CompTIA Cloud+ Post-Assessment Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Ann is working on the installation of the company's new private cloud within the data center. The network engineering team has already configured the router connection to go to the cloud, but she would like to add an additional layer of security that will inspect the contents of the packets as they move back and forth to the cloud. Which of the following should she request to be installed?

b. Firewall

Frank has just created a new virtual machine on the cloud service provider that his organization uses. He was given 10.8.2.32/27 by the cloud architect to use for the network configuration of the virtual machine. He's tried to configure the IP address given and with the subnet mask of 255.255.255.224 but can't seem to get it to work. Which of the following is most likely the problem?

d. The host address given cannot be used with a /27 subnet.

Hurricane Joe has just hit the area where Fictional Corp's offices are located. Management has managed to drive to the office and is looking around at the damage. Which of the following might help them determine how best to rebuild the infrastructure?

a. DRP

Richard wants to create a cloud-based system that will be a centralized repository of log files from various servers in the organization. Which of the following is best used for this scenario?

a. Object

Diego has created a new virtual machine on the company's private cloud and installed a custom application that should be listening for XML formatted data via incoming network traffic and then writing the information contained in those packets to a local database. When he sends XML data to the virtual machine, however, there does not appear to be any data being written to the database. Which of the following tools might Diego use to start troubleshooting? (Choose two)

a. tcpdump d. netstat

Jack has been tasked with creating a document that will outline how the company will continue to operate in case of a disaster. Which of the following describes the document that he needs to create?

b. BCP

Cici has received notification of an IDS failure to detect an event. Which of the following does she next need to determine?

b. What the blast radius is

Jan's cloud service provider has given her 10.0.0.0/8 by default to use for her internal addressing of virtual machines. In order to be compliant with her company's security policy, she needs to segment the virtual machines used by different departments. The finance department currently uses 10 virtual machines but is planning for 50 percent growth over the next year, which you need to allocate IPs for now rather than reconfiguring everything later. Which of the following is the smallest subnet that you can create for the finance department?

c. 10.3.3.128/27

Several nonprofit organizations have decided to create a community cloud. Which of the following components might be the most difficult for them to manage?

c. Access control for users

Joe has purchased an external hard drive to attach to his workstation so that he can maintain backup copies of the virtual machines he uses for testing new applications and patches before they're pushed into the production environment. Which of the following is the type of storage he is using?

c. DAS

Wanda manages an application that fluctuates in usage quite a bit. Sometimes it uses quite a few servers with lots of memory and CPU while other times it only uses a couple of servers with minimal CPU and memory allocated to them. She doesn't have to manually make changes as the system has the ability to increase or decrease those resources on its own. Which of the following terms describes that capability?

c. Elasticity

A company is planning to migrate many of the servers in an existing data center to a cloud service provider. Which of the following should be done as one of the first steps of the project? (Choose two. Each answer is independently correct.)

c. Ensure the backups are up to date d. Establish baselines

Benjamin's company has asked him to start migrating the company's office productivity suite and e-mail to a cloud-based solution. He knows this means that users need to be able to log into the cloud platform, but doesn't want them to have to use a separate account to do so. Which of the following could he configure to meet that goal?

c. Federation

Fictional Corp has two data centers in the United States: one on the east coast and one on the west coast. Each data center has recently had a private cloud infrastructure deployed in them. The cloud architect now wants to connect the private clouds together through the Internet using the built in GRE on the routers his company uses. However, he knows that GRE does not include encryption. Which of the following can he combine with GRE in order to provide an encrypted connection between the two data centers?

c. IPsec

The Chief Technology Officer has just returned from a conference where he learned about a set of best practices many IT departments around the world use in order to properly deliver services to internal and external customers. He is excited that the organization may be able to save time and money by implementing these methods. Which of the following set of best practices is he most likely talking about?

c. ITIL

Catherine is designing the backup strategy for the new private cloud that her company is implementing. She specifies that a full backup will be done weekly on Sunday mornings. She also specifies that another backup will be run every morning after that. Which of the following backup types will use the least amount of disk space for the daily backups?

c. Incremental

Leo is planning the new backup strategy for a subsidiary his company is purchasing that does not currently have a backup strategy in place. He decides that a full backup should be run once per week. Once per day, everything that has changed since the last full backup will be archived. Once per hour everything that has changed since the last backup of any type will be backed up. Which of the following describes the backups that will be run every hour?

c. Incremental

Jack has just implemented a system whereby users are required to log in using their username and a password as well as insert a smart card into the card reader. Which of the following has he implemented?

c. MFA

Ferris has configured one of his cloud applications to increase the capabilities of the virtual machine that it runs on as necessary to meet user demand. Which of the following terms describes this capability?

c. Vertical scaling

David is hired at Fictional Corp and immediately notices a lack of documentation for any of the systems. There are a couple of small spreadsheets that float around, but different people have different versions of those spreadsheets throughout the organization, which creates problems with figuring out what information is accurate. Which of the following should David suggest Fictional Corp implement?

d. CMDB

Fictional Corp has hired a penetration tester to come in and audit their infrastructure. Their report indicates that the six-year-old firewall that the company uses should be replaced. Which of the following best describes why they might have made this recommendation?

d. Obsolete technology

Deidre has just moved from the sales department into the finance department. On her first day in her new role, she receives an e-mail with a list of systems that she should become familiar with. She tries to access the first system on the list and gets an access denied error message. Which of the following is the most likely reason why?

d. The company uses role-based access control and her user account hasn't been migrated into the correct group(s) yet.

Mats wants to automate some user account management tasks. He realizes that he's going to need to learn a programming or scripting language to do so. As part of the development these scripts, or programs, are going to need to communicate with services on the server through the use of which of the following?

a. API

Jonathan manages a virtual private cloud for his organization and has automated some of the standard tasks that he needs to perform. These tasks can be triggered from different sources by means of sending a piece of information from one system to a gateway on the virtual private cloud. Which of the following automation techniques did Jonathan most likely implement?

a. APIs

Fictional Corp is migrating its internal physical servers to a cloud service provider. It currently uses an internal time clock to synchronize time settings. The company still wants to synchronize the time between the virtual machines at the cloud provider and their internal network. Which of the following protocols would allow them to use a globally accessible time server to synchronize the time?

a. NTP

A few friends are looking at creating a new company to deliver a new idea for an application, but have not yet sought out any investors with the idea. They want to go ahead and start building the application out, but want to keep their initial costs low. Which of the following cloud service models would best allow them to create the application given this requirement?

a. Public cloud

A junior technician is testing the deployment of a new virtual machine on the cloud service provider your company uses. He comes to you and says that he knows the provider has stated a guaranteed uptime that they promise to deliver to their customers, but cannot remember where to find that information. Where should you recommend that he look?

a. SLA

Fictional Corp has implemented firewalls and intrusion protection systems, disabled unnecessary services and ports, installed anti-malware scanning software, and regularly audits the permissions assigned to users at least once per quarter. They use a well-known and trusted cloud provider that uses a very well secured data center. However, one of the cloud applications that they use has been compromised and the organization has suffered a data breach because of it. Which of the following could be a cause of the data breach?

a. Weak or no passwords on mobile devices

Carol is deprovisioning an application that will no longer be used within the company from a virtual machine residing on the company's private cloud deployed in their data center. The application was designed to communicate over a special port number that was dedicated just to that application. Which of the following does Carol most likely need to do as part of deprovisioning the application?

b. Disable the rule in the firewall that allowed the traffic

Fictional Corp's development team wants to start deploying new applications in a lightweight, self-contained environment that can run on almost any OS. Which of the following options are they most likely using?

b. Docker

Kelley is managing a project to deploy the company's new application offering by using a cloud service provider for the platform. This will ensure that she has the elasticity and scalability necessary to deliver the application to what is hoped to be a large number of customers. Which of the following should be done at every step of the project?

b. Documentation

A large university that offers classes for spring semester, summer semester, and fall semester is replacing its class registration system due to the age of some of its servers. One of the options it is considering is a migration to the cloud. Which of the following might be the most important benefit to the university of moving their class registration portal to a CSP?

b. Rapid elasticity

Marco has set up the new application that the company is testing out in a virtual machine at the cloud service provider his organization uses. He then attempts to access the server by the FQDN that should be used, but cannot get a response from the server. He attempts to access it by IP address and is successful. Which of the following tools might he use to troubleshoot the issue? (Choose two)

b. nslookup c. dig

Clyde has just configured a web server as the first virtual machine on the cloud service provider that his company has just started using. Which of the following does Clyde need to also configure to make sure that the web server is reachable by users around the world?

c. IG

Fictional Corp has hired a penetration tester to come in and audit their infrastructure. Their report indicates that the company has multiple instances of port 21 being open on virtual machines to the public Internet from their private cloud. Which of the following might be the best explanation of their cause of concern?

c. Unencrypted communications

Bob has just finished applying a patch that he believes should fix one of the problems in an application hosted by the company's chosen cloud service provider. He closes the ticket and updates the documentation. The next day, he receives a ticket saying that something else appears to be broken on that same system. Which of the following steps of the troubleshooting model did Bob most likely forget to perform or not perform correctly?

c. Verify full system functionality, and, if applicable, implement preventive measures

Gwen wants to start performing certain tasks like user account creation, removal, and disablement with minimal human intervention. Which of the following is she looking to implement?

a. Automation

Adrian wants to make a change to one of the virtual machines being hosted on a cloud service provider that requires approval. He is making sure to include as much relevant information as possible in the change request, but wants to make sure that the team that handles the approvals has all of the information they need. Which of the following teams is he trying to cater the information to that will approve or deny the change request?

a. CAB

George has been hired by a company for a security audit. He sees that they use a default password for all new user accounts of welcome123456789. The user is then forced to change the password upon logging in for the first time. Which of the following password policies does this company most likely not have in place that should be enacted?

a. Complexity

Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subject. As they're discussing some of the topics, he gives the co-worker permissions to the resources so they can look at the information on their own. Which of the following access control methods does Kareem's company use?

a. DAC

A large multinational corporation is in the planning stages of migrating some of its applications to a cloud service provider. They have outlined their technical needs and have sent some of the documentation along with the potential provider's SLAs and terms of service to the legal department to review. Which of the following might be a concern expressed by the legal department after reviewing these documents?

a. Ensuring data is hosted in the appropriate regions for the cloud service provider

Jan is looking at implementing a SAN in her organization for data storage. Which of the following protocols could she use as part of the implementation?

a. FC

Frank has created a new virtual machine on the cloud service provider that his company uses. He goes to the command prompt of his workstation and tries to ping the virtual machine. However, it comes back with the results showing that the request timed out. Which of the following is most likely the reason?

a. ICMP is blocked at the firewall

Jane arrives at work on Monday morning and goes to log into her computer with a username and password. Which of the following is the username considered?

a. Identification

Caleb goes to work for Fictional Corp and is told that they use an open-source container management service developed by Google. He knows that he needs to learn more about this management service in order to really be able to do his job well. Which of the following services does Caleb need to learn more about?

a. Kubernetes

Josh is planning a new application for the sales department. The sales department has told him that an occasional outage is fine, so long as the system isn't down for any more than 2 hours at a time. Which of the following describes the timeframe requirement the sales department has given him?

a. RTO

Cullen installs the updates to the operating system on one of the imaging storage systems at the hospital he works at. As soon as he does, the MRI can no longer communicate with the storage server using its proprietary software. He decides to revert the system back to its previous state so the system is still operational until he can come up with a solution to make it all work. Which of the following is this reversal process called?

a. Rollback

Jake has just performed a fresh install of the Linux distribution that the company uses as a virtual machine on the company's chosen CSP. Which of the following steps should Jake do first?

a. Uninstall and disable any unnecessary services and ports that aren't needed.

Freda manages a server where the hypervisor contains multiple virtual machines. One of the virtual machines is an important system that needs to run successfully even if the other virtual machines on that host suffer performance issues as a result of prioritizing this one system. Which of the following techniques can Freda use with the remaining virtual machines to ensure that the critical VM is able to access and use the memory it requires?

b. Ballooning

Kirsten manages the infrastructure that hosts her company's CRM platform. She currently has a production environment that all of the users access. However, she was recently reading about the concept of creating a second production environment where patches and updates are applied and then traffic is shifted over to the second environment once it has been tested. Which of the following describes the methodology that she is considering implementing?

b. Blue-green deployment

When planning out the new data center where he is building a private cloud, Juan knows that he needs to account for all of the physical and logical resources that the servers will need in that new network. Which of the following must he account for in regard to the network part of his planning?

b. Ensure that he has enough IP addresses for the networks and subnets to account for the vNICs that are in bridging mode.

Arlene sees that a new version of the content management system her company uses came out the day before. She downloads and installs it, and then a day later, sees an update come out for it. Which of the following describes the type of update that is available for the CMS?

b. Hotfix

Donovan maintains a collection of documents that outline the precise steps to complete procedures or operations for his organization in case of a staffing or responsibility reorganization. Which of the following is a term that can be used to describe these documents?

b. Runbook

Fictional Corp has a set of guarantees from the cloud service provider they use. The cloud service provider uses the terms of the document in order to determine the types of backup and backup schedule. Which document is it that contains these guarantees?

b. SLA

Benjamin has just finished implementing the federation necessary to migrate his company's office productivity suite and e-mail to a cloud-based solution so that users do not need a separate account to access it. Which of the following describes the benefit of implementing federation in this scenario?

b. SSO

Fictional Corp's website has been growing steadily over the first few months of business and are going to need more than one web server to handle the amount of traffic they are receiving in the near future. However, since they have the ability for users to order products from their website, they know that they need to carefully consider the features and abilities of the load balancing solution they choose. Which of the following features should they look for in a solution?

b. Sticky sessions

Will has been asked to recommend a protocol for his company to use for a VPN connection to the cloud service provider that his company uses. Which of the following protocols could he rule out as options for this connection?

b. TFTP

Kayla is a cloud administrator at Fictional Corp. She has received notification of a ticket describing an issue with one of the cloud-based applications that intermittently stops responding. After remoting into the system, she comes up with a theory of what might be causing the problem. What is the next step in the troubleshooting process that Kayla should take?

b. Test the theory to determine cause

Fictional Corp has an on-premises cloud in their data center that is typically able to handle the normal workload. However, occasionally the company will make headlines on the news or one of its social media posts will go viral and cause a lot more traffic to its website. Which of the following would best help with the capacity issues that only happen occasionally in the most cost-effective manner?

b. Use cloudbursting techniques

Joanne is working on a project and goes to access one of the web applications that her organization provides to retrieve some data. Upon searching for the data that she needs, she receives a pop-up message that top-secret clearance is required and she only has secret clearance. Which of the following access control methods does her organization use?

c. MAC

Fran is deploying an application that will be used globally by the entire organization. She is trying to ensure that there is the necessary amount of redundancy and that the data is readily available quickly. Which of the following storage methods should she use?

c. Multi-regional

Fictional Corp has a lab environment set up for testing patches before deploying them out to the rest of their network. As part of the process, the technician needs to make an image of an existing physical server and then import it as a virtual machine into the lab environment. Which of the following techniques is Fictional Corp using for these tests?

c. P2V

Carol has been asked by her manager to set up a certificate authority that will issue certificates and manage the public keys to be associated with each of the users. Which of the following defines the type of technology she has been asked to configure and install?

c. PKI

Giuseppe has just finished deploying multiple applications into his organization's private cloud. He has completed a number of passive tests and determined that everything appears to be configured correctly. However, he is still unsure whether there exist any vulnerabilities in the new setup and wants to find out what they are and whether they can actually be compromised. Which of the following is he likely to perform next?

c. Penetration testing

Meredith is creating a new virtual machine on the cloud service provider that her company has chosen to use. She needs for it to communicate with other virtual machines on the cloud service provider, but does not need for it to communicate with the rest of the Internet. Which of the following types of addresses will she most likely assign to the network interface?

c. Private

Craig is setting up storage replication to provide a better redundant failover solution than what is currently being used. Which of the following will provide the fastest failover system even though it requires more bandwidth?

c. Synchronous

Several disaster relief nonprofits want to create a centralized application and repository of information so that they can efficiently share and distribute resources related to various disasters that they may respond to together. Which of the following cloud service models would best fit their needs?

d. Community cloud

Which of the following benefits of cloud technology allows a company to provision only the minimum amount of disk space that it needs, knowing that it has the ability to increase that disk space automatically through auto-scaling?

d. Elasticity

Fictional Corp is a large international widget maker with presence all over the world. It wants to re-organize its support team so that no office needs to staff support technicians 24 hours a day. Which of the following support models could Fictional Corp choose to meet this requirement?

d. FTS

Brandon has configured one of the applications hosted on his cloud service provider to increase the number of resources as needed. Which of the following describes this capability?

d. Horizontal scaling

Jack has overcommitted the memory on one of the servers where the hypervisor contains six virtual machines. He is able to do this because of which of the following technologies?

d. Memory bursting

Lars has a number of automated processes within the IT infrastructure that he manages. He wants to optimize those automation processes into a single workflow. Which of the following describes his goal for managing the infrastructure?

d. Orchestration

Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. Which of the following is a step that the cloud administrator needs to perform as part of the move?

d. Remove the DNS entries within the VPC that are no longer relevant

Jon works for a small company with 15 employees. He is tasked with looking at email solutions for the organization. The owner has stated that he doesn't want anyone to have to manage an email server and that everyone should just be able to access their email through a web browser. Which of the following types of cloud services should Jon look at?

d. SaaS

Keely has an automation tool in place that runs a number of different processes for her and has for the last two years. All of a sudden it stops working and generates an error message that the account has been locked. Which of the following is the best possible reason why?

d. Someone has tried to hack into the system using that account.

Fictional Corp makes use of ITIL processes and lifecycle management strategies to ensure that they have a good handle on the various stages of creating new applications and retiring them once they are no longer useful. Jason has been tasked with creating a new application to be deployed onto the company's private cloud. Which of the following is the first stage of the process?

b. Design and development

A startup company has received some initial funding and needs to be very careful with their expenditures. They really want to create a private cloud, but realize that the high capital costs of equipment will prevent them from being able to do that. Which of the following would be the next best option?

b. Create a VPC on an existing cloud service provider.

A company is looking to implement a formalized process for any modifications to functions, processes, or systems within its infrastructure. Which of the following should be the first step in the new process?

b. Change request

Chris is concerned about deploying an application to a cloud service provider and being locked in technologically so that his organization would have to stay with that cloud service provider in order to run that application. Which of the following could he possibly use that should allow for an easier migration from one cloud service provider to another?

b. Containerization

Fred has been tasked with migrating an application from a physical server in the company's data center to a virtual machine residing on a cloud service provider. He knows that he is going to need to compare the performance of the new server to the old one by examining CPU usage, RAM usage, storage utilization, etc. In order to be able to make the comparison, what should he do prior to the migration?

d. Take baselines

The Chief Technology Officer has had an audit performed on the company's external facing IT infrastructure. One of the items in the report he was presented mentions that the company's website is running on HTTP. The recommended fix is to require HTTPS connections for the website. Which of the following should the technician responsible for making this change install and configure?

d. TLS

Vivian receives an e-mail notification from one of her software vendors that a new update is available. She decides to update a few servers at a time so that if there are any issues, she can address the issues on a small number of servers rather than all of the servers at once. She directs the traffic away from a few servers and, once those servers are updated, she starts sending traffic back to them, and then moves to the next wave of servers. Which of the following techniques is she using to apply this update?

a. Rolling deployment

Fred is working on a new storage system for his organization. He needs it to provide storage for the entire private cloud in the data center. Which of the following is he most likely to deploy?

a. SAN

The Chief Information Security Officer just returned from a security conference where he learned about a piece of software that can be installed on individual servers to monitor for malicious activity and hacking attempts and actually put a stop to any activity that it finds immediately. He has decided to run a pilot on the HR servers that are virtual machines running on an internal private cloud that contain private employee information. Janna has been tasked with recommending a product to meet the CISO's request. Which of the following types of technologies should she be searching for?

b. HIPS

Danielle is analyzing logs and baselines of the systems and services that she is responsible for in her organization. She wants to begin taking advantage of a technology that can analyze some of the information for her and learn from that data analysis to make decisions rather than relying on explicit programming for the analysis. Which of the following describes this technique?

b. Machine learning

Kareem is designing the requirements for a new application that his group is going to deploy for the sales department. As part of the requirements, he needs to plan for redundancy capabilities in case of a component or system failure. He finds that some data loss is acceptable, but no more than 4 hours' worth. Which of the following describes this measurement?

b. RPO

Doug's manager has informed him that the company's disaster planning is severely lacking. If something was to happen to the company's data center, the company would be out of business very quickly. Doug needs to recommend a secondary location that can act as a backup for the company's data center and allow everything to failover with as little downtime as possible. Which of the following is Doug's manager asking him to help find and start planning for?

c. Hot site

Grey is implementing automation for the user account creation processes. He wants to make sure that people only receive the access they need to do their jobs and nothing more. Which of the following describes this principle?

c. Least privilege

Rosa has received reports by several users that one of the Linux servers is no longer accessible. She is able to remote into the server using a management IP address separate from the one that users would be directed to via a DNS lookup. Which of the following commands, once connected to the server, should she use to start troubleshooting the issue?

c. ifconfig

Adam has a cluster of servers that he needs to update. He decides to update a few of them and test them to make sure the updates are successful. Once the test proves successful, he decides to update the rest of the servers. Which of the following describes the technique he is using?

d. Canary deployment


Conjuntos de estudio relacionados

Business Law 1101 Chapters 24, 25, 20, 21

View Set

16th Century Art in Italy - The Movement topic test ***

View Set

AMERICAN GOV - CHAPTER 18 Domestic Policy

View Set

Investments Exam #1: Chapters 1-3

View Set

eegoo Part 19 부정사 형용사용법

View Set

GI, Digestive, and Metabolic NCLEX

View Set

PH253 - Modern Physics Conceptual Questions

View Set