Based on the shared responsibility model, which of the following solutions passes the responsibility of patching the OS to the customer?
A cloud administrator notices an e-commerce website was recently warned that the connection is not private. Which of the following is most likely the cause?
A data architect is planning a new deployment of data storage virtualization before a cloud migration to a public cloud. The requirement is to provide deduplication and backup policy management that is separate from the data VMs. Which of the following would be best to utilize to provision storage?
Which of the following are advantages of a public cloud? (Select TWO).
A cloud engineer recently set up a container image repository. The engineer wants to ensure that downloaded images are not modified in transit. Which of the following is the best method to achieve this goal?
A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?
A web consultancy group currently works in an isolated development environment. The group uses this environment for the creation of the final solution, but also for showcasing it to customers, before commissioning the sites in production. Recently, customers of newly commissioned sites have reported they are not receiving the final product shown by the group, and
the website is performing in unexpected ways. Which of the following additional environments should the group adopt and include in its process?
Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps.
Which of the following solutions will resolve the issue the FASTEST?
A Chief Information Security Officer (CISO) is evaluating the company’s security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?
A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?
PDF + Testing Engine
|
---|
$57.75 |
Testing Engine
|
---|
$43.75 |
PDF (Q&A)
|
---|
$36.75 |
CompTIA Free Exams |
---|
![]() |