A system administrator wants to create a mitigation strategy to quickly roll back a virtual image after applying the latest updates. Which of the following would the administrator utilize?
Answer : B
Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops. Which of the following should the lab administrator implement to allow students to upload files?
Answer : D
Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?
Answer : D
Although the SAN appears to be running without any problems, the technician is unable to reach the SANs web enabled management interface. Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?
Answer : B
Which of the following business continuity designs provides the highest degree of fault tolerance?
Answer : B
Which of the following protocols is MOST likely used by a switch to communicate status information to an administrator?
Answer : A
Which of the following can be used to encrypt data at rest on a VM located in the cloud?
Answer : A
A storage administrator has 100 terabytes of physical storage space within the SAN. Which of the following is used to enable access to the storage space?
Answer : B
A critical hypervisor security patch has been released and needs to be rolled out as soon as possible. Which of the following steps can be taken to minimize downtime for all guest
VMs currently running?
Answer : B
Which of the following should be installed on VMs to report and take action against potential threats?
Answer : B
Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized. Which of the following should be used to ensure access is controlled appropriately between devices? (Select TWO).
Answer : A,D
A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?
Answer : C
Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?
Answer : D
Which of the following is MOST important when factoring network level security in a public cloud environment?
Answer : B