CTS-287

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A small company has decided that they have the extra bandwidth to host their website on-premises in their server room. However, occasionally their site goes viral for a few days at a time, which has caused the site to become completely unavailable to all users. Which of the following might solve their problem? a. Virtualization b. Cloud bursting c. DevOps d. Resource pooling

B

Janelle's company has adopted the CompTIA troubleshooting model as part of their standard operating procedures to use when troubleshooting issues. She sees the step listed as identify the problem. Which of the following should she do as part of that step? a. Install the available patches from the manufacturer. b. Ask the user probing questions to determine whether any recent changes have been made. c. Look for clues as to what could be causing a problem. d. Document the issue and all of the pertinent details.

B

Fictional Corp is in the process of merging with Widgets Inc. They both use different cloud service providers for a variety of different applications that their employees need to perform their jobs. The IT departments of the organizations have been tasked with merging the IT infrastructure. One of the first tasks that they are looking at is combining the directory services for the two organizations so that all users are in one large LDAP database. Migrating from one cloud service provider to another is currently not a possibility due to the complexity of the applications deployed. Which of the following describes the type of infrastructure they will end up with as they continue a. Public cloud b. Private cloud c. Multi-cloud d. Hybrid cloud to link the infrastructures together?

C

Alejandro is wanting to configure a couple of new virtual machines to take advantage of DHCP services offered by their cloud service provider. The portal that the CSP provides has their offerings broken up into multiple higher level categories. Which of the following should he most likely look under to configure this service for his company's use? a. Compute components b. Storage components c. Application components d. Network components

D

Creative Co has just set up a private cloud. However, they have employees that work remotely in the field and want them to be able to access resources on the private cloud. Which of the following could Creative Co implement in order to allow users to create secure connections from their computers across the Internet into the private cloud? a. CMS b. WAN c. VLAN d. VPN

D

Ted has been tasked with moving the company's physical server infrastructure to a cloud-based infrastructure. He knows that the servers the company uses in the data center are fairly new and are nowhere near ready for retirement. However, he also knows that security is a very important factor in any decisions that are made. Which of the following is unlikely to be considered as a factor in the confidentiality aspect of security planning? a. An on-premises private cloud may be more susceptible to security vulnerabilities with a limited staff due to the volume of maintenance and patches required. b. If the company were to deploy a private cloud, what kind of uptime requirements would the system need in order to meet the SLAs? c. The physical security of the data center must be considered as physical access to the servers could still cause a data breach. d. If the company were to use a public cloud provider, what kind of assurances do they have that the company's data will be kept private as well as what types of precautions and tools do they have in place?

b

The Chief Technology Officer of an organization just got back from a technology conference where he learned about a set of best practices that many other organizations have put into place to help them be more efficient with their operations. Some of the topics covered by these best practices include change management and systems that store maintenance and configuration information for systems. He has determined that he wants everyone in his organization trained and up to speed on at least the foundational level of knowledge of these practices. What is the topic that the managers in IT should begin looking for training on? a. CMDB b. ITIL c. PCI DSS d. HIPAA

b

There have been multiple performance issues with the virtual machines that reside on one of the hosts in the data center at Fictional Corp. After a bit of research, it is discovered that during peak hours, they are all concurrently trying to use all of the vCPUs that have been configured for them. Which of the following was set too high in this configuration? a. Bursting b. Overcommitment ratio c. Elasticity index d. Scalability ratio

b

Tia has been analyzing the on-premises data center and determined that the data center can handle most of the traffic on a day-to-day basis. However, there are times when the bandwidth becomes saturated and she needs to find a solution to push the excess traffic out to virtual machines on a cloud service provider. Which of the following describes the technique she is looking to implement? a. Cloud ripping b. Cloudbursting c. Cloud tipping d. Cloud redirection

b

Uma has been analyzing the performance and baselines from her virtual machines that are on a cloud service provider's platform. She sees that they do not appear to be performing up to the standards that her cloud service provider guarantees. Which of the following documents outlines the standards that they are guaranteeing? a. DRP b. SLA c. VPC d. GRE

b

Wayne has received reports from users that several web applications are running very slowly at times. He is analyzing the virtual machine they reside on and sees that it is maxing out its resources on a regular basis. Which of the following cloud features should he configure so that more resources would be available on demand? a. Resilience b. Rlasticity c. Hyperthreading d. Simultaneous multithreading

b

Which of the following steps of the troubleshooting model, if not done, could potentially cause users to experience new issues or problems with a system. a. Test the theory to determine cause. b. Verify full system functionality, and, if applicable, implement preventive measures. c. Identify the problem. d. Document findings, actions, and outcomes.

b

Xena has noticed that traffic to her company's website has been increasing from across the world. She has decided to start deploying copies of that server to various regions and wants to direct traffic to the site that is closest to each user. Which of the following technologies could she use to do this? a. GAN b. GSLB c. GCP d. GIMP

b

Yolanda wants to see a list of MAC addresses that one of her servers has been communicating with. Which of the following command line tools will display that information? a. nslookup b. arp c. dig d. ping

b

Zoie is working on a Windows server that has two network interfaces. One is assigned an IP address by a DHCP server while the other is a static IP address. She wants to see what the current dynamic IP address is. Which of the following command line utilities can she use to view that information? a. ifconfig b. ipconfig c. ip d. netconfig

b

Brian has built a private cloud in his company's data center. He has just racked up a server and turns it on for the first time. Which of the following extensions might he see that he should ensure are enabled in the UEFI/BIOS setup before continuing to install the operating system and configure the server to be part of the private cloud? (Choose two) a. Intel-V b. VT-x c. AMD-V d. AV-x

b,c

Fictional Corp has grown exponentially over the first few years of its existence. Until now it had been using commercial off-the-shelf software. They've decided to create a development team and need to decide what the best method of development management is. Which of the following are the two most common methods that they might choose from? a. Flexible b. Agile c. Stream d. Waterfall

b,d

Bill is trying to create a new web application to replace an existing system that is becoming outdated. The old application has been modified a number of times and the code has become rather convoluted over time, so he has decided to start over. However, the application that it is replacing needs to be usable 24 hours a day, 7 days a week, 365 days per year with as little downtime as possible. Which of the following would be the type of system Bill is trying to create by adding in redundancy wherever he can? a. High availability b. Low latency c. High Quality of Service d. No delay

a

Bonnie has been tasked with performing an analysis on her company's firewall infrastructure. The organization has a number of office locations across the United States in addition to a number of people that work remotely from home. She finds that many of the existing firewalls are no longer supported by the manufacturer and has convinced the company to allocate some budget to find a solution to replace them. Which of the following might she recommend as a replacement? a. FWaaS b. FAT c. CRM d. FCoE

a

Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection? a. VPN b. VLAN c. VNC d. DNS

a

Carl has created a virtual machine on the cloud service provider that his company uses and has given it a static private IP address. He wants to make this server is the new web server for the company's website. Which of the following is required to allow that server to perform in that role? a. IG b. IGMP c. IGRP d. IDS

a

Cato has received an email stating that the change that he requested has been completed and the tracking ticket associated with the change has been closed. Cato pulls up the cloud application to see the new features that he had requested but is disappointed to see that they aren't quite what had been described in the change request. Which of the following steps, or phases, of the change management process were omitted? a. Change review b. Change assessment c. Change implementation d. Change documentation

a

Check My Work Homer has just changed the public IP address on one of the virtual machines residing on the cloud service provider his company uses. However, he is now no longer able to ping the server by the FQDN, though he is still able to ping it by the IP address. Which of the following does Homer need to modify? a. DNS A record b. DHCP configuration c. NTP master d. MAC address

a

Chris has learned about a technique that he can configure on some of his virtualized systems to help with memory allocation. Using this specific technique, a driver gets installed on each of the virtual machines on a host. That driver allows the host to control a fake process on the virtual machine so that the VM assigns memory to that process. Rather than actually do something with the memory that has been allocated to the process, the host can then assign that memory to another virtual machine so that it can use the memory instead. Which of the following is the best description of the memory reclamation process that Chris is considering using? a. Ballooning b. Overcommitment c. Bursting d. Hyperthreading

a

Darren has been using Kubernetes for container management with the deployments his company has been using on the Google Cloud Platform. However, he is now being told that the company is going to be migrating to a different container management platform with Azure and AWS. Which of the following tools might he need to learn in order to make this transition and start deploying applications on the new platform? a. Docker Swarm b. Docker Flock c. Docker Crowd d. Docker Concourse

a

Eugene has been given the subnet 10.20.30.0/24 to use for the creation of a group of virtual machines to be used for the sales department. He is used to seeing a subnet mask in the format of four numbers separated by periods (255.255.255.0) along with the subnet ID, but isn't familiar with what the slash and a number mean after the subnet ID. He asks you to help him interpret the information. What term should you tell him to search for on a search engine to learn more about this topic? a. CIDR b. VPN c. DDN d. VLAN

a

Fictional Corp currently uses a private cloud within their data center. The CTO has recently learned about hybrid cloud implementations and their benefits, and has instructed the cloud team to implement a hybrid cloud as soon as possible. Which of the following types of cloud services should they start looking at adding to their setup? a. Public b. Private c. Community d. CRM

a

Fictional Corp has decided to migrate much of its on-premises data center to a cloud service provider to take advantage of some of the benefits of cloud computing. The benefit that they found the most important was the ability to expand and grow (or shrink) as needed without any delay due to shipping and installing the hardware required for an on-premises data center. Which of the following common cloud terms was the most important factor in their decision? a. Elasticity b. Growability c. Hyperthreading d. Bursting

a

Fictional Corp has recently implemented a change management process where a group of employees, through regular meetings, must approve or deny the changes that are proposed through a formalized process. What is the name of the team of employees that is responsible for approving or denying the requested changes? a. CAB b. ECAB c. CMDB d. CASB

a

Fictional Corp is building out a private cloud in their data center. They want to ensure that there are extra resources available in the event that a server fails. Which of the following technologies might they build their cloud upon? a. Cluster b. Bundle c. Clump d. Collection

a

Fictional Corp's IT management team has decided that with their larger infrastructure, they need to look at automating some of the deployments of virtual machines and configurations. They want to use APIs to manage the configurations and installation of operating systems and software as well as for monitoring purposes. Which of the following describes the environment that they are wanting to create and start using? a. DevOps b. advanced deployments c. divestitures d. resource pooling

a

Fictional Corp's Vice President of Sales has just returned from a conference where he learned about a great customer relationship management platform that he would like for the company to begin using. This platform doesn't require any investment in hardware, operating systems, or any other software, and only requires administration of user accounts and configuration of the types of data that it needs to store. Users would access it through their web browser, and the administration and maintenance tasks for the IT department would be minimal. Which of the following is the VP suggesting that the company use? a. Public cloud b. Private cloud c. Hybrid cloud d. Community cloud

a

Fredrica is installing more infrastructure in her company's on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains? a. VLAN b. VPC c. VNC d. VLC

a

George has completed the implementation of a new change to one of the virtual machines on the CSP they use that runs a few of the company's applications. He went back through and compared the results to the original approved request and determined that the change was successful. What is the next step that George should perform? a. Change documentation b. Change review c. Change assessment d. Change request

a

Henry has just been hired as a security engineer and has been tasked with analyzing the cloud infrastructure that the company uses. Which of the following might Henry be concerned about if he discovers that critical data is being stored in that environment? a. Shared compute b. Dedicated compute c. High availability d. Cluster

a

Hershel is working with a virtual network that has the subnet mask 255.255.255.192. He changes the IP address of one of the servers from 172.16.25.183 to 172.16.25.193. What is the result of this change? a. The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a router. b. The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a switch. c. The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a DNS server. d. The server will still be able to communicate with the devices on the subnetwork that it was previously in without the aid of any other devices or servers.

a

Jacob wants to export a virtual machine from one host to another as a single file. Which of the following file formats should he use? a. OVA b. VHD c. OVF d. VDI

a

Jan has just migrated a virtual machine from the company's private cloud to the cloud service provider his company uses. He wants to see how the system responds as well as compare the original and new baselines. What type of testing should he perform? a. Performance testing b. Load testing c. Security testing d. Functionality testing

a

Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs, but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose? a. L2TP b. PPTP c. GRE d. PPP

a

Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company? a. VPC b. VNC c. VPN d. VDI

a

Morgan has hardened the virtual machines in the subnet he's just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment? a. Virtual firewall b. Internet gateway c. VNC d. Virtual switch

a

Olivia manages a group of Windows and Linux servers. She knows there is a command that she can use to view currently open network connections that works on both platforms. Which of the following commands will she most likely use? a. netstat b. dig c. route d. arp

a

Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulations out there that pertain to storing PII that are different than other industries. Which of the following sets of laws and regulations is he specifically thinking of that do not apply to other industries? a. HIPAA b. PCI DSS c. GDPR d. SLA

a

Patti's company has just migrated the only Windows server in a particular VPC to a different VPC. Which of the following should she do next? a. Disable port 3389 on the firewall of the original VPC. b. Disable port 22 on the firewall of the original VPC. c. Disable port 53 on the firewall of the original VPC. d. Disable port 110 on the firewall of the original VPC.

a

Quinn is currently looking to deploy a new Microsoft SharePoint server farm, a web-based application, into its own VPC. Which of the following ports would be unnecessary for her to leave open on the firewall for usage or management purposes? a. 22 b. 80 c. 443 d. 3389

a

Raven has been asked to configure the web server with a specific public class B IP address. Which of the following is a possible address she was given? a. 168.192.10.172 b. 192.165.10.172 c. 172.16.172.16 d. 127.192.168.172

a

Roz is configuring new virtual machines in the company's private cloud. She knows that the virtual machines need a total of 512 GiB of memory. However, the physical machine that she's deploying them to only has 256 GiB installed. Which of the following technologies, when configured correctly, could allow her to deploy the virtual machines to this hardware? a. Overcommitment ratio b. Memory bursting c. RAMming d. Ballooning

a

Sharon has just finished probing her way through a virtual machine that has been causing problems on the company's private cloud looking for clues as to what might be causing those problems. She has a theory of what could be causing the problem. What is the next step that she should perform if she is following the CompTIA troubleshooting model? a. Test the theory to determine cause. b. Establish a theory of probable cause. c. Establish a plan of action to resolve the problem and implement the solution. d. Identify the problem.

a

The legal department of your organization has requested that you audit the licenses you are using for the operating system your organization uses. As you start analyzing the on-premises cloud systems, you need to ensure that you have the correct number of licenses. Which of the following should you ensure to count on the machine? a. The number of CPU cores b. GiB of RAM c. The number of network cards/ports d. The number of disk volumes

a

Thomas has been tasked with implementing automation wherever possible. He starts to work on the first system where he knows automation would greatly benefit the company. What is one of the first things he should do before implementing the automation? a. Design a workflow b. Create a change request c. Create a backup of the system d. Update the patches on the system

a

Victoria is trying to determine whether one of the new servers she set up on the cloud service provider is reachable and online from her current workstation. Which of the following tools is she most likely trying to use? a. ping b. route c. display d. netstat

a

Erma wants to look at the current IP configuration on a Linux server. Which of the following tools can she use to view this information? (Choose two) a. ifconfig b. ipconfig c. ip d. netcon

a,c

A holiday ornament manufacturer sees traffic increase to their website in the couple of months leading up to the holiday, but then it tapers off and is very low for the rest of the year. Which of the following benefits of cloud computing might they be the most interested in for this use? a. Volatility b. Elasticity c. Reliability d. Duplicity

b

A large e-commerce platform sells and ships millions of dollars' worth of goods every day. Which of the following concepts is most likely the most important thing for them to consider in the design of their IT infrastructure? a. Collecting thorough baselines b. Minimizing downtime c. SOPs d. KPIs

b

A large international organization currently has a single support desk that operates 24 hours per day, 7 days per week. However, they have realized that for disaster planning purposes, it would be a good idea to have multiple support desks in different locations so that if one went down the others could take over for it. Normal operations, though, would mean that they didn't have to staff any of the operations overnight. Which of the following has the company decided to use as the new model for their support desk? a. Centralized b. FTS c. Unified d. Streamlined

b

A large telecom company currently has both wireless and landline operations and wants to divest itself of the landline division. However, a lot of the servers that run each separate division are located in the same data center. Before they sell off the landline division, they want to migrate the servers out of that data center. Which of the following would be the best and most cost-effective solution so that they can preserve the capital that they have on hand while not taking on any new debt? a. Build a new data center and move the servers to the new location. b. Convert the servers to virtual machines and migrate them to a cloud service provider. c. Buy new servers and install them in a new leased data center and then migrate the applications to the new servers. d. Buy new servers and install them in a colocation facility and migrate the applications to them.

b

Bellamy has been asked to configure the virtual router interface for the subnetwork that contains the server with IP address 172.19.101.200 and subnet mask of 255.255.255.128. He is asked to use the first usable IP address of the subnet. Which of the following IP addresses should he use? a. 172.19.101.128 b. 172.19.101.129 c. 172.19.101.192 d. 172.19.101.193

b

Beth has been asked to migrate the company's virtual private clouds from class C private addresses to class B private addresses. Which of the following is a valid address for her to change the web server's IP address to? a. 192.168.100.100 b. 172.30.101.50 c. 10.201.115.12 d. 168.192.100.5

b

Bob has received a change request that now needs to be analyzed at the next regular meeting to determine whether or not the change should be implemented. Which of the following teams is responsible for reviewing this change and either giving it their approval or denying it? a. CMDB b. CAB c. SOP d. ITIL

b

Cara has requested some modifications to one of the cloud applications that the company developed internally. She pulled up the internal tracking application and sees that it has just gone through the change assessment phase. What is the next phase of the change management process that it should be in now? a. Change review b. Change implementation c. Change documentation d. Change request

b

Daphne is trying to log into her company's cloud-based email system, but is getting an error message. Upon logging into the administrative portal, it appears the credit card on file has expired. Which of the following seems to be the issue? a. Time synchronization issue b. Licensing outage c. CSP outage d. Template misconfiguration

b

Darla has changed the hostname of a Linux virtual machine within the operating system. She went to ping the server by the new name from her workstation, but is getting a host not found error message. Which of the following does she still need to configure? a. SNMP b. DNS c. ICMP d. SSH

b

Darryl has been given the 10.20.30.64/26 network to use for a set of virtual machines that he is provisioning on his company's private cloud. He has been told to configure the last usable IP address in the range as the gateway, or router, address. Which of the following IP addresses should he use for the gateway? a. 10.20.30.127 b. 10.20.30.126 c. 10.20.30.254 d. 10.20.30.94

b

Dwight has just moved all of the Linux servers from the VPC that they shared with some Windows servers to another VPC. Which of the following does he most likely need to do? a. Remove the rules that allow port 53 from the firewall to the original VPC. b. Remove the rules that allow port 22 from the firewall to the original VPC. c. Remove the rules that allow port 443 from the firewall to the original VPC. d. Remove the rules that allow port 3389 from the firewall to the original VPC.

b

Ezekiel wants to ensure that several of the cloud resources he is responsible for managing are always available. Which of the following might best help him meet his goals of high availability? a. Offsite backup to another region b. Site mirroring between two or more regions c. Daily replication to another region d. Warm site

b

Fictional Corp has an ecommerce shop where customers can buy widgets directly from them through their website. The shop runs on a virtual machine at a cloud service provider. However, the company has just been offered a deal with another cloud service provider that will save them a significant amount of money. They want to make the move to the new cloud service provider as quickly as possible with as little downtime as possible. Which of the following would be their best option, assuming it is technically feasible with the options available from both platforms? a. Offline migration b. Live migration c. Backup and restore d. P2P migration

b

Fictional Corp has multiple monitoring systems in place to report various events that occur as soon as they happen. However, they have also tried to design the infrastructure so that it can withstand and compensate for these failures and outages and allow the system to still function so that the users do not notice the failure. Which of the following terms could be used to describe the theory they used when designing their infrastructure? a. Overcommitment b. Resiliency c. Hyperthreading d. Virtualization

b

Fictional Corp has previously had a release schedule where changes were released into production on the first and third Saturday every month. However, it has been suggested that it would be more efficient to push the changes to production as soon as the code has passed testing. Which of the following methodologies is being suggested? a. Continuous integration b. Continuous deployment c. Continuous delivery d. Continuous migration

b

Fictional Corp has several scripts that can be copied and pasted into their cloud service provider's platform to create new virtual machines with certain specifications. After one of the administrators runs one of the scripts, she goes through and verifies that everything was set up correctly, only to find that certain things were not set up correctly. Which of the following is the most likely issue? a. Resource contention b. Template misconfiguration c. CSP outage d. Platform integration issue

b

Fictional Corp is in the process of migrating applications and data from their on-premises physical servers to a cloud service provider. They have migrated the application code successfully, but now must move the underlying database servers. Which of the following might be the biggest concern with migrating the database servers? a. Proper functionality b. Data integrity c. Connectivity d. Availability

b

Fictional Corp wants to examine systems within their data center to determine how they operate under normal conditions and determine what resources would be necessary to be provisioned on a cloud service provider if they were to make that transition. Which of the following describes the records that Fictional Corp is looking to review? a. SOPs b. Baselines c. CMDB d. ITIL

b

Fictional Corp wants to start migrating a bunch of internal applications to a CSP. However, they are located in a rural area and their only connection option is a T1. However, they know that the move would save them money in electrical expenses and reduce the maintenance burden from having to monitor and control the various firewalls and other related equipment. Which of the following is most likely going to be the biggest hurdle for them? a. Storage b. Bandwidth limitations c. Cost d. Security

b

Finn needs to create multiple virtual networks using a /28 mask. How many devices can he put on each subnet? a. 16 b. 14 c. 30 d. 32

b

Frank has just been hired as the new development manager at Widget Co. He was hired because he proposed that he could implement new methods such as one where new changes are deployed in small increments every 24 hours. Some of the team members don't quite understand it though, so he recommended they go read up on it. What search term would help them find the information they need to learn more about this method? a. Continuous integration b. Continuous delivery c. Continuous deployment d. Continuous feedback

b

Gary is creating a new virtual machine that needs to be closely monitored during its first few months of activity as the application that it is hosting is brand new and he's not sure what to expect out of it. Which of the following should he ensure is done to make sure that logs are collected in as much detail as possible? a. Update the patches for the operating system b. Enable auditing c. Disable unnecessary services d. Make sure the firewall is configured to only allow traffic on the necessary ports for both inbound and outbound traffic

b

Glenn has been tasked with creating a few new virtual machines for a new project that will be used by the finance department. It will contain sensitive data about the company and its operations. Which of the following is the most important thing for Glenn to consider as he's creating the virtual machines? a. Which operating system is being used for the servers b. Which region he is creating the virtual machines in c. How much disk space is being allocated d. How much memory is being allocated for each virtual machine

b

Greg is deploying a new application that will originally have 1 terabyte of disk space allocated to storing user files. However, since it is a new application, he is unsure how quickly the disk space may fill up and need to grow to accommodate new files. Which of the following cloud features should he ensure is configured correctly so as not to cause any errors to be displayed to users about the storage space being full? a. Self-elasticity b. Auto-scaling c. Normalized growth d. SDLC

b

Haley does not want to manually assign IP addresses to clients on one of the network segments that she manages. Instead, she wants clients to obtain an IP address from a server that manages a pool of IP addresses. Which of the following technologies should she implement? a. DNS b. DHCP c. RIP d. OSPF

b

Jeff has a dashboard application that can give him an at-a-glance look at the various virtual machines on his cloud infrastructure. He notices that one of the systems is showing memory usage at 95 percent. Which of the following types of testing has possibly been overlooked for that system? a. Performance testing b. Load testing c. Security testing d. Functionality testing

b

John has just created a new virtual machine on its own virtual network. After configuring the operating system and ensuring the appropriate services are running, he tries and fails to connect to the virtual machine's IP address via RDP. Which of the following might be the reason? a. He did not open port 22 on the firewall for that vnet. b. He did not open port 3389 on the firewall for that vnet. c. He did not configure DNS for the virtual machine. d. He did not configure SSH on the virtual machine.

b

Karen's manager knows that she is working on implementing a VPN connection between the company's on-premises data center and the cloud service provider her company uses. The manager approached her with a concern to make sure that she wasn't using an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following was most likely the protocol that the manager was concerned about? a. L2TP b. PPTP c. GRE d. OpenVPN

b

Kathleen has noticed in the configuration management database that a couple of servers are no longer covered by the manufacturer's warranty. The organization has been migrating to the cloud over the past year, so that seemed to be the best place to migrate these to as well. What type of migration would this be considered? a. P2P b. P2V c. V2P d. V2V

b

Kathryn has been tasked with migrating several on-premises applications that currently reside on servers in the company's data center to a cloud service provider. As part of the process she has taken images from the local systems and put them onto the CSP's platform and now wants to run some tests to determine how well the environment auto-scales as demand increases. Which of the following best describes the type of testing she is performing at this stage of the migration? a. Performance testing b. Load testing c. Vulnerability testing d. Penetration testing

b

Kayla has been tasked with migrating a physical server to the cloud service provider that Fictional Corp uses. Which of the following will allow her to perform that migration? a. P2P b. Snapshot c. Orchestration d. V2V

b

Kevin has created a web application that will reside on the cloud service provider's platform that his company uses. However, the database for the application must reside on the company's private cloud in their data center. Which of the following might be a primary concern when running connectivity tests? a. Speed of the network card in the database server b. Latency c. QoS deprioritizing database traffic d. Incorrect duplex settings

b

Lexa has been asked for the subnet ID and subnet mask in CIDR notation for one of the web servers in the company's private cloud. The web server has an IP address of 192.168.1.200 and a subnet mask of 255.255.255.192. What should she tell them? a. 192.168.1.128/25 b. 192.168.1.192/26 c. 192.168.1.192/27 d. 192.168.1.128/26

b

Margaret has designed an application and the underlying systems that it resides on to have a five-nine uptime, or 99.999%. Which of the following techniques has she implemented? a. Shared compute b. High availability c. Disaster recovery d. Overcommitment

b

Martin has been asked to look for weaknesses within the company's cloud infrastructure and create a report to be delivered to upper management. He is not to actually try and exploit any of the weaknesses found to determine to what extent they might compromise the system. Which of the following has Martin been asked to do? a. Performance testing b. Vulnerability testing c. Load testing d. Penetration testing

b

Max has been hired as a consultant to help revamp the procedures that the IT department uses. He sees a lot of things that they are doing correctly, but sees that the information in the trouble tickets is severely lacking of detail. Which of the following systems would Max most likely recommend putting into place that could have been populated from ticket information if it had been there? a. CMDB b. Knowledge base c. Content management system d. Customer relationship management system

b

Nancy was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following should she read more about to find out how she can implement it? a. PPTP b. IPsec c. GRE d. L2TP

b

Rita has decided that the servers in one of the VPCs that she manages should only be reachable by IP address and they should not be able to perform any domain name lookups from the Internet. Which of the following ports should she disable on the firewall for that VPC? a. 23 b. 53 c. 389 d. 636

b

Simon was asked to create three Linux virtual machines to host the company's new sales application and database server. He is going to be using the company's cloud service provider and was given the 10.20.30.0/30 subnet to put them on. He immediately tells the person giving him this task that he cannot do what is asked of him. Why? a. The web server needs a public IP address. b. The /30 subnet is not large enough for 3 virtual machines. c. Linux will not run as a virtual machine. d. The cloud service provider does not allow private IP addresses to be assigned to virtual machines.

b

Fictional Corp has decided to outsource the development of a cloud application that it wants to have developed for its sales department to use. Which of the following might the company use to solicit bids for the project? a. RFC b. RFI c. RFP d. RFD

c

Fictional Corp has just moved its web server from its on-premises data center to a cloud service provider. Which of the following most likely needs to be changed by an administrator? a. ARP entries b. Routing tables c. DNS entries d. VLAN configurations

c

Fictional Corp is looking at solutions for their new CRM system for the sales department. The IT staff already has a fairly heavy workload, but they do not want to hire any additional IT staff. In order to reduce the maintenance burden of the new system, which of the following types of CRM should they choose to meet these needs? a. IaaS b. PaaS c. SaaS d. DBaaS

c

Fictional Corp is trying to choose a cloud service provider. There are many things to consider, and they have narrowed the choices down to two CSPs that could meet their technical needs. Which of the following might they also consider doing before signing any contracts or creating an account on those platforms? a. Verify that the CSPs' backups are secure b. Ensure that each CSP adheres to PCI DSS standards c. Have the various agreements reviewed by the legal department d. Ask to be able to do a security audit of the potential CSP choices they are evaluating

c

Fictional Corp uses a process to provide oversight to the development, maintenance, and retirement of programs that the company creates and uses internally. Which of the following would best describe this oversight and process? a. Waterfall management b. Agile management c. Application life cycle management d. Gantt management

c

Frederick is trying to deploy a number of new virtual machines to a new private cloud that his company has just built in their data center. He knows that he needs to configure the virtual machines to have multiple vCPUs, but he also knows that the number of vCPUs needed outnumbers the actual number of total logical cores available on the physical servers. Which of the following might describe one of the concepts he could implement in this scenario? a. Multithreading b. Rationing c. Overcommitment ratio d. Slippery slope

c

Gabriel has been given the 10.30.0.0 network and told to use the subnet mask 255.255.248.0 for the new cloud infrastructure he is building out for the subsidiary his company just purchased. Assuming one of the IP addresses is used for a virtual router interface on that subnet, how many virtual machines could he create in each subnetwork? a. 4095 b. 1022 c. 2045 d. 3097

c

Greta manages the on-premises networks for her company's Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement? a. LAN b. VLAN c. VXLAN d. CAN

c

Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure? a. Next server b. DHCP servers c. DNS servers d. FQDN servers

c

Jason is working on a Saturday afternoon and has determined that a newly discovered vulnerability affects a group of servers that contain critical data for the company. The operating system manufacturer has released a fix overnight, but the company's change management processes require approval before patching any of the systems. Which group could possibly give Jason an approval on a weekend outside of their normally scheduled meetings? a. CAB b. CMDB c. ECAB d. CASB

c

Jeff has just been hired by Fictional Corp as a systems administrator. He is told that one of his responsibilities is going to be the backup processes used for on-premises systems in the company's data center. He is told about documentation that he should use to make sure that everything is done correctly. What type of documentation was he referred to? a. Baselines b. CMDB c. SOPs d. KPIs

c

Jim is a technician at Fictional Corp and has been assigned a ticket from the service desk to investigate a problem into one of the cloud applications being used by the company. He has a theory as to what could be causing the problem and tested it to determine the actual cause of the problem. Which of the following should Jim do next? a. Document findings, actions, and outcomes. b. Verify full system functionality, and, if applicable, implement preventive measures. c. Establish a plan of action to resolve the problem and implement the solution. d. Identify the problem.

c

John has received a ticket from the service desk describing an issue that a user is having with a cloud application. The ticket describes the issue that the user is having along with the answers to the probing questions that the service desk technician had asked. Which of the following is the next step in the troubleshooting model? a. Establish a plan of action to resolve the problem and implement the solution. b. Identify the problem. c. Establish a theory of probable cause. d. Document findings, actions, and outcomes.

c

Juan is implementing automation processes into some of the cloud infrastructure that his organization uses. Which of the following terms best describes the design, development, and optimization of these automation tools? a. SDLC b. Collaboration c. Orchestration d. Version control

c

Maggie wants to create a small subnetwork for the Human Resources servers that her organization uses. There are currently 10 servers, but she also needs to plan for 50 percent growth over the next two years. Which of the following subnet masks would give her adequate IP address space while leaving the fewest number of unused IP addresses in the block? a. 255.255.255.128 b. 255.255.255.224 c. 255.255.255.240 d. 255.255.255.248

c

Marcus has been asked to configure a web server with a specific private class C IP address. Which of the following is a possible address she was given? a. 172.168.100.10 b. 200.100.50.25 c. 192.168.205.63 d. 192.158.1.70

c

One of the sales managers has approached the development team to ask for some changes to one of the web applications that his team uses. He made some great suggestions, but the development team manager told him they can't just make those changes without going through the formalized process. Which of the following should the development manager ask the sales manager for? a. Business justification b. ROI c. Change request d. CAB

c

Rick is planning a deployment of multiple virtual machines that need to have internal IP addresses. He is unsure which address ranges he can use. He knows there is a formal document that outlines the ranges that can be used for internal addresses. Which of the following options is that formalized set of specifications? a. RFC 3927 b. RFC 2131 c. RFC 1918 d. RFC 88

c

Shelley wants to make sure that any protocols not using encryption are blocked at the firewall for one of her VPCs. Which of the following protocols should she ensure has a deny rule enabled for it? a. HTTPS b. RDP c. Telnet d. SSH

c

Tara had originally created a /28 mask for the 12 servers in the sales group server pool. However, her company has just merged with a competitor and she needs to expand the subnet to accommodate another 20 servers. Which of the following new subnet masks will accommodate the new servers in addition to the original servers while having the fewest number of unused IP addresses remaining? a. /29 b. /27 c. /26 d. /25

c

Thelonius has just created a new virtual machine. By default, the cloud service provider automatically configured it as part of a class C private network. Which of the following is the default subnet mask expressed in CIDR notation that was configured? a. /8 b. /16 c. /24 d. /32

c

Timothy is responsible for monitoring the performance of the applications the company has deployed on their internal private cloud as well as on the cloud service provider. When the applications were initially developed, the IT department had agreed to ensure that the services were available to varying degrees depending on criticality. As such, he needs to reference the documents for each of those services so he knows how they should be performing. Which document is Timothy most likely referencing? a. SOC b. NDA c. SLA d. GDPR

c

Ward has been hired by Fictional Corp to manage the IT infrastructure group. One of the first questions he asks is how they keep track of all of the information about their servers, operating systems, networking gear, and applications. He is answered that some people have some of the information in spreadsheets, but that there appear to be different versions of that spreadsheet floating around. Which of the following might he decide to implement? a. Baselines b. KPIs c. CMDB d. CMS

c

Widgets Inc. is a startup and looking to manage their own hardware and software. They know that procuring real estate to build their own data center can take a few months and do not have that kind of time built into their schedule. Which of the following would allow them to build their own private cloud on their own hardware with the potential to migrate into their own data center later if need be? a. Public cloud b. POP c. Colocation d. IXP

c

Fictional Corp currently has a data center that is not taking advantage of any virtualization technologies. They have decided that it is time to start looking at migrating to the cloud and depending less on their own data center. However, they have read that even the major cloud providers occasionally have outages that prevent them from meeting the 99.999 percent uptime that Fictional Corp needs, even if that isn't specified in the SLA of the major providers. Which of the following cloud solutions might best fit Fictional Corp's needs? (Choose two) a. Public cloud b. Private cloud c. Hybrid cloud d. Multi-cloud

c,d

Faith has been tasked with migrating as many systems as possible to the cloud. She has a list of the systems that the IT department is aware of, but has heard employees talking about other systems that are not on her list. Which of the following might describe the systems that she still needs to gather information about? a. Dark resources b. Unknown infrastructure c. Unauthorized technology d. Shadow IT

d

Fictional Corp has been using their current cloud service provider for the past year. They have been mostly happy with the service provided up until about a month ago when various virtual machines started becoming unavailable for hours at a time. The CSP has a guarantee of a 99.999 percent uptime, which means they should only have about 5.26 minutes of downtime per year. Which of the following defines the guarantee the CSP is not meeting? a. BIA b. SDP c. DRP d. SLA

d

Fictional Corp has just finished migrating a number of servers from an on-premises data center to a cloud service provider. However, users are now complaining that they are running much slower than before. Which of the following would NOT be a contributing factor as to why they seem slower? a. Internet bandwidth limitations b. Less memory allocated to virtual machines at the CSP c. Fewer CPU cores allocated to virtual machines at the CSP d. Amount of disk space provisioned for virtual machines at the CSP

d

Fictional Corp's primary data center is located in Silicon Valley not far from the San Andreas fault line. Over the past couple of years, earthquakes have been getting more and more frequent and of a higher intensity. As a precaution, the company has decided to use a CSP to geographically disperse the infrastructure. They are currently using multiple hosts that contain between 2 and 20 virtual machines each within their data center. Which of the following types of migration would this be considered? a. P2P b. P2V c. V2P d. V2V

d

Frank is configuring a virtual machine that will reside on a CSP's infrastructure that will eventually need multiple terabytes of storage for data. However, he decides to only configure it with one terabyte in the beginning and then provision more disk space as necessary. Which of the following is the most likely reason for his decision? a. Obsolescence b. Fragmentation c. Incompatibility d. Cost

d

Frasier is comparing the logs from the firewall to the logs on the web server after a security incident. He is trying to correlate the events, but it appears that the traffic took several minutes to reach the web server from the firewall for each of the various attempts. Which of the following could be the issue? a. Licensing outage b. CSP outage c. Platform integration issue d. Time synchronization

d

Isabel is troubleshooting a DNS issue on one of her Windows servers. Which of the following commands might let her look up the DNS records so she can track down where the problem might be? a. dig b. netstat c. route d. nslookup

d

Jadis has just created a new Linux server on the cloud service provider that her company uses. She attempts to SSH into it and it immediately fails. Which of the following steps might she have forgotten to do? a. Configure DNS entries b. Configure the MAC address in the ARP table c. Start the RDP daemon d. Open port 22 on the virtual firewall

d

Jana is trying to optimize the cloud infrastructure of her organization for availability. She wants to ensure that the virtual machines that normally use a certain amount of memory have the ability to use more physical memory up to a predefined level in cases of heavy workloads. Which of the following features should she look at configuring? a. Overcommitment b. Ballooning c. Hyperthreading d. Bursting

d

Jasper was given the IP address of 10.17.101.120/15 for the virtual machine he is to create along with the default gateway of 10.0.0.1. He enters the IP address correctly along with the subnet mask 255.254.0.0. However, the virtual machine doesn't appear to be able to communicate with the Internet when he tries to ping a popular domain name. Which of the following might be the reason why? a. The subnet mask is incorrect. b. There is no route in the routing table. c. The firewall is blocking the traffic. d. The default gateway is incorrect.

d

Jenna's cloud service provider has just started supporting IPv6. She wants her web servers there to be accessible by both IPv4 and IPv6. Which of the following records should she add to the DNS configuration to ensure that IPv6 clients can access her company's website? a. A b. PTR c. MX d. AAAA

d

Marissa is wanting to implement a VPN at her company, but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose? a. L2TP b. PPTP c. GRE d. OpenVPN

d

Ned is working on implementing an open-source container management service because it has some orchestration features that his organization would really benefit from. Which of the following is a possible solution that he may be working with? a. Ubuntu b. Slackware c. Kali d. Kubernetes

d

Negan has been given the 10.50.0.0/16 subnet to create the cloud infrastructure necessary for a new subsidiary that his company is creating, Zombies Inc. He wants to create a minimum of 500 smaller networks that can hold 100 servers each out of that space to minimize broadcast traffic within each subnet. Which of the following CIDR masks could he use to meet his requirements? a. /22 b. /23 c. /24 d. /25 e. /26

d

Niles manages his company's private cloud. His manager wants to start taking advantage of the benefits that resources of a cloud service provider can offer. However, upon starting to try and get his company's local Active Directory to authenticate users on the public cloud resources, he can't seem to get it working. Which of the following is the most likely issue? a. Licensing outage b. Time synchronization issue c. Resource contention d. Platform integration issue

d

Octavia has set up a private cloud with a virtual machine at the IP address 172.19.101.5 and the subnet mask 255.255.255.192. She has been asked what the broadcast IP address is for the network. How should she respond? a. 172.19.101.255 b. 172.19.101.127 c. 172.19.101.31 d. 172.19.101.63

d

Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose? a. GRE b. PPTP c. L2TP d. OpenVPN

d

Pedro is looking for internal and external clues as to what may be causing a problem that has been reported via their ticketing system. Which of the following steps is he currently on from the troubleshooting model? a. Identify the problem. b. Establish a plan of action to resolve the problem and implement the solution. c. Test the theory to determine cause. d. Establish a theory of probable cause.

d

Robert has just finished implementing a change that was approved by the change advisory board. After the change has been implemented, which of the following is the next step that should be performed? a. Change assessment b. Change implementation c. Change request d. Change review

d

Rosita has configured a subnet mask of 255.255.252.0 for the new virtual private cloud she is creating for her organization. One of the junior administrators remarks that he's never seen that kind of a subnet mask before and isn't sure how many devices the subnet would hold. How many devices should Rosita tell him that it will support? a. 1,024 b. 1,021 c. 1,022 d. 1,028

d

Teddy fixed an issue with a cloud-based application a few hours ago and just received a call from a user stating that another part of the application is now broken. Which of the following steps of the troubleshooting model did he most likely omit? a. Identify the problem. b. Document findings, actions, and outcomes. c. Establish a plan of action to resolve the problem and implement the solution. d. Verify full system functionality, and, if applicable, implement preventive measures.

d

Terry has noticed in the configuration management database that one of the servers that acts as a host for multiple virtual machines is no longer covered by the manufacturer's warranty. He gets a replacement with a lot more capacity installed and migrates the guest machines to the new host. What type of migration would this be considered? a. P2P b. P2V c. V2P d. V2V

d

Ursula is working on a Linux system and wants to determine which routers a packet will traverse when a packet is sent to a certain destination. Which of the following command line tools can she use to find that information? a. tracert b. tracer c. trace d. traceroute

d

Wanda is trying to determine which routes packets are traveling over when accessing the company's chosen cloud service provider. Which of the following Windows tools can help her discover that information? a. trace b. traceroute c. tracer d. tracert

d

Zara is implementing a configuration management tool that makes use of a system that sends XML messages to endpoints on various systems in order to make changes. What kind of technology is she putting into use? a. BIA b. DaaS c. CSP d. API

d

A small startup company has just received a round of funding in order to provide the capacity that is required to deliver their smartphone app to a larger number of devices. They have decided to use a public cloud rather than build their own data center, but want to manage as much of the infrastructure as possible while realizing the savings on capital expenditures from the purchase of hardware. Which of the following service models will give them the most control over the security of the platform they want to develop? a. SaaS b. PaaS c. IaaS d. DBaaS

c

A year ago Yvette configured two servers on separate VLANs. She still needs them to remain on separate VLANs, but now has a need for them to be able to send certain communications to each other over a certain port. Which of the following will be necessary for her to do? a. Migrate the servers to a VPC. b. Merge the VLANs together so that they both use two VLAN IDs. c. Create a route between the two VLANs so they know how to contact each other. d. Convert the 2 VLANs into a single VXLAN.

c

Aaron's boss has learned that organizations can create their own clouds in their existing data centers. He has been tasked with researching products that could make better use of the hardware in their data centers and keeping their data on-premises. Which of the following products might Aaron recommend? a. FlexStack b. OSS c. OpenStack d. OwnStack

c

Allen has been tasked with the design, development, and optimization of automation processes. Which of the following is the term that could be used to describe his current set of tasks? a. Replication b. Configuration management c. Orchestration d. Migration

c

Cara works for a startup company that up until now has been running on a single virtual machine. The virtual machine is starting to see capacity issues and she is unable to provision more CPU and memory resources to satisfy its needs. Which of the following would allow her to expand the capacity of her company's web server? a. DHCP b. VPN c. Load balancer d. OSPF

c

Carrie has just finished verifying that the problem she fixed on a problematic virtual machine has not caused any other issues, and the system is now running normally. Which of the following should she do while she is closing out the issue in the ticketing system? a. Establish a plan of action to resolve the problem and implement the solution. b. Establish a theory of probable cause. c. Document findings, actions, and outcomes. d. Verify full system functionality, and, if applicable, implement preventive measures.

c

Craig wants to create a computing infrastructure that will allow developers within his company to build applications on a primarily internally hosted platform rather than outsourcing the infrastructure to a third party provider. However, he wants the ability to easily interact with AWS products. Which of the following could Craig use to do so? a. Patchouli b. Lavender c. Eucalyptus d. Basil

c

Daisy is researching load balancing solutions to implement for a new application that she is tasked with designing and deploying the infrastructure for. One of the requirements is that a client should continue communicating with the same server for the duration of their web browsing session. Which of the following features should she look for in the load balancer? a. Glue connectivity b. Ephemeral sessions c. Sticky sessions d. One-time pad

c

Danny is looking at deploying a new application that requires root-level access to the server. He is currently researching the capabilities of various cloud service providers but is only finding one type of implementation that would meet the requirements set forth by the application developer. Which of the following types of cloud offerings is he most likely going to need? a. SaaS b. PaaS c. IaaS d. DBaaS

c

Emina has three separate VPCs at the cloud service provider that her company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might she implement in order to accommodate that requirement? a. VLANs b. Internet connection sharing c. Cloud peering d. IPsec

c

Fictional Corp has a data center that runs multiple internal applications. However, they want to migrate their email to a cloud service provider so that mail will continue to be delivered in the case of any Internet service interruptions. They also want to use a single directory service so that they don't have to create duplicate user accounts on the internal and external systems. Which of the following types of services is best suited for Fictional Corp's needs? a. Public cloud b. Private cloud c. Hybrid cloud d. Community cloud

c

Fictional Corp has built a private cloud in their data center. That data center is in a region of the country that is prone to earthquakes. They want to ensure that the company can continue to operate in the event that a major earthquake hits and knocks out the power and Internet services. Which of the following strategies should they implement? a. Orchestration b. SDLC c. Disaster recovery d. Clustering

c

Eddie has a virtual machine that is currently serving as the sole web server for the organization he works for. The amount of traffic to the website has been increasing lately, and Eddie wants to add another web server to help answer some of the requests. Which of the following technologies should Eddie look at implementing in addition to the second web server? a. firewall b. router c. switch d. load balancer

d

Emily has just migrated the email from the company's on-premises data center to a cloud service provider. She has modified the appropriate A records, but e-mail isn't being delivered to the new servers. Which of the following records does she still need to modify? a. CNAME b. PTR c. SRV d. MX

d

A server in one of Fictional Corp's branch offices is starting to generate warning messages that a piece of hardware is starting to experience issues and may fail soon. The company keeps the server on-premises for that location due to an unreliable Internet connection and thus cannot move it to the cloud because the office heavily relies on that server. Which of the following should a technician perform? a. P2P migration b. P2V migration c. V2P migration d. V2V migration

a

A social media organization has grown from its initial startup phase to being widely known within the United States. It has decided that it is time to broaden its horizons and see if it can grow the userbase globally as well. They have plans to expand into Europe within the next 12 months. Which of the following should they become familiar with before they start marketing the platform to European users. a. GDPR b. HIPAA c. PCI DSS d. SSAE 18

a

A social video sharing platform has grown quite popular in the United States and has decided to expand to Europe. They want to open a second data center there as part of their expansion. Which of the following is perhaps one of the biggest pieces of the expansion that they want to consider a part of the data storage strategies? a. Legal restrictions b. Baselines c. Business continuity d. Cloud architecture

a

Abby has just created a new virtual machine. Once it has been installed, she connects to it and finds that it has configured the default subnet mask for a class A network. Which of the following subnet masks was automatically configured for this server? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

a

Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement? a. Different cloud service providers for each department b. An Internet gateway c. Network address translation d. Different subnets for each department

d

A large Fortune 500 company has a data center full of servers and wants to move 5 petabytes worth of data to a cloud service provider. Having run some calculations, it could take years to move all of this data to a cloud service provider. Which of the following does the company most likely need to consider in order to complete this migration in a timely manner? a. Internet exchange point b. Point of presence c. Colocation facility d. Offline transfer

d

A user calls into the service desk stating they're having a problem accessing a particular cloud application. The service desk technician asks them some probing questions to see if there have been any changes to their local computer and what they were doing when it stopped working. Which step of the troubleshooting model describes the step that the process is currently at? a. Establish a theory of probable cause. b. Establish a plan of action to resolve the problem and implement the solution. c. Document findings, actions, and outcomes. d. Identify the problem.

d

Adrienne wants to be able to analyze the traffic coming into a Linux server's network interface. Which of the following command line utilities will allow her to see this information? a. tracert b. arp c. dig d. tcpdump

d

Angela has decided upon a multi-cloud deployment so that the company can continue to operate even if one of the cloud service providers experiences an outage. Which of the following explains the factor that was important to Angela in choosing this structure? a. Cost optimization b. Regulatory compliance c. Cloudbursting d. Disaster recovery

d

Carol has created a subnet of 10.20.30.0/27. Which of the following is the address that is used for broadcast messages within the subnet? a. 10.20.30.30 b. 10.20.30.32 c. 10.20.30.1 d. 10.20.30.31

d

Clarke is trying to come up with a subnet mask so that three servers with the IP addresses 172.16.31.10, 172.16.30.15, and 172.16.31.206 are in the same network. Which of the following subnet masks will accommodate this requirement? a. 255.255.255.0 b. 255.255.255.128 c. 255.255.255.192 d. 255.255.254.0

d


संबंधित स्टडी सेट्स

Música de los Pobres a Los Ricos Preguntas

View Set

TEMA 1: Conceptualización general y desarrollo psicológico

View Set

System of Linear Equations - Part 1

View Set

Data and Info. Management Chapter 8 continued (Marist College Eitel Lauria)

View Set

Dr Jekyll and Mr Hyde Annotations

View Set

Cells, synapses, and Neurotransmitters

View Set

AMT General Prep ----- Materials and Processes

View Set