An administrator is tasked with the virtualization of all database management applications. Which of the following should the administrator do FIRST to ensure that database performance will be optimal?
Which of the following backup methods is MOST used by VM users?
Which of the following can be used to physically restrict employees from accessing a datacenter?
A network administrator has been asked to implement a security solution to protect a company’s internal network from external threats on the Internet. Which of the following technologies is the administrator MOST likely to use?
Which of the following tests would be MOST appropriate when over allocate storage on VMs in a development cluster?
An administrator has recently added a new host server to a private cloud environment. The host has two quad-core processors and 128GB of RAM. The server will have ten guest servers that require a minimum of 1 CPU and 8GB of RAM per server. Four of the servers will only be used during off hours. Which of the following should the administrator implement to ensure that the guest servers have the proper resources?
An administrator is no longer receiving alerting messages from the web server platform that recently failed over to a new secondary datacenter due to a power failure. Which of the following is the cause of the problem?
Which of the following cryptographic technologies is MOST likely to be used to protect data at rest?