1.
Which of the following access control methods could allow for a network user to sign onto their corporate network and their supplier's network portal without having to enter their ID and password more than once?
2.
A user is notified that they will be terminated at the end of the day. As they start cleaning up their workstation, they try to FTP information from their workstation to a cloud-based, personal backup solution. Which of the following hardening techniques would be used to restrict their ability to transfer this information via FTP?
3.
Which of the following is MOST important when working in highly available virtual environments?
4.
A datacenter migration is taking place and the administrator has been tasked with reducing the footprint of the new datacenter by virtualizing as many servers as possible. A physical server has been flagged as a candidate for relocation to the new data center. Which of the following methods would be the FIRST method for relocating the server to the new data center?
5.
A critical hypervisor security patch has been released and needs to be rolled out as soon as possible. Which of the following steps can be taken to minimize downtime for all guest VMs currently running?
6.
Which of the following cloud models would be used when implementing a company's email system in the cloud?
7.
Which of the following describes federated access control?
8.
Which of the following is the BEST means of ensuring resource utilization remains even across the hosts?
9.
Which of the following can an administrator implement to achieve boot on SAN?
10.
An administrator has configured a cluster but one of the VMs returns an error when attempting to automatically fail-over to another host in the cluster. Which of the following should be verified?