Mid-Term Exam Study Guide | Cloud Technology

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which technique enables a client service to adjust its rate of requests to accommodate service overload? a. Concurrency control b. Rate limiting c. Hard-coded memory limitations d. Container orchestration

A. Concurrency control

Which of the following is NOT an advantage of a cloud-within-a-cloud deployment model? a. Minimal cost b. Unlimited scalability c. Platform familiarity d. Seamless migration

A. Minimal Cost

To deploy a series of test environments in the cloud, you want a script that will design and configure several servers, some network infrastructure, and firewall rules. What process will produce the script you need? a. Orchestration b. Automation c. Self-healing infrastructure d. Multitenancy

A. Orchestration

What CSP cost-saving strategy can you overcome by using a dedicated host? a. Oversubscription b. Overcommitment c. Tenancy d. High availability

A. Oversubscription

When you speak to Alexa, you initiate the processing of code that runs in the cloud without creating a new server to do so. Which cloud service model most likely provides the service that processes this code? a. PaaS b. IaaS c. SaaS d. DBaaS

A. PaaS

Which is largest? a. 1 GB b. 1 GiB c. 1 MB d. 1 MiB

B. 1 GiB

Multitenancy enables what cloud characteristic? a. Rapid elasticity b. Resource pooling c. On-demand self-service d. Broad network access

B. Resource Pooling

For what purposes does the IoT often use cloud technologies? Choose TWO. a. Virtualization b. Storage c. Communication d. Compute

B. Storage & C. Communication

As you're developing your hybrid cloud, you move a handful of servers and two applications to the cloud. Both applications need to communicate with a database that will remain on-prem. What technology will allow the applications to communicate with the database without human intervention? a. VPN b. CLI c. API d. GUI

C. API

Which rule would ensure two VMs are always hosted on different physical machines? a. Preferred affinity rule b. Required affinity rule c. Preferred anti-affinity rule d. Required anti-affinity rule

D. Required anti-affinity rule

Which driver type will most likely provide the most functionality for a device? a. Generic b. Open source c. Pass-through d. Vendor

D. Vendor

Which channel would provide the most stable release of an application to be deployed in a branch office with minimal technical staff? a. LTS b. Beta c. Stable d. Canary

a. LTS

Why might you NOT want to use an LTS release of an application? a. Lack of updates b. Increased consistency over time c. Early access d. Increased integrity

a. Lack of updates

Which tier is most protected? a. Subnet tier b. Presentation tier c. Logic tier d. Data tier

d. Data tier

Douglas is setting up VM instances on a Hyper-V server to host some basic web server and legacy software workloads along with some light app testing. He needs to know how many vCPUs to allocate to each VM. The server's motherboard has two CPU sockets, both populated with eight-core processors, and hyperthreading is enabled. He's decided that the VMs' workloads can easily handle a 3:1 overcommitment ratio. He plans on creating 15 VMs at first and eventually increasing to 25 VMs as he fine-tunes the workloads and resource allocations. How many vCPUs should Douglas initially allocate to each VM? a. 1 b. 6 c. 32 d. 96

a. 1 | For this relatively small virtualization scenario, best practice is to start with one vCPU and increase that number only as needed.

What kind of expense is the purchase of a new firewall device? a. Shadow b. Standard c. CapEx d. OpEx

c. CapEx

Which IP address belongs within the CIDR block 172.25.1.0/23? a. 192.25.1.100 b. 172.25.0.254 c. 192.24.1.0 d. 172.25.2.10

d. 172.25.2.10

Which of the following functions most like a typical operating system? a. Type 1 hypervisor b. Type 2 hypervisor c. Kubernetes d. Docker

A. Type 1 hypervisor

What resource can provide file access to several containers over a long period of time? a. Image repository b. Secrets file c. Persistent storage d. Microservice

C. Persistent storage

Which document can ensure you will receive compensation if your company's Internet service has an extended outage? a. GDPR b. HIPAA c. SLA d. NDA

C. SLA

Which technology enables a CPU core to function as two threads? a. Affinity b. Elasticity c. SMT d. IPC

C. SMT

Which document might require an NDA before you can read it? a. SAS 70 b. ISO/IEC 27001 c. SOC 2 d. SSAE 18

C. SOC 2

Where does an AWS VM instance find its OS files? a. Template b. SAN c. AMI d. Boot volume

D. Boot Volume

Your company transitions a dozen servers to the cloud instead of purchasing several new servers to replace aging equipment. The monthly cost of these cloud-hosted servers that can grow with the business is significantly lower than the anticipated cost of purchasing new hardware that would have, at first, greatly exceeded the current needs of the business. What feature of the cloud has your company taken advantage of? a. Broad network access b. Multitenancy c. Cross-platform compatibility d. Measured service

D. Measured Service

During which step of the troubleshooting process should you back up data? a. While establishing a plan of action b. While testing your theory as to the probable cause c. While verifying full system functionality d. While identifying the problem

D. While identifying the problem

Which cloud platform's VPC or VNet can extend beyond a single region? a. GCP b. Azure c. VMware d. AWS

a. GCP

Which of the following concepts is ensured by redundant routers and switches? a. HA b. AZ c. SDN d. VPC

a. HA

Tim is troubleshooting a problem with his VM in AWS. He created a new VPC and a new subnet, enabled auto-assign public IPs, added an IG and a VM, and attached the VM's interface to a subnet within the VPC. This is where he ran into problems. Tim has been trying for 30 minutes to open an RDP connection to the VM, and it's not working. He confirmed the VM is set to allow RDP traffic, and the VPC and subnet both also allow RDP traffic. He also confirmed the VM is running. What is the next step Tim must take to solve the problem? a. He should configure a route to the IG. b. He should create a new subnet in the VPC. c. He should install RDP in the VM. d. He should assign the VM a public IP address.

a. He should configure a route to the IG. | Tim has an IG, but no route to the IG. The VM already has an auto-assigned public IP address.

What factor is improved by SR-IOV? a. Performance b. Security c. Availability d. Adaptability

a. Performance

Which resource might you use to quickly determine how to respond to a physical security breach? a. Playbook b. DR kit c. Chain of custody d. Call tree

a. Playbook

Which technology is used to improve vNIC performance? a. SR-IOV b. RFC 1918 c. NFV d. SDDC

a. SR-IOV

Raul works for a small consulting firm that assists medical organizations, such as quick care facilities, and health professionals, such as doctors' offices or alternative care providers, to establish, update, and manage their IT systems. He regularly works with patient databases and must ensure that his clients' networks and other IT resources comply with strict government regulations. Raul's boss, Cheri, recently asked him to assist in upgrading their firm's data center. The CEO has decided they need to take a major step toward a more cloud-centric business model and asked Raul how the company can ensure that their cloud provider meets industry standard requirements for data security, service availability, and confidentiality. Which standard should Raul recommend they use to compare security ratings of various CSPs? a. SSAE 18 b. HIPAA c. PCI DSS d. GDPR

a. SSAE 18 | The SOC 2 and SOC 3 reports both address benchmarks for information security, availability, processing integrity, confidentiality, and privacy.

Vicki works from home developing apps for managing highly regulated data, such as patients' medical history or customers' payment information. She's always concerned with prioritizing data security and ensuring that no programming loopholes would allow hackers access to data managed by one of her apps. During the development process, Vicki performs some initial, lightweight testing of her apps in a few OS environments running in VMs on her home computer, and then she passes each app along to a team at another location for more intense and thorough testing. Which hypervisor is Vicki most likely using? a. VirtualBox b. XenServer c. ESXi d. Windows Server 2016

a. VirtualBox | Vicki is running a hypervisor on her home computer for light testing. Only a type 2 hypervisor is needed, and VirtualBox is the only type 2 hypervisor in this list.

Which of the following is a legitimate CIDR block for a subnet? Choose TWO. a. 192.168.168.0/10 b. 192.168.4.0/24 c. 10.10.10.0/33 d. 172.300.7.0/25

b. 192.168.4.0/24 & a. 192.168.168.0/10

You're moving your application server from AWS Lightsail to AWS EC2. What kind of migration is this? a. Database migration b. Cross-service migration c. Cloud migration d. Storage migration

b. Cross-service migration

Which cloud stack layer corresponds to IaaS services? a. Image layer b. Network layer c. Virtualization layer d. Physical layer

b. Network layer

You've just deployed an update to an HR application that is widely used throughout your company. Which type of testing should you conduct to ensure your scheduling and shift planning software has not been adversely affected by the HR application update? a. Progressive testing b. Regression testing c. Usability testing d. Beta testing

b. Regression testing

What kind of service do you need to store and access container images? a. Hypervisor b. Repository c. Persistent storage volume d. Microservice

b. Repository

Brian is moving his network's backup DHCP server to a VM running Ubuntu Server. The VM will provide a couple of other network services as well, including DNS. Which networking mode should Brian assign to the Ubuntu VM? a. NAT mode b. DHCP mode c. Bridged mode d. Host-only mode

c. Bridged mode | The VM must be accessible to the rest of the network through a static IP address. Only bridged mode will make the VM consistently available to other network devices.

How do you change applicable routes in an Azure VNet? a. Edit system routes. b. Create a new VNet with different system routes. c. Override system routes with custom routes. d. Delete system routes.

c. Override system routes with custom routes.

Mykel and his team recently completed a major migration of several business-critical applications to the AWS public cloud, and they're performing some final tests before going live. While taking a short break at a nearby coffee shop, Mykel decides to remote into one of the primary servers from his personal laptop so he can make additional configuration changes. As he's completing the changes, it occurs to him that this particular server is supposed to be locked down to provide access only from his computer back at his desk. He pokes around in the account to see how much access he has with this user account and then returns to the office to address the problem. What kind of testing did Mykel use to identify this issue? a. Performance testing b. Load testing c. Penetration testing d. Vulnerability testing

c. Penetration testing | Mykel discovered a vulnerability and also took advantage of that vulnerability, which is penetration testing.

Raul's company has narrowed its options to a small handful of CSPs. All these CSPs offer a wide variety of cloud services and meet all of the company's security requirements. Cheri, Raul's boss, is now asking him to recommend what type of cloud services would best fit their needs. She explains they want to start with cloud-based email and an office productivity suite that enables easy file sharing among team members. Which cloud service model should Raul recommend they use to accomplish these goals? a. PaaS b. IaaS c. SaaS d. RaaS

c. SaaS | Email, office productivity apps, and file sharing are all services offered by SaaS products.

A larger delta results in reduced data _________________. a. security b. latency c. integrity d. connectivity

c. integrity

Adan is mapping out address pools for the subnets he plans to create in his Azure account. He has determined the network will use a CIDR /24 address space, and he needs 16 small subnets within this space. How many bits should Adan borrow from the host ID to create these subnets? a. 1 b. 2 c. 3 d. 4

d. 4 | Using the skip-counting method explained earlier, two times two is four, times two is eight, times two is 16, which is four twos. Adan will need four bits from the host ID.

What type of migration would support the transition of an application from a VM instance to a container instance? a. Storage migration b. VM migration c. Online migration d. Cross-service migration

d. Cross-service migration

You work as a software developer and require early access to an operating system's updates so you can recode your application before OS updates are released to the public. Which OS channel are you most likely getting access to? a. Stable b. Canary c. Beta d. Dev

d. Dev

What type of cloud network traffic incurs fees? a. Traffic between two VMs in the same subnet b. Traffic between two VMs in the same VPC c. Ingress traffic to a storage bucket d. Egress traffic from a database

d. Egress traffic from a database

Anika has run into a problem with the VPN connection to her company's cloud-hosted database. She has a good Internet connection and can access her work email account, which uses the same sign-in credentials as the VPN. But she still can't pull reports from the database service. She calls Patrick, who works for the company's help desk. As Anika describes the problem to Patrick, he tells her to try again and make sure she's using the right password, then to restart her router, and if that still doesn't fix it, to restart her computer. Which troubleshooting step did Patrick fail to complete in the correct order? a. Establish a plan of action and implement the solution b. Test the theory to determine cause c. Document findings, actions, and outcomes d. Establish a theory of probable cause

d. Establish a theory of probable cause | Patrick tried several haphazard possible solutions that were unrelated and disorganized without considering what the probable cause of the problem might be.

During which incident response phase are backup systems activated? a. Post-incident b. Investigation c. Identification d. Recovery

d. Recovery

Corin works in the IT department of a law firm specializing in real estate closings. The firm is already using G Suite (web-based Google apps) productivity software for office staff, and it recently acquired a company-wide license for Zoom, an online video conferencing app. The next, more audacious target is their billing software. The company has been using an antiquated program for more than 20 years—longer than most of their staff has been employed. One accountant has been with the firm for nearly 30 years and remembers when the firm first started using this billing software. She says everyone hated it even then. Corin has been asked to make a recommendation as to how to proceed with this phase of the migration. Given these conditions, what is the best approach to migrating the billing functions to the cloud? a. Retire b. Replatform c. Rehost d. Replace

d. Replace | The application is old and likely can't easily be updated for use in the cloud. It also doesn't serve the company's needs well to begin with. Finding a cloud-native replacement is a much better option, considering the application needs replacing anyway.

Mia's company is moving their video database—about 34 TB—to a cloud-based storage solution. The company is located in a fairly small town, at least an hour's drive from the nearest large city, and doesn't do a great deal of data transfer online for normal business operations other than regular contact with customers through email or video conferences. Which data transfer option is the best fit for Mia's company? a. Data transport service such as Snowmobile b. Existing public Internet connection c. Private connection through a colocation facility d. Storage appliance shipped via UPS

d. Storage appliance shipped via UPS | Mia's company is likely too far from the nearest colocation facility to make that a viable option, and her company's existing Internet service likely does not provide sufficient bandwidth for this data transfer task. The amount of data to be transferred is not large enough to justify the expense of Snowmobile. A storage appliance is the best remaining option.

Ginny is building a series of subnets in her AWS cloud that will host VMs used to test applications her company is developing. The applications are tested by a team of users who are specialists in their respective industries. Ginny establishes the subnets, spins up a few experimental VMs, and starts testing her connections. She realizes there's a misconfiguration in one of the VMs and needs to remote into it to make some changes. What piece of information does Ginny need to collect from AWS first? a. The VM's user password b. The AWS account's key pair c. The subnet's private IP address d. The VM's public IP address

d. The VM's public IP address | Ginny will need to check her AWS account to determine the VM's public IP address to establish the remote connection. She should already have the VM's user password or key pair from when she configured the VM.


Ensembles d'études connexes

Chapter 10 Mastering Biology Questions

View Set

Microbiology Chapter 13, Microbiology Chapter 4, Microbiology Chapter 12

View Set

Micro 223 Exam 1 Post Tests (Chapters 1-5) - SELU Bronwyn Duos

View Set