Computer Science > EXAM > WGU 701 Master 2022 QUESTIONS AND ANSWERS (All)
WGU 701 Master 2022 A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the ... only group allowed to modify files in the directory. Which of the following will accomplish the desired objective? Restrict the file write permissions to the development group only. Add access to the fileshare for the systems administrator's group. Remove the file write permissions for the application service account. Deny access to all development user accounts Correct Answer: A A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site. Which of the following should be configured in between the cloud environment and the DR site? Playbook Failback Zoning Replication Correct Answer: D An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time. Which of the following should be implemented to improve application performance? A. Increase the memory and network bandwidth B. Upgrade the application C. Increase disk capacity D. Upgrade the environment and use SSD drives Correct Answer: D A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the browsers are able to load the application home page. Which of the following is the MOST likely cause of the issue? A. The local firewall from older browsers is not allowing inbound connections B. The cloud web server is using strong ciphers that are not supported by older browsers C. The local firewall from older browsers is not allowing outbound connections D. The cloud web server is using a self-signed certificate that is not supported by older browsers Correct Answer: B A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible. Which of the following is the MOST important consideration to ensure a seamless migration? The I/O of the storage Feature compatibility Network utilization The cost of the environment Correct Answer: B A Chief Information Security Officer (CISO) is evaluating the company's security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements? A risk register An SLA document A DR plan SOC procedures Correct Answer: A A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution. Which of the following will provide the data to measure business continuity? (Choose two.) A service-level agreement & A recovery time objective Playbooks & A recovery time objective Automation scripts A backup and restore & A network diagram Correct Answer: A An organization requires the following to be achieved between the finance and marketing departments: -- Allow HTTPS/HTTP.-- Disable FTP and SMB traffic. Which of the following is the MOST suitable method to meet the requirements? Configure on-demand routing between the VLANs Implement an load balancing solution to load balance the VLAN traffic Implement 802.1X in these VLANs Configure an ACL between the VLANs Correct Answer: D An administrator deploys a new virtual machine. After logging on to the virtual machine, she notices that it has a different time setting than the host. What is most likely the cause of this issue? The VLAN tag is incorrect. The vNIC is not configured correctly. The virtual machine cannot communicate with the network. The guest tools are not installed. Correct Answer: D A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance. Which of the following licensing models is the application MOST likely using? Per device Core-based Volume-based Per user Correct Answer: B To make sure that all users are allowed to access only approved resources, the cloud administrator is auditing public cloud identity systems. The cloud administrator wants to control specific access and operations. What is the cloud administrator defining? Resource access definitions Federated access User permissions Access control lists Correct Answer: A A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set. Which of the following RAID levels satisfies this requirement? RAID 1 RAID 10 RAID 6 RAID 5 [Show More]
Last updated: 3 years ago
Preview 1 out of 54 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 14, 2022
Number of pages
54
Written in
All
This document has been written for:
Uploaded
Jul 14, 2022
Downloads
0
Views
59
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·