Terrance is designing storage for a startup company and needs to ensure from the beginning that it will be able to handle high levels of variety in high volumes and arriving in high velocity. Which of the following technologies is he designing for?
Enid is implementing new systems on a cloud service provider…
Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement?
Roberta is trying to find a way to save space on the SAN tha…
Roberta is trying to find a way to save space on the SAN that acts as storage for all of the home directories in her organization. Which of the following might help Roberta accomplish this goal?
Lorna manages a private cloud with 500 terabytes of storage….
Lorna manages a private cloud with 500 terabytes of storage. However, the servers in the cloud have a total provisioned footprint of 800 terabytes. Which of the following describes the provisioning model that she is using?
Kevin is implementing SSO functionality for his organization…
Kevin is implementing SSO functionality for his organization. Which of the following authentication standards could he use to implement it?
Jed has just spent some time analyzing some of the applicati…
Jed has just spent some time analyzing some of the applications on the cloud service provider his company uses. He found that one of the applications was using a lot of resources between the servers that it was deployed on and implemented horizontal scaling to resolve the issue. Which of the following did Jed do?
Jadis has just created a new Linux server on the cloud servi…
Jadis has just created a new Linux server on the cloud service provider that her company uses. She attempts to SSH into it, and it immediately fails. Which of the following steps might she have forgotten to do?
Piper is auditing the accounts on the cloud platform her com…
Piper is auditing the accounts on the cloud platform her company uses. She sees a master user that retains complete access and action permissions no matter what permissions are also given to the other users. Which of the following is the username for that account?
Aron has recently learned about the CIA triad. He knows that…
Aron has recently learned about the CIA triad. He knows that encryption is important to a variety of things within his organization’s infrastructure. One of those is the ability to ensure that data being transmitted across the network cannot be modified undetected. Which of the following tenets of the CIA triad supports this idea?
Fictional Corp. has recently changed its server naming conve…
Fictional Corp. has recently changed its server naming convention. Halfway through the renaming, the automation stops working. Which of the following should have been done as part of the process?