221-230 Flashcards

1
Q

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

A. .yaml
B. .txt
C. .conf
D. .etcd

A

C. .conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organization is conducting a performance test of a public application. The following actions have already been completed:

  • The baseline performance has been established
  • A load test has passed.
  • A benchmark report has been generated

Which of the following needs to be done to conclude the performance test?

A. Verify the application works well under an unexpected volume of requests.
B. Assess the application against vulnerabilities and/or misconfiguration exploitation.
C. Test how well the application can resist a DDoS attack.
D. Conduct a test with the end users and collect feedback.

A

D. Conduct a test with the end users and collect feedback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?

A. There is a configuration failure in the syslog solution
B. The application servers were migrated to the cloud as IaaS instances
C. The application administrators have not performed any activity in those servers
D. There is a local firewall policy restriction on the syslog server

A

C. The application administrators have not performed any activity in those servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?

A. Create a directory security group
B. Create a resource group
C. Create separate VLANs
D. Create a network security group

A

D. Create a network security group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A large pharmaceutical company needs to ensure it is in compliance with the following requirements:

  • An application must run on its own virtual machine.
  • The hardware the application is hosted on does not change.

Which of the following will BEST ensure compliance?

A. Containers
B. A firewall
C. Affinity rules
D. Load balancers

A

C. Affinity rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application’s resource requirements. Which of the following scaling techniques can the cloud administrator implement to accommodate 100% of the application’s requirements?

A. Horizontal
B. Vertical
C. Cloud bursting
D. Autoscaling

A

C. Cloud bursting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?

A. RAID 5
B. RAID 6
C. RAID 10
D. RAID 50

A

C. RAID 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?

A. MTTF
B. SLA
C. RTO
D. RPO

A

C. RTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

A. Site-to-site
B. Client-to-site
C. Point-to-site
D. Point-to-point

A

A. Site-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?

A. Implement a secret management solution
B. Create autoscaling capabilities
C. Develop CI/CD tools
D. Deploy a CMDB tool

A

C. Develop CI/CD tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly