Carl has created a virtual machine on the cloud service provider that his company uses and has given it a static private IP address. He wants to make this server is the new web server for the company's website. Which of the following is required to allow that server to perform in that role?
Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company?
Negan has been given the 10.50.0.0/16 subnet to create the cloud infrastructure necessary for a new subsidiary that his company is creating, Zombies Inc. He wants to create a minimum of 500 smaller networks that can hold 100 servers each out of that space to minimize broadcast traffic within each subnet. Which of the following CIDR masks could he use to meet his requirements?
Maggie wants to create a small subnetwork for the Human Resources servers that her organization uses. There are currently 10 servers, but she also needs to plan for 50 percent growth over the next two years. Which of the following subnet masks would give her adequate IP address space while leaving the fewest number of unused IP addresses in the block?
Darryl has been given the 10.20.30.64/26 network to use for a set of virtual machines that he is provisioning on his company's private cloud. He has been told to configure the last usable IP address in the range as the gateway, or router, address. Which of the following IP addresses should he use for the gateway?
Carol has created a subnet of 10.20.30.0/27. Which of the following is the address that is used for broadcast messages within the subnet?
Morgan has hardened the virtual machines in the subnet he's just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment?
Glenn has been tasked with creating a few new virtual machines for a new project that will be used by the finance department. It will contain sensitive data about the company and its operations. Which of the following is the most important thing for Glenn to consider as he's creating the virtual machines?
| a. Which operating system is being used for the servers | | |
| b. Which region he is creating the virtual machines in | | |
| c. How much disk space is being allocated | | |
| d. How much memory is being allocated for each virtual machine | |
Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement?
| a. Different cloud service providers for each department | | |
|
| c. Network address translation | | |
| d. Different subnets for each department | |
Eugene has been given the subnet 10.20.30.0/24 to use for the creation of a group of virtual machines to be used for the sales department. He is used to seeing a subnet mask in the format of four numbers separated by periods (255.255.255.0) along with the subnet ID, but isn't familiar with what the slash and a number mean after the subnet ID. He asks you to help him interpret the information. What term should you tell him to search for on a search engine to learn more about this topic?
Ezekiel wants to ensure that several of the cloud resources he is responsible for managing are always available. Which of the following might best help him meet his goals of high availability?
| a. Offsite backup to another region | | |
| b. Site mirroring between two or more regions | | |
| c. Daily replication to another region | | |
|
Dwight has just moved all of the Linux servers from the VPC that they shared with some Windows servers to another VPC. Which of the following does he most likely need to do?
| a. Remove the rules that allow port 53 from the firewall to the original VPC. | | |
| b. Remove the rules that allow port 22 from the firewall to the original VPC. | | |
| c. Remove the rules that allow port 443 from the firewall to the original VPC. | | |
| d. Remove the rules that allow port 3389 from the firewall to the original VPC. | |