A financial services company has a requirement to keep backups on premises for 30 days and off-site for up to seven years to a location that is within 100mi (161km) of the primary datacenter location. Recovery times for backups kept on-site have an RTO of one hour, while recovery times for backups kept off-site have an RTO of four hours. Which of the following solutions BEST solves this requirement?
A. Implement a full-based backup and recovery solution for backups within 30 days or less. For backups kept longer than 30 days, migrate them to a cloud provider that will host the data within 100mi (161km) of the financial services company's primary datacenter.
B. Implement a clone-based backup and recovery solution for backups within 30 days or less. For backups kept longer than 30 days, migrate them to a cloud provider that will host the data within 100mi (161km) of the financial services company's primary datacenter.
C. Implement an incremental-based backup and recovery solution for backups within 30 days or less. For backups kept longer than 30 days, migrate them to a cloud provider that will host the data within 62mi (100km) of the financial services company's primary datacenter.
D. Implement a snapshot-based backup and recovery solution for backups within 30 days or less. For backups kept longer than 30 days, migrate them to a cloud provider that will host the data within 100mi (161km) of the financial services company's primary datacenter.
A cloud engineer is required to ensure all servers in the cloud environment meet requirements for PCI compliance. One of the requirements is to make certain all administrator logins and commands are logged. Which of the following is the BEST approach to meet these requirements?
A. Enable configuration change tracking for all servers in the public cloud provider's dashboard.
B. Enable detailed monitoring for all servers in the public cloud provider's dashboard.
C. Define and enable audit tracking rules on each server in the public cloud environment.
D. Modify the cloud provider's role-based authorization policies to log user session activity.
A company is consuming a SaaS solution with a large user base and wants to minimize user management, but also ensure access is as secure as possible. Which of the following should the cloud administrator select to help meet these requirements? (Choose two.)
A. MFA
B. ACL
C. AAA
D. SSO
E. NAC
A company moved its on-premises applications to several SaaS providers. As a result, the security team is concerned about accounts being compromised. Which of the following should the security tem implement to reduce this risk?
A. Multifactor authentication
B. Single sign-on
C. Federation
D. Role-based access control
E. Virtual private network
A company's cloud administrator receives an advisory notice from the CSP. The CSP runs quarterly tests on its platform and customer's environments. The cloud administrator reads the notice and sees the company's environment is at risk of buffer over-read exploits. Which of the following tests is the CSP MOST likely running on a quarterly basis?
A. Load testing
B. Data integrity testing
C. Vulnerability testing
D. Performance testing
A cloud security analyst recently performed a vulnerability scan on a web application server across all staging environments. The vulnerability scan determines the directory that houses web content is located on the same drive as the operating system. The analyst then attempts to mitigate the vulnerability in all staging environments. The vulnerability scan is performed again and produces the following results:
PROD
Website XYZ web content is housed on the C: drive.
QA
Website XYZ web content is housed on the G: drive.
DEV
Website XYZ web content is housed on the G: drive.
Given this scenario, which of the following should the test results conclude about the vulnerability?
A. The mitigation results were unsuccessful, and the PROD staging environment requires remediation and/or mitigation.
B. The mitigation results were unsuccessful, and the DEV staging environment requires remediation and/ or mitigation.
C. The mitigation results were unsuccessful, and each staging environment requires remediation and/or mitigation.
D. The mitigation results were unsuccessful, and the QA staging environment requires remediation and/or mitigation.
A company has implemented a change management process that allows standard changes during business hours. The company's private cloud hardware needs firmware updates and supports rolling upgrades. Which of the following considerations should be given to upgrade firmware and make the change as transparent as possible to users?
A. Implement the change as a standard change.
B. Notify users before applying the change during the day.
C. Fail the application over to perform the upgrade.
D. Perform the change during off-hours to minimize the impact on users.
A private cloud administrator needs to configure replication on the storage level for a required RPO of 15 minutes and RTO of one hour. Which of the following replication types would be the BEST to use?
A. Cold storage
B. Regional
C. Asynchronous
D. Multiregional
A firm responsible for ticket sales notices its local web servers are unable to handle the traffic, which often causes timeout errors and results in lost revenue. The firm wants to obtain additional cloud-based server resources only during peak times. Due to budget constraints, the firm wants to purchase only the exact amount required during peak times. Which of the following steps should be performed to BEST meet the budget requirement?
A. Collect all web server specifications and purchase double the amount of resources from the CSP.
B. Analyze web server performance trends to determine what is being used.
C. Implement cloud bursting through CSP for web servers.
D. Run a network analyzer to monitor web server traffic to determine peak traffic times.
A cloud administrator for a customer's environment must ensure the availability of critical applications. The cloud provider hosting the infrastructure lost power, and the environment was down for four hours. Which of the following solutions is MOST suitable for ensuring availability of critical applications?
A. Install services at alternate sites.
B. Enable HA on the critical infrastructure.
C. Move services to a third-party environment.
D. Deploy additional services to edge sites.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CV0-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.