271-280 Flashcards

1
Q

A cloud administrator must ensure all servers are in compliance with the company’s security policy. Which of the following should the administrator check FIRST?

A. The application version
B. The OS version
C. Hardened baselines
D. Password policies

A

C. Hardened baselines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A systems administrator needs to implement a way for users to verify software integrity. Which of the following tools would BEST meet the administrator’s needs?

A. TLS 1.3
B. CRC32
C. AES-256
D. SHA-512

A

D. SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A cloud administrator would like to maintain file integrity checks through hashing on a cloud object store. Which of the following is MOST suitable from a performance perspective?

A. SHA-256
B. SHA-512
C. MD5
D. AES

A

A. SHA-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following enables CSPs to offer unlimited capacity to customers?

A. Adequate budget
B. Global data center distribution
C. Economies of scale
D. Agile project management

A

C. Economies of scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company has two primary offices, one in the United States and one in Europe. The company uses a public IaaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

A. Add an application load balancer to the applications to spread workloads.
B. Integrate a CDN solution to distribute web content globally.
C. Upgrade the bandwidth of the dedicated connection to the IaaS provider.
D. Migrate the applications to a region hosted in Europe.

A

B. Integrate a CDN solution to distribute web content globally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention. Which of the following will BEST resolve this issue?

A. Ensure all database queries are encrypted.
B. Create an IPSec tunnel between the database server and its clients.
C. Enable protocol encryption between the storage and the hypervisor.
D. Enable volume encryption on the storage.
E. Enable OS encryption.

A

D. Enable volume encryption on the storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company’s marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?

A. GPU passthrough
B. Increased memory
C. Converged infrastructure
D. An additional CPU core

A

A. GPU passthrough

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cloud administrator is supporting an application that has several reliability issues. The administrator needs visibility into the performance characteristics of the application. Which of the following will MOST likely be used in a reporting dashboard?

A. Data from files containing error messages from the application
B. Results from the last performance and workload testing
C. Detail log data from syslog files of the application
D. Metrics and time-series data measuring key performance indicators

A

D. Metrics and time-series data measuring key performance indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An organization provides integration services for finance companies that use web services. A new company that sends and receives more than 100,000 transactions per second has been integrated using the web service. The other integrated companies are now reporting slowness with regard to the integration service. Which of the following is the cause of the issue?

A. Incorrect configuration in the authentication process
B. Incorrect configuration in the message queue length
C. Incorrect configuration in user access permissions
D. Incorrect configuration in the SAN storage pool

A

B. Incorrect configuration in the message queue length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company uses multiple SaaS-based cloud applications. All the applications require authentication upon access. An administrator has been asked to address this issue and enhance security. Which of the following technologies would be the BEST solution?

A. Single sign-on
B. Certificate authentication
C. Federation
D. Multifactor authentication

A

A. Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly