Cloud Infrastructure Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are the ideal goals of cloud system deployment from the perspective of the user? Name three.

1. Reduce your it costs by not having to maintain on site servers. 2. Ability to "Pay-as-you-grow", avoiding prohibitive up front costs when you're first starting out. 3. Ability to access applications/software without necessarily having it locally installed.

You are planning the storage requirements for a two-disk mirror of a server operating system disk partition. How much disk space is usable in the mirrored volume? 10 percent 30 percent 50 percent 75 percent

50 percent

You are planning your migration to a virtual environment. Which of the following physical servers should be migrated first? (Choose two.) A. A development server B. A server that is running a non-mission-critical application and is not heavily utilized day to day C. A highly utilized database server D. A server running a mission-critical application

A and B. When planning a migration from a physical data center to a virtual data center, the first servers that should be migrated are noncritical servers that are not heavily utilized. A development server would be a good candidate since it is most likely not a mission-critical server.

Which of the following statements would be used to explain a private cloud but not a public cloud? A. Used as a service via the Internet B. Dedicated to a single organization C. Requires users to pay a monthly fee to access services D. Provides incremental scalability

A private cloud is dedicated to a single organization and is contained with the corporate firewall.

A website administrator is storing a large amount of multimedia objects in binary format for the corporate website. What type of storage object is this considered to be? A. BLOB B. Replica C. Metadata D. Object ID

A. A BLOB is a collection of binary data that is stored as a single entity. BLOBs are primarily used to store images, videos, and sound.

Which storage type provides block-level storage? A. SAN B. NAS C. DAS D. SATA

A. A SAN is a storage device that resides on its own network and provides block-level access to computers that are attached to it.

Which of the following statements is a benefit of a hybrid cloud? A. Data security management B. Requirement of a major financial investment C. Dependency of internal IT department D. Complex networking

A. A hybrid cloud offers the ability to keep the organization's mission-critical data behind a firewall and outside of the public cloud.

What type of computing solution would be defined as a platform that is implemented within the corporate firewall and is under the control of the IT department? A. Private cloud B. Public cloud C. VLAN D. VPN

A. A private cloud is a cloud computing solution that is implemented behind a corporate firewall and is under the control of the internal IT department.

Which of the following hypervisors would provide the best performance for a host machine? A. Type 1 B. Type 2 C. Open source D. Proprietary

A. A type 1 hypervisor is one that is created and deployed on a bare metal installation. The hypervisor communicates directly with the physical server hardware and boots before the operating system. Due to the way the hypervisor interacts with the host computer, a type 1 hypervisor will provide improved performance versus the other answer choices

Storing huge number of files in the cloud for a variety of projects makes it difficult to locate files related to a single project. Which solution involves the least amount of administrative effort? A. Add project name metadata to cloud-stored files. B. Configure each project in its own cloud tenancy. C. Enable file auto-scaling D. Enable departmental chargeback

A. Add project name metadata to cloud-stored files

A software developing company just finished performing multiple P2V migrations of Windows and Linux on-premises servers to the public cloud. However, only the Linux servers are reachable over SSH. What should be configured to ensure the Windows servers are reachable for remote administration? A. Allow TCP port 3389 traffic into the cloud network. B. Allow TCP port 22 traffic into the cloud network. C. Allow TCP port 443 traffic into the cloud network. D. Allow TCP port 389 traffic into the cloud network.

A. Allow TCP port 3389 traffic into the cloud network.

_______________ is a memory management technique that takes unused memory from virtual machines and allocates it where it is needed by other virtual machines. A. Ballooning B. Overcommitting C. Compressing D. Sharding

A. Ballooning

Your organization has decided to use a public cloud provider to host their existing on-premises PBX telephony solution instead. Which category of cloud services does this apply to? A. CaaS B. SaaS C. PaaS D. IaaS

A. CaaS

Which piece of information is required to create a DHCP reservation? A. MAC address B. Default gateway C. Server name D. Host record

A. DHCP reservations use the system's MAC address to set aside an IP address for that machine.

At which application life cycle phase are breakpoints removed by developers? A. Deployment B. Specifications C. Upgrades D. Testing E. Maintenance

A. Deployment

You notice that one of your virtual machines will not successfully complete an online migration to a hypervisor host. Which of the following is most likely preventing the migration process from completing? A. The virtual machine needs more memory than the host has available. B. The virtual machine has exceeded the allowed CPU count. C. The virtual machine does not have the proper network configuration. D. The virtual machine license has expired.

A. During a P2V migration the host computer must support the source computer's memory. More than likely the host does not have enough available memory to support the import of the virtual machine in a migration scenario.

An administrator is trying to enable hardware-assisted virtualization in the BIOS of a computer and notices it is not an option. He checks the specification on the manufacturer's website and finds that the system should support hardware-assisted virtualization. What is most likely the reason why he can't enable it? A. The BIOS needs a firmware update. B. The BIOS is corrupt. C. Hardware-assisted virtualization is enabled in the operating system, not the BIOS. D. The firmware is corrupt.

A. If the manufacturer states that the hardware should support hardware-assisted virtualization and the option is unavailable in the BIOS, the most likely cause is that the BIOS needs a firmware update to add the additional feature.

Which process allows a router to modify packets so that multiple devices can share a single public IP address? A. NAT B. DNS C. VLAN D. Subnetting

A. NAT allows your router to change your private IP address into a public IP address so that you can access resources that are external to your organization; then the router tracks those IP address changes.

The following file system was designed to replace the FAT file system: A. NTFS B. ZFS C. EXT D. UFS

A. NTFS was designed by Microsoft as a replacement for FAT.

Which of the following causes network performance to deteriorate and delays network response time? A. Network latency B. Caching C. Network bandwidth D. High CPU and memory usage

A. Network latency is a time delay that is encountered while data is being sent from one point to another on the network and impacts network bandwidth and performance.

Quotas are a mechanism for enforcing what? A. Limits B. Rules C. Access restrictions D. Virtualization

A. Quotas are limits on the resources that can be utilized for a specific entity on a system. For example, a user could be limited to storing up to 10GB of data on a server or a virtual machine limited to 500GB of bandwidth each month.

Which of the following alerting methods can be configured to send an e-mail when a certain alert is triggered? A. SMTP B. SMS C. SNMP D. Syslog

A. Simple Mail Transfer Protocol (SMTP) can be configured to send an e-mail alert when a certain monitored event occurs

Which of the following method should be employed to move a busy virtual machine's storage to a faster storage array? A. Storage migration B. Virtual machine snapshot C. Storage cloning D. Virtual machine clone

A. Storage migration

Users complain that Internet access has been intermittent. You check the configuration of a user system and discover it has an IP address beginning with 169.254. What is the problem? A. The DHCP server cannot be reached. B. The default gateway cannot be reached. C. The DNS server cannot be reached. D. The proxy server cannot be reached.

A. The DHCP server cannot be reached.

Which of the following is considered a SAN protocol? A. FCP B. IDE C. SSD D. DTE

A. The Fibre Channel Protocol is a transport protocol that transports SCSI commands over a Fibre Channel network. These networks are used exclusively to transport data in FC frames between storage area networks and the HBAs attached to servers.

Which of the following would be used to directly connect to a hypervisor host remotely to modify operating system settings on the hypervisor host? A. RDP B. Console port C. SMTP D. HTTPS

A. The Remote Desktop Protocol (RDP) lets you establish a remote connection directly to a hypervisor host. It allows you to change system settings on the hypervisor host computer itself.

Which statement defines chargeback? A. The recovery of costs from consumers of cloud services B. The process of identifying costs and assigning them to specific cost categories C. A method of ensuring that cloud computing becomes a profit instead of a cost D. A system for confirming that billing occurs for the cloud services being used

A. The purpose of a chargeback system is to measure the costs of IT services, hardware, or software and recover them from the business unit that used them.

Which data tier would you recommend for a mission-critical database that needs to be highly available all the time? A. Tier 1 B. Tier 2 C. Tier 3 D. Tier 4

A. Tier 1 data is defined as data that is mission-critical, highly available, and secure data.

Which of the following is a cloud computing characteristic? Correct! A. Tracking the amount of hours a virtual machine has been running B. Running virtual machines on a hypervisor C. Centralized patch management D. Automatic backup

A. Tracking the amount of hours a virtual machine has been running

You have been tasked with migrating a virtual machine to a new host computer. Which migration process would be required? A. V2V B. V2P C. P2P D. P2V

A. V2V would allow you to migrate the virtual machine to a new virtual machine on the new host computer.

Which protocol does Microsoft System Center Configuration Manager (SCCM) use to gather hardware inventory? A. WMI B. Syslog C. WBEM D. IPMI E. SNMP

A. WMI

Which of the following can be used to create scripts that can be run against target computers to perform simple administrative tasks? A. WMI B. SMTP C. SMS D. IMAP

A. Windows Management Instrumentation (WMI) allows you to write scripts to automate certain administrative tasks and run those scripts against remote computers

Which of the following can be used to identify which operating system version is installed on a virtual machine? A. WMI B. SMTP C. SMS D. IMAP

A. Windows Management Instrumentation (WMI) provides an administrator a way to gather hardware information from multiple physical servers or virtual servers and put that information into a centralized database

You have been tasked with gathering a list of software installed on all the computers in your environment. You want to gather this information remotely. Which of the following would you use to gather this information? A. WMI B. SNMP C. HTTP D. Syslog

A. With Windows Management Instrumentation (WMI), it is possible to query workstations remotely and gather a list of all the software installed on those workstations.

Which term is used to define the increasing number of services delivered over the Internet? A. XaaS B. CaaS C. MaaS D. C-MaaS

A. XaaS is a collective term that means "Anything as a Service" (or "Everything as a Service").

Which of the following are requirements for adequate application performance when using synchronous replication? (Choose two.) A. Object storage B. Low latency C. Multipathing D. High-speed links

B and D. Synchronous replication requires high-speed, low-latency links in between sites in order to ensure adequate application performance.

Which of the following IP addresses is in a private IP range? A. 12.152.36.9 B. 10.10.10.10 C. 72.64.53.89 D. 173.194.96.3

B. 10.0.0.0-10.255.255.255 is a private class A address range.

When would a reservation be used? A. When a maximum amount of resources needs to be allocated to a specific resource B. When a minimum amount of capacity needs to be available at all times to a specific resource C. When capacity needs to be measured and controlled D. When planning a dinner date

B. A reservation should be used when there is a minimum amount of resources that needs to have guaranteed capacity.

A(n) ___________ is a storage device that has no moving parts. A. HDD B. SSD C. Tape D. SCSI

B. A solid state drive is a drive that has no moving parts.

You are investigating which technology is best suited for virtualizing a server operating system for personal use on a desktop computer. Which of the following technologies would you recommend? A. Type 1 B. Type 2 C. SAN D. RAID 6

B. A type 2 hypervisor is more suited for personal use because it can be installed directly on top of an existing operating system. Most desktop manufacturers support hardware virtualization on their desktops, which would allow you to run a type 2 hypervisor on your existing operating system

In a virtual machine, which component appears as an Ethernet adapter? A. Virtual HBA B. Virtual NIC C. Virtual switch D. Virtual router

B. A virtual network interface card does not have any physical components; it is a software component made up of software drivers that mimics a physical NIC and appears as an Ethernet adapter on a virtual machine.

Which HA solution involves multiple servers that each service requests concurrently, but can assume the load of one member if that member fails. A. Active-passive B. Active-active C. Passive-passive D. Passive-active

B. Active-active solutions allow for all systems to service application requests.

Which of the following connects a server and a SAN and improves performance? A. Network interface card B. Host bus adapter C. Ethernet D. SCSI

B. An HBA card connects a server to a storage device and improves performance by offloading the processing required for the host to consume the storage data without having to utilize its own processor cycles.

What type of hypervisor is provided to an enterprise to use without cost? A. Proprietary B. Open source C. Type 1 D. Type 2

B. An open-source hypervisor is provided at no cost and delivers the same ability as a proprietary hypervisor to run multiple guest virtual machines on a single host

A public website experiences unpredictable usage spikes for the past few months and had slowed down the application to unacceptable levels. What should be configured to ensure performance is optimal during usage spikes? A. Faster Internet connection from on premises to the cloud B. Auto-scaling C. Reduced virtual machine logging D. Content delivery network

B. Auto-scaling

What increases as compression reduces the size of transmitted data? A. Routing complexity B. Available bandwidth C. Cloud ingress network traffic costs D. Cloud egress network traffic costs

B. Available bandwidth

Which of the following terms defines the amount of data that can be sent across a network at a given time? A. Network latency B. Bandwidth C. Compression D. Network load balancing

B. Bandwidth is the amount of data that can traverse a network interface over a specific amount of time.

6. What mechanism allows one core to handle all requests from a specific thread on a specific processor core? A. V2V B. CPU affinity C. V2P D. P2V

B. CPU affinity allows all requests from a specific thread or process to be handled by the same processor core.

13. In a network environment _______ is responsible for assigning IP addresses to computers and _______ is responsible for resolving those IP addresses to names. A. DNS, DHCP B. DHCP, DNS C. HTTP, DNS D. DHCP, SMTP

B. DHCP is responsible for assigning IP addresses to computers and DNS is responsible for resolving those IP addresses to names.

Sam is the virtualization administrator for several hypervisor hosts. There is limited disk space and he does not know how much disk space each virtual machine will require over time. Which virtual disk type should he use? A. Differencing B. Dynamically expanding C. Fixed D. Thin provisioning

B. Dynamically expanding

Which of the following protocols allows Fibre Channel to be transmitted over Ethernet? A. HBA B. FCoE C. iSCSI D. SAN

B. Fibre Channel over Ethernet (FCoE) enables the transport of Fibre Channel traffic over Ethernet networks by encapsulating Fibre Channel frames over Ethernet networks.

An administrator deploys a new virtual machine. After logging on to the virtual machine, she notices that it has a different time setting than the host. What is most likely the cause of this issue? A. The virtual machine cannot communicate with the network. B. The guest tools are not installed. C. The vNIC is not configured correctly. D. The VLAN tag is incorrect.

B. Guest tools are software additions that are added to a virtual machine after the operating system has been installed. Among other things, the guest tools allow a virtual machine to synchronize its time with a host computer.

Which of the following allows you to provide security to the data contained in a storage array? A. Trunking B. LUN masking C. LUN provisioning D. Multipathing

B. LUN masking enforces access policies to storage resources, and these storage policies make sure that the data on those devices is protected from unauthorized access.

Warren is a systems administrator working in a corporate data center, and he has been tasked with hiding storage resources from a server that does not need access to the storage device hosting the storage resources. What can Warren configure on the storage controller to accomplish this task? A. Zoning B. LUN masking C. Port masking D. VLANs

B. LUN masking is executed at the storage controller level instead of at the switch level. By providing LUN-level access control at the storage controller, the controller itself enforces access policies to the devices, making it more secure. This is the reason that physical access to the same device storing the LUNs remains "untouchable" by the entity using it.

Lisa is responsible for a web application running in the public cloud. Recent performance metrics indicate that the average user wait time for page loads is four seconds due to the high number of HTTP requests. What should she configure? A. Compression B. Load balancing C. Proxying D. PKI

B. Load balancing

Which tool allows guest operating systems to share noncritical memory pages with the host? A. CPU affinity B. Memory ballooning C. Swap file configuration D. Network attached storage

B. Memory ballooning allows guest operating systems to share noncritical memory pages with the host.

Which of the following would increase availability from a virtualization host to a storage device? A. Trunking B. Multipathing C. Link aggregation D. VLANs

B. Multipathing creates multiple paths for the computer to reach the storage resources it is attempting to contact, improving fault tolerance and possibly speed.

Which storage type can take advantage of Universal Naming Convention addressable storage? A. SAN B. NAS C. DAS D. SATA

B. NAS appears to the client operating system as a file server, which allows it to use Universal Naming Convention addressable storage.

You administer a website that receives thousands of hits per second. You notice the web server hosting the website is operating at close to capacity. What solution would you recommend to improve the performance of the website? A. Caching B. Network load balancing C. Compression D. Network bandwidth

B. Network load balancing is used to increase performance and provide redundancy for websites and applications.

Which of the following would be considered an advantage of cloud computing? A. Increased security B. Ability to scale to meet growing usage demands C. Ease of integrating equipment hosted in other data centers D. Increased privacy for corporate data

B. One of the benefits of cloud computing is the ability to easily scale and add resources to meet the growth of the organization.

An application was installed on a virtual machine and is now having issues. The application provider has asked you to install the application on a physical server. Which migration process would you use to test the application on a physical server? A. V2V B. V2P C. P2P D. P2V

B. One of the primary reasons for using the V2P process is to migrate a virtual machine to a physical machine to test an application on a physical server if requested by the application manufacturer.

___________ is required before installing a type 2 hypervisor. A. NIC teaming software B. Operating system C. Class C IP address D. Smartcard

B. Operating system

What systems do cloud providers implement for rapid deployment of customer-requested services? A. RDMS B. Orchestration C. On-demand provisions D. Scripting

B. Orchestration

Which type of cloud service model is most likely to be used by Software developers? A. SaaS B. PaaS C. CaaS D. IaaS

B. PaaS

What do you need to employ if you have a serial device that needs to be utilized by a virtual machine? A. Network isolation B. Physical resource redirection C. V2V D. Storage migration

B. Physical resource redirection enables virtual machines to utilize physical hardware as if they were physical hosts that could connect to the hardware directly.

A national tax preparation firm tracks internal IT resource usage by department for billing purposes. What type of cloud is this? A. Metered B. Private C. Departmental D. Charging E. Hybrid

B. Private

How are quotas defined? A. By management systems B. According to service level agreements that are defined between providers and their customers C. Through trend analysis and its results D. With spreadsheets and reports

B. Quotas are defined according to service level agreements that are negotiated between a provider and its customers.

You receive an alert that a virtual machine is down. The server does not respond to a ping. What tool should you use to troubleshoot the server if you are off-site? A. Console port B. SSH C. Hypervisor console D. SMTP

B. Secure Shell (SSH) provides a secure way to remotely manage network devices, including hypervisor hosts.

Which of the following gives a cloud provider the ability to distribute resources on an as-needed basis to the cloud consumer and in turn helps to improve efficiency and reduce costs? A. Elasticity B. Shared resources C. Infrastructure consolidation D. Network isolation Virtual Resource Migrations

B. Shared resources give a cloud provider the ability to distribute resources on an as-needed basis to the cloud consumer, which helps to improve efficiency and reduce costs for an organization. Virtualization helps to simplify the process of sharing compute resources.

Which of the following alerting methods allows a technician to receive an alert on a mobile device such as a cell phone? A. SMTP B. SMS C. SNMP D. Syslog

B. Short Message Service (SMS) is a text messaging service that allows an alert to be sent to a mobile device.

Which of the following utilizes UDP port 514 when collecting events? A. SNMP B. Syslog C. WMI D. We services

B. Syslog provides a mechanism for a network device to send event messages to a logging server or syslog server using UDP port 514 or TCP 514

Which of the following is a benefit of remote hypervisor administration? A. Only being able to modify one hypervisor host at a time B. Being able to remotely manage multiple hypervisor hosts from a single console C. Not having access to a hypervisor host D. Remotely accessing a hypervisor host has no benefit Life Cycle Management

B. The ability to remotely manage multiple hypervisor hosts from a single console from your workstation allows for a quick and easy way to make changes to multiple hosts and is an important benefit of remote hypervisor administration.

What is the desired end result of ITIL? A. CAB B. Continual service improvement C. Service strategy D. Service operation

B. The end result of each cycle within ITIL is to identify opportunities for improvement that can be incorporated into the service to make it more efficient, effective, and profitable

Which provisioning model would you use if data is added quickly and often? The solution must ensure consistent performance. A. Thin provisioning B. Thick provisioning C. Overprovisioning D. Encryption

B. Thick provisioning would consume all the allocated space upon creation of the LUN, but performance would be consistent for a LUN that expects data to be added quickly and often because storage would not need to be continually allocated to the LUN and the storage would not be fragmented.

Which term describes the ability for an organization to store data based on performance, cost, and availability? A. RAID B. Tiered storage C. SSD D. Tape drive

B. Tiered storage refers to the process of moving data between storage devices based on performance, cost, and availability.

The ability to deduplicate virtual machine memory pages for optimal memory usage is called: A. Page swapping B. Transparent page sharing C. Ballooning D. Overcommitting

B. Transparent page sharing

______________ hypervisor does not require an existing operating system. A. Type A B. Type 1 C. Type 2 D. Type B

B. Type 1

Your organization plans to use iSCSI for shared network storage. Which technique should be used to ensure that iSCSI traffic is kept separate from other IP traffic? A. LUN masking B. VLANs C. Zoning D. Load balancing

B. VLANs

Your organization has numerous newly deployed virtual machines (VMs) in a public cloud. You are responsible for ensuring the VMs are malware free. What is the FIRST item you should configure? A. Malware definition updates B. Virtual machine antivirus extension C. Cloud packet filtering firewall D. Cloud web application firewall

B. Virtual machine antivirus extension

How does virtualization help to consolidate an organization's infrastructure? A. It allows a single application to be run on a single computer. B. It allows multiple applications to run on a single computer. C. It requires more operating system licenses. D. It does not allow for infrastructure consolidation and actually requires more compute resources.

B. Virtualization allows an organization to consolidate its servers and infrastructure by allowing multiple virtual machines to run on a single host computer.

Which of the following would be a requirement when planning the compute resources for a host computer? A. The host computer does not need to have enough compute resources to support the virtual machine workload. B. The host computer must have enough compute resources to support the virtual machine workload. C. The host computer must be running a support operating system. D. The number of virtual machines running Microsoft Windows must be known. Virtual Machine

B. When you are planning for and determining the compute resources for a host computer, you need to make sure there are enough resources to handle the virtual machine workload that the host computer is expected to support.

You are migrating a physical server to a virtual server. The server needs to remain available during the migration process. What type of migration would you use? A. Offline B. Online C. Hybrid D. V2P Migration Considerations

B. With an online migration the physical computer or source computer remains running and operational during the migration.

Which of the following technologies allows you to logically segment a LAN into different broadcast domains? A. MAN B. WAN C. VLAN D. SAN

C. A VLAN allows you to configure separate broadcast domains even if the devices are plugged into the same physical switch.

A cloud deployment has been created explicitly for the finance department. What type of cloud deployment would this be defined as? A. Public cloud B. Hybrid cloud C. Community cloud D. Private cloud

C. A community cloud is a cloud solution that provides services to a specific or limited number of individuals who share a common computing need.

2. Which of these can be used by both a cloud consumer and a cloud provider to give a visual picture of performance metrics? A. API B. SNMP C. Dashboard D. SMTP

C. A dashboard is a great way for both the cloud consumer and cloud provider to access key metrics when it comes to monitoring cloud resources. A dashboard can give a summary of the current usage of the cloud resources in an easy-to-view format of charts and graphs

After taking a new job at the state university, you are asked to recommend a network topology that best fits the large college campus. The network needs to span the entire campus. Which network topology would you recommend? A. LAN B. WAN C. MAN D. SAN

C. A metropolitan area network (MAN) can connect multiple LANs and is used to build networks with high data connection speeds for cities or college campuses.

Which of the following hypervisors runs on a bare metal system? A. Open source B. Proprietary C. Type 1 D. Type 2

C. A type 1 hypervisor is one that is created and deployed on a bare metal installation

An administrator is testing a variety of operating systems while performing other functions like surfing the Internet and word processing. What type of hypervisor is the admin most likely using? A. Type 1 B. Enterprise hypervisor C. Type 2 D. Open source Virtualization Host

C. A type 2 hypervisor allows an administrator to run virtual machines on top of an existing operating system while surfing the Internet and running word processing on the host computer

After a successful P2V migration, which of the following tests, if any, should be completed on the new virtual machine? A. Testing is not required. B. Remove all unnecessary software. C. Verify the IP address, DNS, and other network configurations. D. Run a monitoring program to verify compute resources.

C. After a successful migration, the network settings should be checked and verified before bringing the virtual machine online

Which network type is not accessible from outside the organization by default? A. Internet B. Extranet C. Intranet D. LAN

C. An intranet is a private network that is configured and controlled by a single organization and is only accessible by users that are internal to that organization.

An existing on-premises application will no longer be used in your company's public cloud implementation. Instead, a functional cloud equivalent will be used. To which aspect of the application life cycle does this apply? A. Application upgrade B. Application retirement C. Application replacement D. Application migration

C. Application replacement

You are using IPMI to remotely monitor a host whose operating system has crashed and is unresponsive. What type of items would you be monitoring? A. Running processes B. Halted processes C. BIOS settings D. Application monitoring E. Installed software

C. BIOS settings

Which of the following must be licensed when running a virtualized infrastructure? A. Hosts B. Virtual machines C. Both D. Neither

C. Both hosts and guests must be licensed in a virtual environment.

When you run out of computer resources in your internal data center and expand to an external cloud on demand, this is an example of what? A. SaaS B. Hybrid cloud C. Cloud bursting D. Elasticity

C. Cloud bursting allows you to add additional resources from an external cloud on an on-demand basis. The internal resource is the private cloud and the external resource is the public cloud.

Andrew is working in a server room and needs to connect his laptop directly to a hypervisor for management purposes. What should he plug his laptop into? A. RJ-45 B. USB port C. Console port D. SATA port

C. Console port

Which statement would identify the primary difference between NAS and DAS? A. NAS cannot be shared and accessed by multiple computers. B. DAS provides fault tolerance. C. DAS does not connect to networked storage devices. D. NAS uses an HBA and DAS does not.

C. DAS is a storage system that directly attaches to a server or workstation without a storage network in between the devices.

Which type of storage system is directly attached to a computer and does not use a storage network between the computer and the storage system? A. NAS B. SAN C. DAS D. Network share

C. DAS is a storage system that directly attaches to a server or workstation without a storage network in between the devices.

Which of these options is not a valid mechanism for improving disk performance? A. Replacing rotational media with solid state media B. Replacing rotational media with higher-speed rotational media C. Decreasing disk quotas D. Employing a different configuration for the RAID array

C. Decreasing disk quotas helps with capacity issues, but not with performance.

Which of the following allows you to scale resources up and down dynamically as required for a given application? A. Subnetting B. Resource pooling C. Elasticity D. VLAN

C. Elasticity allows an organization to scale resources up and down as an application or service requires.

You need to determine if future cloud network performance values are acceptable. What should you do first? A. Enable syslog forwarding. B. Forward logs to an on-premises server. C. Establish a performance baseline. D. Take virtual machine snapshots. E. Harden each virtual machine.

C. Establish a performance baseline.

Your global organization has worldwide support centers. When a site in one time zone closes, it hands off operations at the end of the work shift to another site that is open for business. What support model needs to be implemented? A. Service level agreement B. Resource pooling C. Follow the sun D. International VPNs

C. Follow the sun

Which of the following would you use to remotely access a virtualization host in a secure fashion? A. Telnet B. Ping C. HTTPS D. Console port

C. HTTPS gives you a way to access a virtualization host remotely in a secure fashion.

Which of the following is a disadvantage of network compression? A. Higher storage requirements B. Longer transmission time C. Higher compute requirements D. Shorter transmission time E. Higher latency

C. Higher compute requirements

Which of the following models should a company use if they need to archive records for long periods of time? A. SaaS B. PaaS C. IaaS D. CaaS

C. IaaS

Which of the following statement regarding cloud computing is correct? A. Infrastructure provisioning time is increased. B. IT capital expenditures are increased. C. Infrastructure provisioning time is decreased. D. Application provisioning is increased

C. Infrastructure provisioning time is decreased.

Which of the following is an example of application life cycle management models? A. WBEM B. ITLI C. MOF D. OSI

C. MOF

You are managing a busy on-premises file server that needs to be migrated to the cloud as a virtual machine. Which of the following method should you employ? A. Online P2V B. Online V2P C. Offline P2V D. Offline V2P

C. Offline P2V

Which of the following is usually accessed via a web browser? A. IaaS B. SaaS C. PaaS D. Virtual machines

C. PaaS provides a platform to allow developers to build applications and services over the Internet. PaaS is hosted in the cloud and accessed with a web browser.

Which of the following would be considered an example of IaaS? A. Providing productivity software for use over the Internet B. A multiuser program that is hosted by a third party C. Providing hardware resources over the Internet D. A database that is hosted in the cloud.

C. Providing hardware resources over the Internet.

In a PKI, network data is normally encrypted with the recipient's ____________ key. A. Symmetric B. Asymmetric C. Public D. Private

C. Public

What RAID level would be used for a database file that requires minimum write requests to the database, a large amount of read requests to the database, and fault tolerance for the database? A. RAID 10 B. RAID 1 C. RAID 5 D. RAID 0

C. RAID 5 is best suited for a database or system drive that has a lot of read requests and very few write requests.

Which of the following could not be used as one part of a multi-factor authentication solution? A. Fingerprint B. Token C. Reference D. Proximity card

C. References are used in the real world to validate a person. However, computers do not accept references as a method of authentication. The other items are all forms of multifactor authentication.

You need to divide your virtualized environment into groups that can be managed by separate groups of administrators. Which of these tools can you use? A. Quotas B. CPU affinity C. Resource pools D. Licensing Optimizing Performance

C. Resource pools allow the creation of a hierarchy of guest virtual machine groups that can have different administrative privileges assigned to them.

SFTP uses _________ to secure FTP communication. A. Certificates B. FTPS C. SSH D. SMTP

C. SFTP uses SSH keys to secure FTP communication.

In a scenario where an entity exceeds its defined quota but is granted access to the resources anyway, what must be in place? A. Penalty B. Hard quota C. Soft quota D. Alerts

C. Soft quotas enforce limits on resources, but do not restrict access to the requested resources when the quota has been exceeded.

Which key is used to encrypt an SSH session? A. Public B. Private C. Symmetric D. Asymmetric

C. Symmetric

Which type of storage device would be used primarily for off-site storage and archiving? A. HDD B. SSD C. Tape D. SCSI

C. Tape storage is good for off-site storage and archiving because it is less expensive than other storage types.

Which of these ports is the well-known port for the Telnet service? A. 25 B. 22 C. 23 D. 443

C. Telnet uses port 23 by default for its communication.

Which of the following is a network of multiple networks relying on network devices and common protocols to transfer data from one destination to another until it reaches its final destination and is accessible from anywhere? A. Intranet B. Extranet C. Internet D. LAN

C. The Internet is not controlled by a single entity and serves billions of users around the world

Which of the following would be considered a host compute resource? A. Cores B. Power supply C. Processor D. Bandwidth

C. The four compute resources used in virtualization are disk, memory, processor, and network. On a host, these are available as the physical entities of hard disks, memory chips, processors, and network interface cards (NICs).

Which data tier would you recommend for data that is financial in nature, is not accessed on a daily basis, and is archived for tax purposes? A. Tier 1 B. Tier 2 C. Tier 3 D. Tier 4

C. Tier 3 storage would be for financial data that you want to keep for tax purposes and is not needed on a day-to-day basis.

Which of the following statements can be considered a benefit of using RAID for storage solutions? A. It is more expensive than other storage solutions that do not include RAID. B. It provides degraded performance, scalability, and reliability. C. It provides superior performance, improved resiliency, and lower costs. D. It is complex to set up and maintain.

C. Using RAID can provide all these benefits over conventional hard disk storage devices.

You have been tasked with deploying a group of virtual machines quickly and efficiently with the same standard configurations. What process would you use? A. V2P B. P2V C. Virtual machine templates D. Virtual machine cloning

C. Virtual machine templates would allow you to deploy multiple virtual machines and those virtual machines would have identical configurations, which streamlines the process.

You are deploying two virtual servers. One of the virtual servers is a heavily used database server and the other is a lightly used print server. What virtual CPU configuration would you recommend? A. One virtual CPU for the database server and two virtual CPUs for the print server B. Two virtual CPUs for the database server and two virtual CPUs for the print server C. Two virtual CPUs for the database server and one virtual CPU for the print server D. Three virtual CPUs for the print server and two virtual CPUs for the database server

C. When assigning virtual CPUs, you want to assign as many as possible to the heavily used application. If an application is not going to be heavily utilized, you should assign the minimum amount of virtual CPUs. In this case the database server is heavily utilized so it should get more CPUs than the lightly used print server

You need to create an exact copy of a virtual machine to deploy in a development environment. Which of the following processes is the best option? A. Storage migration B. Virtual machine templates C. Virtual machine cloning D. P2V

C. When you create a virtual machine clone, you are creating an exact copy of an existing virtual machine.

Which of the following allows you to connect a server to storage devices with speeds of 128 Gbps? A. Ethernet B. iSCSI C. Fibre Channel D. SAS

C. You can use Fibre Channel (FC) to connect servers to shared storage devices with speeds of up to 128 Gbps. FC also comes in 64, 32, 16, 8, 4, and 2 Gbps versions.

You have been given a drive space requirement of 2 terabytes for a production file server. Which type of disk would you recommended for this project if cost is a primary concern? A. SSD B. Tape C. HDD D. VLAN

C. You should recommend using an HDD because of the large size requirement. An HDD would be considerably cheaper than an SSD. Also, since it is a file share the faster boot time provided by an SSD is not a factor.

Which of the following file systems was designed to protect against data corruption and is a 128-bit file system? A. NTFS B. UFS C. ZFS D. FAT

C. ZFS was developed by Sun Microsystems and is focused on protecting the user's data against corruption. It is currently the only 128-bit file system.

Which of the following uses IP networks that enable servers to access remote disks as if they were locally attached? A. SAS B. SATA C. iSCSI D. Fibre Channel

C. iSCSI utilizes serialized IP packets to transmit SCSI commands across IP networks and enables servers to access remote disks as if they were locally attached.

Regulations dictate that specific types of documents be stored permanently. Metadata must be added to each stored item to facilitate retrieval. Which term best describes this storage system? Content addressed storage Cloud backup Storage area network Storage tiers

Content addressed storage

Which of the following constantly executes a software component called an agent, which reports information using the protocol back to a manager? A. WMI B. SMTP C. SMS D. SNMP

D. A monitoring solution that uses SNMP has an administrative computer, commonly referred to as a manager, that monitors or manages a group of network devices. Each managed device constantly executes a software component, called an agent, that reports back to the manager

Which of the following data centers offers the same concepts as a physical data center with the benefits of cloud computing? A. Private data center B. Public data center C. Hybrid data center D. Virtual data center

D. A virtual data center offers compute resources, network infrastructure, external storage, backups, and security, just like a physical data center. A virtual data center also offers virtualization, pay-as-you-grow billing, elasticity, and scalability.

Which of the following statements describes the difference between an extranet and an intranet network configuration? A. An intranet does not require a firewall. B. An extranet requires less administration than an intranet. C. An intranet is owned and operated by a single organization. D. An extranet allows controlled access from outside the organization.

D. An extranet is an extension of an intranet with the primary difference being that an extranet allows controlled access from outside the organization.

A client web browser connects to an HTTPS web server. Which port does the server use to communicate back to the client? A. 81 B. 444 C. Any port below 1024 D. Any port above 1024

D. Any port above 1024

An IT consultant for a medium-sized medical practice has been asked to determine which outsourced cloud solutions would best meet regulatory requirements for the health industry. Which type of cloud is best suited for this scenario? A. Private B. Public C. Health D. Community

D. Community

Which type of memory allows a virtual machine to start with a smaller amount of memory and increase it based on the workload of the virtual machine? A. Startup RAM B. Static memory C. Virtual memory D. Dynamic memory

D. Dynamic memory allows you to assign a minimum and maximum amount of memory to a virtual machine. This allows a virtual machine to consume memory dynamically based on its current workload.

Which of the following file systems was the first to be designed specifically for Linux? A. FAT B. NTFS C. UFS D. EXT

D. EXT was the first file system designed specifically for Linux

If price is not a factor, which type of storage device interface would you recommend for connecting to a corporate SAN? A. IDE B. SCSI C. SATA D. FC

D. Fibre Channel delivers the fastest connectivity method, with speeds of up to 16 Gbps, but it is more expensive than the other interface types. If price is not a factor, FC should be the recommendation for connecting to a SAN.

Which of the following protocols and ports is used to secure communication over the Internet? A. HTTP over port 80 B. SMTP over port 25 C. FTP over port 21 D. HTTPS over port 443

D. HTTPS is an extension of HTTP that provides secure communication over the Internet and uses port 443 by default.

Which of the following cloud solutions provides only hardware and network resources to make up a cloud environment? A. SaaS B. CaaS C. PaaS D. IaaS

D. In a cloud service model, IaaS providers offer computers and other hardware resources. Organizations would outsource the equipment needed to support their business.

Which of the following terms best describes life cycle management? A. Baseline B. Finite C. Linear D. Continuum

D. Life cycle management is a continuum with feedback loops going back into itself to enable better management and continual improvement

At which application life cycle phase is software performance tweaked? A. Deployment B. Specifications C. Testing D. Maintenance

D. Maintenance

Andrew is a cloud network administrator. Cloud-based virtual machines hosting a custom web application have been deployed to a single cloud virtual network that currently has no Internet access. Each virtual machine must have Internet access, while incoming connections initiated from the Internet must be blocked. Which solution should the administrator deploy? A. Forward proxy host B. Packet filtering firewall C. Web application firewall D. NAT E. Host based firewall

D. NAT

Which of the following characteristics describe a network attached storage (NAS) deployment? A. Requires expensive equipment to support B. Requires specialized skill sets for administrators to support C. Delivers the best performance of any networked storage technologies D. Provides great value by utilizing existing infrastructure

D. Network attached storage can utilize existing Ethernet infrastructures to deliver a low-cost solution with good performance.

Your organization is planning on migrating its data center, and you as the administrator have been tasked with reducing the footprint of the new data center by virtualizing as many servers as possible. A physical server running a legacy application has been identified as a candidate for virtualization. Which of the following methods would you use to migrate the server to the new data center? A. V2V B. V2P C. P2P D. P2V

D. P2V would allow you to migrate the physical server running the legacy application to a new virtual machine in the new virtualized data center.

Which of the following is NOT a benefit of using VLANs? A. Performance B. Reduced costs C. Security D. Reduced network complexity

D. Reduced network complexity

Which of the following storage device interface types is the most difficult to configure? A. IDE B. SAS C SATA D. SCSI

D. SCSI is relatively difficult to configure, as the drives must be configured with a device ID and the bus has to be terminated.

Which type of document details baseline performance measurements for cloud resource performance? A. BIA B. BCP C. DRP D. SLA

D. SLA

Which e-mail transfer protocol is commonly used to send notifications? A. POP3 B. SNMP C. IMAP D. SMTP E. Syslog

D. SMTP

This protocol is responsible for transferring e-mail messages from one mail server to another over the Internet. A. DNS B. HTTPS C. FTP D. SMTP

D. SMTP is used to transfer e-mail messages from one e-mail server to another over the Internet.

Which of the following allows you to migrate a virtual machine's storage to a different storage device while the virtual machine remains operational? A. Network isolation B. P2V C. V2V D. Storage migration

D. Storage migration is the process of transferring data between storage devices and can be automated or done manually and allows the storage to be migrated while the virtual machine continues to be accessible.

Which of the following groups multiple network storage devices into a single storage unit that can be managed from a central console and used by a virtual machine or host computer? A. Virtual switch B. Virtual HBA C. Virtual NIC D. Storage virtualization

D. Storage virtualization consolidates multiple storage devices into a single unit and simplifies the administration of common storage tasks.

Which of the following allows for out-of-band management of a computer? A. WMI B. SMS C. SNMP D. IPMI Remote-Access Tools

D. The Intelligent Platform Management Interface (IPMI) operates independently of the operating system. It provides out-of-band management and monitoring of a system before the operating system is loaded, which allows BIOS settings to be remotely monitored or configured

How does the hypervisor enable access for virtual machines to the physical hardware resources on a host? A. Over Ethernet cables B. By using USB 3.0 C. Through the system bus D. By emulating a BIOS that abstracts the hardware

D. The host computer BIOS is emulated by the hypervisor to provide compute resources for a virtual machine.

Which component controls how the network traffic flows between the virtual machines and the host computer and also how network traffic flows between the virtual machine and other network devices in the organization? A. Virtual NIC B. Virtual storage C. Virtual HBA D. Virtual switch Virtualized Infrastructure Service Elements

D. The vSwitch is responsible for how the network traffic flows between virtual machines and the host and between virtual machines and other network devices.

Which of the following file systems is used primarily for Unix-based operating systems? A. NTFS B. FAT C. VMFS D. UFS

D. UFS is the primary file system in a Unix-based computer.

Voice over IP (VoIP) is an example of what type of cloud service? A. IaaS B. PaaS C. MaaS D. CaaS

D. Voice over IP is an example of CaaS.

You have been tasked with planning the purchase of a new virtualization host computer. When it comes time to recommend the processor type, which processor capability is more important? A. CPUs are more important than CPU cores and cache. B. CPU cores and cache are more important than CPUs. C. CPU speed is more important than CPU cores and cache. D. CPU cores and cache are more important than CPU speed.

D. You are better off spending money on more cores with more cache rather than on faster CPU speed. When it comes to virtualization, you want as many CPU cores as possible to assign to the virtual machine.

The network administrator for a large healthcare company is configuring an on-premises hypervisor host with storage connected locally to the server. What type of storage is this? SAN NAS DAS iSCSI

DAS

All of the following use LUN identifiers except ____________. SCSI Ethernet SAN iSCSI

Ethernet

Which of the following network types is designed solely for storage traffic? SSD DAS NAS Fibre Channel

Fibre Channel

Your company stores budget forecasting data on a local file server at headquarters. An on-premises virtual machine periodically replicates file server data to the public cloud as an off-site backup. What type of cloud is used for this scenario? A. Community B. Private C. Hybrid D. Public

Hybrid

Which of the following methods is needed to implement granular security to separate shared storage between servers over the SAN? LUN masking File system ACLs Zoning VLAN

LUN masking

Which of the following NAS and SAN statements is correct? A SAN uses network sharing protocols such as CIFS. A SAN shares the network with TCP/IP traffic. NAS does not share the network with TCP/IP traffic. NAS uses network sharing protocols such as CIFS.

NAS uses network sharing protocols such as CIFS.

Cloud providers allow the storage of files of almost any size using ____________. Object storage RAID 0 Storage tiers Deduplication

Object storage

Jacob is an IT consultant for a large accounting firm. He has been asked to configure their storage array. Performance is the highest priority in order to support a heavily used database transaction system. Which level of RAID should he configure in the array? RAID 0 RAID 1 RAID 5 RAID 6

RAID 0

You have migrated your data to a private cloud. The cloud provider allows frequently accessed data to reside on fast storage while less utilized data is migrated to slower storage. What type of configuration is this? RAID 1 Storage tiers IOPS SSD

Storage tiers

Refer to this table. Which of the following statements about the SLA is true? There is approximately 6 minutes of downtime each year. Synchronous replication is being used. The solution is suitable for data archiving. Performance will not be as good as HDDs

There is approximately 6 minutes of downtime each year.

Your Windows server holds contract documents on an NTFS disk volume. Users make revisions to documents before they are finalized. You need to ensure previous versions of files are available to users. What should you configure? Journaling Volume shadow copies File classification System restore points

Volume shadow copies

Jumbo Frames allow for less packet overhead. True False

tRUE


Ensembles d'études connexes

CompTIA A+ Certification Core 1 (220-1101)

View Set

lexemas y morfemas; prefijos y sufijos

View Set

Биология животных

View Set

BA 490 Exam 2 (potential) study guide

View Set

Mod 33.1 understanding of the concept of reproduction in the care of the patient during antepartum.

View Set

American History, Baseball - Exam I

View Set

Understanding Gantt Charts Chris Croft

View Set

Simple, Compound and Complex Sentences

View Set

CFA: Financial Reporting & Analysis

View Set

Life and health exam chapter 7 and a half

View Set