A cloud engineer deployed an email server in a public cloud. Users can access the email server, but the emails they send cannot reach their destinations. Which of the following should the cloud engineer do FIRST?
A. Confirm the email server configuration and reinstall the email server software.
B. Validate the security certificate for the email domain.
C. Confirm email encryption service.
D. Consult the cloud vendor's anti-spam policy.
Network statistics show that the 1Gbps switch port used for storage traffic is fully saturated. Which of the following switch technologies can be used to provide twice the bandwidth?
A. NAT
B. Multipathing
C. Link aggregation
D. VLAN
Metadata is described as which of the following?
A. A unique data field.
B. A description of a data element.
C. A file header.
D. A large data object.
A company has changed their web hosting policy and now requires SSL certificates on all web servers. Users are reporting that they can no longer access an internal website. Which of the following commands should the administrator run to determine if port 443 1s listening? (Select two.)
A. traceroute
B. telnet
C. netstat
D. ipconfig
E. nslookup
A number of VMs in a host are experiencing processor contention, showing down operations Which of the following host hardware upgrade paths would yield higher VM performance, for the same VMs in the given hypervisor host?
A. Replace CPUs to move from 32-bit architecture o 64-bit
B. Replace CPUs to move from 64-bit architecture to 32-bit
C. Replace CPUs to increase current core speed
D. Replace CPUs to increase CPU core count
An administrator has enabled monitoring for a new tenant environment. The administrator checks 24 hours after the new environment has been added and sees data for other tenants' environments but no data for the new environment. Which of the following has NOT been properly configured?
A. SNMP Community String
B. SNMP Destination IP Address
C. SNMP Manager IP Address
D. SNMP Trap
A company has implemented a dual-region (Region 1 and Region 2) cloud strategy from its current CSP. Both regions have the same data in them. Region 2 is experiencing an outage. Which of the following is the BEST way to provide service to users in Region 2 during the outage while allowing access to the data?
A. Bring the backup instances online and provide Region 2 users access to their data.
B. Add more network bandwidth to Region 2.
C. Copy Region 1 data to a location in Region 3 and have users access their data.
D. Redirect users from Region 2 to Region 1.
A company's Chief Information Officer (CIO) wants to manage PII by delegating access to sensitive files to the human resources department. The cloud engineer is tasked with selecting and implementing an appropriate technique to achieve the stated objective. Which of the following control methods would be BEST for the cloud engineer to implement?
A. Create a group, add users to the group, and apply the appropriate ACL.
B. Restrict the access to originate from the home office only.
C. Create a shared account for users in the human resources department.
D. Implement multifactor authentication for users in the human resources department.
A company hired a consultant to diagnose and report performance issues of an application hosted on an IaaS, three-tier application. The cloud administrator must provision only the access required by the consultant to complete the job. Which of the following resource configurations should be applied to the consultant's account? (Choose two.)
A. Read/write access to the load balancer and its configuration settings
B. Administrator account on the resources in that region
C. Read/write access to the cloud compute resources
D. Read-only access to the server OS logs
E. Read-only access to the cloud resource diagnostic logs
F. Administrator account in the server OS
A systems administrator needs to deploy a database that saves a unique ID/hash at the beginning of each block into a private cloud. The administrator needs to maximize storage savings. The administrator has multiple storage policies set. Which of the following would be the BEST option for this deployment?
A. Compression enabled
B. Deduplication enabled
C. Mirroring enabled
D. Tokenization enabled