A new browser version has been deployed to all users at a company. After the deployment, users
report that they can no longer access the company's secure time - card system, which is hosted by a
SaaS provider. A technician investigates and discovers a security error is received upon opening the
site. If the browser is rolled back to the older version, the site is accessible again. Which of the
following is the MOST likely cause of the security error users are seeing?
Question No 2
CORRECT TEXT
A company has decided to scale its e - commerce application from its corporate datacenter to a
commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.
The majority of the application load takes place on the application server under normal conditions.
For this reason, the company decides to deploy additional application servers into a commercial
cloud provider using the on - premises orchestration engine that installs and configures common
software and network configurations. The remote computing environment is connected to the on -
premises datacenter via a site - to - site IPSec tunnel. The external DNS provider has been configured to
use weighted round - robin routing to load balance connections from the Internet.
During testing, the company discovers that only 20% of connections completed successfully.
Review the network architecture and supporting documents and fulfill these requirements:
Part1:
1. Analyze the configuration of the following components: DNS, Firewall1, Firewall2, Router1,
Rouler2, VPN and Orchestrator Server.
2. Identify the problematic device(s).
Instructions:
If at any time you would like to bring back the initial state of the simulation, please select the Reset
button. When you have completed the simulation, please select the Done button to submit. Once
the simulation is submitted, please select the Next button to continue.
Simulation
0
1
2
Answer: See the
solution below.
Solution given below with details.
3
Question No 3
DRAG DROP
A hosted file share was infected with CryptoLocker and now root cause analysis needs to be
performed. Place the tasks in the correct order according to the troubleshooting methodology.
4
Answer:
Question No 4
A company is seeking a new backup solution for its virtualized file servers that fits the following
characteristics:
The files stored on the servers are extremely large.
Existing files receive multiple small changes per day.
New files are only created once per month.
All backups are being sent to a cloud repository.
Which of the following would BEST minimize backup size?
5
Question No 5
A company has deployed a four - node cluster in a COLO environment with server configurations listed
below. The company wants to ensure there is 50% overhead for failover and redundancy. There are
currently eight VMs running within the cluster with four vCPUs x32GB each. The company wants to
better utilize its resources within the cluster without compromising failover and redundancy.
Given the information above, which of the following should a cloud administrator do to BEST
accommodate failover and redundancy requirements?