Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
CV0-002
Free trial
Verified
Question 26
A cloud provider is increasingly discovering hard-to-find issues within the growing infrastructure. The provider has all the basic necessary tools implemented to collect and store data regarding the environment. To allow the cloud provider to focus on relevant events, which of the following is the MOST appropriate technique to build intelligence?
- A: Event correlation
- B: Event collection
- C: Event alerts
- D: Event-based workflows
Question 27
An application server, which uses a SaaS fax provider, is determined to cost too much money. An upgrade to the application allows for use of a physical fax card so the company only has to pay for a phone line. This is a production application; therefore, downtime must be minimized. Which of the following types of migration is MOST efficient in facilitating this application upgrade?
- A: Virtual-to-physical migration
- B: Storage migration
- C: Cloud migration
- D: Offline migration
Question 28
A company has moved all on-premises workloads into a public cloud. After some time, the cloud engineer starts noticing time drifts on the VMs and suspects an
NTP issue. Time drifts were not an issue when all the workloads were on-premises. Which of the following describes how the cloud engineer should resolve the issue?
- A: Implement Coordinated Universal Time on all workloads
- B: Point all workloads back to an on-premises NTP server
- C: Point all workloads to a stratum 2 within the public cloud provider
- D: Configure all of the VMs as NTP servers within the public cloud provider
Question 29
A security administrator wants to automate the implementation of network-based ACLs for services deployed within the company's VPC. The security administrator is mostly concerned with intra-VPN separation to prevent unauthorized communication between cloud deployed services within the VPC.
Which of the following should the security administrator implement?
- A: Include a list of the firewall rules in the orchestration script
- B: Use the cloud API to deploy and configure anti-malware services
- C: Configure the appropriate IDS rules using the cloud portal
- D: Write custom scripts to deploy a network ACL between the VPC and the company's on-premises network
Question 30
A CASB provides the application proxy and web application firewall to a large retailer. All access to the retailer cloud application must originate from the CASB- designated IP addresses. The CASB has known geolocations with known IP addresses. Suddenly, all customers are not able to access the retailer cloud applications. Which of the following is MOST likely the reason for the issue?
- A: Additional CASB IP addresses were added to the authorized pool
- B: All of the CASB's European datacenters are down
- C: There was federation and SSO misconfiguration
- D: The CASB's SSL/TLS certificate expired
Question 31
A tenant has provisioned a new database server. It needs to add the database files in the exclusion list for security scanning, as it allows down the performance and locks the database file. Which of the following solutions must have this exclusion?
- A: IPS
- B: IDS
- C: Antivirus
- D: Firewall
Question 32
Ann, a technician, is using a saved workflow to deploy virtual servers. The script worked yesterday but is now returning an authentication error. Ann confirms that she can manually log in with her own account and create a virtual server. Which of the following is MOST likely causing the error?
- A: Certificate misconfiguration
- B: Account expiration
- C: Federation issues
- D: Encryption issues
Question 33
A company is interested in a DRP. The purpose of the plan is to recover business as soon as possible. The MOST effective technique is:
- A: archiving.
- B: network clustering.
- C: site mirroring.
- D: active/active.
Question 34
A company recently decided to move some of its servers to a public cloud. The engineer has been invited to attend requirement sessions for moving servers to the cloud. The engineer is tasked with ensuring the servers that are being moved to the cloud are still in compliance, as they were on-premises.
Which of the following should the engineer request during the requirement sessions?
- A: Syslog server
- B: Administrator access to the cloud service
- C: Configuration management tool
- D: Orchestration tool
Question 35
Following is a sample result from a recently completed load test.
Based on the information provided, which of the following would be the BEST recommendation?
- A: Use the test result as a benchmark and document it.
- B: Downsize the CPU and memory assignment.
- C: Decrease assigned storage capacity.
- D: Implement storage compression.
Question 36
An administrator needs to make a file-level backup of a VM before deploying monthly updates. The backup should capture all changes since the last backup but should NOT reset the archive bit on any files.
Which of the following backup types BEST meets these requirements?
- A: Incremental
- B: Full
- C: Snapshot
- D: Differential
- E: Delta Tracking
Question 37
As part of a nightly testing process, new version of an application is deployed to the set of web servers in the development environment.
Which of the following is the BEST way to ensure the test environment is consistent with the previous night's test?
- A: Clone the development web servers to the test environment.
- B: Reprovision the web servers using predefined templates.
- C: Undeploy the previous application and deploy the new version.
- D: Revert to a previous state using configuration management tools.
That’s the end of your free questions
You’ve reached the preview limit for CV0-002Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!