CompTIA Dumps 2019-11

[Free] 2019(Oct) EnsurePass CompTIA CV0-002 Dumps with VCE and PDF 41-50

October 27, 2019

Get Full Version of the Exam
http://www.EnsurePass.com/CV0-002.html

Question No.41

Email users report that it takes more than one minute to open emails, including those without attachments. There are three email instances in three different regions hosted by the same CSP. Other applications hosted by the same CSP have no reported issues. Which of the following solutions BEST resolves the issue?

  1. Confirm that the email instances have sufficient bandwidth.

  2. Install monitoring software on the email instances.

  3. Check the antivirus software settings and disable real-time message scanning.

  4. Ensure the requested IOPS are being provided to the email instances.

Correct Answer: C

Question No.42

A file server is being migrated from physical hardware into a private cloud. Baselining of the server shows the disks average 90% full at all times. The contents of the file server consist mostly of compressed audio files. Multiple copies of the same files are often saved in different locations on the same disk. Which of the following storage technologies is MOST likely to help minimize storage utilization when moving this server to the private cloud?

  1. Compression

  2. Thin provisioning

  3. Deduplication

  4. Tokenization

Correct Answer: C

Question No.43

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday. The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations. The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully. Review the network architecture and supporting documents and fulfill these requirements:

  1. Analyze the configuration of the following components: DNS, Firewall1, Firewall2, Router1, Rouler2, VPN and Orchestrator Server.

  2. Identify the problematic device(s).

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

image

image

image

Instruction:

Only select a maximum of TWO options from the multiple choice question.

  1. Deploy a Replica of the Database Server in the Cloud Provider

  2. Update the PSK (Pre-shared key in Router2)

  3. Update the A record on the DNS from 2.2.2.2 to 1.1.1.1

  4. Promote deny All to allow All in Firewall1 and Firewall2

  5. Change the Address Space on Router2

  6. Change internal IP Address of Router1

  7. Reverse the Weight property in the two CNAME records on the DNS

  8. Add the Application Server at on-premises to the Load Balancer

Correct Answer: AH

Question No.44

A company is deploying a new instant messaging app to allow for communications with external vendors. Each entity will host its own version of the application, but users must be able to talk between the companies. Which of the following security techniques would MOST likely be used to allow this to happen?

  1. User synchronization

  2. Password synchronization

  3. Public federation

  4. Multifactor authentication

Correct Answer: D

Question No.45

A company uses SaaS and IaaS solutions from multiple cloud providers. Users report that this requires them to manage and remember multiple user accounts and passwords. Which of the following solutions should be implemented to fix this issue?

  1. SSO

  2. Federation

  3. Password synchronization

  4. Lowered password complexity

  5. Multifactor authentication

Correct Answer: A

Question No.46

A security and risk team requires a weekly report to detect VM file system changes and validate the integrity of the OS. Which of the following is the BEST solution for this requirement?

  1. Configure a FIM agent on the VM and forward syslogs to a central location.

  2. Configure debugging on the VM and forward syslogs to a central location.

  3. Configure an antivirus agent on the VM and create the report through the web GUI.

  4. Configure a FIM agent on the VM and create the report through the web GUI.

Correct Answer: B

Question No.47

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday. The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations. The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully. Review the network architecture and supporting documents and fulfill these requirements: Part1:

  1. Analyze the configuration of the following components: DNS, Firewall1, Firewall2, Router1, Rouler2, VPN and Orchestrator Server.

  2. Identify the problematic device(s).

    Instructions:

    If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

    Simulation

    image

    image

    image

    image

    image

    Correct Answer: See the solution below.

    Explanation:

    Solution given below with details.

    image

    Question No.48

    Company A just acquired Company B and needs to migrate critical applications to Company A#39;s private cloud infrastructure. Company B#39;s applications are running on legacy servers and cannot be removed from the current datacenter where they reside. Which of the following migration strategies should the cloud administrator use?

    1. V2V

    2. B.P2V

    3. V2P

    4. P2P

    Correct Answer: C

    Question No.49

    A company uses its own private cloud, which has few available resources. Mission-critical systems and other information systems are running on it. A new system will be deployed on the private cloud. The following tests are included in the test plan:

    image

    image

    image

    image

    Load test (2h) Backup/restore test (6h) Functional test (8h) Failover test (1h)

    The work schedule of the existing system is shown below.

    image

    To minimize the effect to the existing system, which of the following schedules is MOST suitable for the load test?

    A. 02:00-04:00

    B. 09:00-12:00

    C. 18:00-20:00

    D. 22:00-00:00

    Correct Answer: C

    Question No.50

    A customer recently provisioned a new server on the IaaS. The IP address assigned from the pool resolves to another hostname. Some user traffic is being dumped or is causing slowness because of this issue. Which of the following maintenance activities does the provider need to perform to prevent this issue?

    1. Use cloud provider tools to remove orphaned resources.

    2. Initiate resource reclamation.

    3. Run a script to remove stale DNS entries.

    4. Update outdated security firewall configurations.

    Correct Answer: C

    Get Full Version of the Exam
    CV0-002 Dumps
    CV0-002 VCE and PDF