A systems administrator notices a surge of network traffic is coming from the monitoring server. The administrator discovers that large amounts of data are being downloaded to an external source. While investigating, the administrator reviews the following logs:
Which of the following ports has been compromised?
Based on the logs provided, the port that has been compromised is Port 8048. The state 'TIME_WAIT' indicates that this port was recently used to establish a connection that has now ended. This could be indicative of the recent activity where large amounts of data were downloaded to an external source, suggesting a potential security breach. Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson
A cloud consultant needs to modernize a legacy application that can no longer address user demand and is expensive to maintain. Which of the following is the best migration
strategy?
Refactoring is the process of restructuring existing computer code without changing its external behavior. In cloud computing, it often means modifying the application to better leverage cloud-native features and services. This can address user demand and reduce maintenance costs by making the application more scalable, resilient, and manageable. Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg
A systems administrator notices a surge of network traffic is coming from the monitoring server. The administrator discovers that large amounts of data are being downloaded to an external source. While investigating, the administrator reviews the following logs:
Which of the following ports has been compromised?
Based on the logs provided, the port that has been compromised is Port 8048. The state 'TIME_WAIT' indicates that this port was recently used to establish a connection that has now ended. This could be indicative of the recent activity where large amounts of data were downloaded to an external source, suggesting a potential security breach. Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson
You are a cloud engineer working for a cloud service provider that is responsible for an
IaaS offering.
Your customer, who creates VMs and manages virtual storage, has noticed I/O bandwidth issues and low IOPS (under 9000).
Your manager wants you to verify the proper storage configuration as dictated by your service level agreement (SLA).
The SLA specifies:
. Each SFP on the hypervisor host must be set to the maximum link speed
allowed by the SAN array. . All SAN array disk groups must be configured in a RAID 5.
. The SAN array must be fully configured for redundant fabric paths. . IOPS should not fall below 14000
INSTRUCTIONS
Click on each service processor to review the displayed information. Then click on the drop-down menus to change the settings of each device as necessary to conform to the SLA requirements.
Based on the SLA requirements and the information provided in the diagram:
For the Hypervisor:
Slot A fiber channel card:
Port 1 link speed should be set to 16 Gbps since it's connected to Fabric switch A which supports 16 Gbps.
Port 2 link speed should be set to 8 Gbps because it's connected to Fabric switch B which supports up to 8 Gbps.
Slot B fiber channel card:
Port 1 link speed should be set to 16 Gbps since it's connected to Fabric switch A which supports 16 Gbps.
Port 2 link speed should be set to 8 Gbps because it's connected to Fabric switch B which supports up to 8 Gbps.
A systems administrator notices a surge of network traffic is coming from the monitoring server. The administrator discovers that large amounts of data are being downloaded to an external source. While investigating, the administrator reviews the following logs:
Which of the following ports has been compromised?
Based on the logs provided, the port that has been compromised is Port 8048. The state 'TIME_WAIT' indicates that this port was recently used to establish a connection that has now ended. This could be indicative of the recent activity where large amounts of data were downloaded to an external source, suggesting a potential security breach. Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson
Ilene
26 days agoLindsey
28 days agoKarrie
29 days agoVashti
2 months agoelishaa
2 months agoMark james
2 months agokallisa
2 months agomelivish
2 months agoMaryann
2 months agoAntonio
2 months agobavigi
3 months ago