151-160 Flashcards

1
Q

A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way?

A. Submit the upgrade to the CAB.
B. Perform a full backup.
C. Take a snapshot of the system.
D. Test the upgrade in a preproduction environment.

A

C. Take a snapshot of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps. Which of the following solutions will resolve the issue the FASTEST?

A. Change the connection to point-to-site VPN.
B. Order a direct link to the provider.
C. Enable quality of service.
D. Upgrade the link to 200Mbps.

A

B. Order a direct link to the provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?

A. A CDN solution
B. An MPLS connection between datacenters
C. A DNS round robin
D. A site-to-site VPN between datacenters

A

A. A CDN solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An administrator receives a ticket indicating the accounting application is not working. Which of the following should the administrator check FIRST?

A. DHCP
B. Service-level agreement
C. DNS
D. System logs

A

B. Service-level agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company recently adjusted its load-balancer encryption policies to support only TLSv1.3. Soon after the change was made, several customers began reporting they could not access their website. Which of the following is the MOST likely cause of the issue?

A. The certificate is expired.
B. There is a mismatch between the key and the certificate.
C. The customers are using an unsupported OS.
D. The load balancer was misconfigured.

A

C. The customers are using an unsupported OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A cloud architect is reviewing the design for a new cloud-based ERP solution. The solution consists of eight servers with a single network interface. The allocated
IP range is 172.16.0.0/28. One of the requirements of the solution is that it must be able to handle the potential addition of 16 new servers to the environment.
Because of the complexity of the firewall and related ACL requirements, these new servers will need to be in the same network range. Which of the following changes would allow for the potential server addition?

A. Change the IP address range to use a 10.0.0.0 address.
B. Change the server template to add network interfaces.
C. Change the subnet mask to use a 255.255.255.128 range.
D. Change the server scaling configuration to increase the maximum limit.

A

C. Change the subnet mask to use a 255.255.255.128 range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An organization is required to set a custom registry key on the guest operating system. Which of the following should the organization implement to facilitate this requirement?

A. A configuration management solution
B. A log and event monitoring solution
C. A file integrity check solution
D. An operating system ACL

A

A. A configuration management solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible. Which of the following will BEST achieve this goal?

A. Configure CPU passthrough.
B. Oversubscribe CPU resources.
C. Switch from a Type 1 to a Type 2 hypervisor.
D. Increase instructions per cycle.
E. Enable simultaneous multithreading.

A

E. Enable simultaneous multithreading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A systems administrator needs to implement a security control that will prevent unknown malware from infecting a system in case the antivirus solution fails. Which of the following should the administrator implement?

A. A software whitelist
B. File integrity monitoring
C. A host-based IDS
D. Hardened baselines

A

D. Hardened baselines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal. Which of the following should the administrator do to fix this issue?

A. Change the database application IP.
B. Create a database cluster between the primary site and the DR site.
C. Update the connection string.
D. Edit the DNS record at the DR site for the application servers.

A

C. Update the connection string.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly