GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

Fictional Corp. has made the decision to outsource the creat…

Fictional Corp. has made the decision to outsource the creation of a cloud application that will be used by its sales department. Which method from the list below may the business utilize to request bids for the project?

Read Details

Olina is fairly new at Fictional Corp. and is used to workin…

Olina is fairly new at Fictional Corp. and is used to working at much smaller companies. Most of her former jobs have all been manual work. However, she has been told that because of its size, her new company prefers to implement technologies that can perform various processes and procedures without human intervention so that humans can spend their time monitoring the systems for errors and fixing problems when something goes wrong. Which of the following describes what Fictional Corp. has implemented to much more of an extent than her previous company?

Read Details

Summer is analyzing one of the company’s database servers an…

Summer is analyzing one of the company’s database servers and sees that it uses 90 percent of its allocated disk space. What could she do without creating another server to split the load with?

Read Details

Carol is analyzing the security on her company’s hybrid netw…

Carol is analyzing the security on her company’s hybrid network and sees that GRE is being used as a VPN. Why does Carol recommend it be removed from the company’s network?

Read Details

Aron has recently learned about the CIA triad. He knows that…

Aron has recently learned about the CIA triad. He knows that encryption is important to a variety of things within his organization’s infrastructure. One of those is the ability to ensure that data being transmitted across the network cannot be modified undetected. Which of the following tenets of the CIA triad supports this idea?

Read Details

Sarah has deployed a private cloud infrastructure that requi…

Sarah has deployed a private cloud infrastructure that requires users to insert a smart card into their computer or into a card reader in order to authenticate them to use the applications. The smart card is associated with a certificate for each user, which is verified against a certificate authority. Which of the following has she deployed?

Read Details

Peter, a cloud engineer, is struggling to scale EC2 instance…

Peter, a cloud engineer, is struggling to scale EC2 instances. The organizational policy dictates that at a given threshold value, VMs should scale up. However, the VMs do not scale out even if the threshold value is reached. All the instances are in a healthy state and the VM count is not at maximum capacity. What could be the possible reasons for this?

Read Details

Roberta is trying to find a way to save space on the SAN tha…

Roberta is trying to find a way to save space on the SAN that acts as storage for all of the home directories in her organization. Which of the following might help Roberta accomplish this goal?

Read Details

Katy wants to make a few automated API calls from a new appl…

Katy wants to make a few automated API calls from a new application that she is developing. Which of the following might be a valid structure for the data that she needs to send to the API endpoint?

Read Details

In a cloud environment, which device might be arranged at th…

In a cloud environment, which device might be arranged at the presentation tier of a basic three-tier infrastructure?

Read Details

Posts pagination

Newer posts 1 … 38,761 38,762 38,763 38,764 38,765 … 79,815 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top