Question 96
A cloud administrator needs to give a new developer access to contents in a directory stored in a public cloud provider. Which of the following is the BEST way to do this?
Question 97
Anne, an administrator, notices unusual activity on a database server. After reviewing the logs, she notices a number of successful anonymous FTP logins and transferring of data to an external server.
Which of the following hardening techniques would have helped stop this attack from succeeding?
(Select two.)
Which of the following hardening techniques would have helped stop this attack from succeeding?
(Select two.)
Question 98
A mobile subscriber is experiencing random limited-service outages. Customers report being unable to make calls or browse. The service provider management console is not showing any alarms, errors, or critical logs, but does show a large number of connection request failures.
Which of the following could be the problem?
Which of the following could be the problem?
Question 99
An administrator has created a new virtual server according to specifications and verified that TCP/IP settings are correct. When the VM is powered on, however, an error message indicates that a network card MAC address conflict exists. Which of the following would resolve this issue?
Question 100
Which of the following techniques would be used to deliver SLA performance guarantees for a VM in a virtual environment? (Select two.)