A vendor is installing a new retail store management application for a customer. The application license ensures software costs are low when the application is not being used, but costs go up when use is higher.
Which of the following licensing models is MOST likely being used?
A. Socket-based
B. Core-based
C. Subscription
D. Volume-based
A systems administrator is creating a playbook to run tasks against a server on a set schedule.
Which of the following authentication techniques should the systems administrator use within the playbook?
A. Use the server's root credentials
B. Hard-code the password within the playbook
C. Create a service account on the server
D. Use the administrator's SSO credentials
A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled.
Which of the following techniques would BEST help the administrator assess these business requirements?
A. Performance testing
B. Usability testing
C. Vulnerability testing
D. Regression testing
A systems administrator is troubleshooting performance issues with a VDI environment. The administrator determines the issue is GPU related and then increases the frame buffer on the virtual machines. Testing confirms the issue is solved, and everything is now working correctly. Which of the following should the administrator do NEXT?
A. Consult corporate policies to ensure the fix is allowed
B. Conduct internal and external research based on the symptoms
C. Document the solution and place it in a shared knowledge base
D. Establish a plan of action to resolve the issue
A systems administrator wants to restrict access to a set of sensitive files to a specific group of users. Which of the following will achieve the objective?
A. Add audit rules on the server
B. Configure data loss prevention in the environment
C. Change tine permissions and ownership of the files
D. Implement a HIPS solution on the host
A systems administrator is writing a script for provisioning nodes in the environment. Which of the following would be BEST for the administrator to use to provision the authentication credentials to the script?
A. password='curl https://10.2.3.4/api/sytemops?op=provision'
B. password=$env_password
C. password=$(cat /opt/app/credentials)
D. password="MyS3cretP4sswordIsVeryL0ng"
Which of the following enables CSPs to offer unlimited capacity to customers?
A. Adequate budget
B. Global data center distribution
C. Economies of scale
D. Agile project management
A systems administrator is responsible for upgrading operating systems on VMs that are hosted in a cloud environment. The systems administrator wants to ensure the VMs receive updates for as long as possible. Which of the following should the systems administrator choose?
A. Stable
B. Nightly
C. LTS
D. Canary
E. EDR
Which of the following provides groups of compute units that can horizontally scale according to a workload?
A. Orchestrated container environment
B. Cloud-reserved instances
C. Autoscaling
D. Cloud bursting
An IT professional is selecting the appropriate cloud storage solution for an application that has the following requirements:
The owner of the objects should be the object writer. The storage system must enforce TLS encryption.
Which of the following should the IT professional configure?
A. A bucket
B. A CIFS endpoint
C. A SAN
D. An NFS mount