Deck 10: Cloud Automation

Full screen (f)
exit full mode
Question
Cecil is interested in using more of the tools available from the cloud service provider his company has chosen to use, AWS. He sees that they have various security tools available including a threat detection tool that relies on machine learning, anomaly detection, and threat intelligence to identify threats and trigger events or functions. Which of the following is the tool that he may be interested in implementing?

A) ATP
B) FIM
C) GuardDuty
D) Lambda
Use Space or
up arrow
down arrow
to flip the card.
Question
Zane's company has chosen to use Ansible for its primary automation tool. Which of the following is the default protocol used by this tool that he might need to ensure it is open on the firewall in order for it to work correctly?

A) SSH
B) STP
C) DSL
D) JSON
Question
Mavis wants to develop an application that can talk to one of the cloud-based services her company uses. As part of the design process, she needs to take into account the structure and type of messages that are sent back and forth from the service. Which of the following describes the endpoint that her application will be communicating with for that service?

A) ANSI
B) ACPI
C) API
D) ASCII
Question
Sigmund has created a new web application server for the psychology department at the university he works for. He wants to install a tool on the server that will detect any security breaches, alert the administrative team, log the event, and attempt to stop the security breach before the attacker is able to gain further access or cause any damage. Which of the following types of tools might he install?

A) HIDS
B) HIPS
C) NIDS
D) NIPS
Question
Amari is planning on deploying a failover cluster for a new cloud-based deployment. She works for a comedy television channel and needs to ensure that users can access their streaming services 24/7/365. Which of the following technical terms might describe the primary benefit that she is hoping for by implementing this technology?

A) LOL
B) HE
C) HA
D) ROFL
Question
Omar needs to install an update to the web servers so that the development team can use some of the new libraries and functions for the .NET application they are modifying. However, upon trying to install the latest .NET framework, an error is displayed stating that another update must be installed first. Which of the following technical terms describes why the .NET framework cannot be installed yet?

A) Dependencies
B) Subordinates
C) Reliants
D) Tied-To-Update (TTU)
Question
Ronan has just received notification of a critical update that is available for one of the operating systems that his company uses. He downloads it from the OS developer's website and patches a couple of the systems. He then allows a small amount of traffic to those servers so he can verify that there are no new error messages or issues with the deployment. Once he's verified that they have updated successfully, he issues the patch to the rest of the servers running that operating system. Which of the following types of deployments has he just performed?

A) Blue-green deployment
B) Look-ahead deployment
C) Canary deployment
D) Rolling deployment
Question
Tanesha is currently documenting all of the steps necessary to perform various functions that her team is responsible for. Which of the following describes what she is creating?

A) Guidebook
B) Runbook
C) Walkthroughs
D) Stepping stones
Question
Kylie has a number of processes that she has implemented automation for. As she was researching on the best way to automate another process, she came across some information about a technique for optimizing automation processes into a single workflow. Which of the following describe this technique?

A) Instrumentation
B) Coordination
C) Orchestration
D) Collaboration
Question
Miriam is performing a quarterly review of all web-based applications that the company uses. She sees that one of the finance department's applications has an update available for it. After downloading the update, she applies the update to a duplicate of the production environment that does not receive any traffic. After verifying that everything looks good, she transfers all of the traffic over to that server and updates the formerly active server. Which of the following deployment types has she chosen for this application update?

A) Blue-green deployment
B) Look-ahead deployment
C) Canary deployment
D) Rolling deployment
Question
Regan has been asked to apply updates to one of the company's web application server farms. He does not want to update all of the servers at once in case there is some sort of an issue that causes a crash or failure. He decides to direct traffic away from a few servers and update those first. Once he has tested that everything is working successfully, he'll allow them to handle traffic again and then do another small group of servers. He'll continue repeating this process until all servers have been updated. Which of the following describes the deployment method that he has chosen?

A) Blue-green deployment
B) Look-ahead deployment
C) Canary deployment
D) Rolling deployment
Question
Gary is reading one of the marketing e-mails that he receives as part of his company's Azure subscription. This particular e-mail highlights a tool that he's interested in learning more about. The tool is described as a security tool that relies on learning-based analytics to better monitor activities, identify threats, and prioritize alerts for follow-up by security staff. Which of the following should he look up in the Azure portal to learn more about it?

A) ATP
B) FIM
C) GuardDuty
D) Lambda
Question
Olina is fairly new at Fictional Corp and is used to working at much smaller companies. Most of her former jobs have all been manual work. However, she has been told that because of its size, her new company prefers to implement technologies that can perform various processes and procedures without human intervention so that humans can spend their time monitoring the systems for errors and fixing problems when something goes wrong. Which of the following describes what Fictional Corp has implemented to much more of an extent than her previous company?

A) In-house developed applications
B) Proprietary system management procedures
C) High availability
D) Automation
Question
Merlin wants to create a new script that will communicate with several of his CSP's APIs. Which of the following scripting languages might he use to create the script?

A) Python
B) YAML
C) JSON
D) XML
Question
User acceptance testing has just been completed on a new application and it is ready for the rest of the userbase at Fictional Corp to start using it. Which of the following environments should the application be copied to?

A) QA
B) Production
C) Development
D) Archive
Question
Katy wants to make a few automated API calls from a new application that she is developing. Which of the following might be a valid structure for the data that she needs to send to the API endpoint?

A) JavaScript
B) Anaconda
C) JSON
D) PHP
Question
Garrett has developed an application and is ready for the user acceptance team to go through and verify that everything is functional and working as it should while reporting any bugs they may identify. Which of the following environments should he copy the application to for them to begin their work?

A) QA
B) Production
C) Development
D) Blue-green
Question
Tomas is going to be deploying a new cloud-based point-of-sale application for the organization that will be run within web browsers on computers located in his company's retail stores. He knows that the system must experience as little downtime as possible. Which of the following technologies might he choose to implement?

A) Plan b infrastructure (PBI)
B) Failover cluster (FC)
C) Planned failure domain (PFD)
D) Alternate lifecycle system (ALS)
Question
Sven wants to ensure that his infrastructure is protected from attacks against the applications themselves and the automation and orchestration that helps keep everything together. In some areas he implements a technology that can only detect attacks, while in others he implements a technology that can also stop the attack in progress. Which of the following terms can be used to describe the technology that he has implemented?

A) IDP
B) IDS
C) ILS
D) IPS
Question
Marvin runs one of the operating system utilities on a server and receives a message that several of the files appear to have been modified or corrupted. The operating system is recommending reinstalling those files from the installation source. Which of the following tools could have alerted Marvin or other administrators when the files were originally changed?

A) FIM
B) IFS
C) FCoE
D) MTBF
Question
Fictional Corp has decided that it wants to automate as much of the infrastructure as possible. As well, it has decided to outsource some of the monitoring capabilities. Which of the following might they outsource some of these tasks to?

A) MPLS
B) CMS
C) MSP
D) DSP
Question
Fictional Corp has recently changed its server naming convention. Halfway through the renaming, the automation stops working. Which of the following should have been done as part of the process?

A) The servers should have used DHCP reservations.
B) The automation configuration should have been updated as each server name was changed.
C) The ARP tables should have been updated first.
D) The MAC address should have been updated in the automation configuration as well.
Question
Strom works on a team that manages a number of nodes to provide commercial e-mail list services for companies. With their current infrastructure and volume, it is sometimes necessary to change the configuration of various nodes very quickly to be able to handle other functions. Which of the following would result in the quickest configuration changes being applied to the nodes?

A) Send model
B) Pull model
C) Push model
D) Grab model
Question
Adele is looking at the options for automation tools and needs to choose one that does not require the installation of an agent. Which of the following tools might she choose?

A) SaltStack
B) Puppet
C) Chef
D) Ansible
Question
Desiree works for a web hosting company that adds new accounts and removes others on a regular basis. Which of the following should she automate for customers that have cancelled their service? (Choose two.)

A) Remove DNS entries for their sites.
B) Archive the customer's sites and logs for 30 days and then delete them.
C) Delete all of the files and logs associated with the customer's account.
D) Change the customer's password.
Question
Reina has configured an orchestration model for her company's infrastructure that requires servers to connect to the centralized server once an hour to determine if there should be any configuration changes made. Which of the following is she using?

A) Send model
B) Pull model
C) Push model
D) Grab model
Question
Fictional Corp has chosen AWS as its primary cloud service provider. Which of the following automation tools could they use to help with configuring and managing EC2 instances?

A) Automation
B) Deployment Manager
C) SaltyChef
D) SSM
Question
Dave manages a large network and has researched a bunch of automation tools. He decides on one that requires the installation of an agent, called a minion, on the nodes to be automated, which are then called minions. Which of the following automation tools did Dave choose?

A) SaltStack
B) Puppet
C) Chef
D) Ansible
Question
Cherice has just completed an audit of a server group that she has recently taken over. She found a number of accounts that were still active even though the users no longer worked for the company. Which of the following should she do to prevent this issue in the future?

A) Set up an automation task to lock accounts that have been inactive over 30 days automatically and send the user a notification.
B) Set up an automation task to remind her to run a user audit on the first of every month.
C) Set up an automation task to disable accounts that have been inactive over 30 days automatically and send the administrator a notification.
D) Set up an automation task to delete accounts that have been inactive over 30 days and send the administrator a notification.
Question
Serena wants to implement as much automation in her organization as possible. One of her next tasks is to create a process where the system can duplicate a virtual machine on the fly. Which of the following terms might describe this automation process?

A) Replicating
B) Cloning
C) Twinning
D) Doubling
Question
Eleanor is trying to secure a couple of servers that she manages. After hardening the servers, she installs a piece of software on each of them that will detect intrusions, log the event, and notify the administration team. She does not want it to automatically stop the intrusions due to the possibility of false positives. Which of the following has she installed?

A) HIDS
B) HIPS
C) NIDS
D) NIPS
Question
Jose just returned from a security conference where he learned about a technology that he can implement on his network that will detect security breaches on his network, log the event, and alert the administrator. He also wants it to automatically stop the breach. Which of the following technologies could he implement?

A) HIDS
B) HIPS
C) NIDS
D) NIPS
Question
Wyatt notices a message on the dashboard that one of the servers is no longer reachable by the automation system. He remotes into the server by name and is able to connect just fine. He pings the server by name from his workstation and it comes back with a different IP address than what is in the automation system. Which of the following is a possible reason why?

A) The server somehow changed from a static IP address to DHCP and is now receiving a different IP address and the automation system isn't configured to detect IP address changes automatically.
B) The DNS server is having issues.
C) There is a rule on the firewall blocking the automation traffic.
D) The DHCP server is having issues.
Question
Gisella has just returned from a security conference where she won a free year of protection and support for her company with a device that will detect intrusions on her network, alert the administrators, and log the events. Unfortunately, it will not try to stop the intrusion. Which of the following has she won?

A) HIDS
B) HIPS
C) NIDS
D) NIPS
Question
Startup Inc. has chosen the Azure platform as its cloud service provider. Which of the following tools might they use for configuration management, update management, and process automation?

A) Automation
B) Deployment Manager
C) SaltyChef
D) SSM
Question
Cadence is analyzing disk space usage on one of the Linux virtual machines she manages. She noticed that log files are taking up more space than necessary. Which of the following automation jobs could she set up to resolve this issue?

A) Archive all log files older than 30 days to cold storage.
B) Rename the log files.
C) Check to make sure that the appropriate logging level is configured.
D) Move the log files to another directory.
Question
Jeanette just finished watching a video on a popular social media site about a technology that can provision and manage IT infrastructure through configuration files that can be automated rather than interactive tools that require manual configuration. Which of the following technologies was she learning about?

A) Runbook
B) IaC
C) Orchestration
D) Automation
Question
Julia uses AWS's CloudFormation tool to manage many of her company's resources. Which of the following may be used as part of the template configuration? (Choose two)

A) YAML
B) XML
C) JSON
D) HCL
Question
Luc has installed Ansible and is trying to get it working correctly, but cannot seem to make it communicate with the various nodes that he wants to use it on. Which of the following is the most likely issue?

A) The port for YAML is not open on the firewall.
B) The nodes are all offline.
C) The agent has not been installed on the nodes yet.
D) Port 22 is not open on the firewall.
Question
Amber has been researching automation tools and believes that Puppet is the best option for her company to use. She is currently testing the open-source version but is considering asking for budget to be allocated so that she can implement the enterprise version. How many nodes can she run the enterprise version on before needing to start paying for the product?

A) 5
B) 10
C) 20
D) 25
Question
Taj needs to install a set of updates for an application server that will restart the server three times. Which of the following should prevent at least some of the users from calling in to report an outage? (Choose two)

A) Disable the service desk phone number temporarily.
B) Schedule a maintenance window.
C) Perform the update when the fewest number of people are using the application.
D) Make a backup of the application server.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Cloud Automation
1
Cecil is interested in using more of the tools available from the cloud service provider his company has chosen to use, AWS. He sees that they have various security tools available including a threat detection tool that relies on machine learning, anomaly detection, and threat intelligence to identify threats and trigger events or functions. Which of the following is the tool that he may be interested in implementing?

A) ATP
B) FIM
C) GuardDuty
D) Lambda
C
2
Zane's company has chosen to use Ansible for its primary automation tool. Which of the following is the default protocol used by this tool that he might need to ensure it is open on the firewall in order for it to work correctly?

A) SSH
B) STP
C) DSL
D) JSON
A
3
Mavis wants to develop an application that can talk to one of the cloud-based services her company uses. As part of the design process, she needs to take into account the structure and type of messages that are sent back and forth from the service. Which of the following describes the endpoint that her application will be communicating with for that service?

A) ANSI
B) ACPI
C) API
D) ASCII
C
4
Sigmund has created a new web application server for the psychology department at the university he works for. He wants to install a tool on the server that will detect any security breaches, alert the administrative team, log the event, and attempt to stop the security breach before the attacker is able to gain further access or cause any damage. Which of the following types of tools might he install?

A) HIDS
B) HIPS
C) NIDS
D) NIPS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
Amari is planning on deploying a failover cluster for a new cloud-based deployment. She works for a comedy television channel and needs to ensure that users can access their streaming services 24/7/365. Which of the following technical terms might describe the primary benefit that she is hoping for by implementing this technology?

A) LOL
B) HE
C) HA
D) ROFL
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
Omar needs to install an update to the web servers so that the development team can use some of the new libraries and functions for the .NET application they are modifying. However, upon trying to install the latest .NET framework, an error is displayed stating that another update must be installed first. Which of the following technical terms describes why the .NET framework cannot be installed yet?

A) Dependencies
B) Subordinates
C) Reliants
D) Tied-To-Update (TTU)
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
Ronan has just received notification of a critical update that is available for one of the operating systems that his company uses. He downloads it from the OS developer's website and patches a couple of the systems. He then allows a small amount of traffic to those servers so he can verify that there are no new error messages or issues with the deployment. Once he's verified that they have updated successfully, he issues the patch to the rest of the servers running that operating system. Which of the following types of deployments has he just performed?

A) Blue-green deployment
B) Look-ahead deployment
C) Canary deployment
D) Rolling deployment
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
Tanesha is currently documenting all of the steps necessary to perform various functions that her team is responsible for. Which of the following describes what she is creating?

A) Guidebook
B) Runbook
C) Walkthroughs
D) Stepping stones
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
Kylie has a number of processes that she has implemented automation for. As she was researching on the best way to automate another process, she came across some information about a technique for optimizing automation processes into a single workflow. Which of the following describe this technique?

A) Instrumentation
B) Coordination
C) Orchestration
D) Collaboration
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
Miriam is performing a quarterly review of all web-based applications that the company uses. She sees that one of the finance department's applications has an update available for it. After downloading the update, she applies the update to a duplicate of the production environment that does not receive any traffic. After verifying that everything looks good, she transfers all of the traffic over to that server and updates the formerly active server. Which of the following deployment types has she chosen for this application update?

A) Blue-green deployment
B) Look-ahead deployment
C) Canary deployment
D) Rolling deployment
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
Regan has been asked to apply updates to one of the company's web application server farms. He does not want to update all of the servers at once in case there is some sort of an issue that causes a crash or failure. He decides to direct traffic away from a few servers and update those first. Once he has tested that everything is working successfully, he'll allow them to handle traffic again and then do another small group of servers. He'll continue repeating this process until all servers have been updated. Which of the following describes the deployment method that he has chosen?

A) Blue-green deployment
B) Look-ahead deployment
C) Canary deployment
D) Rolling deployment
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
Gary is reading one of the marketing e-mails that he receives as part of his company's Azure subscription. This particular e-mail highlights a tool that he's interested in learning more about. The tool is described as a security tool that relies on learning-based analytics to better monitor activities, identify threats, and prioritize alerts for follow-up by security staff. Which of the following should he look up in the Azure portal to learn more about it?

A) ATP
B) FIM
C) GuardDuty
D) Lambda
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
Olina is fairly new at Fictional Corp and is used to working at much smaller companies. Most of her former jobs have all been manual work. However, she has been told that because of its size, her new company prefers to implement technologies that can perform various processes and procedures without human intervention so that humans can spend their time monitoring the systems for errors and fixing problems when something goes wrong. Which of the following describes what Fictional Corp has implemented to much more of an extent than her previous company?

A) In-house developed applications
B) Proprietary system management procedures
C) High availability
D) Automation
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
Merlin wants to create a new script that will communicate with several of his CSP's APIs. Which of the following scripting languages might he use to create the script?

A) Python
B) YAML
C) JSON
D) XML
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
User acceptance testing has just been completed on a new application and it is ready for the rest of the userbase at Fictional Corp to start using it. Which of the following environments should the application be copied to?

A) QA
B) Production
C) Development
D) Archive
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
Katy wants to make a few automated API calls from a new application that she is developing. Which of the following might be a valid structure for the data that she needs to send to the API endpoint?

A) JavaScript
B) Anaconda
C) JSON
D) PHP
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
Garrett has developed an application and is ready for the user acceptance team to go through and verify that everything is functional and working as it should while reporting any bugs they may identify. Which of the following environments should he copy the application to for them to begin their work?

A) QA
B) Production
C) Development
D) Blue-green
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
Tomas is going to be deploying a new cloud-based point-of-sale application for the organization that will be run within web browsers on computers located in his company's retail stores. He knows that the system must experience as little downtime as possible. Which of the following technologies might he choose to implement?

A) Plan b infrastructure (PBI)
B) Failover cluster (FC)
C) Planned failure domain (PFD)
D) Alternate lifecycle system (ALS)
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
Sven wants to ensure that his infrastructure is protected from attacks against the applications themselves and the automation and orchestration that helps keep everything together. In some areas he implements a technology that can only detect attacks, while in others he implements a technology that can also stop the attack in progress. Which of the following terms can be used to describe the technology that he has implemented?

A) IDP
B) IDS
C) ILS
D) IPS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
Marvin runs one of the operating system utilities on a server and receives a message that several of the files appear to have been modified or corrupted. The operating system is recommending reinstalling those files from the installation source. Which of the following tools could have alerted Marvin or other administrators when the files were originally changed?

A) FIM
B) IFS
C) FCoE
D) MTBF
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
Fictional Corp has decided that it wants to automate as much of the infrastructure as possible. As well, it has decided to outsource some of the monitoring capabilities. Which of the following might they outsource some of these tasks to?

A) MPLS
B) CMS
C) MSP
D) DSP
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
Fictional Corp has recently changed its server naming convention. Halfway through the renaming, the automation stops working. Which of the following should have been done as part of the process?

A) The servers should have used DHCP reservations.
B) The automation configuration should have been updated as each server name was changed.
C) The ARP tables should have been updated first.
D) The MAC address should have been updated in the automation configuration as well.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
Strom works on a team that manages a number of nodes to provide commercial e-mail list services for companies. With their current infrastructure and volume, it is sometimes necessary to change the configuration of various nodes very quickly to be able to handle other functions. Which of the following would result in the quickest configuration changes being applied to the nodes?

A) Send model
B) Pull model
C) Push model
D) Grab model
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
Adele is looking at the options for automation tools and needs to choose one that does not require the installation of an agent. Which of the following tools might she choose?

A) SaltStack
B) Puppet
C) Chef
D) Ansible
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
Desiree works for a web hosting company that adds new accounts and removes others on a regular basis. Which of the following should she automate for customers that have cancelled their service? (Choose two.)

A) Remove DNS entries for their sites.
B) Archive the customer's sites and logs for 30 days and then delete them.
C) Delete all of the files and logs associated with the customer's account.
D) Change the customer's password.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
Reina has configured an orchestration model for her company's infrastructure that requires servers to connect to the centralized server once an hour to determine if there should be any configuration changes made. Which of the following is she using?

A) Send model
B) Pull model
C) Push model
D) Grab model
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
Fictional Corp has chosen AWS as its primary cloud service provider. Which of the following automation tools could they use to help with configuring and managing EC2 instances?

A) Automation
B) Deployment Manager
C) SaltyChef
D) SSM
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
Dave manages a large network and has researched a bunch of automation tools. He decides on one that requires the installation of an agent, called a minion, on the nodes to be automated, which are then called minions. Which of the following automation tools did Dave choose?

A) SaltStack
B) Puppet
C) Chef
D) Ansible
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
Cherice has just completed an audit of a server group that she has recently taken over. She found a number of accounts that were still active even though the users no longer worked for the company. Which of the following should she do to prevent this issue in the future?

A) Set up an automation task to lock accounts that have been inactive over 30 days automatically and send the user a notification.
B) Set up an automation task to remind her to run a user audit on the first of every month.
C) Set up an automation task to disable accounts that have been inactive over 30 days automatically and send the administrator a notification.
D) Set up an automation task to delete accounts that have been inactive over 30 days and send the administrator a notification.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
Serena wants to implement as much automation in her organization as possible. One of her next tasks is to create a process where the system can duplicate a virtual machine on the fly. Which of the following terms might describe this automation process?

A) Replicating
B) Cloning
C) Twinning
D) Doubling
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
Eleanor is trying to secure a couple of servers that she manages. After hardening the servers, she installs a piece of software on each of them that will detect intrusions, log the event, and notify the administration team. She does not want it to automatically stop the intrusions due to the possibility of false positives. Which of the following has she installed?

A) HIDS
B) HIPS
C) NIDS
D) NIPS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
Jose just returned from a security conference where he learned about a technology that he can implement on his network that will detect security breaches on his network, log the event, and alert the administrator. He also wants it to automatically stop the breach. Which of the following technologies could he implement?

A) HIDS
B) HIPS
C) NIDS
D) NIPS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
Wyatt notices a message on the dashboard that one of the servers is no longer reachable by the automation system. He remotes into the server by name and is able to connect just fine. He pings the server by name from his workstation and it comes back with a different IP address than what is in the automation system. Which of the following is a possible reason why?

A) The server somehow changed from a static IP address to DHCP and is now receiving a different IP address and the automation system isn't configured to detect IP address changes automatically.
B) The DNS server is having issues.
C) There is a rule on the firewall blocking the automation traffic.
D) The DHCP server is having issues.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
Gisella has just returned from a security conference where she won a free year of protection and support for her company with a device that will detect intrusions on her network, alert the administrators, and log the events. Unfortunately, it will not try to stop the intrusion. Which of the following has she won?

A) HIDS
B) HIPS
C) NIDS
D) NIPS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
Startup Inc. has chosen the Azure platform as its cloud service provider. Which of the following tools might they use for configuration management, update management, and process automation?

A) Automation
B) Deployment Manager
C) SaltyChef
D) SSM
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
Cadence is analyzing disk space usage on one of the Linux virtual machines she manages. She noticed that log files are taking up more space than necessary. Which of the following automation jobs could she set up to resolve this issue?

A) Archive all log files older than 30 days to cold storage.
B) Rename the log files.
C) Check to make sure that the appropriate logging level is configured.
D) Move the log files to another directory.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
Jeanette just finished watching a video on a popular social media site about a technology that can provision and manage IT infrastructure through configuration files that can be automated rather than interactive tools that require manual configuration. Which of the following technologies was she learning about?

A) Runbook
B) IaC
C) Orchestration
D) Automation
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
Julia uses AWS's CloudFormation tool to manage many of her company's resources. Which of the following may be used as part of the template configuration? (Choose two)

A) YAML
B) XML
C) JSON
D) HCL
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
Luc has installed Ansible and is trying to get it working correctly, but cannot seem to make it communicate with the various nodes that he wants to use it on. Which of the following is the most likely issue?

A) The port for YAML is not open on the firewall.
B) The nodes are all offline.
C) The agent has not been installed on the nodes yet.
D) Port 22 is not open on the firewall.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
Amber has been researching automation tools and believes that Puppet is the best option for her company to use. She is currently testing the open-source version but is considering asking for budget to be allocated so that she can implement the enterprise version. How many nodes can she run the enterprise version on before needing to start paying for the product?

A) 5
B) 10
C) 20
D) 25
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
Taj needs to install a set of updates for an application server that will restart the server three times. Which of the following should prevent at least some of the users from calling in to report an outage? (Choose two)

A) Disable the service desk phone number temporarily.
B) Schedule a maintenance window.
C) Perform the update when the fewest number of people are using the application.
D) Make a backup of the application server.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 41 flashcards in this deck.