The CASB report indicates several unsanctioned SaaS applications are being used in an organization. Which of the following is the MOST likely cause?
A. VPN bypass
B. Shadow IT
C. Web proxy bypass
D. CAB approval
A cloud administrator has finished building a virtual server template in a public cloud environment. The administrator is now cloning six servers from that template. Each server is configured with one private IP address and one public IP address. After starting the server instances, the cloud administrator notices that two of the servers do not have a public IP address. Which of the following is the MOST likely cause?
A. The maximum number of public IP addresses has already been reached.
B. The two servers are not attached to the correct public subnet.
C. There is no Internet gateway configured in the cloud environment.
D. The two servers do not have enough virtual network adapters attached.
A new SaaS timecard application that is being tested will be used by all employees at a large corporation. The following process was used to test the application:
1.
Three users from each site used the application for three weeks.
2.
The new application was used side by side with the existing application.
3.
The outputs of the old and new applications were compared side by side.
Which of the following requirements did the testing plan confirm? (Select two.)
A. High availability
B. Performance
C. Connectivity
D. Data integrity
E. Sizing
F. Security
A multinational corporation needs to migrate servers, which are supporting a national defense project, to a new datacenter. The data in question is approximately 20GB in size. The engineer on the project is considering datacenters in several countries as possible destinations. All sites in consideration are on a high-speed MPLS network (10Gb+ connections). Which of the following environmental constraints is MOST likely to rule out a possible site as an option?
A. Downtime impact
B. Legal restrictions
C. Peak time frames
D. Bandwidth
A business is demanding faster IT services turnaround from its IT groups. The current lead time between request and delivery is three weeks for a task that would take a competitor two days. An architect is asked to develop a solution to reduce the lead time of the request while ensuring adherence to the company policies. Which of the following is the BEST approach to achieve the stated objective?
A. Document the desired state, complete a root cause analysis, and execute the flow.
B. Revise the schedule, implement a waterfall methodology, and flatten the network.
C. Identify deficiencies, optimize change management, and automate the workflow.
D. Follow the company policies, execute the flow, and document results.
An engineer is configuring the monitoring for a new application server. During the day, the CPU on the server is baselined at approximately 30% utilization. At midnight, a batch job is scheduled to run that will drive the CPU utilization up to 75% for approximately an hour. Any time the CPU utilization is at 40% or higher for longer than ten minutes, administrators will receive an alert. Which of the following is the BEST method to ensure administrators do not experience message fatigue due to false alerts?
A. Set a different threshold during the batch peak time.
B. Increase the alert time threshold to 65 minutes.
C. Increase the alert utilization threshold to 80%.
D. Manually disable monitoring during the batch job.
Before doing a change on a VM, a systems administrator wants to ensure there is an easy and fast way to rollback if needed. The change and testing should take approximately two hours. Which of the following is the EASIEST way to meet this requirement?
A. Create a snapshot on the hypervisor.
B. Make an on-demand, incremental backup to a VTL.
C. Make an on-demand, full backup to a secondary location.
D. Create a snapshot on a remote storage array.
A company security policy mandates education and training for new employees. The policy must outline acceptable use policies for SaaS applications. Given these requirements, which of the following security controls is BEST suited?
A. Preventive
B. Detective
C. Corrective
D. Physical
A cloud administrator notices one of the servers is using the wrong set of NTP servers. The administrator needs to avoid the same issue in the future but needs to minimize administration resources. Which of the following tools should a cloud administrator deploy to meet this requirement?
A. Patching tools
B. Monitoring tools
C. Configuration tools
D. Deployment tools
Email users report that it takes more than one minute to open emails, including those without attachments. There are three email instances in three different regions hosted by the same CSP. Other applications hosted by the same CSP have no reported issues. Which of the following solutions BEST resolves the issue?
A. Confirm that the email instances have sufficient bandwidth.
B. Install monitoring software on the email instances.
C. Check the antivirus software settings and disable real-time message scanning.
D. Ensure the requested IOPS are being provided to the email instances.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CV0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.