Anne, an administrator, notices unusual activity on a database server. After reviewing the logs, she notices a number of successful anonymous FTP logins and transferring of data to an external server. Which of the following hardening techniques would have helped stop this attack from succeeding? (Select two.)
A. Changing default account settings
B. Up-to-date patching for operating system software
C. Current updates for the NIDS
D. Disabling unused ports and services
E. Up-to-date patching for application system software
F. Current updates for antivirus software
An administrator is tasked with the virtualization of all database management applications. Which of the following should the administrator do FIRST to ensure that database performance will be optimal?
A. Follow the recommendations of the database management application vendor.
B. Design a physical to virtual migration plan of the application.
C. Adhere to the recommendations of the virtualization software vendor.
D. Develop a migration plan to the new environment, ensuring maximum uptime.
An administrator has been asked by the Chief Information Officer (CIO) to provide storage that will have the ability to accommodate at least FC and SATA in the same enterprise array with software that will be policy driven based on performance. Which of the following enterprise storage features should be recommended?
A. Storage provisioning
B. Storage tiering
C. Dynamic provisioning
D. Dynamic resource allocation
Which of the following is the BEST method to isolate iSCSI network traffic?
A. WWPN Zoning
B. WWNN Zoning
C. Dedicated VLANs
D. LUN Masking
Which of the following are benefits of virtualization in a cloud environment? (Select two.)
A. Application virtualization
B. Presentation Virtualization
C. Rapid deployment
D. Server virtualization
E. Reduce number of physical servers
Which of the following is used to connect a VM to a SAN?
A. vNIC
B. vRouter
C. vLAN
D. vHBA
Joe, an administrator, has cloned a new virtualized application server. The new application server runs for several months and meets performance expectations. After building a second application server from the clone, Joe receives a few reports that the second server is too slow. Which of the following should Joe use FIRST to determine expected server performance?
A. NIC throughput monitoring tools
B. Baseline documentation
C. HBA throughput monitoring tools
D. Change management database
An administrator of a credit card company needs to ensure that private cloud resources are allocated effectively, but needs to utilize the agility of the public cloud during peak seasons. Which of the following would accomplish this?
A. Cloud bursting
B. Elasticity
C. Multi-tenancy
D. Self-service provisioning
An organization is converting a physical SQL server into a virtual server. The SQL database has been in use for several years and contains critical data for the organization. Which of the following conversion methods would be MOST appropriate?
A. Automated offline
B. Manual offline
C. Manual online
D. Automated online
A virtual machine snapshot is:
A. a backup copy of the virtual machine.
B. a revertible point in time of the virtual machine.
C. an exact copy of the virtual machine.
D. an image of the virtual machine.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CV0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.