Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
CV0-003
Free trial
Verified
Question 51
A company needs to migrate the storage system and batch jobs from the local storage system to a public cloud provider. Which of the following accounts will
MOST likely be created to run the batch processes?
- A: User
- B: LDAP
- C: Role-based
- D: Service
Question 52
A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error. Which of the following will MOST likely solve the issue?
- A: Checking user passwords
- B: Configuring QoS rules
- C: Enforcing TLS authentication
- D: Opening TCP port 3389
Question 53
A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data. Which of the following migration methods would be the BEST to use?
- A: Conduct a V2V migration.
- B: Perform a storage live migration.
- C: Rsync the data between arrays.
- D: Use a storage vendor migration appliance.
Question 54
A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web-based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.
The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment.
Which of the following is the MOST likely reason for this issue?
- A: The license limit on the number of server deployments allowed per month was exceeded.
- B: The deployment script changes made by the first administrator were not checked in and committed.
- C: The new server images were incompatible with the application load-balancer configuration.
- D: The application load balancer exceeded the maximum number of servers it could use.
Question 55
A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage. Which of the following RAID types should the administrator choose?
- A: 5
- B: 6
- C: 10
- D: 50
Question 56
A systems administrator is configuring updates on a system. Which of the following update branches should the administrator choose to ensure the system receives updates that are maintained for at least four years?
- A: LTS
- B: Canary
- C: Beta
- D: Stable
Question 57
A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way?
- A: Submit the upgrade to the CAB.
- B: Perform a full backup.
- C: Take a snapshot of the system.
- D: Test the upgrade in a preproduction environment.
Question 58
Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps. Which of the following solutions will resolve the issue the FASTEST?
- A: Change the connection to point-to-site VPN.
- B: Order a direct link to the provider.
- C: Enable quality of service.
- D: Upgrade the link to 200Mbps.
Question 59
An administrator receives a ticket indicating the accounting application is not working. Which of the following should the administrator check FIRST?
- A: DHCP
- B: Service-level agreement
- C: DNS
- D: System logs
Question 60
A company recently adjusted its load-balancer encryption policies to support only TLSv1.3. Soon after the change was made, several customers began reporting they could not access their website. Which of the following is the MOST likely cause of the issue?
- A: The certificate is expired.
- B: There is a mismatch between the key and the certificate.
- C: The customers are using an unsupported OS.
- D: The load balancer was misconfigured.
Question 61
A cloud architect is reviewing the design for a new cloud-based ERP solution. The solution consists of eight servers with a single network interface. The allocated
IP range is 172.16.0.0/28. One of the requirements of the solution is that it must be able to handle the potential addition of 16 new servers to the environment.
Because of the complexity of the firewall and related ACL requirements, these new servers will need to be in the same network range. Which of the following changes would allow for the potential server addition?
- A: Change the IP address range to use a 10.0.0.0 address.
- B: Change the server template to add network interfaces.
- C: Change the subnet mask to use a 255.255.255.128 range.
- D: Change the server scaling configuration to increase the maximum limit.
Question 62
An organization is required to set a custom registry key on the guest operating system. Which of the following should the organization implement to facilitate this requirement?
- A: A configuration management solution
- B: A log and event monitoring solution
- C: A file integrity check solution
- D: An operating system ACL
Question 63
A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible. Which of the following will BEST achieve this goal?
- A: Configure CPU passthrough.
- B: Oversubscribe CPU resources.
- C: Switch from a Type 1 to a Type 2 hypervisor.
- D: Increase instructions per cycle.
- E: Enable simultaneous multithreading.
Question 64
A systems administrator needs to implement a security control that will prevent unknown malware from infecting a system in case the antivirus solution fails. Which of the following should the administrator implement?
- A: A software whitelist
- B: File integrity monitoring
- C: A host-based IDS
- D: Hardened baselines
Question 65
A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:
✑ High availability
✑ Horizontal auto-scaling
✑ 60 nodes peak capacity per region
✑ Five reserved network IP addresses per subnet
✑ /24 range
Which of the following would BEST meet the above requirements?
- A: Create two /25 subnets in different regions.
- B: Create three /25 subnets in different regions.
- C: Create two /26 subnets in different regions.
- D: Create three /26 subnets in different regions.
- E: Create two /27 subnets in different regions.
- F: Create three /27 subnets in different regions.
Question 66
A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal. Which of the following should the administrator do to fix this issue?
- A: Change the database application IP.
- B: Create a database cluster between the primary site and the DR site.
- C: Update the connection string.
- D: Edit the DNS record at the DR site for the application servers.
Question 67
A company recently subscribed to a SaaS collaboration service for its business users. The company also has an on-premises collaboration solution and would like users to have a seamless experience regardless of the collaboration solution being used. Which of the following should the administrator implement?
- A: LDAP
- B: WAF
- C: VDI
- D: SSO
Question 68
A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues. Which of the following is the MOST likely cause of this issue?
- A: Change management failure
- B: Service overload
- C: Patching failure
- D: Job validation issues
- E: Deprecated features
Question 69
A systems administrator notices several VMs are constantly ballooning, while the memory usage of several other VMs is significantly lower than their resource allocation. Which of the following will MOST likely solve the issue?
- A: Right-sizing
- B: Bandwidth increase
- C: Cluster placement
- D: Storage tiers
Question 70
The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other's work. Which of the following did the team MOST likely forget to implement?
- A: Incident type categories
- B: A calling tree
- C: Change management
- D: Roles and responsibilities
Question 71
A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments. Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?
- A: Chain
- B: Star
- C: Mesh
- D: Hub and spoke
Question 72
A systems administrator is using VMs to deploy a new solution that contains a number of application VMs. Which of the following would provide high availability to the application environment in case of hypervisor failure?
- A: Anti-affinity rules
- B: Cold migration
- C: Live migration
- D: Affinity rules
Question 73
A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?
- A: HTTPS
- B: IPSec
- C: TLS
- D: SSH
Question 74
A company still has several dedicated servers and wants to migrate them to its private cloud. Which of the following migration methods would be BEST to accomplish this goal?
- A: Virtual-to-virtual
- B: Storage
- C: Cloud-to-cloud
- D: Physical-to-virtual
Question 75
A systems administrator is securing a new email system for a large corporation. The administrator wants to ensure private corporate information is not emailed to external users. Which of the following would be MOST useful to accomplish this task?
- A: DLP
- B: EDR
- C: DNSSEC
- D: SPF
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!