Special Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CompTIA CV0-003 CompTIA Cloud+ Certification Exam Exam Practice Test

Page: 1 / 45
Total 452 questions

CompTIA Cloud+ Certification Exam Questions and Answers

Question 1

A cloud administrator recently noticed that a number of files stored at a SaaS provider’s file-sharing service were deleted. As part of the root cause analysis, the administrator noticed the parent folder permissions were modified last week. The administrator then used a test user account and determined the permissions on the files allowed everyone to have write access.

Which of the following is the best step for the administrator to take NEXT?

Options:

A.

Identify the changes to the file-sharing service and document

B.

Acquire a third-party DLP solution to implement and manage access

C.

Test the current access permissions to the file-sharing service

D.

Define and configure the proper permissions for the file-sharing service

Question 2

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPU resources

F.

License issues

Question 3

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

Question # 3 Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

Question # 3 Identify the problematic device(s).

Part 2:

Question # 3 Identify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

Question # 3

Question # 3

Question # 3

Question # 3

Question # 3

Question # 3

Part 2:

Only select a maximum of TWO options from the multiple choice question

Question # 3

Options:

Question 4

A cloud administrator needs to implement a mechanism to monitor the expense of the company’s cloud resources.

Which of the following is the BEST option to execute this task with minimal effort?

Options:

A.

Ask the cloud provider to send a daily expense report

B.

Set custom notifications for exceeding budget thresholds

C.

Use the API to collect expense information from cloud resources

D.

Implement a financial tool to monitor cloud resource expenses

Question 5

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A – The end user accesses the application through a web browser to enter and view clinical data.

2A – The CTM application server reads/writes data to/from the database server.

1B – The end user accesses the application through a web browser to run reports on clinical data.

2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B – The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 5

Question # 5

Question # 5

Question # 5

Options:

Question 6

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

Options:

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Question 7

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations.

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?

Options:

A.

Integrity

B.

Versioning

C.

Classification

D.

Segmentation

Question 8

Which of the following is relevant to capacity planning in a SaaS environment?

Options:

A.

Licensing

B.

A hypervisor

C.

Clustering

D.

Scalability

Question 9

A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention.

Which of the following will BEST resolve this issue?

Options:

A.

Ensure all database queries are encrypted

B.

Create an IPSec tunnel between the database server and its clients

C.

Enable protocol encryption between the storage and the hypervisor

D.

Enable volume encryption on the storage

E.

Enable OS encryption

Question 10

A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution.

Which of the following will provide the data to measure business continuity? (Choose two.)

Options:

A.

A service-level agreement

B.

Automation scripts

C.

Playbooks

D.

A network diagram

E.

A backup and restore

F.

A recovery time objective

Question 11

A cloud administrator is designing a multiregion network within an IaaS provider. The business requirements for configuring the network are as follows:

    Use private networking in and between the multisites for data replication.

    Use low latency to avoid performance issues.

Which of the following solutions should the network administrator use within the IaaS provider to connect multiregions?

Options:

A.

Peering

B.

Gateways

C.

VPN

D.

Hub and spoke

Question 12

A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency.

Which of the following services should the technician deploy to eliminate the latency issue?

Options:

A.

Auto-scaling

B.

Cloud bursting

C.

A content delivery network

D.

A new cloud provider

Question 13

A systems administrator is deploying a solution that requires a virtual network in a private cloud environment. The solution design requires the virtual network to transport multiple payload types.

Which of the following network virtualization options would BEST satisfy the requirement?

Options:

A.

VXLAN

B.

STT

C.

NVGRE

D.

GENEVE

Question 14

A cloud administrator is planning to migrate a globally accessed application to the cloud.

Which of the following should the cloud administrator implement to BEST reduce latency for all users?

Options:

A.

Regions

B.

Auto-scaling

C.

Clustering

D.

Cloud bursting

Question 15

An organization has two businesses that are developing different software products. They are using a single cloud provider with multiple IaaS instances. The organization identifies that the tracking of costs for each

business are inaccurate.

Which of the following is the BEST method for resolving this issue?

Options:

A.

Perform segregation of the VLAN and capture egress and ingress values of each network interface

B.

Tag each server with a dedicated cost and sum them based on the businesses

C.

Split the total monthly invoice equally between the businesses

D.

Create a dedicated subscription for the businesses to manage the costs

Question 16

A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times.

Which of the following actions will MOST likely solve this issue?

Options:

A.

Update the quest graphics drivers from the official repository

B.

Add more vGPU licenses to the host

C.

Instruct users to access virtual workstations only on the VLAN

D.

Select vGPU profiles with higher video RAM

Question 17

An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions.

Which of the following would be suitable to optimize the network for this requirement?

Options:

A.

Implement CDN for overall cloud application

B.

Implement auto-scaling of the compute resources

C.

Implement SR-IOV on the server instances

D.

Implement an application container solution

Question 18

A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:

    High availability

    Horizontal auto-scaling

    60 nodes peak capacity per region

    Five reserved network IP addresses per subnet

    /24 range

Which of the following would BEST meet the above requirements?

Options:

A.

Create two /25 subnets in different regions

B.

Create three /25 subnets in different regions

C.

Create two /26 subnets in different regions

D.

Create three /26 subnets in different regions

E.

Create two /27 subnets in different regions

F.

Create three /27 subnets in different regions

Question 19

An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time.

Which of the following should be implemented to improve application performance?

Options:

A.

Increase disk capacity

B.

Increase the memory and network bandwidth

C.

Upgrade the application

D.

Upgrade the environment and use SSD drives

Question 20

In an existing IaaS instance, it is required to deploy a single application that has different versions.

Which of the following should be recommended to meet this requirement?

Options:

A.

Deploy using containers

B.

Install a Type 2 hypervisor

C.

Enable SR-IOV on the host

D.

Create snapshots

Question 21

An organization is hosting a DNS domain with private and public IP ranges.

Which of the following should be implemented to achieve ease of management?

Options:

A.

Network peering

B.

A CDN solution

C.

A SDN solution

D.

An IPAM solution

Question 22

An administrator is performing an in-place upgrade on a quest VM operating system.

Which of the following can be performed as a quick method to roll back to an earlier state, if necessary?

Options:

A.

A configuration file backup

B.

A full backup of the database

C.

A differential backup

D.

A VM-level snapshot

Question 23

After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message.

Which of the following should the administrator verify NEXT?

Options:

A.

The TLS certificate

B.

The firewall rules

C.

The concurrent connection limit

D.

The folder permissions

Question 24

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

Options:

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Question 25

An organization’s web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization’s web server infrastructure.

Which of the following should be implemented to prevent this in the future as a mitigation method?

Options:

A.

Enable DLP

B.

Configure microsegmentation

C.

Enable DNSSEC

D.

Deploy a vADC appliance

Question 26

A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information:

    The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.

    The cloud management console does not show an IP address for that server.

    A DNS lookup shows the hostname resolves to an IP address.

    The server is a member of the same security group as the others.

    The cloud administrator is able to log in remotely to the other servers without issue.

Which of the following is the MOST likely cause of the server being unavailable?

Options:

A.

The network driver updates did not apply successfully, and the interface is in a down state.

B.

The ACL policy for the server was updated as part of the server reboot, preventing login access.

C.

The server was assigned a new IP address, and DNS entry for the server name was not updated.

D.

The update caused an increase in the output to the logs, and the server is too busy to respond.

Question 27

A company has decided to get multiple compliance and security certifications for its public cloud environment. However, the company has few staff members to handle the extra workload, and it has limited knowledge of the current infrastructure.

Which of the following will help the company meet the compliance requirements as quickly as possible?

Options:

A.

DLP

B.

CASB

C.

FIM

D.

NAC

Question 28

An organization has the following requirements that need to be met when implementing cloud services:

    SSO to cloud infrastructure

    On-premises directory service

    RBAC for IT staff

Which of the following cloud models would meet these requirements?

Options:

A.

Public

B.

Community

C.

Hybrid

D.

Multitenant

Question 29

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections.

Which of the following MOST likely needs to be analyzed before rehosting the ERP?

Options:

A.

Software

B.

Licensing

C.

Right-sizing

D.

The network

Question 30

A systems administrator needs to convert ten physical servers to virtual.

Which of the following would be the MOST efficient conversion method for the administrator to use?

Options:

A.

Rebuild the servers from scratch

B.

Use the vendor’s conversion tool

C.

Clone the hard drive

D.

Restore from backup

Question 31

Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?

Options:

A.

Using only open-source technologies

B.

Keeping all resources up to date

C.

Creating a standby environment with a different cloud provider

D.

Having a detailed incident response plan

Question 32

A systems administrator for an e-commerce company will be migrating the company’s main website to a cloud provider. The principal requirement is that the website must be highly available.

Which of the following will BEST address this requirement?

Options:

A.

Vertical scaling

B.

A server cluster

C.

Redundant switches

D.

A next-generation firewall

Question 33

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

Options:

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Question 34

The human resources department was charged for a cloud service that belongs to another department. All other cloud costs seem to be correct.

Which of the following is the MOST likely cause for this error?

Options:

A.

Misconfigured templates

B.

Misconfigured chargeback

C.

Incorrect security groups

D.

Misconfigured tags

Question 35

A cloud engineer is troubleshooting RSA key-based authentication from a local computer to a cloud-based server, which is running SSH service on a default port. The following file

permissions are set on the authorized keys file:

-rw-rw-rw-1 ubuntu ubuntu 391 Mar S 01:36 authorized _ keys

Which Of the following security practices are the required actions the engineer Should take to gain access to the server? (Select TWO).

Options:

A.

Fix the file permissions with execute permissions to the owner of the file.

B.

Open port 21 access for the computer's public IP address.

C.

Fix the file permissions with read-only access to the owner Of the file.

D.

Open port 22 access for the computer's public IP address.

E.

Open port 21 access for 0.0.0.0/0 CIDR.

F.

open port 22 access for 0.0.0.0/0 CIDR.

Question 36

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled? (Select TWO).

Options:

A.

Telnet

B.

FTP

C.

Remote login

D.

DNS

E.

DHCP

F.

LDAP

Question 37

A systems administrator is reviewing the logs from a company's IDS and notices a large amount of outgoing traffic from a particular server. The administrator then runs a scan on the server, which detects malware that cannot be removed. Which of the following should the administrator do first?

Options:

A.

Determine the root cause.

B.

Disconnect the server from the network.

C.

Perform a more intrusive scan.

D.

Restore the server from a backup.

Question 38

A business is looking at extending the platform for an internally developed application using microservices from various cloud vendors. The cloud architect is responsible for reviewing the proposed solution design, which covers critical requirements for the business to fulfill its requirements. Which of the following is the most likely requirement the cloud architect needs to fulfill?

Options:

A.

Software

B.

Budgetary

C.

Security

D.

Integration

Question 39

A cloud administrator needs to implement a new system within the current CSR The system requires a storage service to allocate a large number of digital files and images. The storage service must keep files for distributed access and serve images directly to the user's browser. Which of the following solutions would best meet these requirements?

Options:

A.

NAS storage

B.

Object storage

C.

File storage

D.

Block storage

Question 40

An organization hosts an ERP database in on-premises infrastructure. A recommendation has been made to migrate the ERP solution to reduce operational overhead in the maintenance of the data center. Which of the following should be considered when migrating this on-premises database to DBaaS?

    • Database application version compatibility

• Database IOPS values

• Database storage utilization

    • Physical database server CPU cache value

• Physical database server DAS type

• Physical database server network I/O

    • Database total user count

• Database total number of tables

• Database total number of storage procedures

• Physical database server memory configuration

• Physical database server CPU frequency

Options:

A.

• Physical database server operating system

Question 41

A new development team requires workstations hosted in a PaaS to develop a new website. Members of the team also require remote access to the workstations using their corporate email addresses. Which of the following solutions will BEST meet these requirements? (Select TWO).

Options:

A.

Deploy new virtual machines.

B.

Configure email account replication.

C.

Integrate identity services.

D.

Implement a VDI solution.

E.

Migrate local VHD workstations.

F.

Create a new directory service.

Question 42

An enterprise is considering a cost model for a DBaaS. Which of the following is BEST for a cloud solution?

Options:

A.

per gigabyte

B.

per seat

C.

Per user

D.

Per device

Question 43

Following the deployment of a new VM, a cloud engineer notices the backup platform has not added the machine to the appropriate job. The backup platform uses a text-based variable for job configuration. This variable is based on the RPO requirements for the workload. Which of the following did the cloud engineer forget to configure when deploying the virtual machine?

    Tags

Options:

A.

RPO

B.

RTO

C.

Server name

D.

Template

Question 44

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Question # 44

Which Of the following actions Should the analyst take to accomplish the Objective?

Options:

A.

Remove rules I, 2. and 5.

B.

Remove rules I, 3, and 4.

C.

Remove rules 2.3. and 4.

D.

Remove rules 3.4. and 5.

Question 45

After a virtualized host is rebooted, ten guest VMs take a long time to start, and extensive memory utilization is observed. Which of the following should be done to optimize the host?

Options:

A.

Reduce the host memory assignment.

B.

Configure the virtual/swap memory configuration on the guest VMs.

C.

Increase the allocated vCPUs per VM.

D.

Reduce the allocated memory and enable dynamic memory.

Question 46

A cloud engineer needs to perform a database migration_ The database has a restricted SLA and cannot be offline for more than ten minutes per month The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps. Which of the following is the BEST option to perform the migration?

Options:

A.

Copy the database to an external device and ship the device to the CSP

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-patty tool to back up and restore the data to the new database

D.

use the database import/export method and copy the exported file.

Question 47

Which of the following types of incidents requires users to be informed post-incident?

Options:

A.

Data breaches.

B.

Brute-force attacks.

C.

Website hijacking.

D.

DDoS attacks.

Question 48

A company has entered into a business relationship with another organization and needs to provide access to internal resources through directory services. Which of the following should a systems administrator implement?

Options:

A.

sso

B.

VPN

C.

SSH

D.

SAML

Question 49

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols Should the company use? (Select TWO)

Options:

A.

CIFS

B.

FTP

C.

Iscsi

D.

Raid 10

E.

Nfs

F.

fc

Question 50

A company is comparing an application environment to be hosted on site versus a SaaS model of the same application. Which of the following SaaS-based licensing models should the administrator consider?

Options:

A.

Per core

B.

Per socket

C.

Per instance

D.

Per user

Question 51

A non-critical file on a database server was deleted and needs to be recovered. A cloud administrator must use the least disruptive restoration process to retrieve the file, as the database server cannot be stopped during the business day. Which of the following restoration methods would best accomplish this goal?

Options:

A.

Alternate location

B.

Restore from image

C.

Revert to snapshot

D.

In-place restoration

Question 52

A cloud engineer receives an alert that a newly provisioned server is running a non-supported Linux version. The automation scripts are performing as expected on the server. Which of the following should the engineer check first?

Options:

A.

Provisioning script indentation

B.

Template selection

C.

API version

D.

Script account

Question 53

A cloud engineer is troubleshooting a performance issue for a high-traffic, cloud-based application that provides static content to its geographically distributed users. The engineer needs to:

    Improve the performance of an application.

    Implement a static content caching mechanism.

    Protect against DDoS attacks.

    Maintain low cost.

Which of the following strategies would best accomplish this task?

Options:

A.

Implementing a site-to-site VPN tunnel between multiple availability zones of a cloud provider by intelligently routing network traffic through global networks and edge locations

B.

Implementing a server-based caching mechanism to store and provide faster delivery of static content across multiple availability zones within the cloud network close to the end-user locations

C.

Implementing a CDN that allows caching and quick transfer of an application's assets needed to load on a browser of the end-user based on the location

D.

Implementing a cross-region, DNS-based load balancing and caching mechanism in the cloud DNS system that can provide faster delivery of static content based on end-user locations

Question 54

A cloud administrator is investigating slow VM performance. The administrator has checked the physical server performance and has identified the host is under stress due to a peak usage workload. Which of the following is the NEXT step the administrator should complete?

Options:

A.

Perform a root cause analysis

B.

Migrate the VM to a different host.

C.

Document the findings.

D.

Perform a system restart.

Question 55

An application deployment team has observed delays in deployments and has asked the cloud administrator to evaluate the issue. Below is the result of a latency test that was conducted by the cloud administrator from offices located in the following regions:

• Asia-Pacific (APAC)

• Europe, the Middle East, and Africa (EMEA)

• Americas

Tests were conducted from each location, and the results are shown below:

Question # 55

Which of the following locations needs to be investigated further?

Options:

A.

• Connectivity from APAC to APAC regions• Connectivity from APAC to EMEA and US - North

B.

• Connectivity from APAC to all regions• Connectivity from Americas to all regions

C.

• Connectivity from EMEA to all regions• Connectivity from APAC to APAC and EMEA regions

D.

• Connectivity from APAC to EMEA and Americas regions• Connectivity from EMEA to all regions

Question 56

A company plans to publish a new application and must conform with security standards. Which of the following types of testing are most important for the systems administrator to run to assure the security and compliance of the application before publishing? (Select two).

Options:

A.

Regression testing

B.

Vulnerability testing

C.

Usability testing

D.

Functional testing

E.

Penetration testing

F.

Load testing

Question 57

An integration application that communicates between different application and database servers is currently hosted on a physical machine. A P2V migration needs to be done to reduce the hardware footprint. Which of the following should be considered to maintain the same level of network throughput and latency in the virtual server?

Options:

A.

Upgrading the physical server NICs to support IOGbps

B.

Adding more vCPU

C.

Enabling SR-IOV capability

D.

Increasing the VM swap/paging size

Question 58

A systems administrator is writing a script for provisioning nodes in the environment. Which of the following would be best for the administrator to use to provision the authentication credentials to the script?

Options:

A.

password='curl https://10.2.3.4/api/sytemops?op=provision

B.

password=$env_password

C.

password=$ (cat /opt/app/credentials)

D.

password="MyS3cretP4sswordIsVeryLong"

Question 59

A cloud administrator receives an email stating the following:

"Clients are receiving emails from our web application with non-encrypted links."

The administrator notices that links generated from the web application are opening in http://. Which of the following should be configured to redirect the traffic to https://?

Options:

A.

User account access

B.

Programming code

C.

Web server configuration

D.

Load balancer setting

Question 60

A cloud administrator for a retail business identified a significant month-to-month increase in the cost of storage. The current IaaS instances are hosting the organization's ERP solution. Which of the following is the most likely cause for the cost increase?

Options:

A.

The database (DB) data drive size is set to 512GB, and the DB size is 384GB.

B.

The virtual memory in IaaS instances is utilizing space from the OS drive.

C.

The storage tiers for the archival data have a suboptimal configuration.

D.

The DB backup drive is reaching 80% of utilization and needs to be cleaned up.

Question 61

A VDI administrator is enhancing the existing environment with a feature to allow users to connect devices to virtual workstations. Which of the following types of devices are most likely to be allowed in the upgrade? (Select two).

Options:

A.

Display monitors

B.

USB devices

C.

SATA devices

D.

PCIe devices

E.

PCI devices

F.

Printers

Question 62

A company has applications that need to remain available in the event of the data center being unavailable. The company's cloud architect needs to find a solution to maintain business continuity. Which of following should the company implement?

Options:

A.

A DR solution for the application between different data centers

B.

An off-site backup solution with a third-party vendor

C.

laC techniques to recreate the system at a new provider

D.

An HA solution for the application inside the data center

Question 63

A cloud administrator must ensure all servers are in compliance with the company's security policy Which of the following should the administrator check FIRST?

Options:

A.

The application version

B.

The OS version

C.

Hardened baselines

D.

Password policies

Question 64

A company is moving its entire infrastructure to the cloud. The infrastructure consists of:

    100 virtual desktops

    10 database servers

    10 web servers

    15 application servers

    15 development servers

    7 VDI servers

Each server, except for web, application, and database servers, needs to be on an isolated subnet. The CSP has allocated a /24 subnet. Which of the following would best divide the IP space to meet these requirements?

Options:

Options:

A.

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

B.

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

C.

VDI: /25Web, application, and database: /27Development: /27VDI servers: /28

D.

VDI: /26Web, application, and database: /26Development: /26VDI servers: /28

Question 65

A cloud administrator has received a physical disk that was analyzed by the incident response team. Which of the following documents should the cloud administrator update?

Options:

A.

Chain of custody

B.

Incident taxonomy

C.

Risk register

D.

Incident playbook

Question 66

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator most likely use?

Options:

A.

An API gateway

B.

An IPS/IDS

C.

A reverse proxy

D.

A WAF

Question 67

A cloud administrator received a request to provision a set of cloud resources in an effort to switch to infrastructure as code to automate and optimize operations. The administrator decides to try to run some tests with the following definition:

Question # 67

Which of the following is the most likely cause of the issue?

Options:

A.

The cloud provider is expecting the private key.

B.

The incorrect resource name was used.

C.

The environment variable for the public key path has not been set.

D.

An unexpected variable was provided.

Question 68

A data architect is planning a new deployment of data storage virtualization before a cloud migration to a public cloud. The requirement is to provide deduplication and backup policy management that is separate from the data VMs. Which of the following would be best to utilize to provision storage?

Options:

A.

Software-defined storage

B.

Containerized storage

C.

Thick-provisioning storage

D.

RAID 10 disk-array storage

Question 69

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

Options:

A.

The target system's API functionality has been deprecated

B.

The password for the service account has expired

C.

The IP addresses of the target system have changed

D.

The target system has failed after the updates

Question 70

A company needs to access the cloud administration console using its corporate identity. Which of the following actions would MOST likely meet the requirements?

Options:

A.

Implement SSH key-based authentication.

B.

Implement cloud authentication with local LDAP.

C.

Implement multifactor authentication.

D.

Implement client-based certificate authentication.

Question 71

A cloud administrator wants to have a central repository for all the logs in the company’s private cloud. Which of the following should be implemented to BEST meet this requirement?

Options:

A.

SNMP

B.

Log scrubbing

C.

CMDB

D.

A syslog server

Question 72

A system administrator supports an application in the cloud, which includes a restful API that receives an encrypted message that is passed to a calculator system. The administrator needs to ensure the proper function of the API using a new automation tool. Which of the following techniques would be BEST for the administrator to use to accomplish this requirement?

Options:

A.

Functional testing

B.

Performance testing

C.

Integration testing

D.

Unit testing

Question 73

A disaster situation has occurred, and the entire team needs to be informed about the situation. Which of the following documents will help the administrator find the details of the relevant team members for escalation?

Options:

A.

Chain of custody

B.

Root cause analysis

C.

Playbook

D.

Call tree

Question 74

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?

Options:

A.

Incorrect encryption ciphers

B.

Broken trust relationship

C.

Invalid certificates

D.

Expired password

Question 75

An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used?

Options:

A.

Thick provisioning

B.

Software-defined storage

C.

User quotas

D.

Network file system

Question 76

A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?

Options:

A.

A service availability scan

B.

An agent-based vulnerability scan

C.

A default and common credentialed scan

D.

A network port scan

Question 77

A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue?

Options:

A.

Check the FAQ section of the vendor's documentation.

B.

Ask the user if the client device or access location has changed.

C.

Reboot the user's virtual desktop.

D.

Request permission to log in to the device remotely.

Question 78

A systems administrator is trying to reduce storage consumption. Which of the following file types would benefit the MOST from compression?

Options:

A.

System files

B.

User backups

C.

Relational database

D.

Mail database

Question 79

Which of the following cloud services is fully managed?

Options:

A.

IaaS

B.

GPU in the cloud

C.

IoT

D.

Serverless compute

E.

SaaS

Question 80

Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud?

Options:

A.

Deploy a new instance using a known-good base image.

B.

Configure a firewall rule to block the traffic on the affected instance.

C.

Perform a forensic analysis of the affected instance.

D.

Conduct a tabletop exercise involving developers and systems administrators.

Question 81

A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?

Options:

A.

SNMPv3

B.

Community strings

C.

IPSec tunnels

D.

ACLs

Question 82

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly.

Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?

Options:

A.

Tier pricing

B.

Licensing

C.

Estimated consumption

D.

Feature compatibility

Question 83

A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?

Options:

A.

The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS

B.

The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor

C.

The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule

D.

Migrating from laaS to on premises, the network traffic between on-premises users and the laaS instance, and the CPU utilization of the hypervisor host

Question 84

Which of the following should be considered for capacity planning?

Options:

A.

Requirements, licensing, and trend analysis

B.

Laws and regulations

C.

Regions, clusters, and containers

D.

Hypervisors and scalability

Question 85

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?

Options:

A.

Deploy web servers into an laaS provider.

B.

Implement a cloud-based VDI solution.

C.

Provision web servers in a container environment.

D.

Use PaaS components in the cloud to implement the product.

Question 86

A systems administrator is deploying a new cloud application and needs to provision cloud services with minimal effort. The administrator wants to reduce the tasks required for maintenance, such as OS patching, VM and volume provisioning, and autoscaling configurations. Which of the following would be the BEST option to deploy the new application?

Options:

A.

A VM cluster

B.

Containers

C.

OS templates

D.

Serverless

Question 87

A cloud administrator is assigned to establish a connection between the on-premises data center and the new CSP infrastructure. The connection between the two locations must be secure at all times and provide service for all users inside the organization. Low latency is also required to improve performance during data transfer operations. Which of the following would BEST meet these requirements?

Options:

A.

A VPC peering configuration

B.

An IPSec tunnel

C.

An MPLS connection

D.

A point-to-site VPN

Question 88

A systems administrator is troubleshooting performance issues with a VDI environment. The administrator determines the issue is GPU related and then increases the frame buffer on the virtual machines. Testing confirms the issue is solved, and everything is now working correctly. Which of the following should the administrator do NEXT?

Options:

A.

Consult corporate policies to ensure the fix is allowed

B.

Conduct internal and external research based on the symptoms

C.

Document the solution and place it in a shared knowledge base

D.

Establish a plan of action to resolve the issue

Question 89

A cloud administrator is upgrading a cloud environment and needs to update the automation script to use a new feature from the cloud provider. After executing the script, the deployment fails. Which of the following is the MOST likely cause?

Options:

A.

API incompatibility

B.

Location changes

C.

Account permissions

D.

Network failure

Question 90

A cloud architect is reviewing four deployment options for a new application that will be hosted by a public cloud provider. The application must meet an SLA that allows for no more than five hours of downtime annually. The cloud architect is reviewing the SLAs for the services each option will use:

Based on the information above, which of the following minimally complies with the SLA requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 91

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed.

Which of the following actions will make the server fully operational?

Options:

A.

Restart the RAID resynchronization process

B.

Perform a P2V migration of the server

C.

Swap the failed hard drive with a fresh one

D.

Restore the server from backup

Question 92

A cloud security analyst is implementing a vulnerability scan of the web server in the DMZ, which is running in an IaaS compute instance. The default inbound firewall settings are as follows:

Which of the following will provide the analyst with the MOST accurate report?

Options:

A.

An agent-based scan

B.

A network vulnerability scan

C.

A default and common credentialed scan

D.

A network credentialed vulnerability scan

Question 93

A cloud administrator has deployed a new VM. The VM cannot access the Internet or the VMs on any other subnet. The administrator runs a network command and sees the following output:

The new VM can access another VM at 172.16.31.39. The administrator has verified the IP address is correct. Which of the following is the MOST likely cause of the connectivity issue?

Options:

A.

A missing static route

B.

A duplicate IP on the network

C.

Firewall issues

D.

The wrong gateway

Question 94

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

Options:

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Question 95

An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?

Options:

A.

Two load balancers behind a single firewall

B.

Firewalls in a blue-green configuration

C.

Two firewalls in a HA configuration

D.

A web application firewall

Question 96

A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity?

Options:

A.

Patch management

B.

Hardening

C.

Scaling

D.

Log and event monitoring

Question 97

A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?

Options:

A.

Create a VPC and peer the networks.

B.

Implement dynamic routing.

C.

Enable DHCP on the networks.

D.

Obtain a new IPAM subscription.

Question 98

A cloud administrator is working in a secure government environment. The administrator needs to implement corrective action due to recently identified security issue on the OS of a VM that is running a facility-management application in a cloud environment. The administrator needs to consult the application vendor, so it might take some time to resolve the issue. Which of the following is the FIRST action the administrator should take while working on the resolution?

Options:

A.

Shut down the server.

B.

Upgrade the OS

C.

Update the risk register.

D.

Raise a problem ticket.

Question 99

A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit?

Options:

A.

An SLA report

B.

Tagging

C.

Quotas

D.

Showback

Question 100

A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would all ow for the maximum number of two-core machines with equal memory?

Options:

A.

30 VMs, 3GB of memory

B.

40 VMs, 1,5GB of memory

C.

45 VMs, 2 GB of memory

D.

60 VMs, 1 GB of memory

Question 101

A systems administrator has migrated a web application to the cloud with a synchronous uplink speed of 100Mbps. After the migration, the administrator receives reports of slow connectivity to the web application. The administrator logs into the firewall and notices the WAN port is transmitting at a constant 12.5MBps. Which of the following BEST explains the reason for the issue?

Options:

A.

Misconfigured subnetting

B.

Insufficient compute

C.

Firewall issues

D.

Not enough upload bandwidth

Question 102

To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public DBaaS solution. Which of the following would be the BEST technique?

Options:

A.

Live migration

B.

Physical-to-virtual

C.

Storage-level mirroring

D.

Database replication

Question 103

A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Incorrect permissions

B.

Insufficient storage

C.

Billing issues with the cloud provider

D.

No connectivity to the public cloud

E.

Expired API token

F.

Disabled autoscaling

Question 104

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

Options:

A.

A firewall

B.

Switches

C.

Ballooning

D.

Autoscaling

Question 105

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?

Options:

A.

Implement a secret management solution.

B.

Create autoscaling capabilities.

C.

Develop CI/CD tools.

D.

Deploy a CMDB tool.

Question 106

A systems administrator must ensure confidential company information is not leaked to competitors. Which of the following services will BEST accomplish this goal?

Options:

A.

CASB

B.

IDS

C.

FIM

D.

EDR

E.

DLP

Question 107

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the BEST action to correct the latency issue?

Options:

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Question 108

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?

Options:

A.

Insufficient guest bandwidth

B.

Overwhelmed vCPU

C.

A storage error on the guest

D.

Incorrect VLAN assignment

E.

Inadequate memory allocation

Question 109

A security analyst is investigating incidents in which attackers are able to access sensitive data from a corporate application's database. The attacks occur periodically and usually

after the release of a new application's version. The following log confirms the compromise:

USER: WebApp access—key accepted

WebApp user assumed DBA role

GetData API call executed

The following actions are made after every incident occurrence:

• Validation of firewall rules

• Scripted rebuild of the database and web instances

• Application deployment from a cloud code repository

Which of the following actions will MOST likely prevent future compromises?

Options:

A.

Rotating the account credentials

B.

Migrating the database to be on premises

C.

Forbidding the use of API calls to retrieve data

D.

Implementing a new database service account

Question 110

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

Options:

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Question 111

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?

Options:

A.

HTTPS

B.

IPSec

C.

TLS

D.

SSH

Question 112

A systems administrator received an email from a cloud provider stating that storage is 80% full on the volume that stores VDI desktops. Which of the following is the MOST efficient way to mitigate the situation?

Options:

A.

Deduplication

B.

Compression

C.

Replication

D.

Storage migration

Question 113

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the MOST likely cause of the issue?

Options:

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Question 114

In an IaaS platform, which of the following actions would a systems administrator take FIRST to identify the scope of an incident?

Options:

A.

Conduct a memory acquisition.

B.

Snapshot all volumes attached to an instance.

C.

Retrieve data from a backup.

D.

Perform a traffic capture.

Question 115

A local bank has all of its infrastructure in the cloud. An update was applied to the main database server at 5:00 a.m. on Monday morning, and the database was then corrupted and unusable. It had to be restored from backup. The last backup was taken the night before at 10:00 p.m. The database was then restored successfully, but seven hours' worth of data was lost, which is deemed unacceptable. Which of the following needs to be updated in the DR plan?

Options:

A.

Recovery point objective

B.

Statement of work

C.

Service-level agreement

D.

Recovery time objective

Question 116

A company wants to move to a multicloud environment and utilize the technology that provides the most portability. Which of the following technology solutions would BEST meet the company's needs?

Options:

A.

Bootstrap

B.

Virtual machines

C.

Clusters

D.

Containers

Question 117

A systems administrator is helping to develop a disaster recovery solution. The solution must ensure all production capabilities are available within two hours. Which of the following will BEST meet this requirement?

Options:

A.

A hot site

B.

A warm site

C.

A backup site

D.

A cold site

Question 118

A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality?

Options:

A.

NAC

B.

IDS

C.

DLP

D.

EDR

Question 119

A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?

Options:

A.

A CDN solution

B.

An MPLS connection between data centers

C.

A DNS round robin

D.

A site-to-site VPN between data centers

Question 120

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?

Options:

A.

Consult the law for the country where the company’s headquarters is located

B.

Consult the regulatory requirements for the company’s industry

C.

Consult the law for the country where the cloud services provider is located

D.

Consult the cloud services provider's policies and guidelines

Question 121

A financial industry services firm was the victim of an internal data breach, and the perpetrator was a member of the company's development team. During the investigation, one of the security administrators accidentally deleted the perpetrator's user data. Even though the data is recoverable, which of the following has been violated?

Options:

A.

Chain of custody

B.

Evidence acquisition

C.

Containment

D.

Root cause analysis

Question 122

A web application has been configured to use autoscaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new CI/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now. the autoscaling configuration is creating a new VM ever\ five minutes. Which of the following actions will MOS I like y resolve the issue?

Options:

A.

Reducing the maximum threshold in the autoscaling configuration

B.

Debugging the script and redeploying it

C.

Changing the automation tool because it is incompatible

D.

Modifying the script to shut down the VM after five minutes

Question 123

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

Options:

A.

Firewall outbound rules

B.

Firewall inbound rules

C.

Load balancer certificates

D.

Load balancer stickiness

E.

WAF transaction throttling

Question 124

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

Options:

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Question 125

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?

Options:

A.

Create a directory security group.

B.

Create a resource group.

C.

Create separate VLANs.

D.

Create a network security group.

Question 126

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

Options:

A.

Require the user's source IP to be an RFC1918 address.

B.

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.

Require the use of a password and a physical token.

D.

Require the password to be ten characters long.

Question 127

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

Options:

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Question 128

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

Options:

A.

Reboot all the servers in the green stack

B.

Failback to the blue stack

C.

Restore from backups

D.

Troubleshoot and resolve the application issues

Question 129

A cloud administrator is monitoring a database system and notices an unusual increase in the read operations, which is causing a heavy load in the system. The system is using a relational database and is running in a VM. Which of the following should the administrator do to resolve the issue with minimal architectural changes?

Options:

A.

Migrate the relational database to a NoSQL database.

B.

Use a cache system to store reading operations.

C.

Create a secondary standby database instance.

D.

Implement the database system using a DBaaS.

Question 130

A company is using an laaS environment. Which of the following licensing models would BEST suit the organization from a financial perspective to implement scaling?

Options:

A.

Subscription

B.

Volume-based

C.

per user

D.

Socket-based

Question 131

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company's security posture?

Options:

A.

SSH

B.

MFA

C.

Certificates

D.

Federation

Question 132

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

Options:

A.

Site-to-site

B.

Client-to-site

C.

Point-to-site

D.

Point-to-point

Question 133

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following

scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?

Options:

A.

Horizontal

B.

Vertical

C.

Cloud bursting

D.

Autoscaling

Question 134

A systems administrator is setting up a backup solution to follow the 3-2-1 policy. Currently, the solution is set to back up from the servers to an on-site storage server. Which of the following should the administrator configure to comply with the 3-2-1 policy?

Options:

A.

Weekly lull backups, with daily incremental backups

B.

A second on-site storage server for backups

C.

Storage snapshots

D.

An off-site storage server for backups

Question 135

A systems administrator is securing a new email system for a large corporation. The administrator wants to ensure private corporate information is not emailed to external users. Which of the following would be MOST useful to accomplish this task?

Options:

A.

DLP

B.

EDR

C.

DNSSEC

D.

SPF

Page: 1 / 45
Total 452 questions