SAMPLE QUESTIONS :
Question No. 1 :
A cloud provider is increasingly discovering hard-to-find issues within the growing infrastructure. The provider has all the basic necessary tools implemented to collect and store data regarding the environment. To allow the cloud provider to focus on relevant events, which of the following is the MOST appropriate technique to build intelligence?
A. Event correlation
B. Event collection
C. Event alerts
D. Event-based workflows
ANSWER : B
Question No. 2 :
A company uses SaaS and IaaS solutions from multiple cloud providers. Users report that this requires them to manage and remember multiple user accounts and passwords. Which of the following solutions should be implemented to fix this issue?
A. SSO
B. Federation
C. Password synchronization
D. Lowered password complexity
E. Multifactor authentication
ANSWER : A
Question No. 3 :
Ann, a technician, is using a saved workflow to deploy virtual servers. The script worked yesterday but is now returning an authentication error. Ann confirms that she can manually log in with her own account and create a virtual server. Which of the following is MOST likely causing the error?
A. Certificate misconfiguration
B. Account expiration
C. Federation issues
D. Encryption issues
ANSWER : C
Question No. 4 :
Ann. a user, has tried to connect to a VM hosted in a private cloud using her directory services credentials. After three attempts, she realizes the keyboard was set to German instead of English, and she was typing "z" instead of "y". After fixing this issue, Ann is still unable to log in; however, other users can access the VM. Which of the following is the MOST likely cause?
A. The default language on Ann's computer is German.
B. The account was locked.
C. There is an account mismatch.
D. There is an account mismatch.
E. The account localization settings are incorrect.
ANSWER : E
Question No. 5 :
A cloud administrator is required to implement a solution to handle data-at-rest encryption requirements for a database. Which of the following would BEST satisfy the requirements?
A. Install an SSL certificate and only allow secure connections to the server.
B. Enable two-factor authentication on connections to the database server and log activities.
C. Activate memory encryption on the virtual server and store the certificates remotely.
D. Create a virtual encrypted disk, add it to the virtual server, and have the database write to it.
ANSWER : D
FOR MORE INFORMATION
VISIT NOW :-
0 comments:
Post a Comment
Note: Only a member of this blog may post a comment.