Question 96

A cloud administrator needs to give a new developer access to contents in a directory stored in a public cloud provider. Which of the following is the BEST way to do this?
  • Question 97

    Anne, an administrator, notices unusual activity on a database server. After reviewing the logs, she notices a number of successful anonymous FTP logins and transferring of data to an external server.
    Which of the following hardening techniques would have helped stop this attack from succeeding?
    (Select two.)
  • Question 98

    A mobile subscriber is experiencing random limited-service outages. Customers report being unable to make calls or browse. The service provider management console is not showing any alarms, errors, or critical logs, but does show a large number of connection request failures.
    Which of the following could be the problem?
  • Question 99

    An administrator has created a new virtual server according to specifications and verified that TCP/IP settings are correct. When the VM is powered on, however, an error message indicates that a network card MAC address conflict exists. Which of the following would resolve this issue?
  • Question 100

    Which of the following techniques would be used to deliver SLA performance guarantees for a VM in a virtual environment? (Select two.)