Of ten newly deployed VMs from a single template, the cloud administrator notices one VM has direct root access enabled and automatic configuration control disabled. These settings do not comply with the company's policies for production VMs. Which of the following is the MOST likely cause of this situation?
A. Another administrator intentionally changed the settings.
B. The template is misconfigured.
C. There is provisioning workflow breakdown.
D. There is a bug in the current hypervisor version.
A systems administrator needs to deploy a database that saves a unique ID/hash at the beginning of each block into a private cloud. The administrator needs to maximize storage savings. The administrator has multiple storage policies set. Which of the following would be the BEST option for this deployment?
A. Compression enabled
B. Deduplication enabled
C. Mirroring enabled
D. Tokenization enabled
A user cannot consume SaaS services while working remotely. IP whitelisting is implemented to connect to a SaaS provider as a security mechanism. Which of the following describes the MOST likely reason why the user cannot access the SaaS resources?
A. The user is not utilizing VPN to connect to the home office.
B. The user account does not exist in the SaaS provider.
C. The user account is not assigned the correct role in RBAC policy.
D. The user account has consumed all of the available subscriptions.
A company has developed a SaaS product for the financial services industry. The Chief Executive Officer (CEO) of the SaaS company has engaged an independent third party to run tests against its platform. Which of the following is the MOST likely test the third party has been engaged to perform?
A. Penetration testing
B. Load testing
C. Vulnerability testing
D. Functionality testing
A manufacturing company has the following DR requirements for its IaaS environment:
1.
RPO of 24 hours
2.
RTO of 8 hours
The company experiences a disaster and has a two-site hot/cold configuration. Which of the following is the BEST way for the company to recover?
A. Restore data from the archives on the hot site, point users to it, and resume operations.
B. Bring the cold site online, point users to it, and resume operations.
C. Rebuild the site from the cold site, bring the site back online, and point users to it.
D. Replicate data from the non-failed site to another cloud provider, point users to it, and resume operations.
Which of the following solutions BEST complies with laws requiring secure data-at-rest for a critical application while keeping in mind the need for reduced costs?
A. Install a new array with hardware encryption disks.
B. Enable encryption on the back-end database.
C. Use IPSec on the storage array.
D. Enable HTTPS on the application.
Ann, an internal user, has been accessing an internal SaaS solution on a different subnet for the last several months. When Ann tries to connect to the application today, she receives an error stating the resource cannot be found. When checking with her teammates, she discovers some users can access the resource and others cannot. Which of the following tools would be the BEST option to determine where the issue is located?
A. ipconfig or ifconfig
B. ping
C. netstat
D. tracert or traceroute
A company hired a consultant to diagnose and report performance issues of an application hosted on an IaaS, three-tier application. The cloud administrator must provision only the access required by the consultant to complete the job. Which of the following resource configurations should be applied to the consultant's account? (Choose two.)
A. Read/write access to the load balancer and its configuration settings
B. Administrator account on the resources in that region
C. Read/write access to the cloud compute resources
D. Read-only access to the server OS logs
E. Read-only access to the cloud resource diagnostic logs
F. Administrator account in the server OS
A company's Chief Information Officer (CIO) wants to manage PII by delegating access to sensitive files to the human resources department. The cloud engineer is tasked with selecting and implementing an appropriate technique to achieve the stated objective. Which of the following control methods would be BEST for the cloud engineer to implement?
A. Create a group, add users to the group, and apply the appropriate ACL.
B. Restrict the access to originate from the home office only.
C. Create a shared account for users in the human resources department.
D. Implement multifactor authentication for users in the human resources department.
A company is seeking a new backup solution for its virtualized file servers that fits the following characteristics:
1.
The files stored on the servers are extremely large.
2.
Existing files receive multiple small changes per day.
3.
New files are only created once per month.
4.
All backups are being sent to a cloud repository.
Which of the following would BEST minimize backup size?
A. Local snapshots
B. Real-time backups
C. File-based replication
D. Change block tracking
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CV0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.