301-310 Flashcards

1
Q

A company has entered into a business relationship with another organization and needs to provide access to internal resources through directory services. Which of the following should a systems administrator implement?

A. SSO
B. VPN
C. SSH
D. SAML

A

D. SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A SaaS provider wants to maintain maximum availability for its service. Which of the following should be implemented to attain the maximum SLA?

A. A hot site
B. An active-active site
C. A warm site
D. A cold site

A

B. An active-active site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization has decided to implement the following network segregation:

Below is a configuration of an application server:

The application team is unable to establish connectivity to another server, which has the IP address 10.10.10.180. Which of the following is the MOST likely reason for the issue?

A. Incorrect routing configuration
B. Incorrect NIC1 configuration
C. Incorrect gateway in NIC 1
D. Incorrect subnet mask in NIC2

A

A. Incorrect routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company that requires full administrative control at the OS level is considering the use of public cloud services. Which of the following service models would BEST fit the company’s requirements?

A. SaaS
B. DBaaS
C. PaaS
D. IaaS

A

D. IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A systems administrator must ensure confidential company information is not leaked to competitors. Which of the following services will BEST accomplish this goal?

A. CASB
B. IDS
C. FIM
D. EDR
E. DLP

A

E. DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An organization is developing a new online product. The product must:

  • Minimize organizational infrastructure and comply with security standards.
  • Minimize organizational compliance efforts.
  • Focus on application development and increase speed to market.

Which of the following should the organization consider, given the requirements listed above?

A. Use cloud-native serverless services.
B. Implement automated compliance scanning tools.
C. Harden servers using repeatable compliance templates.
D. Deploy compliance linters in the CI/CD pipeline.

A

A. Use cloud-native serverless services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A VDI administrator is deploying 512 desktops for remote workers. Which of the following would meet the minimum number of IP addresses needed for the desktops?

A. /22
B. /23
C. /24
D. /25

A

B. /23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company plans to publish a new application and must conform with security standards. Which of the following types of testing are MOST important for the systems administrator to run to assure the security and compliance of the application before publishing? (Choose two.)

A. Regression testing
B. Vulnerability testing
C. Usability testing
D. Functional testing
E. Penetration testing
F. Load testing

A

B. Vulnerability testing

E. Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

A. A firewall
B. Switches
C. Ballooning
D. Autoscaling

A

D. Autoscaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Users currently access SaaS email with five-character passwords that use only letters and numbers. An administrator needs to make access more secure without changing the password policy. Which of the following will provide a more secure way of accessing email at the lowest cost?

A. Change the email service provider.
B. Enable MFA with a one-time password.
C. Implement SSO for all users.
D. Institute certificate-based authentication.

A

B. Enable MFA with a one-time password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly