Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?
A. Defrag system
B. Update drivers
C. Disable firewall
D. Patch system
Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?
A. Obfuscation
B. Authentication
C. Log review
D. LUN masking
An administrator creates a new VM, but after powering on the VM, the administrator receives the message "no boot device detected". Which of the following needs to be done to resolve this problem?
A. Mount a NIC that is connected to the virtual switch
B. Migrate the VM to a new host
C. Connect the host to working VM storage
D. Mount an ISO containing an operating system
An administrator is responsible for maintenance and support of servers in the cloud environment. There are over 500 virtual servers spanning across ten physical hosts. The administrator deploys a new application server. The administrator allocated the appropriate virtual resources for the application. Users report slow response after the new server was deployed. Which of the following is the cause of this issue?
A. Storage allocation on the guest OS
B. Resource pooling mis-configuration
C. Application licensing expiration
D. Data segregation on the host OS
A JBOD is being monitored and an administrator notices that a high number of writes occur in short timeframes in the last 24 hours. Which of the following BEST describes this issue?
A. I/O bursting
B. I/O throttling
C. I/O threshold
D. I/O saturation
An administrator is tasked with writing the company disaster recovery plan in the event the hosting company experiences a catastrophe. Which of the following should be included? (Select TWO).
A. Fire safety signage
B. Fire exits
C. Door closures and time-delay door alarm
D. Risk assessments
E. Contingency plan and test protocols
Which of the following tests would be MOST appropriate when determining the need for patches and updates to servers in the datacenter?
A. Penetration testing
B. Risk assessment
C. Latency testing
D. Bandwidth determination
A host has four NICs. Two of the NICs that have been teamed will be used for VM traffic. The remaining two will be used for management, backup, and VM mobility. The VMs will span four VLANs. Which of the following will the administrator need to configure?
A. Virtual NIC
B. Virtual HBA
C. Virtual switch
D. NPIV
An administrator has created a VM on a new virtualization host and notices network speeds are significantly slower than expected. Upon further review, the VM is using a legacy virtual driver for the NIC. Which of the following should the administrator perform?
A. Change the default gateway to point to a faster router
B. Change the router port to support spanning tree
C. Install guest VM tools
D. Add an additional virtual NIC
A company uses a third-party utility to protect critical virtual machines. The third party uses deduplication to compress workloads without degrading performance. Which of the following should be tested to ensure appropriate network support?
A. Bandwidth
B. Trunking
C. Caching
D. Compression