Question 276
Which of the following techniques would be used to deliver SLA performance guarantees for a VM in a virtual environment? (Select two.)
Question 277
An administrator suspects malware has infected a server. Which of the following should be used to check services communicating with external servers?
Question 278
An automation performs the following on a monthly basis:
- Disable accounts that have not logged on in the last 60 days
- Remove firewall rules with zero hits in the last 30 days
- Remove DNS entries that have not been updated in the last 60 days
- Archive all logs that are more than 30 days old
Six weeks after this new automation is implemented, an internal client reports that quarterly replication failover testing has failed.
Which of the following is the MOST likely cause of the failed test?
- Disable accounts that have not logged on in the last 60 days
- Remove firewall rules with zero hits in the last 30 days
- Remove DNS entries that have not been updated in the last 60 days
- Archive all logs that are more than 30 days old
Six weeks after this new automation is implemented, an internal client reports that quarterly replication failover testing has failed.
Which of the following is the MOST likely cause of the failed test?
Question 279
Which of the following is used in Object-Based Storage to reference the servers that provide services to store, retrieve, and manage data in the Object-Based Storage system?
Question 280
A cloud provider is evaluating an insider threat. A resource from the company operations team has access to the servers' virtual disks. This poses a risk that someone could copy and move the virtual server image and have access to the data. Which of the following solutions would help mitigate this problem?