June/2020 New Braindump2go CV0-002 Exam Dumps with PDF and VCE Free Updated Today! Following are some new CV0-002 Real Exam Questions!
A law firm wants to limit log retention to the minimum required by law and regulation. Which of the following is the engineer most likely to do FIRST?
A. Create a 2GB external hard drive to log all activities.
B. Configure all systems in scope to log activities in support of company policies.
C. Configure a daily rotation on all workstations to limit the logs’ discovery scope.
D. Deduplicate, compress, and encrypt all logs before archiving them.
Cloud developers are experiencing a delay caused by the static code review before each deployment. The security operator and developer must address the issue without cutting corners with security testing. Which of the following would BEST address the delay issue?
A. Replace the static code analysis with hardening techniques.
B. Perform the static code analysis earlier in the SDLC.
C. Perform a penetration test instead of a static code analysis.
D. Replace the static code analysis with a vulnerability analysis.
All the virtual server instances within an organization’s private cloud environment are having trouble logging into the Kerberos realm. Upon investigation, the CSA notices the time stamps are different on the server virtual instances. Which of the following should be the CSA’s NEXT step to resolve this issue?
A. Check the Kerberos token time stamp.
B. Check the NTP server to see when it last rebooted.
C. Check the NTP server synchronization.
D. Check the virtual server time display format.
A company provides IaaS services. Which of the following disk provisioning models for creating standard template should the company use to provision virtual instances?
A. Thin disk
B. SCSI disk
C. SATA disk
D. Thick disk
Several state and local law enforcement agencies have decided to share information about traffic violations within their state by using a new search application. The state has policies around limiting the exposure of PII, and each local agency must comply with these policies. Which of the following cloud architecture models would be the BEST approach?
A. Deploy the application to a public cloud and establish connections for each local agencies’ private cloud and use federation.
B. Have each local agency publish its data to an account that has been set up in a public cloud provider and deploy the application there.
C. Deploy the application in each local agency’s private cloud and create accounts for everyone to allow access to publish and search the data.
D. Deploy the application in the state’s shared cloud environment and create federation between the local agencies.
A cloud engineer is upgrading a high-performance computing cluster for the private cloud. The existing cluster is being replaced with GPU servers. A single GPU server is capable of the same teraflops output as 10 CPU servers. The current cluster configuration is as follows:
– 100 quad-core CPU servers capable of producing 100 teraflops.
– The baseline and current usage is 100%.
The new cluster was set up and benchmarked in four different configurations. Which of the following configurations will meet the baseline teraflops performance of the cluster while maintaining the current usage?
A. 1 GPU server, 80 CPU servers
B. 2 GPU servers, 50 CPU servers
C. 5 GPU servers, 40 CPU servers
D. 9 GPU servers, 10 CPU servers
A company wants to set up a new department using private cloud resources. The new department needs access to sales and financial data, but it should be prohibited from accessing human resources data. Which of the following is the BEST option to configure on the virtual (software-defined) network to meet these requirements?
An engineer is responsible for managing a private cloud environment at a software company. Company developers perform all programming in the cloud environment. There are two departments working on a highly classified product that now requires dedicated resources, which cannot be viewed or accessed by other departments in the cloud environment. Which of the following should the engineer perform to ensure the requirements are met? (Choose three.)
A. Create a baseline
B. Assign an ACL
C. Verify segmentation
D. Use thin provisioned storage
E. Automate patch deployments
F. Create a tenant
G. Deploy a PKI solution
A company is in the process of evaluating cloud service providers, as it is planning to move all of its on- premises IT services to the cloud. Most of the applications are mission critical with four 9s and five 9s uptime. The area where the company is located is also prone to natural disasters. One of the main requirements is that IT services need to survive local outages as well as regional outages. One of the company’s main customers is a government entity. Which of the following is the BEST way for a cloud engineer to address these requirements?
A. Select a cloud service provider with local, regional, and international failure zones.
B. Select a cloud service provider with local, national, and international failure zones.
C. Select a cloud service provider with local, regional, and national failure zones.
D. Select a cloud service provider with regional, national, and international failure zones.
A cloud administrator is troubleshooting a network issue that was raised after the introduction of a CASB solution. The administrator attempts different ideas during troubleshooting but is unable to resolve the issue. In which of the following steps of the troubleshooting process is the administrator experiencing an issue?
A. Identifying the problem
B. Establishing a theory of probable cause
C. Testing the theory to determine the cause
D. Documenting the findings and actions
A large law firm is migrating all of its systems to the cloud to meet growing business needs. The firm wants to reduce IT staff while maintaining day-to-day operations, such as user provisioning, folder management, and permissions. Which of the following MUST the cloud provider and cloud customer implement to ensure user non-repudiation?
A. Server certificate
B. Client-to-site VPN
C. Two-factor authentication
D. Single sign-on
A multinational corporation is moving its worldwide cloud presence to a single region, which is called Region A. An administrator attempts to use a workflow, which was previously used to deploy VMs to Region E in the new Region A environment, and receives the following error: Invalid character set. Which of the following is the MOST likely cause of the error?
A. Language support
B. Licensing failure
C. Authentication issues
D. Time-zone misconfiguration
An administrator is using a script to create ten new VMs in a public cloud. The script runs and returns no errors. The administrator confirms that all ten VMs show up in the dashboard, but only the first eight reply to pings. Which of the following is the MOST likely cause of the issue?
A. Workflow credential errors
B. API request limitations
C. IP address depletion
D. Batch job scheduling issue
A company has hired a technician to build a cloud infrastructure for a massively parallel application. Which of the following should the technician consider doing FIRST?
A. Add a GPU to the VMs
B. Configure the VMs to scale up automatically
C. Allocate maximum bandwidth to the VMs
D. Select the most compute cores for the VMs
An administrator needs to deploy a new release of an application in a way that allows a quick rollback to the previous version of the application. Which of the following is the BEST strategy to apply?
A. Deploy the application to a set of servers in small batches. If a rollback is necessary, restore the previous deployment from snapshots or backups.
B. Deploy the application to a subset of servers that expose the new application. Direct all traffic to these servers. If a rollback is necessary, redirect all traffic to the previous subset of servers.
C. Deploy the application to the servers in a backup datacenter or secondary cloud deployment. Shut down the servers in the primary datacenter, forcing all traffic to the failover location. If a rollback is necessary, restart the primary environment and shut down the secondary environment.
D. Deploy the application to all servers in the datacenter or cloud environment. If a rollback is necessary, undeploy the application and deploy the previous version.
Below is the output from a troubleshooting activity:
1. SaaS application is unavailable to a set of users at a single site.
2. WAN connectivity was considered to be the cause of the problem.
3. Upon testing, it seemed the WAN connectivity was up, but the default gateway was unreachable from the internal users.
4. The faulty switch was replaced to bring up the connectivity.
5. The incident was documented.
Based on the methodology, which of the following steps was overlooked during the activity?
A. Problem identification
B. Establish theory of probable cause
C. Verify full system functionality
D. Establish a plan of action and implement the solution
A production IaaS database server contains PCI data and is a critical business capability. The CAB approved a normal code change release for QA and PROD to occur 30 minutes apart and to last a maximum of one hour. The cloud DBA team is 45 minutes behind schedule, so they miss the start time on QA. As the cloud DBA, which of the following is the BEST course of action to apply the code change?
A. Skip QA and apply the code change to PROD to meet time requirements
B. Resubmit another change request for another time for approval
C. Submit an emergency CAB approval to change the time to after business hours
D. Change the time in the CAB request and apply the code change at a more convenient time
1.2020 Latest Braindump2go CV0-002 Exam Dumps (PDF & VCE) Free Share:
2.2020 Latest Braindump2go CV0-002 PDF and CV0-002 VCE Dumps Free Share:
3.2020 Free Braindump2go CV0-002 PDF Download:
Free Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams!