최신 CV0-002 무료덤프 - CompTIA Cloud+ Certification
A company is migrating a website to a CSP to improve availability and performance. After testing the application, the systems engineer realizes the website stores the session state in a database system. Which of the following is the BEST way to ensure a successful migration?
정답: D
A communications service operator is planning to start migrating its complex network infrastructure to cloud by NFV, including a pool of media gateway servers, routers, and firewalls. The network elements consist of two controller cards, two redundant drives, and redundant ASIC boards. Which of the following virtualization requirements outlines the correct deployment plan?
정답: A
A business is planning to migrate from a private cloud to a public cloud. To document business continuity, which of the following should be done FIRST?
정답: B
An organization is replacing its internal human resources system with a SaaS-based application. The solution is multi-tenant, and the organization wants to ensure ubiquitous access while preventing password replay attacks. Which of the following would BEST help to mitigate the risk?
정답: C
A company moved its on-premises applications to several SaaS providers. As a result, the security team is concerned about accounts being compromised. Which of the following should the security tem implement to reduce this risk?
정답: E
A tenant has provisioned a new database server. It needs to add the database files in the exclusion list for security scanning, as it allows down the performance and locks the database file. Which of the following solutions must have this exclusion?
정답: A
A consumer is performing a comparison between different IaaS providers for upcoming cloud migrations.
Which of the following is the MOST appropriate option to make a comparison for the selection process?
Which of the following is the MOST appropriate option to make a comparison for the selection process?
정답: C
Which of the following is the BEST way to ensure accounts in a cloud environment are disabled as soon as they no longer need to be active?
정답: A
A company is implementing a launchpad within an existing application that will point to an existing SaaS provider. One of the requirements is the user should not have to log on multiple times. SSO is in place. When the launchpad is used, the user is redirected to SaaS providers as designed, but is asked for login credentials. Which of the following is the MOST likely cause of this issue?
정답: A
A cloud administrator is adding several accounts for new development team interns. These interns will need access to some, but not all, of the resources and will only be working over the summer. Which of the following user provisioning techniques should be used?
정답: D
A cloud administrator is managing two private cloud environments. In cloud A, the disaster recovery solution has an SLA for RPO of five minutes and RTO of one hour. In cloud B, the disaster recovery solution has an SLA for RPO of one hour and RTO of 24 hours. A new customer's application requires that, in case of a disaster, no more than 15 minutes of data can be lost, and it should be fully recovered within one day. Which of the following would be the BEST approach to this application?
정답: C
Team members should be able to review their organization's resource utilization and adjust workloads to ensure they stay within budget. The organization has three different teams and associated cloud environments:
development, staging, and production.
Which of the following access control models would be BEST in this scenario?
development, staging, and production.
Which of the following access control models would be BEST in this scenario?
정답: D
Below is the output from a troubleshooting activity:
1. SaaS application is unavailable to a set of users at a single site.
2. WAN connectivity was considered to be the cause of the problem.
3. Upon testing, it seemed the WAN connectivity was up, but the default gateway was unreachable from the internal users.
4. The faulty switch was replaced to bring up the connectivity.
5. The incident was documented.
Based on the methodology, which of the following steps was overlooked during the activity?
1. SaaS application is unavailable to a set of users at a single site.
2. WAN connectivity was considered to be the cause of the problem.
3. Upon testing, it seemed the WAN connectivity was up, but the default gateway was unreachable from the internal users.
4. The faulty switch was replaced to bring up the connectivity.
5. The incident was documented.
Based on the methodology, which of the following steps was overlooked during the activity?
정답: A
A consultant is helping a gaming-as-a-service company set up a new cloud. The company recently bought several graphic cards that need to be added to the servers.
Which of the following should the consultant suggest as the MOST cost effective?
Which of the following should the consultant suggest as the MOST cost effective?
정답: C
A cloud administrator wants to apply patches in an isolated copy of the production virtual server to assess the impact. Which of the following activities would BEST achieve this objective?
정답: C
A hosted file share was infected with CryptoLocker and now root cause analysis needs to be performed. Place the tasks in the correct order according to the troubleshooting methodology.
정답:
A cloud engineer needs to deploy a new virtual firewall in a private cloud. Which of the following should the engineer do as a FIRST step?
정답: B
A software company recently moved all of its development testing to a public cloud environment. The company primarily uses IaaS to deploy and test its code. The company needs the software developers to be more agile and efficient when testing application code. Which of the following backup types should the developers use to BEST ensure the speedy recovery of a system if it is damaged?
정답: B