Читать книгу CompTIA Cloud+ Study Guide - Ben Piper, David Higby Clinton - Страница 29
Assessment Test
Оглавление1 Bob is accessing a self-service portal in the cloud to instantly create additional servers, storage, and database instances for his firm's DevOps group. Which of the following options best describes this operation?BurstingPay-as-you-growMultitenancyOn-demand
2 Jillian is working on a project to interconnect her company's private data center to a cloud company that offers email services and another that can provide burstable compute capacity. What type of cloud delivery model is she creating?PublicHybridCommunityPrivate
3 Carl is learning how cloud service providers allocate physical resources into a group. These resources are then dynamically associated with cloud services as demand requires. What best describes this?On-demand virtualizationDynamic scalingResource poolingElasticity
4 Liza is a new Cloud+ architect for BigCo Inc. She is investigating cloud services that provide server hardware, but not applications. What cloud service is she using?IaaSPaaSSaaSCaaS
5 Harold is investigating his options to migrate his company's time and attendance application to the cloud. He wants to be responsible only for maintaining the application and would prefer that the public cloud company manage all underlying infrastructure and servers that are required to support his application. Harold calls you and asks for assistance in selecting a cloud service model that would meet his requirements. What would you suggest that he implement?IaaSPaaSSaaSCaaS
6 Jane is a Cloud+ architect working on a physical-to-virtual migration to the public cloud. She has matched VM performance levels to her established baselines. She knows that her organization may need to adjust hardware resources in the future. What cloud characteristics can she use to match cloud capacity with future growth? (Choose three.)ElasticityOn-demand computingAvailability zonesResiliency virtualizationPay-as-you growResource pooling
7 What are two elements that together distinguish the cloud from a traditional data center operation? (Choose two.)Load balancingAutomationAutoscaling groupsVirtualization
8 Dawn is interested in selecting a community cloud provider that offers a specialized financial reporting application. What type of cloud model would you recommend Dawn investigate to meet her requirements?IaaSPaaSSaaSCaaS
9 Carol is a cloud customer that your consulting company is assisting with their migration. She is asking you about the demarcation point of operations for her public PaaS service. Which of the following defines what you are responsible for and the responsibility of the provider?Availability zonesCommunityShared responsibility modelBaselines
10 Jonathan is architecting his client's global public cloud presence for an upcoming e-commerce deployment. You have been brought on to help design the network. He asks about providing local connections in Singapore and Malaysia. What would you suggest that he investigate?RegionsAuto-scaling groupsAvailability zonesGlobal DNS affinity
11 Zale is working on a collaborative project that requires the implementation of a large-scale NoSQL database that will access three petabytes of historical data. He needs durable block storage in remote flash arrays. You have been tasked with designing the storage connectivity from the database to the stored data. What type of network connection would you recommend for NoSQL read/write access to the arrays?Block accessZoningVMFSSAN
12 Physical resources are virtualized and presented as resources to virtual machines running on hypervisors. What common resources does the hypervisor virtualize? (Choose three.)Layer 2RAMLayer 3CPUsRAIDStorage
13 As a new Cloud+ professional, you have been hired by a company that operates its own data center; however, the company is calling it a cloud. What delivery model are you working with?HybridPublicPrivateCommunity
14 Tim just logged into his cloud management dashboard to check the health monitors of his server fleet. What is the process that he completed at login?AuthorizationAccountingAuthenticationFederationIdentity access
15 Martha is studying SAN technologies that use the Fibre Channel protocol, and she is asking about disk configuration in the remote storage array. She asks you which type of storage she can use on her Linux servers. What storage type can she deploy? (Choose the best answer.)MetaObjectBlockFile
16 Patesh is becoming familiar with the interfaces available for his operations team to use to access his hybrid cloud deployment. You have been asked to explain the common types of user-based interfaces available to manage cloud objects. What are the common interfaces that you would explain to Patesh? (Choose three.)Web consoleSNMPAPIPaaSCLI
17 You work for a company that offers cloud services to the railroad industry. All railroads have a similar set of requirements and access the same applications. BigWest Rail has contacted you about becoming a customer and is asking what applications are shared with other rail operators. They also ask what type of cloud model your company offers. What type of cloud is this?HybridPublicPrivateCommunity
18 Kevin is exploring a durable block storage option that offers high performance. It also needs to support striping that allows a parity bit to be used to reconstruct a volume if a single magnetic disk fails in his array. Which storage type stripes file data and performs a parity check of data over multiple disks that can recover from a single hard disk failure?RAID 0RAID 1RAID 3RAID 5
19 You are involved in a large-scale migration project that requires moving a Windows OS running on a dual-slot, eight-core server with no hypervisor in a data center to a virtual server in the public cloud. What type of migration is this?vMotionP2VPrivate to publicV2VSynchronous replication
20 You have been asked by a new customer what type of authentication systems require something that you have and something that you know. What type of authentication technology would you recommend?Single sign-onConfederationsActive Directory/LDAPMultifactor
21 Beatriz stops at her bank's ATM on her way home from work. She inserts her card into the ATM and then enters her PIN on the keypad. What type of authentication is she using?SSOTwo-factorLDAPUser-based
22 Roman is the cloud administrator for a company that stores object-based data in a hybrid cloud. Because of the sensitivity of the data and various regulatory restrictions on allowing users access to sensitive security data, what type of access control would meet his security policies?Mandatory access controlNondiscretionaryRolesMultifactor
23 William is implementing an access control rollout for a cluster of Windows SQL database servers in a hybrid cloud environment. Developers will need full read/write access to the database servers, whereas other business units will need read-only access to particular databases. What type of access control should William deploy?Mandatory access controlNondiscretionaryRole-basedMultifactor
24 Quentin is a defense contractor investigating server compliance requirements needed to be certified to meet the U.S. Department of Defense security requirements for contractors. What requirement would you recommend that he focus on?FedRAMPDIACAPFISMASection 405.13 for DoD rule A286
25 Leanna wants to deploy a public cloud service that allows her to retain responsibility only for her applications and requires the cloud provider to maintain the underlying operating system and virtualized hardware. Which service model would you recommend that she implement?IaaSPaaSSaaSCaaS
26 Robert is configuring a new cloud interconnect to access his locally hosted Active Directory services. He wants to prevent his user base from having fragmented rights and no unified authorization services. You are brought in as a service consultant to assist in optimizing and controlling user access by implementing a technology that will give access to all allowed systems at the time of user authentication. What type of system are you deploying?Token-based 2FASSORSANondiscretionary
27 Cathy is preparing her company's migration plan from a private to a hybrid cloud. She wants to outline firewall and DDoS requirements. What document should she create?DIACAPSecurity policyService level agreementSOC-2
28 Perry is investigating options for interconnecting a private cloud to a new public cloud region that supports analysis of customer-streamed IoT data. He is planning on implementing a tunnel across the Internet to interconnect the two locations to avoid the high costs of a dedicated interconnection. What transport protocol would you suggest that can offer a secure connection across the unsecure Internet?AESSOC-3IPsecRC5
29 Jarleen is a consultant tasked with migrating Health Med Records Inc. customer records to a cloud-based service offering a long-term archival system. Which U.S. compliance mandate must her company align with?SOC 3HIPAAMPAAISA 2701
30 Fluentes is a security consultant for a day trading company that must implement strong encryption of data at rest for their cloud storage tiers. What is the best option that meets most security regulations for the encryption of stored data?3DESRSAAES-256Rivest Cipher 5
31 Randy is developing a new application that will be deployed in an IaaS-based public cloud. He builds a test image and deploys a test VM in his private cloud's development zone. When he stops and restarts one of the Linux-based servers, he notices that his storage volume data is missing. What type of storage exhibits this behavior? (Choose two.)DurableRAIDEphemeralNondurableBlockObject
32 Matt has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?DMABIOSCPUIPsecI/O
33 Jill works in the operations center, and she is tasked with monitoring security operations. What cloud-based GUI can she use for a real-time overview of security operations?Puppet automationGemalto systemDashboardVendor-based security appliance
34 Larken is reviewing the SLA and statement of responsibility with his community cloud provider PaaS. To whom does the responsibility for stored data integrity in the cloud belong?Cloud providerCompliance agencyCloud customerShared responsibility
35 Mindy has been tasked with developing a new QA test logging application, but she is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for her to use to meet her requirements?PythonXMLAPISNMPTLS
36 What technology was instrumental in the growth of cloud services?XMLPythonAutomationAuthenticationSecurityWorkflow servicesEncryption
37 Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shut down the hacking attempts. What application would you suggest that Vicky deploy?DMZIDSIPSRAIDHIDS
38 What options can you offer your user base for MFA tokens? (Choose two.)One-time passwordSmartphone appAutomation systemsKey fobCloud vendor management dashboard
39 Linda works in the IT security group of her firm and has been tasked with investigating options that will allow customers to access their personal records securely via the web. What is the most common in-flight e-commerce security protocol on the market?MD5SSL/TLSIPsecVPN
40 Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network micro-segmentation deployments. When reading the documentation, you notice a link to download a Java-based application to monitor and configure the IPS application. What kind of configuration program is this?CLIGIUVendor-basedAPIRESTful
41 Name the type of software update that is designed to address a known bug and to bring a system up-to-date with previously released fixes.HotfixPatchVersion updateRollout
42 Your employer has developed a mission-critical application for the medical industry, and there can be no downtime during maintenance. You have designed a web architecture to take this into account and that allows you to have an exact copy of your production fleet that can be brought online to replace your existing deployment for patching and maintenance. What type of model did you implement?ClusterDevOpsBlue-greenRolling
43 Jill is performing a Tuesday night backup of a Tier 2 storage volume of which she already completed a full backup on Sunday night. She only wants to back up files based on changes of the source data since the last backup. What type of backup is she performing?FullDifferentialIncrementalOnline
44 What virtual machine backup method creates a file-based image of the current state of a VM, including the complete operating system and all applications that are stored on it?Full backupSnapshotCloneReplicate
45 Ronald is a Cloud+ student studying systems that abstract and hide much of the complexity of modern cloud systems. What is he learning about?RunbooksWorkflowOrchestrationREST/API
46 What are common automation platforms? (Choose three.)ChefCloud-patchAnsibleDevOpsPuppetCloud Deploy
47 Marlene is updating her horizontally scaled Internet-facing web servers to remediate a critical bug. Her manager has agreed to operate under reduced computing capacity during the process but stipulates that there can be no downtime. What upgrade approach should Marlene perform to meet these requirements?OrchestrationRollingHotfixBlue-green
48 What VM backup method can be used to create a master image to be used as a template to create additional systems?Full backupSnapshotCloneReplica
49 A new application patch is being validated prior to release to the public. The developers have a release candidate, and the DevOps manager is requesting a report that shows the pass/fail data to verify that the fix does, in fact, resolve the problem. What process is the manager verifying?RolloutOrchestrationAutomationQA
50 Jane has found a table merge issue in her SQL database hosted in a private cloud. While reviewing the log files, the vendor requested that she install a software change designed for rapid deployment that corrects a specific and critical issue. What are they referring to?HotfixPatchVersion updateRollout
51 To meet regulatory requirements, a medical records company is required to store customer transaction records for seven years. The records will most likely never be accessed after the second year and can be stored offline to reduce expenses. What type of storage should they implement to achieve this goal?File transferArchiveReplicationData store
52 Mark is creating a disaster recovery plan based on directives from his company's executive management team. His company's business is an e-commerce website that sells children's apparel, with 85 percent of its revenue received during the holiday season. If there was a severe disruption in operations, the loss of business could put the company's ongoing financial viability in peril. Mark is creating a plan that will restore operations in the shortest amount of time possible if there is an outage. What DR model is he implementing?Hot siteActive/activeWarm siteActive/passiveCold siteRollover
53 You're researching data replication options for your SQL database. You've decided to create a backup replica in a different availability zone that could become primary should the primary zone go offline. The replica is updated in near real time after the initial write operation on the primary database. What type of solution is this?SynchronousAsynchronousVolume syncRemote mirroringRAID 5
54 Pierre is deploying a solution that allows data for his e-commerce operations hosted in a public cloud to be reached at remote locations worldwide with local points of presence. He wants to reduce the load on his web servers and reduce the network latency of geographically distant customers. What are these facilities called?RegionsEdge locationsAvailability zonesReplication
55 Melinda is updating her firm's disaster recovery plans, and after receiving direction from her company's board of directors, she has been instructed to create a plan that restores operations within 48 hours of a disaster. What part of the plan should she update with the new requirements?RSORPORTODBO
56 Jillian is a Cloud+ consultant for an auto parts company based in central Michigan. She is putting together a disaster recovery plan that includes a remote backup site that has a SQL server instance running at that location with a synchronously refreshed data replica. Her plan calls for activating all other services in the event of a hurricane causing an outage at her primary data center. What model is Jillian going to deploy to meet the requirements?Hot siteWarm siteCold siteActive/passive
57 Pete has been busy updating the disaster recovery procedures for his client's business continuity plan. The DR facility will need to be ready with floor space, power, and cooling and have loading docks to unload server and equipment racks to restore service. What type of DR implementation is Pete planning on deploying?Hot siteActive/activeWarm siteActive/passiveCold siteRollover
58 Connie has been directed by her employer's finance department that they cannot afford to lose any more than 30 minutes of data in the case of a database failure or other catastrophic event. Connie has updated her corporate business continuity and disaster recovery plans. What metric did she change?RSORPORTODBO
59 Will is testing his backup DR site and using his DNS configuration to load-balance the primary and backup sites. He wants to verify that the database in the DR facility is updated in real time and remains current with the production replica in the primary data center. What type of updates should he define in his primary data center servers prior to enabling the DNS load balancing?Synchronous replicationAsynchronous replicationVolume syncMirroringRAID 5
60 Leonard is creating disaster recovery documents for his company's online operations. He is documenting metrics for a measurable SLA that outlines when you can expect operations to be back online and how much data loss can be tolerated when recovering from an outage. Which metrics is he documenting? (Choose all that apply.)RSORTORPODRVxRestore
61 The ability to dynamically add additional resources on demand such as storage, CPUs, memory, and even servers is referred to as what?BurstingPoolingElasticityOrchestration
62 Margo is reviewing the maintenance responsibilities between her company and its public cloud service provider. She notices that the cloud provider takes responsibility for the operating system, and her company assumes responsibility for all applications and services running on the operating system. What type of service model is she operating under?IaaSPaaSSaaSXaaS
63 Which service model has the most lock-ins and is the most complex to migrate?IaaSPaaSSaaSXaaS
64 Joe is in the planning stages to make sure that an upcoming company promotion during a major sporting event will not overwhelm his company's cloud-based e-commerce site. He needs to determine his options to add capacity to the web server farm so that it can process the anticipated additional workload. What do you recommend as possible solutions? (Choose three.)Vertical scalingHorizontal scalingEdge cacheCloud burstingCore elasticity
65 Janice manages the MySQL database back end that runs on a multi-CPU instance that has reached 100 percent utilization. The database can run on only a single server. What options does she have to support the requirements of this database?Horizontal scalingVertical scalingPoolingBursting
66 A popular e-commerce site is hosting its public-facing front-end web server fleet in a public cloud. You have been tasked with determining what the normal day-to-day web hit count is so that capacity plans for the upcoming holiday selling season can be assessed. You want to track incoming web requests and graph them against delayed and missed connection counts. What type of dataset are you producing?MetricVarianceBaselineSmoothing
67 Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community cloud in another state. She is investigating using the community cloud to supplement her private cloud workload during end-of-month processing. What operation is she going to perform?ElasticityCloud burstingVertical scalingAutoscaling
68 CPU utilization on a database server has consistently been at more than 80 percent utilization. The baselines show that 57 percent utilization is normal. What is this called?DeviationVarianceTriggersBaseline imbalance
69 Harold will modify an NACL to adjust remote access to a cloud-based HR application. He will be submitting a plan that outlines all details of the change. What process is he following?Cloud automationChange advisoryChange managementRollout
70 To increase TipoftheHat.com 's security posture, Alice is reviewing user accounts that access the community cloud resources. Alice notices that the summer interns have left to go back to school but their accounts are still active. She knows that they will return over the winter break. What would you suggest that Alice do with these accounts?Do nothing.Delete the accounts.Disable the accounts.Change the resource access definitions.Modify the confederation settings.Change the access control.
71 Object tracking can be helpful in identifying which of the following? (Choose three.)ResiliencyTrendsMetricsACLsPeak usageAnomalies
72 Capacity and utilization reporting often contains data on which of the following objects? (Choose three.)CPUOS versionVolume tierRAMNetwork
73 What does a cloud management system monitor to collect performance metrics?DatabaseServerHypervisorObjects
74 Object tracking should be aligned with which of the following?VPCSLARDPJSON
75 What is a visual representation of current cloud operations?Operational matrixManagement consoleDashboardTicker
76 Hanna is monitoring performance metrics on a video server; she sees that the server is utilizing 100 percent of the available network bandwidth. What action will most likely address the problem?Implement 802.1Q tagging.Install a second network adapter.Update the network adapter's firmware.Install a network coprocessor ASIC.
77 What type of scaling includes adding servers to a pool?HorizontalRound robinElasticityAutoscaleVertical
78 What type of scaling involves replacing an existing server with another that has more capabilities?HorizontalRound robinElasticityAutoscaleVertical
79 Ichika is preparing a change management plan to increase the processing abilities of one of her middleware servers. What components can she upgrade to increase server performance? (Choose three.)CPUSLARAMNetwork I/OACLDNS
80 Niko is generating baseline reports for her quarterly review meeting. She is interested in a public cloud application server's memory utilization. Where does she generate these reports?HypervisorDatabasesLogging serversCloud management and monitoring application
81 SaaS orchestration systems are whose responsibility in the public cloud?CustomerProviderAutomation vendorDevOps
82 What type of application commonly uses batch processing?DNSNTPDatabasesMiddleware
83 Giulia posted a new software update to her company's popular smartphone application. After announcing the release, she has been monitoring her dashboard information and has noticed a large spike in activity. What cloud resource should she focus on?CPUNetwork bandwidthRAMAPIStorage
84 Cloud capacity can be measured by comparing current usage to what?OrchestrationAutomationNTPBaselineAPIs
85 Emma is modifying a publicly accessible IP subnet on her company's e-commerce site hosted in a hybrid cloud. After performing address changes for all of her public-facing web servers, she validated the change by connecting from a bastion host located offshore. She was unable to connect to the web servers. What does she need to modify to allow the remote site to connect to the web server?NTPSTPDNSAPI
86 Maria has noticed an increase in the response time of the NoSQL application she runs in her IaaS cloud deployment. When comparing current results against her baseline measurements that she recorded when the database was originally deployed, she verified that there has been a steady increase in the number of read requests. You have been asked to evaluate the baseline variances. Where should you focus your troubleshooting efforts?MemoryCPUStorageNetworking
87 Derek is monitoring storage volume utilization and is preparing a company change request to add storage capacity. He has decided to automate the volume allocation size. What cloud feature can he take advantage of?SaaSAPIElasticityOpenStack
88 What application tracks a process from start to finish?APINTPWorkflowOrchestration
89 Common cloud resources in your deployment that may saturate over time include which of the following? (Choose three.)RAMPowerCPUStorageMonitoringIaaS
90 Homer designed an application tier for his company's new e-commerce site. He decided on an IP subnet that uses the /28 IPv4 subnet. He is planning for a maximum of 14 servers. You are brought in as a cloud architect to validate his design. What other devices may be on this subnet other than the servers that would also require IP address assignments? (Choose two.)SLADefault gatewayDNSNTPAPISNMP
91 Elena manages user accounts for her company's cloud presence. She has a trouble ticket open with Jill to assist her in accessing an SSD storage volume in the San Paulo region of the public cloud. What kind of user issue is she investigating?AuthenticationAuthorizationFederationSSO
92 Emma is unable to reach her Linux-based web server hosted in the Singapore zone of the cloud. She is located in Austin, Texas. What command can she use to verify the connection path?tracerouteipconfigarpnetstatpingtcpdumproute print
93 After deploying a new public website, your validation steps ask you to check the domain name–to–IP address mappings. What utility can you use for validation? (Choose two.)RDPdigSSHnslookupIPsecIPS
94 Nicola is deploying a new fleet of IIS web servers on his IaaS e-commerce site. The company has elected to use a hybrid approach and wants graphical connections to the Windows bastion hosts. What traffic must he permit through the external-facing firewall to the host?SSHRDPDNSIPS
95 Martina is troubleshooting a networking problem and needs to capture network frames being sent and received from the server's network adapter. What command would she use to collect the traces?dignetstattcpdumpnslookup
96 The remote disaster recovery location follows the warm site model. To configure the network switches, routers, and firewalls remotely, Joyce will need serial port access from her company's operations center. She has 14 serial ports currently available but needs to be prepared for any unplanned expansion requirements during a disaster recovery cutover. What device would you recommend that she install at the warm site?RDPTelnetIPsecSSHTerminal server
97 The cloud data center is in a large industrial park with no company signage, extensive video cameras in the parking lot, high-security fences, and biometrics at the guard shack. What type of security is the provider implementing?BuildingDeviceInfrastructureTunneling
98 Mergie is documenting different methods that her remote operations center can use to access a fleet of servers operating in a community cloud. Which of the following are not viable methods? (Choose two.)RDPTelnetIDS/IPSTerminal serverDNSHTTP
99 Vasile is working a support ticket that shows the connection between the Ames field office and the Kansas City cloud edge location has dropped. She confirms it's a secure Internet-based access solution. What type of connection is this?Direct peeringIDSVPNAES-256RDP
100 Company users are complaining that they cannot log into a cloud-based collaboration system. The operations center has been investigating and has, so far, verified that the MFA applications are operational. What user system are they troubleshooting?AuthenticationAuthorizationFederationKerberos