<< Prev Question Next Question >>

Question 372/400

A software development team is looking for a sandbox environment to test new releases before deploying to production and has requested several virtual machines for this purpose. Which of the following virtual components could be utilized to help isolate these virtual machines from the production infrastructure?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (400q)
Question 1: Which of the following tables would an administrator use to ...
Question 2: Which of the following network topologies should an administ...
Question 3: A company has deployed a website which is mirrored at a seco...
Question 4: Disk read/write performance on a VM is very low. The VM stor...
Question 5: Which of the following solutions primarily relies on private...
Question 6: Joe, a system administrator, has noticed that a remote facil...
Question 7: Which of the following tools would an administrator use to t...
Question 8: Which of the following cloud services provides billing, payr...
Question 9: Which of the following describes the combination of a disk, ...
Question 10: An administrator is tasked to reduce the company's datacente...
Question 11: A company has made the decision to virtualize as many server...
Question 12: A virtualized mission critical application requires a guaran...
Question 13: A fault tolerant storage array with clustered nodes is being...
Question 14: An administrator has been tasked with reducing costs by cons...
Question 15: A company has five servers and wishes to consolidate into a ...
Question 16: Which of the following attributes BEST describes "elasticity...
Question 17: Which of the following should an administrator implement whe...
Question 18: A security administrator is being hired to perform a penetra...
Question 19: Every quarter, technicians perform a UPS and generator test ...
Question 20: Which of the following is a file transfer protocol that woul...
Question 21: A company has a virtualized environment. Hosts are configure...
Question 22: An administrator has created a VM on a new virtualization ho...
Question 23: A company is migrating their physical servers to virtual. Th...
Question 24: An administrator deployed a VM that is hosting an internal w...
Question 25: Which of the following detection controls can be used to ide...
Question 26: Which of the following would BEST ensure uninterrupted commu...
Question 27: An administrator is installing a new Unix-based server and w...
Question 28: Which of the following storage technologies can leverage swi...
Question 29: After receiving a report from the helpdesk that a database a...
Question 30: A system administrator wants to create a mitigation strategy...
Question 31: Which of the following uses the business model of shared res...
Question 32: Joe, an administrator, is responsible for the maintenance an...
Question 33: A round robin is an example of which of the following method...
Question 34: An employee is asked to run an instance of a Linux OS while ...
Question 35: Which of the following will provide the MOST network address...
Question 36: A JBOD is being monitored and an administrator notices that ...
Question 37: Which of the following are components of an Object-Based Sto...
Question 38: Which of the following describes a best practice for placeme...
Question 39: Cloud bursting can alleviate which of the following attacks?...
Question 40: Which of the following are SAN protocols? (Select TWO)....
Question 41: A technician wants to configure a server for storage redunda...
Question 42: A group of users can no longer access a number of different ...
Question 43: A company has hired a new Chief Security Officer (CSO). Whil...
Question 44: A company has multiple guest operating systems running in a ...
Question 45: A technician would like to connect to a virtual server from ...
Question 46: Joe, an administrator, has just added a new VM to a producti...
Question 47: How many cores are available to the resource pool with a Typ...
Question 48: High CPU wait times can often be attributed to:...
Question 49: A VM that is generally used for development is tested quarte...
Question 50: An application has been moved to a new third-party public cl...
Question 51: Which of the following cloud services provides application i...
Question 52: Which of the following should a network administrator implem...
Question 53: Which of the following is true about Type I hypervisors?...
Question 54: Which of the following is a concern when migrating from a pr...
Question 55: A company wants to be sure their cloud infrastructure is sec...
Question 56: Which of the following cryptographic technologies is MOST li...
Question 57: Which of the following could be reviewed on devices to help ...
Question 58: A new WAN connection was recently installed between the prim...
Question 59: Which of the following is used for keeping track of all logi...
Question 60: A network engineer is investigating slow response times for ...
Question 61: Which of the following characteristics hosts several clients...
Question 62: Which of the following statements defines fault tolerance in...
Question 63: An administrator has access to the following tools: ping, tr...
Question 64: A technician wants to isolate storage from other network tra...
Question 65: Which of the following server types would be an ideal candid...
Question 66: A network administrator has been asked to implement a securi...
Question 67: Which of the following cloud service models would be recomme...
Question 68: An administrator has been reviewing a cloud provider's websi...
Question 69: An enterprise hypervisor offers which of the following benef...
Question 70: Which of the following may be used to provide certificate ma...
Question 71: Which of the following is an access control type that requir...
Question 72: Which of the following is the BEST method to isolate iSCSI n...
Question 73: A cloud service provider is associating chargeback values wi...
Question 74: A number of virtual servers suddenly crash, but the physical...
Question 75: A company has a virtual database server running in the cloud...
Question 76: An administrator is investigating performance issues related...
Question 77: An administrator is tasked with encrypting all Personally Id...
Question 78: In which of the following situations would a network adminis...
Question 79: A cloud infrastructure function that can grow and shrink to ...
Question 80: Which of the following tools would an administrator use to c...
Question 81: A system administrator wants to be able to use one server to...
Question 82: Which of the following should be implemented to ensure email...
Question 83: In the process of streamlining the IT activity, a company ha...
Question 84: Which of the following would a company implement to provide ...
Question 85: An administrator has recently added a new host server to a p...
Question 86: A company is building a new server cluster to host applicati...
Question 87: A department requires segregated access due to project requi...
Question 88: Which of the following is MOST likely to be retrieved from a...
Question 89: A company has decided to reduce their datacenter size. An ad...
Question 90: Which of the following tests would be MOST appropriate when ...
Question 91: An administrator has created a new virtual server according ...
Question 92: Which of the following is the BEST answer for implementing a...
Question 93: A network administrator needs to manage a virtual switch rem...
Question 94: Which of the following generally has better performance when...
Question 95: An administrator is called in to determine why a virtual des...
Question 96: Which of the following business continuity designs provides ...
Question 97: A bare metal hypervisor runs:
Question 98: A company has an existing internal network that hosts confid...
Question 99: Which of the following reduces the risk of known attacks fro...
Question 100: The IT department of a company has received many calls conce...
Question 101: Which of the following would be used to advertise a public I...
Question 102: During the company's last DR exercise, the administrator not...
Question 103: Which of the following is the correct subnet mask for a VM w...
Question 104: A client was unable to connect to the cloud provider for ove...
Question 105: Which of the following access control types would give a sys...
Question 106: A company wants to migrate its critical application to a pub...
Question 107: An administrator wants to repurpose server hardware to host ...
Question 108: Which of the following is typically the BEST boundary contro...
Question 109: Which of the following is used to locate a specific area of ...
Question 110: The BEST way to compare daily performance metrics against a ...
Question 111: Which of the following routine practices can help protect re...
Question 112: An administrator notices that the mouse does not perform as ...
Question 113: Virtual switches are:
Question 114: Which of the following MUST be in a zone? (Select TWO)....
Question 115: A Chief Information Officer (CIO) has established a budget f...
Question 116: A virtual campus lab is accessible by students remotely. Whi...
Question 117: Which of the following will allow the administrator to be ab...
Question 118: To avoid the same LUN showing up multiple times in client ho...
Question 119: A company has two datacenters in different cities. When one ...
Question 120: A new host has been bought to be a part of a new cluster. Th...
Question 121: Which of the following is an example of two-factor authentic...
Question 122: An administrator is tasked to perform a P2V migration of a c...
Question 123: An administrator is responsible for maintenance and support ...
Question 124: An administrator notices one of the VMs hosting an applicati...
Question 125: Which of the following protocols is MOST likely used by a sw...
Question 126: Which of the following storage technologies uses file level ...
Question 127: Which of the following backup types will enable scheduled po...
Question 128: Which of the following is the BEST approach to re-architect ...
Question 129: An administrator is planning to implement multipathing for i...
Question 130: Which of the following would create an efficient means of ac...
Question 131: An administrator is implementing a private cloud that will b...
Question 132: Which of the following would be used to mitigate the risk of...
Question 133: Which of the following cloud delivery models presents the LE...
Question 134: A business has a virtualized environment which relies on spe...
Question 135: An administrator has received a request for a disaster recov...
Question 136: Hardware compatibility among multiple hosts guarantees which...
Question 137: The Chief Technology Officer (CTO) has recently implemented ...
Question 138: Which of the following is an example of a customer solely re...
Question 139: Which of the following can be used by the cloud consumer and...
Question 140: Which of the following encryption technologies would MOST li...
Question 141: A web server is offline. Which of the following will allow t...
Question 142: An administrator has provisioned a LUN on a SAN and wants to...
Question 143: Which of the following types of virtual components performs ...
Question 144: A company has virtualized all of their servers on one physic...
Question 145: Which of the following services can an administrator disable...
Question 146: A company has just established a new branch office that need...
Question 147: An administrator is responsible for managing a host that is ...
Question 148: Which of the following should be installed on VMs to report ...
Question 149: Which of the following provides a secure tunnel through the ...
Question 150: The network administrator creates a DNS A record. Which of t...
Question 151: An administrator has configured a cluster but one of the VMs...
Question 152: An external USB hard drive physically attached to a server i...
Question 153: VM templates should have their default account passwords cha...
Question 154: Which of the following deployment models BEST meets the requ...
Question 155: A hypervisor host that has two fibre-channel ports needs to ...
Question 156: In regards to private clouds, which of the following BEST ex...
Question 157: Which of the following hypervisors will allocate resources M...
Question 158: Which of the following service delivery models is MOST likel...
Question 159: Which of the following is an example of vertical scaling?...
Question 160: A new network engineer logs into a router and discovers mult...
Question 161: Which of the following protocols allows fibre channel to be ...
Question 162: Which of the following solutions would an administrator depl...
Question 163: Multipathing software normally chooses favored paths based o...
Question 164: Which of the following is bridged and sends packets on the w...
Question 165: Which of the following are VM template hardening techniques?...
Question 166: Multipathing achieves which of the following high availabili...
Question 167: Which of the following, in conjunction with IPSec, can be co...
Question 168: Which of the following access control types allows users to ...
Question 169: Which of the following provides a company with the BEST equi...
Question 170: Which of the following BEST explains why remote access works...
Question 171: An organization wants to create a server VM that is segregat...
Question 172: Which of the following would be used to establish a dedicate...
Question 173: Which of the following factors yields cost savings in cloud ...
Question 174: Which of the following ensures that there is enough space fo...
Question 175: Which of the following BEST describes the process of mapping...
Question 176: After a recent outage going unnoticed, an administrator has ...
Question 177: Which of the following can be used to enable out-of-band man...
Question 178: Which of the following is a subcomponent of a virtual machin...
Question 179: Which of the following components should be virtualized and ...
Question 180: Which of the following is MOST important when factoring netw...
Question 181: In which of the following cloud services will the customer b...
Question 182: A system administrator is creating images of the physical se...
Question 183: An administrator is tasked with writing the company disaster...
Question 184: A company has purchased a new self-service provisioning syst...
Question 185: Students in a virtual lab must be able to upload and downloa...
Question 186: A technician has recently virtualized an older business crit...
Question 187: An administrator is no longer receiving alerting messages fr...
Question 188: An administrator is building a VM for a department whose req...
Question 189: Joe, a new administrator, is asked to enter his mobile phone...
Question 190: Several servers are connected to a SAN using three storage d...
Question 191: A company decided to go with a cloud-based hosted email solu...
Question 192: An administrator has been tasked with the collection of all ...
Question 193: Which of the following protocols could be used to identify t...
Question 194: A company uses a third-party utility to protect critical vir...
Question 195: Users on a network report that they are unable to access any...
Question 196: In a storage fabric, which of the following is the primary w...
Question 197: An administrator is troubleshooting the cause of multiple VM...
Question 198: A critical hypervisor security patch has been released and n...
Question 199: A storage system that retains data in a flat address space i...
Question 200: Which of the following cloud delivery models is deployed ove...
Question 201: Which of the following authentication types is being require...
Question 202: New servers were purchased specifically for virtualization c...
Question 203: Which of the following goals are met by multi-port link aggr...
Question 204: Which of the following would be used to prove the existence ...
Question 205: Which of the following would physically block access to a zo...
Question 206: An administrator allocates 50GB on a SAN for use by a server...
Question 207: Which of the following is a type of hypervisor that runs on ...
Question 208: An IT professional is considering the migration of an on-lin...
Question 209: A system administrator can no longer easily control a remote...
Question 210: An administrator has noticed that a 500MB file is taking ove...
Question 211: Which of the following can be used to protect data integrity...
Question 212: Which of the following offers 128, 192, and 256 bit encrypti...
Question 213: A host has four NICs. Two of the NICs that have been teamed ...
Question 214: Which of the following storage technologies is IP-based?...
Question 215: An administrator has logically grouped several VMs and confi...
Question 216: Encryption ensures which of the following? (Select TWO)....
Question 217: Geo-clustering protects against which of the following?...
Question 218: A catastrophic disk failure occurred on a company's critical...
Question 219: An administrator is configuring access to hypervisors that w...
Question 220: Which of the following may be used prior to encryption of in...
Question 221: Which of the following can be used to assign priority to spe...
Question 222: Which of the following would be the FASTEST way to backup a ...
Question 223: Which of the following cloud delivery models consists of pri...
Question 224: Which of the following RAID configuration would be used to a...
Question 225: Which of the following are used in guest servers? (Select TW...
Question 226: A storage administrator has created five new LUNs for a comp...
Question 227: An administrator needs to provide Internet access to all int...
Question 228: Which of the following can limit VM mobility in a host clust...
Question 229: A new server is connected to the fibre channel switch. In or...
Question 230: Which of the following would assist in preventing malware fr...
Question 231: One of the administrators of a cloud service provider has be...
Question 232: In order to enhance security on a SAN, which of the followin...
Question 233: A system administrator is testing various types of software ...
Question 234: An administrator receives an automated text that indicates a...
Question 235: Which of the following terms would describe a cloud characte...
Question 236: The Chief Information Officer (CIO) of a company would like ...
Question 237: Which of the following would be the FIRST choice to encrypt ...
Question 238: A technician wants to remotely gather a list of all the soft...
Question 239: An administrator is planning to implement multipathing for I...
Question 240: After deploying VM guests from a VM template on an NFS datas...
Question 241: An administrator adds a new virtualization host to an existi...
Question 242: The administrator of an organization needs to configure a VM...
Question 243: Anne, a disgruntled employee, decides to load a VM onto a US...
Question 244: Which of the following provides insight information when inv...
Question 245: A system administrator identified an issue on a critical ser...
Question 246: Which of the following would allow the knowledge management ...
Question 247: An administrator is building a sandbox environment. There is...
Question 248: Requiring all SaaS vendors to perform updates to systems wit...
Question 249: The corporate security department is recommending that the a...
Question 250: A user is notified that they will be terminated at the end o...
Question 251: Which of the following technologies should be used to reduce...
Question 252: An administrator finds and removes an "any any" allow rule. ...
Question 253: Joe, a network administrator, is working with the security t...
Question 254: A system engineer is asked to design a new department infras...
Question 255: A company has tasked an administrator with virtualizing the ...
Question 256: The actual data within an object store is called the:...
Question 257: Which of the following can be used to enable additional netw...
Question 258: A new self-service provisioning system has been deployed to ...
Question 259: Which of the following virtualization implementations yields...
Question 260: After a sudden spike in traffic Anne, an administrator, noti...
Question 261: Which of the following is LEAST suitable for online storage ...
Question 262: Which of the following can be used to encrypt data at rest o...
Question 263: A storage array is shared with other departments. An adminis...
Question 264: An administrator deployed ten application servers from a sin...
Question 265: Users report that they are unable to access the Internet. Th...
Question 266: A company with an online store website has migrated the webs...
Question 267: Which of the following would be a good reason to perform a V...
Question 268: An administrator is working on a guest operating system and ...
Question 269: A storage administrator has just partitioned storage to seve...
Question 270: The Chief Information Officer (CIO) of a company is tasked t...
Question 271: Which of the following is often used by a certificate to kee...
Question 272: Which of the following describes federated access control?...
Question 273: Which of the following are benefits of virtualization in a c...
Question 274: A company needs to have a system that allows for high availa...
Question 275: Which of the following security methods would be used to har...
Question 276: Which of the following would be a deciding factor when choos...
Question 277: Which of the following disk drive types would be the BEST fo...
Question 278: In which of the following situations would an administrator ...
Question 279: Management has implemented a policy which states that the OS...
Question 280: Which of the following cloud models would be used when imple...
Question 281: A company wants to build a cloud environment where individua...
Question 282: A network engineer continuously runs traceroute at different...
Question 283: A Chief Information Officer (CIO) has summoned an administra...
Question 284: Anne, an administrator, receives an alert indicating a disk ...
Question 285: A system administrator has been tasked with increasing redun...
Question 286: Which of the following protocols uses port 53, by default?...
Question 287: A corporate office allows employees to work remotely, using ...
Question 288: Which of the following only uses Fibre Channel to implement ...
Question 289: An administrator has implemented a self-service provisioning...
Question 290: A developer is storing a large number of images in binary fo...
Question 291: An administrator is unable to communicate with the physical ...
Question 292: An administrator is creating a new VM template and has a req...
Question 293: Which of the following would be the FIRST thing to do after ...
Question 294: A company has contracted email and storage services from a c...
Question 295: An administrator deployed a VM from a template which has the...
Question 296: An IT manager wishes to migrate classified data to a cloud e...
Question 297: A storage administrator has 100 terabytes of physical storag...
Question 298: The Chief Information Officer (CIO) is selecting a hardware ...
Question 299: After an administrator successfully migrated the last physic...
Question 300: A system administrator has a pool of employees using VMs tha...
Question 301: When conducting penetration testing on production systems du...
Question 302: Which of the following events will force a storage migration...
Question 303: Which of the following backup methods is MOST used by VM use...
Question 304: A system administrator repeatedly gets reports of files beco...
Question 305: Which of the following should an administrator perform to ha...
Question 306: Which of the following tools is used to manage virtual serve...
Question 307: A company that provides Software as a Service wants to preve...
Question 308: Which of the following is the BEST means of ensuring resourc...
Question 309: Which of the following would need to be consistent for a LUN...
Question 310: Two independent organizations want to share authentication a...
Question 311: An administrator is tasked with installing an application pa...
Question 312: An administrator has overcommitted resources in a cluster. A...
Question 313: Which of the following is the BEST classification for a host...
Question 314: Which of the following is true about a Type II hypervisor?...
Question 315: An administrator needs to add more guests in a virtual envir...
Question 316: An administrator is tasked with ensuring that any new virtua...
Question 317: Host A and B can both access LUNs one to ten in a single SAN...
Question 318: Which of the following allows a network device to process st...
Question 319: A system administrator has a server that has lost one of its...
Question 320: Which of the following ciphers consists of independent keys ...
Question 321: A company that provides cloud-based storage services wants t...
Question 322: Which of the following storage technologies is file-based?...
Question 323: A system administrator is planning storage infrastructure to...
Question 324: During deployment, which of the following should a technicia...
Question 325: A government agency wants to create a common environment tha...
Question 326: Which of the following BEST describes a copy of data?...
Question 327: A start-up company has recently gone public and is experienc...
Question 328: Which of the following is a disk interface type that has the...
Question 329: Ubiquitous access to cloud computing means:...
Question 330: When working with hypervisors configured in a highly availab...
Question 331: Which of the following ports is generally associated with a ...
Question 332: A small startup wins a contest giving them advertising time ...
Question 333: A system administrator is asked to build ten servers and is ...
Question 334: Every night a datacenter takes snapshots of each VM and back...
Question 335: Which of the following is used to handle non-sensitive infor...
Question 336: Which of the following storage technologies would be MOST ap...
Question 337: In order for a company to transition to a cloud solution, wh...
Question 338: Which of the following mitigates newly found vulnerabilities...
Question 339: Which of the following is a boot type that requires a NIC wh...
Question 340: A cloud based global multiplayer game is an example of which...
Question 341: Users report that they are unable to access a virtual server...
Question 342: ARP is used to resolve IP addresses to:...
Question 343: A web hosting company received reports of slow performance f...
Question 344: Which of the following could be assigned to a virtual CPU?...
Question 345: Which of the following would an administrator implement betw...
Question 346: An administrator has three VMs and each has been allocated t...
Question 347: The IT department has had problems coping with the demand of...
Question 348: The administrator wants to have central storage for all of t...
Question 349: A small business is moving ten physical servers to the cloud...
Question 350: An administrator is designing a VM cluster to support a new ...
Question 351: A datacenter migration is taking place and the administrator...
Question 352: Several clients hosted on a cluster, is BEST referred to as:...
Question 353: Clients of a cloud provider are able to access their informa...
Question 354: A system administrator has a distribution switch with four u...
Question 355: Which of the following could an administrator perform to res...
Question 356: In which of the following situations would a network adminis...
Question 357: Joe, an administrator, is experiencing connectivity problems...
Question 358: Although the SAN appears to be running without any problems,...
Question 359: Which of the following BEST defines RAID 4?...
Question 360: Which of the following cloud services would MOST likely be u...
Question 361: An administrator deployed a DaaS cloud delivery model for a ...
Question 362: Which of the following is true about physical and virtual CP...
Question 363: Which of the following describes the access control method w...
Question 364: Elasticity is closely related to which of the following clou...
Question 365: An administrator creates a new virtual desktop for a user. T...
Question 366: A server has two power supplies such that when the first one...
Question 367: An administrator is testing a new web server from outside of...
Question 368: Which of the following tools would an administrator use to t...
Question 369: Which of the following hypervisor types runs on a host opera...
Question 370: The performance logs on a virtualization server show a large...
Question 371: Which of the following would be considered a cold site?...
Question 372: A software development team is looking for a sandbox environ...
Question 373: Which of the following networking components would be used t...
Question 374: An administrator recently deployed a critical web server tha...
Question 375: Some of the VMs in an environment are experiencing network c...
Question 376: Which of the following BEST describes the need for LUN Maski...
Question 377: Which of the following is a MINIMUM requirement for VM onlin...
Question 378: Which of the following access control methods would be BEST ...
Question 379: Which of the following will be the BEST option for an admini...
Question 380: An administrator has enabled NPIV and has configured the SAN...
Question 381: A network administrator was tasked with creating several new...
Question 382: Which of the following will explain why only some of the CPU...
Question 383: Which of the following protocols would allow data to be tran...
Question 384: Which of the following would mitigate a "ping of death" atta...
Question 385: An IPS is used to:
Question 386: A company wants to streamline their reporting tools. They ha...
Question 387: A hypervisor is unable to access its fibre-channel storage. ...
Question 388: An administrator has installed a new NAS and is now attempti...
Question 389: Network statistics show that the 1Gbps switch port used for ...
Question 390: Which of the following network terms describes the process o...
Question 391: A company that provides IaaS to small business organizations...
Question 392: A company is required to provide their customers with zero d...
Question 393: Which of the following locations would a system engineer MOS...
Question 394: The Chief Information Officer (CIO) tells the IT department ...
Question 395: A programmer removes OS software from a laptop during develo...
Question 396: Users have been reporting slow response times on a database ...
Question 397: A storage administrator wants to limit an operating system f...
Question 398: An administrator creates a new VM, but after powering on the...
Question 399: Which of the following RAID levels spreads blocks of a file ...
Question 400: An administrator, who operates a public cloud, has been task...