Looks like no one added any tags here yet for you.
Sven wants to ensure that his infrastructure is protected from attacks against the applications themselves and the automation and orchestration that helps keep everything together. In some areas he implements a technology that can only detect attacks, while in others he implements a technology that can also stop the attack in progress. Which of the following terms can be used to describe the technology that he has implemented?
a. IDP
Kylie has a number of processes that she has implemented automation for. As she was researching on the best way to automate another process, she came across some information about a technique for optimizing automation processes into a single workflow. Which of the following describe this technique?
c. Orchestration
Marvin runs one of the operating system utilities on a server and receives a message that several of the files appear to have been modified or corrupted. The operating system is recommending reinstalling those files from the installation source. Which of the following tools could have alerted Marvin or other administrators when the files were originally changed?
a. FIM
Cecil is interested in using more of the tools available from the cloud service provider his company has chosen to use, AWS. He sees that they have various security tools available including a threat detection tool that relies on machine learning, anomaly detection, and threat intelligence to identify threats and trigger events or functions. Which of the following is the tool that he may be interested in implementing?
c. GuardDuty
Gary is reading one of the marketing e-mails that he receives as part of his company's Azure subscription. This particular e-mail highlights a tool that he's interested in learning more about. The tool is described as a security tool that relies on learning-based analytics to better monitor activities, identify threats, and prioritize alerts for follow-up by security staff. Which of the following should he look up in the Azure portal to learn more about it?
a. ATP
Mavis wants to develop an application that can talk to one of the cloud-based services her company uses. As part of the design process, she needs to take into account the structure and type of messages that are sent back and forth from the service. Which of the following describes the endpoint that her application will be communicating with for that service?
c. API
Merlin wants to create a new script that will communicate with several of his CSP's APIs. Which of the following scripting languages might he use to create the script?
a. Python
Katy wants to make a few automated API calls from a new application that she is developing. Which of the following might be a valid structure for the data that she needs to send to the API endpoint?
c. JSON
Sigmund has created a new web application server for the psychology department at the university he works for. He wants to install a tool on the server that will detect any security breaches, alert the administrative team, log the event, and attempt to stop the security breach before the attacker is able to gain further access or cause any damage. Which of the following types of tools might he install?
b. HIPS
Garrett has developed an application and is ready for the user acceptance team to go through and verify that everything is functional and working as it should while reporting any bugs they may identify. Which of the following environments should he copy the application to for them to begin their work?
a. QA
User acceptance testing has just been completed on a new application and it is ready for the rest of the user base at Fictional Corp to start using it. Which of the following environments should the application be copied to?
b. Production
Ronan has just received notification of a critical update that is available for one of the operating systems that his company uses. He downloads it from the OS developer's website and patches a couple of the systems. He then allows a small amount of traffic to those servers so he can verify that there are no new error messages or issues with the deployment. Once he's verified that they have updated successfully, he issues the patch to the rest of the servers running that operating system. Which of the following types of deployments has he just performed?
c. Canary deployment
Miriam is performing a quarterly review of all web-based applications that the company uses. She sees that one of the finance department's applications has an update available for it. After downloading the update, she applies the update to a duplicate of the production environment that does not receive any traffic. After verifying that everything looks good, she transfers all of the traffic over to that server and updates the formerly active server. Which of the following deployment types has she chosen for this application update?
a. Blue-green deployment
Tomas is going to be deploying a new cloud-based point-of-sale application for the organization that will be run within web browsers on computers located in his company's retail stores. He knows that the system must experience as little downtime as possible. Which of the following technologies might he choose to implement?
b. Failover cluster (FC)
Amari is planning on deploying a failover cluster for a new cloud-based deployment. She works for a comedy television channel and needs to ensure that users can access their streaming services 24/7/365. Which of the following technical terms might describe the primary benefit that she is hoping for by implementing this technology?
c. HA
Omar needs to install an update to the web servers so that the development team can use some of the new libraries and functions for the .NET application they are modifying. However, upon trying to install the latest .NET framework, an error is displayed stating that another update must be installed first. Which of the following technical terms describes why the .NET framework cannot be installed yet?
a. Dependencies
Taj needs to install a set of updates for an application server that will restart the server three times. Which of the following should prevent at least some of the users from calling in to report an outage? (Choose two)
b. Schedule a maintenance window.
c. Perform the update when the fewest number of people are using the application.
Tanesha is currently documenting all of the steps necessary to perform various functions that her team is responsible for. Which of the following describes what she is creating?
b. Runbook
Zane's company has chosen to use Ansible for its primary automation tool. Which of the following is the default protocol used by this tool that he might need to ensure it is open on the firewall in order for it to work correctly?
a. SSH
Olina is fairly new at Fictional Corp and is used to working at much smaller companies. Most of her former jobs have all been manual work. However, she has been told that because of its size, her new company prefers to implement technologies that can perform various processes and procedures without human intervention so that humans can spend their time monitoring the systems for errors and fixing problems when something goes wrong. Which of the following describes what Fictional Corp has implemented to much more of an extent than her previous company?
d. Automation
Reina has configured an orchestration model for her company's infrastructure that requires servers to connect to the centralized server once an hour to determine if there should be any configuration changes made. Which of the following is she using?
b. Pull model
Strom works on a team that manages a number of nodes to provide commercial e-mail list services for companies. With their current infrastructure and volume, it is sometimes necessary to change the configuration of various nodes very quickly to be able to handle other functions. Which of the following would result in the quickest configuration changes being applied to the nodes?
c. Push model
Serena wants to implement as much automation in her organization as possible. One of her next tasks is to create a process where the system can duplicate a virtual machine on the fly. Which of the following terms might describe this automation process?
b. Cloning
Dave manages a large network and has researched a bunch of automation tools. He decides on one that requires the installation of an agent, called a minion, on the nodes to be automated, which are then called minions. Which of the following automation tools did Dave choose?
a. SaltStack
Adele is looking at the options for automation tools and needs to choose one that does not require the installation of an agent. Which of the following tools might she choose?
d. Ansible
Amber has been researching automation tools and believes that Puppet is the best option for her company to use. She is currently testing the open-source version but is considering asking for budget to be allocated so that she can implement the enterprise version. How many nodes can she run the enterprise version on before needing to start paying for the product?
b. 10
Fictional Corp has chosen AWS as its primary cloud service provider. Which of the following automation tools could they use to help with configuring and managing EC2 instances?
d. SSM
Startup Inc. has chosen the Azure platform as its cloud service provider. Which of the following tools might they use for configuration management, update management, and process automation?
a. Automation
Cadence is analyzing disk space usage on one of the Linux virtual machines she manages. She noticed that log files are taking up more space than necessary. Which of the following automation jobs could she set up to resolve this issue?
a. Archive all log files older than 30 days to cold storage.
Cherice has just completed an audit of a server group that she has recently taken over. She found a number of accounts that were still active even though the users no longer worked for the company. Which of the following should she do to prevent this issue in the future?
c. Set up an automation task to disable accounts that have been inactive over 30 days automatically and send the administrator a notification.
Desiree works for a web hosting company that adds new accounts and removes others on a regular basis. Which of the following should she automate for customers that have cancelled their service? (Choose two.)
a. Remove DNS entries for their sites.
b. Archive the customer's sites and logs for 30 days and then delete them.
Fictional Corp has decided that it wants to automate as much of the infrastructure as possible. As well, it has decided to outsource some of the monitoring capabilities. Which of the following might they outsource some of these tasks to?
c. MSP
Jose just returned from a security conference where he learned about a technology that he can implement on his network that will detect security breaches on his network, log the event, and alert the administrator. He also wants it to automatically stop the breach. Which of the following technologies could he implement?
d. NIPS
Eleanor is trying to secure a couple of servers that she manages. After hardening the servers, she installs a piece of software on each of them that will detect intrusions, log the event, and notify the administration team. She does not want it to automatically stop the intrusions due to the possibility of false positives. Which of the following has she installed?
a. HIDS
Gisella has just returned from a security conference where she won a free year of protection and support for her company with a device that will detect intrusions on her network, alert the administrators, and log the events. Unfortunately, it will not try to stop the intrusion. Which of the following has she won?
c. NIDS
Julia uses AWS's CloudFormation tool to manage many of her company's resources. Which of the following may be used as part of the template configuration? (Choose two)
a. YAML
c. JSON
Jeanette just finished watching a video on a popular social media site about a technology that can provision and manage IT infrastructure through configuration files that can be automated rather than interactive tools that require manual configuration. Which of the following technologies was she learning about?
b. IaC
Fictional Corp has recently changed its server naming convention. Halfway through the renaming, the automation stops working. Which of the following should have been done as part of the process?
b. The automation configuration should have been updated as each server name was changed.
Wyatt notices a message on the dashboard that one of the servers is no longer reachable by the automation system. He remotes into the server by name and is able to connect just fine. He pings the server by name from his workstation and it comes back with a different IP address than what is in the automation system. Which of the following is a possible reason why?
a. The server somehow changed from a static IP address to DHCP and is now receiving a different IP address and the automation system isn't configured to detect IP address changes automatically.
Luc has installed Ansible and is trying to get it working correctly, but cannot seem to make it communicate with the various nodes that he wants to use it on. Which of the following is the most likely issue?
d. Port 22 is not open on the firewall.