Exam 10: Cloud Automation
Exam 1: Introduction to Cloud Computing32 Questions
Exam 2: Virtual Hardware31 Questions
Exam 3: Migration to the Cloud40 Questions
Exam 4: Cloud Infrastructure31 Questions
Exam 5: Cloud Connectivity and Troubleshooting33 Questions
Exam 6: Securing Cloud Resources32 Questions
Exam 7: Identity and Access Management37 Questions
Exam 8: Cloud Storage32 Questions
Exam 9: Managing Cloud Capacity and Performance41 Questions
Exam 10: Cloud Automation41 Questions
Select questions type
Gary is reading one of the marketing e-mails that he receives as part of his company's Azure subscription. This particular e-mail highlights a tool that he's interested in learning more about. The tool is described as a security tool that relies on learning-based analytics to better monitor activities, identify threats, and prioritize alerts for follow-up by security staff. Which of the following should he look up in the Azure portal to learn more about it?
(Multiple Choice)
4.8/5
(28)
Miriam is performing a quarterly review of all web-based applications that the company uses. She sees that one of the finance department's applications has an update available for it. After downloading the update, she applies the update to a duplicate of the production environment that does not receive any traffic. After verifying that everything looks good, she transfers all of the traffic over to that server and updates the formerly active server. Which of the following deployment types has she chosen for this application update?
(Multiple Choice)
4.9/5
(37)
Zane's company has chosen to use Ansible for its primary automation tool. Which of the following is the default protocol used by this tool that he might need to ensure it is open on the firewall in order for it to work correctly?
(Multiple Choice)
4.8/5
(29)
Taj needs to install a set of updates for an application server that will restart the server three times. Which of the following should prevent at least some of the users from calling in to report an outage? (Choose two)
(Multiple Choice)
4.9/5
(37)
Fictional Corp has recently changed its server naming convention. Halfway through the renaming, the automation stops working. Which of the following should have been done as part of the process?
(Multiple Choice)
4.8/5
(35)
User acceptance testing has just been completed on a new application and it is ready for the rest of the userbase at Fictional Corp to start using it. Which of the following environments should the application be copied to?
(Multiple Choice)
5.0/5
(34)
Luc has installed Ansible and is trying to get it working correctly, but cannot seem to make it communicate with the various nodes that he wants to use it on. Which of the following is the most likely issue?
(Multiple Choice)
4.8/5
(38)
Julia uses AWS's CloudFormation tool to manage many of her company's resources. Which of the following may be used as part of the template configuration? (Choose two)
(Multiple Choice)
4.9/5
(38)
Jeanette just finished watching a video on a popular social media site about a technology that can provision and manage IT infrastructure through configuration files that can be automated rather than interactive tools that require manual configuration. Which of the following technologies was she learning about?
(Multiple Choice)
4.8/5
(36)
Cherice has just completed an audit of a server group that she has recently taken over. She found a number of accounts that were still active even though the users no longer worked for the company. Which of the following should she do to prevent this issue in the future?
(Multiple Choice)
4.9/5
(34)
Cadence is analyzing disk space usage on one of the Linux virtual machines she manages. She noticed that log files are taking up more space than necessary. Which of the following automation jobs could she set up to resolve this issue?
(Multiple Choice)
5.0/5
(34)
Eleanor is trying to secure a couple of servers that she manages. After hardening the servers, she installs a piece of software on each of them that will detect intrusions, log the event, and notify the administration team. She does not want it to automatically stop the intrusions due to the possibility of false positives. Which of the following has she installed?
(Multiple Choice)
5.0/5
(37)
Merlin wants to create a new script that will communicate with several of his CSP's APIs. Which of the following scripting languages might he use to create the script?
(Multiple Choice)
4.8/5
(34)
Kylie has a number of processes that she has implemented automation for. As she was researching on the best way to automate another process, she came across some information about a technique for optimizing automation processes into a single workflow. Which of the following describe this technique?
(Multiple Choice)
4.8/5
(30)
Amari is planning on deploying a failover cluster for a new cloud-based deployment. She works for a comedy television channel and needs to ensure that users can access their streaming services 24/7/365. Which of the following technical terms might describe the primary benefit that she is hoping for by implementing this technology?
(Multiple Choice)
4.7/5
(33)
Mavis wants to develop an application that can talk to one of the cloud-based services her company uses. As part of the design process, she needs to take into account the structure and type of messages that are sent back and forth from the service. Which of the following describes the endpoint that her application will be communicating with for that service?
(Multiple Choice)
4.8/5
(30)
Sven wants to ensure that his infrastructure is protected from attacks against the applications themselves and the automation and orchestration that helps keep everything together. In some areas he implements a technology that can only detect attacks, while in others he implements a technology that can also stop the attack in progress. Which of the following terms can be used to describe the technology that he has implemented?
(Multiple Choice)
4.9/5
(41)
Marvin runs one of the operating system utilities on a server and receives a message that several of the files appear to have been modified or corrupted. The operating system is recommending reinstalling those files from the installation source. Which of the following tools could have alerted Marvin or other administrators when the files were originally changed?
(Multiple Choice)
4.7/5
(35)
Tanesha is currently documenting all of the steps necessary to perform various functions that her team is responsible for. Which of the following describes what she is creating?
(Multiple Choice)
4.9/5
(34)
Strom works on a team that manages a number of nodes to provide commercial e-mail list services for companies. With their current infrastructure and volume, it is sometimes necessary to change the configuration of various nodes very quickly to be able to handle other functions. Which of the following would result in the quickest configuration changes being applied to the nodes?
(Multiple Choice)
5.0/5
(34)
Showing 21 - 40 of 41
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)