NTC-300 Practice Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Niko is generating baseline reports for her quarterly review meeting. She is interested in a public cloud application server's memory utilization. Where does she generate these reports? A Cloud management and monitoring application B Hypervisor C Databases D Logging servers

A Cloud management and monitoring application

A web-based dashboard is being deployed by your company. Hank has been tasked to develop the application but is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for him to use to meet his requirements? A. API B. GUI C. JSON D. CLI

A. API

Company users are complaining that they cannot log in to a cloud-based collaboration system. The operations centre has been investigating and has, so far, verified that the MFA applications are operational. What user system are they troubleshooting? B. Authorization C. Federation D. Kerberos

A. Authentication

What technology can allow code to replace many of the processes that had to be performed manually in the past? A. Automation B. Scripting C. XML D. Python

A. Automation

Cloud services depend on highly automated operations. What are common automation systems that are used for patch management? (Choose three.) A. Chef B. Cloud-patch C. Ansible D. DevOps E. Puppet F. Cloud Deploy

A. Chef C. Ansible E. Puppet

What is a visual representation of current cloud operations that consolidates data into an easy-to-read format? A. Dashboard B. Object monitor C. Operational matrix D. Management console

A. Dashboard

Which of the following security services are installed inline in a network so that all traffic must pass through it as it transits from one network to another? A. Firewalls B. Antivirus and Malware Prevention C. Intrusion Detection and Prevention A. Firewalls

A. Firewalls

A web-based dashboard is being deployed by a company. James has been tasked to develop an application but is concerned that the application must pull data from many different cloud locations and devices. Which is a good interface for him to meet his requirements? A. GUI B. JSON C. CLI D. API

A. GUI B. JSON C. CLI D. API

Which of the following types of scaling involves adding servers to a pool? A. Horizontal scaling B. Vertical scaling C. Autoscaling D. Elasticity

A. Horizontal scaling

Carl is planning for a large advertising campaign his company will unveil. He is concerned that his current e-commerce server farm hosted in a public cloud will be overwhelmed and suffer performance problems. He is researching options to dynamically add capacity to the web server farm to handle the anticipated additional workload. You are brought in to consult with him on his options. What can you recommend as possible solutions? Each correct answer represents a complete solution. Choose three. A. Horizontal scaling B. Edge cache C. Cloud bursting D. Core elasticity E. Vertical scaling

A. Horizontal scaling C. Cloud bursting E. Vertical scaling

Mark is creating a disaster recovery plan based on directives from his company's executive management team. His company's business is an e-commerce website that sells children's apparel with 85 percent of its revenue received during the holiday season. If there was a severe disruption in operations, the loss of business could put the company's ability to continue as a financially viable operation in peril. Mark is creating a plan that will restore operations in the shortest amount of time possible if there was an outage. What DR model is he implementing? A. Hot site B. Active/active C. Warm site D. Active/passive E. Cold site F.Rollover

A. Hot site

Which cloud-based VPN access technology is used for secure access from your corporate data center to the cloud that offers data integrity and confidentiality? This task contains the radio buttons and checkboxes for options. A. IPSec B. RC5 C. AES D. 3DES

A. IPSec

High-performance network clusters should share which of the following? Each correct answer represents a complete solution. Choose all that apply. A. Identity group B. Hypervisor C. Availability zone D. GUI

A. Identity group B. Hypervisor C. Availability zone

James goes to his local bank and inserts his card into the ATM and then enters his PIN on the keypad. What type of authentication is he participating in? A. Multifactor B. IDS C. Mutual D. Single sign-on

A. Multifactor

Harley is a systems architect for a large manufacturing firm. While testing a new application that will be deployed in an IaaS-based public cloud, he builds a test image and deploys a test VM in his development virtual private cloud zone. When he restarts one of the Linux-based servers, he notices that his storage volume data is missing. What type of storage did he implement?Each correct answer represents a complete solution. Choose all that apply. A. Nondurable B. Ephemeral C. RAID D. Durable E. Object F. Block

A. Nondurable B. Ephemeral

Which software package automates cloud security in a single package? A. Orchestration B. API C. Scripting D. JSON

A. Orchestration

Which of the following is a general networking term for the ability of the network to provide differentiated services based on information in the Ethernet packet? A. Quality of service (QoS) B. Transmission units C. Network latency D. Tunneling

A. Quality of service (QoS)

Each correct answer represents a complete solution. Choose three. A. RAM B. Network C. CPU D. OS version E. Volume tier

A. RAM B. Network C. CPU

What hypervisor virtualized pools can be upgraded to increase virtual server capacity? Each correct answer represents a complete solution. Choose three. A. RAM B. SLA C. CPU D. DNS E. ACL F. Network I/O

A. RAM C. CPU F. Network I/O

Carrie is researching various remote access options to access her Linux servers in a public cloud. She has been asked to provide a standardized and secure solution that protects against snooping. As a Cloud+ architect, you have been asked to assist. What protocol would you advise she implement? A. SSH B. RDP C. Telnet D. IPSec

A. SSH

James is becoming familiar with the interfaces available for his operations team to access his hybrid cloud deployment. You have been asked to explain the common types of user-based interfaces available to manage cloud objects. What are the common interfaces you would explain to James?Each correct answer represents a complete solution. Choose three. A. Web console B. SNMP C. API D. PaaS E. CLI

A. Web Console C. API E. CLI

What application tracks a process from start to finish? A. Workflow B. Orchestration C. API D. NTP

A. Workflow

Jane has found a table merge issue in her SQL database hosted in a private cloud. While reviewing the log files, the vendor requested she install a software change that is designed for rapid deployment that corrects a specific and critical issue. What are they referring to? A.Hotfix B.Patch C.Version update D.Rollout

A. hotfix

Dimitry is troubleshooting a Linux SQL server that is experiencing poor read/write performance from the middleware servers. The vendor support team is requesting that he send them packet traces to further investigate the issue. What utility would he use to collect the traces? A. tcpdump B. nslookup C. dig D. netstat

A. tcpdump

Capacity and utilization reporting often contains data on which of the following objects? (Choose three.) A.CPU B.OS version C.Volume tier D.RAM E.Network

A.CPU D.RAM E.Network

What type of scaling includes adding servers to a pool? A.Horizontal B.Round robin C.Elasticity D.Auto-scale E.Vertical

A.Horizontal

Liza is a new Cloud+ architect for BigCo Inc. She is investigating cloud services that provide server hardware, but the operating system is not included. What cloud service is she using? A. IaaS B. PaaS C. SaaS D. CaaS

A.IaaS

Common cloud resources in your deployment that may saturate over time include which of the following? (Choose three.) A.RAM B.Power C.CPU D.Storage E.Monitoring F.IaaS

A.RAM C.CPU D.Storage

Joe is in the planning stages to make sure that an upcoming company promotion during a major sporting event will not overwhelm his company's cloud-based e-commerce site. He needs to determine his options to add capacity to the web server farm so it can process the anticipated additional workload. You are brought in to consult with him on his options. What do you recommend as possible solutions? (Choose three.) A.Vertical scaling B.Horizontal scaling C.Edge cache D.Cloud bursting E.Core elasticity

A.Vertical scaling B.Horizontal scaling D.Cloud bursting

A storage administrator in your cloud deployment is not granted full control over the firewalls. But he is able to gain firewall configuration attributes, which of the following act does this refers to? A Authentication B Privilege escalation C Federation D Authorization

B Privilege escalation

Elena manages user accounts for her company's cloud presence. She has a trouble ticket open with Jill to assist her in accessing an SSD storage volume in the San Paulo region of the public cloud. What kind of user issue is she investigating? A. Authentication B. Authorization C. Federation D. SSO

B. Authorization

Peter is creating a change management document to redeploy applications for a private to public cloud for his employer. When moving to the public cloud, what technologies can he take advantage of to enable cloud operations? (Choose two.) A. Load balancing B. Automation C. Auto-scaling groups D. Virtualization

B. Automation D. Virtualization

Comparison of current cloud capacity consumption to the maximum available refers to what? A. NTP B. Baseline C. APIs D. Orchestration E. Automation

B. Baseline

Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard? A. BIOS B. CPU C. IPsec D. I/O E. DMA

B. CPU

Quentin is a defense contractor investigating server compliance requirements needed to be certified to meet the U.S. Department of Defense security requirements for contractors. What requirement would you recommend he focus on? A. FedRAMP B. DIACAP C. FISMA D. Section 405.13 for DoD rule A286

B. DIACAP

Jerry is expanding a public subnet in his company's e-commerce site. After performing the address change for all of his public-facing web servers, he tested connecting from a bastion host located offshore. He was unable to connect. What does he need to change to allow the remote site to connect to the web server? A. DHCP B. DNS C. IPSec D. NAT

B. DNS

You have been involved in a project to migrate a fleet of web servers from one cloud service provider to another. After performing address changes for all public-facing web servers, you validate connectivity by connecting from a bastion host located offshore to the new website. However, you find that the browser times out. What needs to be modified to allow the remote site to connect to the web server? A. STP B. DNS C. API D. NTP

B. DNS

You are being asked by your company's network operations center about visibility into a newly implemented hybrid cloud deployment. After consulting with the OPS center, you configure a web-based interface that shows all critical operations at the public cloud. What is this referred to as? A. Gemalto system B. Dashboard C. Vendor-based security appliance D. Puppet automation

B. Dashboard

Which of the following is the process of adding cloud capacity by expanding your current server fleet by adding systems? A. Vertical scaling B. Horizontal scaling C. Elasticity D. Autoscaling

B. Horizontal scaling

Which of the following monitors the malicious activity and actively takes countermeasures to eliminate or reduce the effects of the intrusion? A. SSL B. IPS C. SSH D. DMZ

B. IPS

Ronald is a Cloud+ student studying systems that automate cloud security in a single package and provide cloud asset discovery that can be scanned, and a vulnerability assessment can be completed on all of the cloud services. What is Ronald learning about? A. REST/API B. Orchestration C. Workflow D. Runbooks

B. Orchestration

Which of the following abstracts and hides much of the service provisioning complexity of modern cloud systems from end-users? A. REST B. Orchestration C. Workflow D. Runbook

B. Orchestration

Name the type of software update that is designed to address a known bug and to bring a system up-to-date with previously released fixes? A. Hotfix B. Patch C.V ersion update D. Rollout

B. Patch

Which of the following is an update that fixes a known bug or issue? A. Workflow automation B. Patch C. Version update D. Runbook

B. Patch

Which of the following protocols communicates between devices over HTTP/HTTPS? A. SMTP B. REST C. GRE D. IPSec

B. REST

Connie has been directed by her employer's finance department that they cannot afford to lose any more than 30 minutes of data in the case of a database failure or other catastrophic event. Connie has updated her corporate business continuity and disaster recovery plans. What metric did she change? A. RSO B. RPO C. RTO D. DBO

B. RPO

Marlene is updating her horizontally scaled Internet-facing web servers to remediate a critical bug. Her manager has agreed to operate under reduced computing capacity during the process but stipulates that there can be no downtime during the process. What upgrade approach should Marlene perform to meet these requirements? A. Orchestration B. Rolling C. Hotfix D. Blue-green

B. Rolling

Cathy is preparing her company's migration plan from a private to a hybrid cloud. She wants to outline firewall and DDoS requirements. What document should she create? A. DIACAP B. Security policy C. Service level agreement D. SOC-2

B. Security policy

What options can you offer your user base for MFA tokens? (Choose two.) A. Python app B. Smartphone app C. Automation systems D. Key fob E. Cloud vendor management dashboard

B. Smartphone app D. Key fob

What virtual machine backup method creates a file-based image of the current state of a VM including the complete operating system and all applications that are stored on it? A. Full backup B. Snapshot C. Clone D. Replicate

B. Snapshot

Jane integrated a new marketing group into her PaaS cloud fleet. She noticed a load on the system due to which the cloud performance was getting affected. Which of the following could be the possible reason of the load on the system? A. Traffic shaping B. Variance in number of users C. API request D. Network bandwidth

B. Variance in number of users

Physical resources are virtualized and presented as resources to virtual machines running on hypervisors. What common resources does the hypervisor consume? (Choose three.) A. Bare-metal cores B. Virtual RAM C. SaaS D. Virtual CPUs E. RAID F. Virtual Storage

B. Virtual RAM F. Virtual Storage

Jillian is a Cloud+ consultant for an auto parts company based in central Michigan. She is putting together a disaster recovery plan that includes a remote backup site that has a SQL server instance running at that location with asynchronously refreshed data replica. Her plan calls for activating all other services in the event of a hurricane causing an outage at her primary data center. What model is Jillian going to deploy to meet the requirements? A. Hot site B. Warm site C. Cold site D. Active/passive

B. Warm site

Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community cloud in another province. She is investigating using the community cloud to supplement her private cloud workload during end-of-month processing. What operation is she going to perform? A.Elasticity B.Bursting C.Vertical scaling D.Auto-scaling

B.Bursting

Pierre is deploying a solution that allows data for his e-commerce operations hosted in a public cloud to be reached at remote locations worldwide with local points of presence. He wants to reduce the load on his web servers and reduce the network latency of geographically distant customers. What are these facilities called? A.Region B.Edge location C.Availability zone D.Replication

B.Edge location

Jillian is working on a project to interconnect her company's private data center to a cloud company that offers e-mail services and another that can provide burstable compute capacity. What type of cloud delivery model is she creating? a. Public b. Hybrid c. Community d. Private

B.Hybrid

Harold is investigating his options to migrate his company's time and attendance application to the cloud. He only wants to be responsible for the application and would prefer that the public cloud company manage all underlying infrastructure and servers that are required to support his application. Harold calls you and asks for assistance in selecting a cloud service model that would meet his requirements. What would you suggest he implement? A.IaaS B.PaaS C.SaaS D.CaaS

B.PaaS

Leanna wants to deploy a public cloud service that allows her to retain responsibility only for her applications and require the cloud provider to maintain the underlying operating system and virtualized hardware. Which service model would you recommend she implement? a. IaaS b. PaaS c. SaaS d. CaaS

B.PaaS

Nicola is deploying a new fleet of IIS web servers on her IaaS e-commerce site. The company has elected to use a hybrid approach and desires graphical connections to the Windows bastion hosts. What traffic must he permit through the external-facing firewall to the host? A.SSH B.RDP C.DNS D.IPS

B.RDP

Leonard is creating disaster recovery documents for his company's online operations. He is documenting metrics for a measurable SLA that outlines when you can expect operations to be back online and how much data loss can be tolerated when recovering from an outage. Which metrics is he documenting? (Choose all that apply.) A.RSO B.RTO C.RPO D.DR E.VxRestore

B.RTO C.RPO

Object tracking should be aligned with which of the following? A.VPC B.SLA C.RDP D.JSON

B.SLA

Object tracking can be helpful in identifying which of the following? (Choose three.) A.Resiliency B.Trends C.Metrics D.ACLs E.Peak usage F.Anomalies

B.Trends E.Peak usage F.Anomalies

James, a network administrator, is tasked to enable you to dynamically discover the mapping of a Layer 3 IP address to a Layer 2 MAC address. Which utility would he use to accomplish his task? A SSL B DNS C ARP D DHCP

C ARP

Mindy has been tasked to develop a new QA test logging application but is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for her to use to meet her requirements? A. Python B. XML C. API D. SNMP E. TLS

C. API

Harold will modify a NACL to modify re mote access to a cloud-based HR ap- plication. He will be submitting a de- tailed plan that outlines all details of the planned change. What process is he fol- lowing? A. Cloud automation B. Change advisory C. Change management D. Rollout

C. Change management

Larken is reviewing the SLA and statement of responsibility with their community cloud provider PaaS. Who does the responsibility for stored data integrity in the cloud belong to? A.Cloud provider B.Compliance agency C.Cloud customer D.Shared responsibility

C. Cloud customer

Alex is creating a new set of baseline reports after performing a series of OS and application upgrades on his e-commerce deployment in a public cloud. You are asked to assist in generating the new baselines. What do you employ to accomplish this? A. Databases B. Hypervisor C. Cloud management and monitoring application D. Logging servers

C. Cloud management and monitoring application

Jillian works in the operations center and is tasked with monitoring security operations. What cloud-based GUI can she use for a real-time overview of security operations? A. Puppet automation B. Gemalto system C. Dashboard D. Vendor-based security appliance

C. Dashboard

What is a visual representation of current cloud operations? A. Operational matrix B. Management console C. Dashboard

C. Dashboard

To increase TipoftheHat.com's security posture, Alice is reviewing user accounts that access the community cloud resources. Alice notices that the summer interns have left to go back to school, but their accounts are still active. She knows they will return over the winter break. What would you suggest Alice do with these accounts? A. Do nothing B. Delete the accounts C. Disable the accounts D. Change the resource access definitions E. Modify the confederation settings F. Change the access control

C. Disable the accounts

Mergie is documenting different methods that her remote operations centre can use to access the Perth fleet of servers operating in a community cloud. Which of the following are not viable methods? (Choose two.) A. RDP B. Telnet C. IDSD/IPS D. Terminal server E. DNS F. HTTP

C. IDSD/IPS E. DNS

A new security directive has been issued that requires active preventative measures be taken during an attempted security breach. What system can monitor malicious activity and actively deploy countermeasures to shut down the hacking attempts as they occur? A. DMZ B. IDS C. IPS D. RAID E. HIDS

C. IPS

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy? A. DMZ B. IDS C. IPS D. RAID E. HIDS

C. IPS

Which of the following detects hacking attempts and actively takes countermeasures to shut down the connections? A. DMZ B. IDS C. IPS D. SSH

C. IPS

Jill is performing a Tuesday night backup of a Tier 2 storage volume that she has already completed a full backup of on Sunday night. She only wants to back up files based on changes of the source data since the last backup. What type of backup is she performing? A. Full B. Differential C. Incremental D. Online

C. Incremental

Cloud-based reports can be generated in which formats? Each correct answer represents a complete solution. Choose all that apply. A. GUI B. CLI C. PDF D. JSON E. Excel

C. PDF E. Excel

Melinda is updating her firm's disaster recovery plans, and after receiving direction for his company's board of directors, she has been instructed to create a plan that restores operations within 48 hours of a disaster. What part of the plan should she update with the new requirements? A. RSO B. RPO C. RTO D. DBO

C. RTO

Carl is learning about how cloud service providers allocate physical resources into a group. These resources are then dynamically associated with cloud ser vices as demand requires. What virtual ization technology is this? A. On-demand virtualization B. Dynamic scaling C. Resource pooling D. Elasticity

C. Resource pooling

Which of the following creates a shell or session with a remote system, offers strong authentication methods, and ensures that communications are secure over insecure channels? A. SMTP B. ARP C. SSH D. VPN

C. SSH Secure Shell (SSH) creates a shell or session with a remote system, offers strong authentication methods, and ensures that communications are secure over insecure channels.

Maria has noticed an increase in the response time of the NoSQL application she runs in her IaaS cloud deployment. When comparing current results against her baseline measurements that she recorded when the database was originally deployed, she verified that there has been a steady increase in the number of read requests. You have been asked to evaluate the baseline variances. Where should you focus your troubleshooting efforts? a. Memory b. CPU c. Storage d. Networking

C. Storage

An organization's remote disaster recovery location follows the warm site model. To configure the network switches, routers, and firewalls remotely, Mark will need serial port access from his company's operations center. He has 14 serial ports currently but needs to be prepared for any unplanned expansion requirements during a disaster recovery. Which device would he recommend to implement at the warm site? A. Telnet B. RDP C. Terminal server D. SSH E. IPSec

C. Terminal server

Beatriz stops at her bank's ATM on her way home from work. She inserts her card into the ATM and then enters her PIN on the keypad. What type of authentication is she using? A. User-based B. LDAP C. Two-factor D. SSO

C. Two-factor

Vasile is working a support ticket that shows the connection between the Ames field office and the Kansas City cloud edge location has dropped. She confirms it is a secure Internet-based access solution. What type of connection is this? A. Direct peering B. IDS C. VPN D. AES-256 E. RDP

C. VPN

Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network micro-segmentation deployments. When reading the documentation, Siri notices a link to download a Java-based application to monitor and configure the IPS application. What kind of automation system is this? A. CLI B. GIU C. Vendor-based D. API E.RESTful

C. Vendor-based

Which type of scaling involves replacing an existing server with another that has more capabilities? A. Autoscaling B. Elasticity C. Vertical scaling D. Horizontal scaling

C. Vertical scaling

Martina is troubleshooting a networking problem and needs to capture network frames being sent and received from the server's network adapter. What utility would she use to collect the traces? A. dig B. netstat C. tcpdump D. nslookup

C. tcpdump

A popular e-commerce site is hosting its public-facing front-end web server fleet in a public cloud. You have been tasked with determining what the normal day-to-day web hit count is so that capacity plans for the upcoming holiday selling season can be assessed. You want to track incoming web requests and graph them against delayed and missed connection counts. What type of data set are you producing? A.Metric B.Variance C.Baseline D.Smoothing

C.Baseline

What VM backup method can be used to create a master image to be used as a template to create additional systems? A.Full backup B.Snapshot C.Clone D.Replicate

C.Clone

As a new Cloud+ professional you have been hired by a company that operates its own data centre; however, the company is calling it a cloud. What delivery model are you working with? A. Hybrid B. Public C. Private D. Community

C.Private

Akari is developing a cross-cloud provider migration plan as part of her company's business continuity plan. As she assesses the feasibility of migrating applications from one public cloud provider to another, what does she find is the service model that has the most lock-ins and is the most complex to migrate? A. IaaS B. PaaS C. SaaS D. XaaS

C.SaaS

Dawn is investigating the various cloud service models; she is interested in selecting a community cloud provider that offers a specialized financial reporting application. You are brought in to assist. What type of cloud model would you recommend Dawn investigate to meet her requirements? A. IaaS B. PaaS C. SaaS D. CaaS

C.SaaS

Which backup method is used to create a master copy of an image that can be used as a template to create additional virtual machine? Incremental Cloning Differential Full

Cloning

Which of the following protocols allows remote access to Windows devices? A IPSec B ARP C SFTP D RDP

D RDP

James is troubleshooting a DNS issue and wants to look at DNS frames being sent and received from his network adapter card on a web server. What utility would he use to collect the traces? A tracert B ifconfig C netstat D tcpdump

D tcpdump

Cloud capacity can be measured by comparing current usage to what? A. Benchmarking B. SLA C. SSL D. Baseline

D. Baseline

Which of the following is a text-based interface tool used to configure, manage, and troubleshoot devices? A. GUI B. JSON C. API D. CLI

D. CLI

In an organization, during a recent downtime window, the server team was applying patches to an application, and the networking team was upgrading a router's interface to 10 Gbps. When the network was down for the upgrade, the server team complained that they could not download the needed software patches. Which process should be modified to prevent this from happening in the future? A. Patch management B. Orchestration C. API D. Change management

D. Change management

Niko is generating baseline reports for her quarterly review meeting. She is interested in a public cloud application server's memory utilization. Where does she generate these reports? A. Hypervisor B. Databases C. Logging servers D. Cloud management and monitoring application

D. Cloud management and monitoring applicatio

What type of application commonly uses batch processing? A. NTP B. DNS C. Middleware D. Databases

D. Databases

Which of the following is configured to stop suspicious or unsolicited incoming traffic, but allow incoming traffic sent as a response to requests from internal hosts? A. SSL B. Telnet C. DHCP D. Firewall

D. Firewall

James, a network administrator, wants to detect possible malicious incursions into a network to monitor and audit suspected and known attack signatures and behavior. Which of the following will help him? A. DMZ B. WPAN C. HTTP D. IDS

D. IDS

Perry is investigating options for interconnecting a private cloud to a new public cloud region that supports analysis of customer-streamed IoT data. She is planning on implementing a tunnel across the Internet to interconnect the two locations to avoid the high costs of a dedicated interconnection. What transport protocol would you suggest that can offer a secure connection across the unsecure Internet? A. SOC-3 B. AES C. RC5 D. IPSec

D. IPSec

Perry is investigating options for interconnecting a private cloud to a new public cloud region that supports analysis of customer-streamed IoT data. She is planning on implementing a tunnel across the Internet to interconnect the two locations to avoid the high costs of a dedicated interconnection. What transport protocol would you suggest that can offer a secure connection across the unsecure Internet? A. SOC-3 B. AES C. RC5 D. IPSec

D. IPSec

Your public cloud provider has located an availability zone data center in a large industrial park with no company signage, deployed extensive video cameras around the property, erected tall security fences, and deployed biometrics at the guard shack. What type of security is the cloud provider implementing? A. Tunneling B. Building C. Device D. Infrastructure

D. Infrastructure

Melinda has been tracking the performance metrics on a busy NoSQL database server that has heavy write operations of large files from the second-tier application servers. She is concerned that network utilization is approaching 100 percent of the available network bandwidth. What action should she take that will resolve the problem? A. Implement 802.1Q tagging B. Install a network co-processor ASIC C. Update the network adapter's firmware D. Install a second network adapter

D. Install a second network adapter

A constantly changing six-digit numerical token is used in what type of cloud service? A. XML B. TLS C. SSL D. MFA E. JSON

D. MFA

Where are reports generated in a cloud? A. Logging servers B. Databases C. Hypervisor D. Management and monitoring application

D. Management and monitoring application

Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies? A. RBAC B. Nondiscretionary C. Discretionary

D. Mandatory

Emily inserts her ATM card into the ATM machine and then enters her PIN on the keypad. What type of authentication is she using? A. SSO B. LDAP C. User-based D. Multifactor

D. Multifactor

What does a cloud management system monitor to collect performance metrics? A.Database B. Server C. Hypervisor D. Objects

D. Objects

Bob is accessing a self-service portal in the cloud to instantly create addi- tional servers, storage, and database instances for his firms DevOps group. Which of the options offered best de scribes this operation? A. Bursting B. Pay-as-you-grow C. Multitenancy D. On-demand

D. On-demand

Which of the following defines traffic priorities in the event of network congestion or impairments? A. Jitter B. Packet loss C. Latency D. QoS

D. QoS

Which of the following is an access control method in which access rights are granted to, or restricted from, users based on which roles they perform in an organization? A. Mandatory B. Nondiscretionary C. Discretionary D. RBAC

D. RBAC

Which of the following is a method of providing device communications over IP networks? A. SSO B. PKI C. GRE D. REST

D. REST

Robert is configuring a new cloud interconnect to access his locally hosted Active Directory services. He wants to prevent his user base from having fragmented rights and no unified authorization services. You are brought in as a service consultant to assist in optimizing and controlling user access by implementing a technology that will give access to all allowed systems at the time of user authentication. He is implementing the LDAP protocol to enable this service. What type of system are you deploying? A. Token-based 2FA B. Nondiscretionary C. RSA D. SSO

D. SSO

Sabil works for a company that offers cloud services to the railroad industry. All railroads have a similar set of requirements and access the same applications. BigWest Rail has contacted you about becoming a customer and is asking what applications are shared with other rail operators; they also ask what type of cloud model your company offers. What type of cloud is this? A. Hybrid B. Public C. Private D. Community

D.Community

John is a software developer working on a program that will be cloud compatible and implements a machine-to-machine interconnection coupling two applications in a tiered cloud stack. You have been brought in as a Cloud+ certified consultant to assist on the project. Which of the following software interfaces would you recommend to John? A. XML B. Python C. TLS D. SNMP E. API

E. API

Your company has posted a video on the Internet that has gone viral. Users are complaining about frames pausing and session drops. As your company's cloud support person, what cloud resource should you investigate to remedy the issue? A. RAM B. API C. Storage D. CPU E. Network bandwidth

E. Network bandwidth

Pete has been busy updating the disaster recovery procedures for his client's business continuity plan. The DR facility will need to be ready with floor space, power, and cooling and have loading docks to unload server and equipment racks to restore service. What type of DR implementation is Pete planning on deploying? A.Hot site B.Active/active C.Warm site D.Active/passive E.Cold site F.Rollover

E.Cold site

What type of scaling involves replacing an existing server with another that has more capabilities? A.Horizontal B.Round robin C.Elasticity D.Auto-scale E.Vertical

E.Vertical

In which cloud computing model does the cloud provider takes responsibility up to the operating system level, including all hardware and OS software? a. UCaaS b. PaaS c. DaaS d. CaaS

PaaS

Connie is the chief information officer at a medium-sized accounting firm. During tax preparation season, the internal demand for computing resources rises, and then after the taxes are filed, the computing capacity is no longer needed. She is being asked to create a more efficient and agile solution to her company's operations that maximizes operational expenditures. What servers does the public cloud offer to meet her needs? a. Elasticity b. On-demand computing c. Availability zones d. Resiliency virtualization e. Pay-as-you grow f. Resource pooling

a Elasticity b On-demand computing e Pay-as-you grow

What are common management interfaces that are used to migrate and manage cloud-based resources? a. API b. PaaS c. CLI d. Web console e. SNMP

a. API c. CLI d. Web console

Christina is configuring her public cloud object storage bucket for granular access from a new Linux VM. She wants to set the permissions on the storage system. What would you recommend? a. Access control list authorization b. SSO c. Permission-based e. Federations

a. Access control list authorization

An organization's IT department wants to know what its normal day-to-day web hit count is so it can plan for the upcoming holiday selling season. Jim's job is to measure the incoming web requests and graph them against delay and missed connection counts. What type of data set is Jim producing? a. Baseline b. SOC 2 c. Benchmarking d. SLA

a. Baseline

What is the term associated with using a second cloud to accommodate peak loads? a. Bursting b. Vertical-scaling c. Auto-scaling d. Elasticity

a. Bursting

What are common automation systems that are used for patch management? Each correct answer represents a complete solution. Choose three. a. Chef b. Gov Cloud c. Ansible d. Rackspace e. Puppet

a. Chef c. Ansible e. Puppet

Which of the following is an application deployment model in which an application runs in a private cloud or data center and moves into a public cloud when the demand for computing capacity spikes? a. Cloud bursting b. Cloud automation c. Multitenancy d. Resiliency Cloud bursting

a. Cloud bursting

Matt is preparing for an upcoming promotion his company is offering during a major soccer game. He needs to determine his options to add capacity to his company's web server farm so it can handle the anticipated additional workload. You are brought in to consult with him on his options. What do you recommend as possible solutions? Each correct answer represents a complete solution. Choose all that apply. a. Cloud bursting b. Trigger c. Vertical scaling d. Horizontal scaling e. Variance

a. Cloud bursting c. Vertical scaling d. Horizontal scaling

A national tax preparation firm is accessing industry-specific productivity applications in the cloud; many other tax preparation companies are also subscribing to the same service. Which model of cloud are they accessing? a. Community b. Private c. Public d. Hybrid

a. Community

Which of the following are common troubleshooting steps? Choose all that apply. a. Creat a plan of action b. Research c. Distill the issue d. Gather information e. Test and verify

a. Creat a plan of action b. Research c. Distill the issue d. Gather information e. Test and verify

During a disaster recovery switchover, which network services may need to be modified as part of a multisite failover to the backup site? Each correct answer represents a complete solution. Choose all that apply. a. DNS b. DHCP c. SSH d. FTP e. IPSec

a. DNS b. DHCP d. FTP

Which of the following is a virtual PC desktop that is hosted in the cloud and accessed remotely by thin clients? a. DaaS b. VPN c. NIDS d. CaaS

a. DaaS

Which of the following is the ability to automatically and dynamically add additional resources such as storage, CPUs, memory, and servers in the cloud? b. Trigger c. Autoscaling d. Variance

a. Elasticity

Databases capacity can be added by scaling horizontally. a. False b. True

a. False

Jarleen is a consultant tasked with migrating Health Med Records Inc. customer records to a cloud-based service offering a long-term archival system. Which U.S. compliance mandate must her company align with? a. HIPAA b. SOC 3 c. ISA 2701 d. MPAA

a. HIPAA

Johanna has been hired as an outside consultant to manage a migration of customer medical records to a cloud-based service offering long-term archival requirements. Which US compliance mandate should her company follow? a. HIPAA b. MPAA c. ISA 2701 d. SOC 3

a. HIPAA

Carl is planning for a large advertising campaign his company will unveil. He is concerned that his current e-commerce server farm hosted in a public cloud will be overwhelmed and suffer performance problems. He is researching options to dynamically add capacity to the web server farm to handle the anticipated additional workload. You are brought in to consult with him on his options. What can you recommend as possible solutions? Each correct answer represents a complete solution. Choose three. a. Horizontal scaling b. Vertical scaling c. Core elasticity d. Cloud bursting e. Edge cache

a. Horizontal scaling b. Vertical scaling d. Cloud bursting

Sharon has been directed to put together a disaster recovery plan based on directives from her company's executive management team. The company's core business is operating an e-commerce website selling winter apparel with 85 percent of its revenue received during the holiday season. If there was a prolonged outage, it would put the company's ability to continue as a financially viable operation in peril. Sharon has been instructed to create a plan that will restore operations in the shortest amount of time possible. Which disaster recovery model should she implement? a. Hot site b. Cold site c. Alternate site d. Warm site

a. Hot site

Pete is troubleshooting a SQL database hosted in a public cloud using the IaaS service model. The database vendor has identified a bug in the table merge feature and is requesting that he install a software change that is designed for rapid deployment that corrects a specific and critical issue. What type of fix is this? a. Hotfix b. Patch c. Version Update d. Rollout Hotfix

a. Hotfix

Which of the following software update types fixes an immediate and specific problem with a quick release procedure? a. Hotfix b. Patch c. Version update d. Rollback

a. Hotfix

Which of the following cloud computing services enables a consumer to outsource computing equipment purchases and running their own data center? a. IaaS b. SaaS c. Idaas d. Naas

a. IaaS

John requires a data center full of the needed computing gear to support his company's operations where all computing is owned and operated by a single corporate entity. Which of the following computing types will accomplish John's requirement. a. In-house computing b. Cloud computing c. Virtualized computing d. Client-server computing

a. In-house computing

Roman is the cloud administrator for a company that stores object-based data in a hybrid cloud. Because of the sensitivity of the data and various regulatory restrictions on allowing users access to sensitive security data, what type of access control would meet his security policies? b. Multifactor c. Roles d. Nondiscretionary

a. Mandatory access control

What are examples of cloud element and object? Each correct answer represents a complete solution. Choose three. a. Memory b. Storage c. Scalability d. SSH e. CPU f. Resource groups

a. Memory b. Storage e. CPU

Your customer is asking about strengthening their authentication security by implementing a system that requires each user who logs into the system to present something you know and something you possess. What is this type of authentication called? a. Multifactor B. Active Directory/LDAP c. Kerberos d. Single sign-on

a. Multifactor

Jennifer is writing a change management plan to increase the processing abilities of one of her middleware servers. Which of the following components can she upgrade to increase server performance? Each correct answer represents a complete solution. Choose all that apply. a. Network I/O b. DNS c. CPU d. SLA e. RAM

a. Network I/O c. CPU e. RAM

Which of the following cloud components include traditional switching and routing as well as services such as load balancing, DNS, DHCP, and virtual private networks? a. Networking b. Automation c. Computing d. Storage e. Virtualization

a. Networking

Storage that does not survive a virtual machine removal is referred to as what classification? Each correct answer represents a complete solution. Choose all that apply. a. Nondurable b. Ephemeral c. Private d. Public

a. Nondurable b. Ephemeral

Which service allows the cloud customer to access a self-service portal and instantly create additional servers, storage, processing power, or any other services as required? a. On-demand b. Resiliency virtualization c. Vulnerability scanning d. Resource pooling

a. On-demand

Jane is a Cloud+ architect working on a physical-to-virtual migration to the public cloud. She has matched VM performance levels to her established baselines. She knows that her organization may need to adjust hardware resources in the future. What cloud characteristics can she use to match cloud capacity with future growth? Each correct answer represents a complete solution. Choose three. a. On-demand computing b. Availability zones c. Resiliency virtualization d. Pay-as-you grow e. Elasticity

a. On-demand computing d. Pay-as-you grow e. Elasticity

Scott is planning his company's upload of stored data to the cloud. What are the common storage migration types? a. Online b. Block to object c. Physical to virtual d. Asynchronous e. Synchronous f. Offline

a. Online f. Offline

When performing a migration from your on-site private cloud to a new community cloud data center, which of the following are project management pre-migrations action items? Each correct answer represents a complete solution. Choose all that apply. a. Online migration bandwidth b. Benchmark compatibility c. VM file format d. RAID array durability rating

a. Online migration bandwidth c. VM file format

Which system do the cloud providers implement for rapid deployment of customer-requested services? a. Orchestration b. RDMS c. Service catalogs d. On-demand provisions

a. Orchestration

Margo is reviewing the maintenance responsibilities between her company and its public cloud service provider. She notices that the cloud provider takes responsibility for the operating system, and her company assumes responsibility for all applications and services running on the operating system. What type of service model is she operating under? a. PaaS b. IaaS c. XaaS d. SaaS

a. PaaS

Which of the following enables you to rent a fully configured system that is set up for a specific purpose? a. PaaS b. VPN c. VDI d. IDS

a. PaaS

Which type of software change is designed to address a known bug or issue and to bring a system up-to-date with previous bug fixes? a. Patch b. Version update c. Rollout d. Hotfix

a. Patch

Carl is documenting his employer's cloud deployment needs to label the cloud delivery model which is used by a single organization. As a Cloud+ consultant, what would you suggest he name his internal cloud? a. Private b. Community c. Hybrid d. Public

a. Private

Who is responsible for host-based intrusion detection and prevention systems for PaaS and SaaS? a. Provider b. Automation vendor c. DevOps d. Customer

a. Provider

Kevin is exploring a durable block storage option that offers high utilization rates. It also needs to support striping that allows a parity bit to be used to reconstruct a volume if a single magnetic disk fails in his array. Which storage type stripes file data and performs a parity check of data over multiple disks that can recover from a single hard disk failure? a. RAID 5 b. RAID 0 c. RAID 1 d. RAID 3

a. RAID 5

Which storage type stripes file data and performs a parity check of data over multiple disks that can recover from a hard disk failure? a. RAID 5 b. RAID 1+0 c. RAID 1 d. RAID 0

a. RAID 5

Your company can only afford to lose a maximum of the last 30 minutes of data in the event of a disaster. What section of the corporate business continuity and disaster recovery plan addresses this issue? a. RPO b. RSO c. DBO d. RTO

a. RPO

Which of the following are the measurements for the amount of data lost and the time needed to get back online after an outage? Each correct answer represents a complete solution. Choose all that apply. a. RPO b. RTO c. SLA d. MTTR

a. RPO b. RTO

Jonathan is architecting his client's global public cloud presence for an upcoming e-commerce deployment. You have been brought on to help design the network; he asks about providing local connections in Singapore and Malaysia. What would you suggest he investigate? a. Regions b. Global DNS affinity c. Availability zones d. Auto-scaling groups

a. Regions

To meet regulatory requirements, your company must provide geographical separation between active and backup data of certain medical records your company collects and processes in Germany. The requirements stipulate that the data cannot leave the country and must be in two or more data centers. As the cloud professional for your company, what recommendations would you offer to meet these requirements? a. Remote b. Full c. Local d. Incremental

a. Remote

William is implementing an access control rollout for a cluster of Windows SQL database servers in a hybrid cloud environment. He has defined the required tasks and then puts users, groups, and servers into this task-based implementation. What type of access control should William deploy? a. Roles b. Nondiscretionary c. Mandatory access control d. Multifactor

a. Roles

You have been asked to update your entire fleet of Internet-facing web servers to remediate a critical bug. Your supervisor has agreed to operate under reduced computing capacity during the process but stipulates that there can be no downtime. Which upgrade approach should you recommend to meet these requirements? a. Rolling b. Blue-green c. Hotfix d. Patch

a. Rolling

Which of the following outlines specific metrics and the minimum performance that is offered by the cloud provider? a. SLA b. SSL c. Baseline d. Benchmarking

a. SLA

What is a report for the public disclosure of financial controls and security reporting that does not contain sensitive and technical information called? a. SOC 3 b. FISMA c. SOC 1 d. SOC 2

a. SOC 3

Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent network analyzers from being able to read data in flight. Which of the following are considered as secure network protocols? Each correct answer represents a complete solution. Choose all that apply. a. SSH b. DNS c. HTTPS d. DHCP e. SHHTP f. FTPS g. SMTP

a. SSH c. HTTPS f. FTPS

Which HTTP security implementation is used in e-commerce web servers? a. SSL b. IPSec c. ARP d. 3DES

a. SSL Secure sockets layer (SSL) makes up a protocol group that operates on top of TCP to provide an encrypted session between the client and the server. It is commonly seen on websites implemented as the Hypertext Transport Protocol Secure (HTTPS) protocol.

Linda works in the IT security group of her firm and has been tasked to investigate options that will allow customers to securely access their personal records stored on the cloud deployment accessed via tablets. What is the most common in-flight e-commerce security posture in the market? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. a. SSL/TLS b. IPsec c. VPN d. MD5 A. SSL/TLS

a. SSL/TLS SSL/TLS security is the most common remote access encryption technology and is commonly used in browsers and smartphone applications. MD5 is a hash algorithm, and IPsec is a security framework; they do not apply to the question. VPNs are not as common as SSL/TLS for the scenario given.

Which backup method creates a file-based image of the current state of a VM including the complete operating system and all applications that are stored on it? a. Snapshot b. Incremental c. Full d. Differential

a. Snapshot

Which of the following is a file-based image of the current state of a virtual machine? a. Snapshot b. Ghosting d. Cloning e. Template

a. Snapshot

A well-architected framework includes which of the following cloud performance components? Each correct answer represents a complete solution. Choose all that apply. a. Storage I/O operations per second b. Swap file utilization c. Memory pools d. Scalability e. Network latency f. Encryption g. Inter-availability zone latency

a. Storage I/O operations per second b. Swap file utilization d. Scalability e. Network latency

Which of the following allows you to store current data at a remote location from the primary data center that can be brought online with a short recovery time and limited loss of data? a. Synchronous replication b. Asynchronous replication c. Volume sync d. Remote mirroring

a. Synchronous replication

VMs running on a hypervisor consume which of the following resources? Each correct answer represents a complete solution. Choose all that apply. a. Virtual CPUs b. SaaS c. Virtual RAM d. Bare-metal cores e. Memory pools f. RAID

a. Virtual CPUs c. Virtual RAM e. Memory pools

Which of the following are examples of vertical scaling? Each correct answer represents a complete solution. Choose all that apply. a. adding memory to host b. Adding more disks c. Increasing number of servers d. adding more cpu cores

a. adding memory to host b. Adding more disks d. adding more cpu cores

Carl is planning for a large advertising campaign his company will unveil. He is concerned that his current e-commerce server farm hosted in a public cloud will be overwhelmed and suffer performance problems. He is researching options to dynamically add capacity to the web server farm to handle the anticipated additional workload. You are brought in to consult with him on his options. What can you recommend as possible solutions? Each correct answer represents a complete solution. Choose three. a. vertical scaling b. horizontal scaling c. edge cache d. Cloud bursting e. Core elasticity

a. vertical scaling b. horizontal scaling d. Cloud bursting

Data replication is often used to store copies of real-time data in remote zones. When there is a need to have the master data immediately updated, and then on the backend, update the remote zones. What type of replication would you recommend to configure? a. Synchronous b. ASynchronous c. Site mirroring d. RTO

b. ASynchronous

To meet regulatory requirements, a medical records company is required to store customer transaction records for seven years. The records will most likely never be accessed after the second year and can be stored offline to reduce expenses. What type of storage should they implement to achieve the goal? a. Replication b. Archive c. File transfer d. Data store

b. Archive

Ahmed is a cloud+ professional re searching data replication options for his MySQL database. For redundancy rea sons, he decided to create a backup replica in a different availability zone that could become master should the prima- ry zone go offline. For performance rea- sons, he has decided to update the repli- ca in near real time after the initial write operation on the primary database. What type of solution is this? a. Synchronous b. Asynchronous c. Volume sync d. Remotemirroring

b. Asynchronous

What is the process of determining the identity of a client usually by a login process? a. Federation b. Authentication c. Accounting d. Authorization e. Identity access

b. Authentication

The DevOps team is requesting read/write access to a storage bucket in the public cloud that is located in a backup region. What kind of services are they requesting? a. Federation b. Authorization c. Authentication d. SSO

b. Authorization

Upgrading to a newer operating system may require that you update what? a. SOC 2 b. Baseline c. Benchmarking d. SLA

b. Baseline

Storage area networks support which type of storage? (Choose the best answer.) a. File b. Block c. Object d. Meta

b. Block

Which of the following methodology uses two configurations for production that are identical to each other with one being active and the other being inactive? A. Cluster b. Blue-green C. Rolling D. Hotfix

b. Blue-green

Your employer has developed a mission-critical application for the medical industry, and there can be no downtime during maintenance. You have designed a web architecture to take this into account and that allows you to have an exact copy of your production fleet that can be brought online to replace your existing deployment for patching and maintenance. What type of model did you implement? a. Rolling b. Blue-green c. DevOps d. Cluster

b. Blue-green

Which of the following creates an identical copy of the data that may be a storage volume, a filesystem, or the logical unit number (LUN) on a storage area network (SAN)? a. Full backup b. Cloning c. Snapshot d. Replicate

b. Cloning

Which is a compliance requirement to be certified to meet the U.S. Department of Defense security requirements for contractors working with the U.S. Department of Defense? a. FISMA b. DIACAP c. FedRAMP d. 123

b. DIACAP

Which of the following networks is used in the creation and testing of new cloud-based services? a. Production b. Development c. Quality assurance d. Converged

b. Development

As a security administrator of an enterprise data center, you need to check the operating systems that are being used in the company. You find one of the operating systems originally loads with unneeded services such as printing, various networking services such as DHCP, and an FTP server enabled. These services might expose the operating system to potential malicious activity. What will you do to harden the operating system? a. Remove the services that are not in use. b. Disable the services that are not in use. c. Install antivirus. d. Implement host-based firewall security.

b. Disable the services that are not in use.

What are critical steps that must be taken prior to performing a migration to the cloud? Each correct answer represents a complete solution. Choose all that apply. a. Variance measurements b. Documentation c. Automation rollout d. Baselines e. Capacity requirements

b. Documentation d. Baselines e. Capacity requirements

Derek is monitoring storage volume utilization and is preparing a company change request to add storage capacity. He has decided to automate the volume allocation size. What cloud feature can he take advantage of? a. OpenStack b. Elasticity c. API d. SaaS

b. Elasticity

Which of the following is the means by which a person's electronic identity and attributes are linked across multiple distinct identity management systems? a. Public key infrastructure b. Federation c. Obfuscation d. Multifactor authentication federation

b. Federation

Which of the following backup sites has all the equipment necessary for a business to resume regular activities? a. Disaster site b. Hot Site c. Cold site d. Warm site

b. Hot Site

James is preparing a disaster recovery test drill in advance of the upcoming hurricane season along the Gulf of Mexico. He is planning to create a DR location in the Midwest and have a database server running at that location with a synchronously refreshed data replica. His DR plan calls for activating all other services in the event of a hurricane causing an outage at his primary data center. What model is Hank going to deploy to meet his requirements? a. Cold site b. Hot site c. Warm site d. Alternate site

b. Hot site

When monitoring performance metrics on one of your servers, you notice that the server is utilizing 100 percent of the network bandwidth available to it. What modification could you make to the server that will most likely address the problem? a. Add memory to the system b. Install a second network adapter c. Update the network adapter's firmware d. Install a second processor

b. Install a second network adapter

Which of the following low-level security methods do the cloud provider use on their storage area network and storage head-end controllers? Each correct answer represents a complete solution. Choose two. a. ACL b. LUN masking c. PKI d. VSAN

b. LUN masking d. VSAN

Which of the following is a piece of software that is intended to update an application, operating system, or any other software-based system to fix or improve its operations? a. Rollout b. PAtch c. Hotfix d. Version Update

b. PAtch

Which of the following cloud service models enables a consumer to rent fully configured systems that are set up for specific purposes? a. NaaS b. PaaS c. CaaS d. DaaS

b. PaaS

Which of the following enables consumers to rent fully configured systems that are set up for specific purposes? a. DaaS b. PaaS c. SAN d. CaaS

b. PaaS

You are installing a software update that is designed to address a known bug and to bring a system up-to-date with previously released fixes. What type of remediation is this? a. Version update b. Patch c. Hotfix d. Rollout

b. Patch

Which cloud characteristic allows you to pay for only the services used? a. Chargeback b. Pay-as-you-grow c. Bursting d. Metering

b. Pay-as-you-grow

What are common automation systems that are used for patch management? Each correct answer represents a complete solution. Choose three. a. Cloud Deploy b. Puppet c. DevOps d. Ansible e. Cloud-patch f. Chef

b. Puppet d. Ansible f. Chef

The applications development team has created a new patch that is being validated prior to posting the fix on your website's support page. However, before the release, the DevOps manager is requesting a report that shows the pass/fail data to verify that the fix does, in fact, resolve the problem. What process is he verifying? a. Rollout b. QA c. Automation d. Orchestration

b. QA

You, as an administrator, informed company employees that one of the applications can be down for not more than 48 hours. Which of the following have you defined? a. DBO b. RTO c. RPO d. RSO

b. RTO

Your IaaS cloud company has announced that there will be a brief outage for regularly scheduled maintenance over the weekend to apply a critical hotfix to vital infrastructure. What are the systems they may be applying patches to? Each correct answer represents a complete solution. Choose all that apply. a. E-mail server b. Router c. NoSQL database d. Hypervisor e. Load balancer f. VM

b. Router d. Hypervisor e. Load balancer

Zale is working on a collaborative project that requires the implementation of a large-scale NoSQL database that will access three petabytes of historical data. He needs durable block storage in remote flash arrays. You have been tasked to design the storage connectivity from the database to the stored data. What type of network connection would you recommend for NoSQL read/write access to the arrays? a. Block access b. SAN c. VMFS d. Zoning

b. SAN

Jennifer is reviewing a document from her secondary community cloud provider. What is the document that outlines specific metrics and the minimum performance that is offered by the cloud provider? a. SSL b. SLA c. Benchmarking d. Baseline

b. SLA

Which of the following regulatory requirements concerns a business's nonfinancial reporting controls for the availability, confidentiality, privacy, processing integrity, and security of a system? a. SOC 1 b. SOC 2 c. SOC 3 d. ISO 27001 SOC 2

b. SOC 2

Brad has been tasked with encrypting data in flight into his e-commerce presence in a community cloud. He is investigating a standards-based secure solution that web customers can easily implement to ensure secure transactions. What is a good solution that you would recommend to Brad? a. 3DES b. SSL c. IPSec d. ARP

b. SSL

Allison is working on her company's new e-commerce rollout at a large public cloud provider. She wants to secure all web traffic between the client and her site when a user proceeds to checkout and places orders. What security protocol would she be implementing? a. MD5 b. SSL/TLS c. IPsec d. VPN

b. SSL/TLS

Randall is investigating the various cloud service models. His primary needs require the service offered by a community cloud provider that offers a specialized retail sales reporting application. The application is owned and operated by the provider, and he pays only for what his company uses. What service type of cloud is this? a. PaaS b. SaaS c. CaaS d. IaaS

b. SaaS

A company is undertaking a large project to migrate all accounting operations to a hybrid cloud model. You are being asked about firewall and DDoS security requirements in the Dallas region of the cloud. What document should you create to define your company's requirements for this deployment? a. DIACAP b. Security policy c. Service level agreement d. SOC-2

b. Security policy

Which document outlines your company's responsibilities to securely deploy your fleet of servers in the public cloud? a. SLA b. Security policy c. Baseline d. SOC 2

b. Security policy

Cloud operations are the responsibility of both your organization and the cloud service provider. Which model defines what you are responsible for and the responsibility of the provider? a. Community b. Shared responsibility c. Baselines d. Availability zones

b. Shared responsibility

Cheryl is preparing to perform a major upgrade on a critical virtual machine. She wants to have a back-out plan if the upgrade validation fails. What virtual machine backup method creates a file-based image of the current state of a VM including the complete operating system and all applications that are stored on it that she can use to restore the VM if the testing of the upgrade fails? a. Full backup b. Snapshot c. Clone d. Replicate snapshot

b. Snapshot

Which of the following is the process of replicating data in real time from the primary storage system to a remote facility? a. Asynchronous b. Synchronous c. RTO d. Site mirroring

b. Synchronous

Which system was developed to address the different types of storage needs a cloud consumer may require for availability, response times, backups, and economics? a. Multipathing b. Tiering c. Policies d. RAID

b. Tiering

A bank's ATM machine is an example of what type of authentication? a. LDAP b. Two-factor c. SSO d. User based

b. Two-factor

What is the name of the process when a cloud administrator uses his token, username, and password to log into the cloud console? a. Role-based access b. Two-factor authentication c. Authorization

b. Two-factor authentication

Samantha has been monitoring her cloud web server dashboard and notices that the CPU utilization on her company's database servers has been consistently at more than 80 percent utilization. She checked her baselines and reported that 57 percent utilization is normal. What is she noticing? a. MTTR b. Variance c. Trigger d. Elasticity

b. Variance

A MySQL database backend application operates on a multi-CPU instance that is nearing 100 percent utilization. However, the database can run on only a single server. What options are available to support the requirements of this database? a. Horizontal scaling b. Vertical scaling c. Pooling d. Bursting

b. Vertical scaling

Janice manages the MySQL database back end that runs on a multi-CPU instance that has reached 100 percent utilization. The database can run on only a single server. What options does she have to support the requirements of this database? a. horizontal scaling b. Vertical scaling c. Pooling d. Bursting

b. Vertical scaling

Which cloud delivery model is used by a single organization? a. Hybrid b. Public c. Private d. Community

c Private

Which of the following delivers cloud-managed applications as well as the underlying platform and infrastructure support? a. SAN b. DaaS c. Saas d. CaaS

c Saas

A new federal regulation has been released that requires stringent new encryption requirements for data at rest. You are investigating different types of data security protection technologies. What is the best encryption option for this requirement? a. 3DES b. Rivest Cipher 5 c. AES-256 d. RSA

c. AES-256

Fluentes is a security consultant for a day trading company that must implement strong encryption of data at rest for their cloud storage tiers. What is the best option that meets most security regulations for the encryption of stored data? a. 3DES b. RSA c. AES-256 d. Rivest Cipher 5

c. AES-256

Tim just logged into his cloud management dashboard to check the health monitors of his server fleet. What is the process he completed at login? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. a. Identity access b. Federation c. Authentication d. Accounting e. Authorization

c. Authentication

When logging into the management console of her public cloud privider, what requirement does Marie first fulfill to identify herself? a. Identity access b. Federation c. Authentication d. Accounting e. Authorization

c. Authentication

You have designed a web architecture that allows you to have an exact copy of your production fleet that can be brought online to replace your existing deployment for patching and maintenance. What type of model did you implement? a. Cluster b. DevOps c. Blue-green d. Rolling

c. Blue-green

Allison is preparing to modify a network access control list and add three firewall rules to her private cloud HR systems. She is planning on submitting a detailed plan to accomplish these tasks. Which process is Allison following? a. MTSR b. Patch management c. Change management d. Trigger

c. Change management

Jennifer plans to modify a firewall access control list to allow RDP connections from a new remote office into her private cloud data center. She is creating a document that details all the steps required to implement the new rule set. What process is she following? a. Cloud automation b. Change advisory c. Change management d. Rollout

c. Change management

Ann has created a master image of a web server that she plans to use for adding new servers for her horizontally scaled e-commerce site. What VM backup method can be used to create an image to be used as a template to create additional systems? a. Full backup b. Snapshot c. Clone d. Replicate

c. Clone

Jennifer has been pinging a new web server by its URL and getting strange and seemingly unexplainable responses from unrecognized systems. She recalls that the new web farm is on a reclaimed subnet that was no longer in use in their cloud server fleet. What would you recommend she investigate to resolve the issue? a. NAT b. IPSec c. DNS d. DHCP

c. DNS

Which of the following is a hierarchical scheme of databases that map computer names to their associated IP addresses? a. NAT b. DHCP c. DNS d. IPSec

c. DNS

Several troubleshooters are about to work on the same problem. Which of the following troubleshooting methods would be most appropriate to make the best use of the troubleshooter's time? a. Top-down b. Bottom-up c. Divide and Conquer d. Validation

c. Divide and Conqure

The ability to dynamically add virtual machine compute resources on demand such as storage, CPUs, and memory is referred to as what? a. Bursting b. Pooling c. Elasticity d. Orchestration

c. Elasticity

What is the National Institute of Standards and Technology publication that coordinates the requirements and standards for cryptography modules? a. FISMA b. FedRAMP c. FIPS 140-2 d. PCI-DSS

c. FIPS 140-2

To secure a data center interconnect between your company's Sydney and Berlin regions, you are being asked what a common solution is that allows interoperability between the various vendors' firewalls and routers in each region. What is a good solution for securing interconnects over the Internet and between dissimilar hardware and software security devices? a. AES b. SOC-3 c. IPSec d. RC5

c. IPSec

Which cloud computing service enables a consumer to outsource computing equipment purchases and running their own data center? a. NaaS b. CaaS c. IaaS d. DaaS

c. IaaS

Which type of backup operation is based on the change of the source data since the last backup was performed? a. Full b. Local c. Incremental d. Differential

c. Incremental

Which of the following only monitors the network and report security issues? a. Intrusion prevention system b. Firewall c. Intrusion detection system d. CloudShield

c. Intrusion detection system

Donald has been tasked by the IT security group in his company to prevent dictionary login attacks to the company's VMs running in a private cloud at a remote data center. You have been brought in to offer him advice to deter the random but steady login attacks. What would you recommend be enabled to help prevent this type of cyber-attack? a. Autoscaling b. Variance c. Lockout d. Trigger

c. Lockout

You have been asked by a new customer what type of authentication systems require something you have and also something you know. What type of authentication technology would you recommend? a. Confederations b. Active Directory/LDAP c. Multifactor d. Single sign-on

c. Multifactor

James has allowed access to a development server for certain hours of the day, granting another user complete control over a server fleet or storage system for administrative purposes. What type of access control is this? a. Role-Based Access Control b. Discretionary Access Control c. Nondiscretionary Access Control d. Mandatory Access Control

c. Nondiscretionary Access Control

Which of the following is a hosting service that is located remotely from a company's data center? a. Measured service b. Resource pooling c. Off-premise d. On-demand

c. Off-premise

Which cloud characteristic allows you to access a self-service portal to instantly create additional servers, storage, or other services? a. Pay-as-you-grow b. Bursting c. On-demand d. Multitenancy

c. On-demand

Which type of backup system is intended to provide quick restore access if needed? a. VSAN b. Replica c. Online d. FCOE

c. Online

Liza is reviewing the maintenance responsibilities between her company and its public cloud service provider. She notices that the cloud provider takes responsibility for the operating system, and she needs to assume responsibility for any applications or services running on the operating system. What type of service model is she operating under? a. CaaS b. SaaS c. PaaS d. IaaS

c. PaaS

Jennifer is planning on implementing physical disk redundancy on her SQL database in the public cloud. She is creating specifications for her virtual machine image that will become the template for the database servers. What disk redundancy option could she implement to meet the needs of a SQL deployment? a. NAT b. RBAC c. RAID d. SSO

c. RAID

James has been directed by his employer's finance department that they cannot afford to lose any more than 30 minutes of data in the case of a database failure or other catastrophic event. James has updated his corporate business continuity plan and has had his cloud provider update its SLA. What was the metric that was changed? a. SLA b. RTO c. RPO d. MTTR

c. RPO

Mark has been reviewing disaster recovery planning, and after receiving direction from his company's board of directors, it has been determined that they can only withstand a maximum of 36 hours of downtime. Mark is updating his DR plan with this new metric. What part of the plan should he modify? a. SLA b. RPO c. RTO d. MTTR

c. RTO

Cloud service providers will often segment their operations to allow for resiliency, survivability, and geographic proximity. What are these geographical segmentations referred to as? a. Availability zones b. Autoscaling groups c. Regions d. Global DNS affinity

c. Regions

A cloud service provider allocates resources into a group. These resources are then dynamically allocated and reallocated as the demand requires. What is this referred to as? a. Measured service b. On-demand c. Resource pooling d. Off-premise

c. Resource pooling

Jerry is learning about cloud storage systems and she is interested in learning about high-speed network storage solutions. What would you recommend she focus her research on? a. NAT b. RBAC c. SAN d. SSO

c. SAN

Which of the following outlines specific metrics and the minimum performance or availability level and outlines the penalties for failing to meet the metrics? a. QOS b. RDP c. SLA d. VPC

c. SLA

Art plans to implement a site backup plan for his company's inventory control database. To ensure a low RTO, he has decided to contract with multiple public cloud providers to back up each other. He is reviewing the service models as he prepares his migration plans. Which service model has the most lock-ins and is the most complex to migrate? a. IaaS b. PaaS c. SaaS d. XaaS

c. SaaS

Which of the following is not a valid pooled resource? a. CPU b. Networking c. Security d. Storage e. Memory

c. Security

A cloud customer web server dashboard shows that CPU utilization on a database server has been consistently at more than 80 percent utilization. The baselines show that 57 percent utilization is normal. What is this called? a. Baseline imbalance b. Triggers c. Variance d. Deviation

c. Variance

Mindy has a SQL database backend that runs on a multi-CPU instance that has reached 100 percent utilization. The database supports a single server. What options does she have to support the requirements of this database? a. Elasticity b. Autoscaling c. Vertical scaling d. Horizontal scaling

c. Vertical scaling

Which deployment system offers a structured process for a series of actions that should be taken in order to complete a process? a. NTP b. API c. Workflow d. Orchestration

c. Workflow

Which of the following is the process of diagnosing the cause of an imparimnt and resolving the issue? a. authentication b. single sign-on c. troubleshooting d. authorization

c. troubleshooting

What type of cloud data set measures object metrics to determine normal operations? a. Variance b. Metric c. Smoothing d. Baseline

d. Baseline

Which of the following is used in capacity planning to determine whether additional cloud capacity is required based on usage and consumption information collected over time? a. Smoothing b. Automation c. Variance d. Baseline

d. Baseline

Martha is studying SAN technologies that use the Fibre Channel protocol and is asking about disk configuration in the remote storage array. She asks you which type of storage she can use on her Linux servers. What storage type can she deploy? (Choose the best answer.) a. File b. Meta c. Object d. Block

d. Block

After upgrading an accounting application in your IaaS fleet of servers, you notice that the newly installed features in the upgrade dramatically increase the local processing requirements for the servers. What virtual resource can be increased to account for the new application's added requirements? a. DMA b. BIOS c. IPSec d. CPU e. I/O

d. CPU

Ethel is the network architect for a hybrid cloud operation and has interconnected her private cloud to a community cloud in another province. She is investigating using the community cloud to supplement her private cloud operations during end-of-month processing. What operation is she going to perform? a. Autoscaling b. Elasticity c. Horizontal scaling d. Cloud bursting

d. Cloud bursting

Jeff has been reviewing his company's SLA and statement of responsibilities with their public cloud provider's IaaS offerings. In this model, who would be responsible for the integrity of data stored in the cloud? a. Compliance agency b. Cloud provider c. Shared responsibility d. Cloud customer

d. Cloud customer

Which of the following disaster recovery sites doesn't have any resources or equipment except for elevated floors and air conditioning? a. Hot site b. Warm site c. Alternative site d. Cold site

d. Cold site

Which identity system allows multiple organizations to use the same data for identification when accessing the networks or resources of everyone in the group? a. Single sign-on b. Authorization manager c. LDAP d. Federation

d. Federation

Which of the following is a composition of two or more clouds that are unique entities but are bound together and provide the benefits of multiple deployment models? a. Private b. Community c. Public d. Hybrid

d. Hybrid

Your company has decided to interconnect its cloud services with three different service providers. What type of cloud delivery model is it creating? a. Private b. Community c. Public d. Hybrid

d. Hybrid

Charles is a solutions architect who has been hired to assist a company in migrating to a public cloud provider. When investigating a highly customized application server, he finds that the standard Linux image has been modified and is not a standard distribution. What type of cloud service model could he use to host this machine image? a. CaaS b. SaaS c. PaaS d. IaaS

d. IaaS

Which of the following is a copy of complete hard drive volumes? a. File Backup b. Full Backup c. Clone d. Image Backup

d. Image Backup

Matts performs a backup on a nightly basis, which captures the changes that were made since the previous backup was run the night before. As a result, only the changes in the past 24 hours are stored on the backup media. What type of backup is Matts using? a. Differential b. Full c. Online d. Incremental

d. Incremental

Mary is a Cloud+ certified security consultant for her company. She is researching enhanced security access systems. What could she suggest that requires something you have and something you know? a. IDS b. Mutual c. Single sign-on d. Multifactor

d. Multifactor

What is the process of complicating the ability to read stored data? a. Cipher b. Symmetrical c. PKI d. Obfuscation

d. Obfuscation

Judy is migrating a Linux OS from running on a dual-slot, eight-core server in a private cloud to a VMware-based server in the public cloud, what type of migration would she perform? a. V2V b. P2P c. V2P d. P2V

d. P2V

A new application patch is being validated prior to release to the public. The developers have a release candidate, and the DevOps manager is requesting a report that shows the pass/fail data to verify that the fix does, in fact, resolve the problem. What process is he verifying? a. Automation b. Orchestration c. Rollout

d. QA

Which of the following is the maximum acceptable amount of data loss allowed measured in time? a. MTBF b. RTO c. MTTR d. RPO

d. RPO

For disaster recovery purposes, a medical transcription firm is transferring and synchronizing data between multiple data centers. What disaster recovery process is the company following? a. File transfer b. Data store c. Archive d. Replication

d. Replication

A fleet of 20 load-balanced Internet-facing e-commerce web servers need to be upgraded to remediate a critical bug in the web application. Your company cannot afford to be offline during the update. What is the upgrade type that allows you to fix the bug and remain online during the process? a. Blue-green b. Orchestration d. Rolling e. Hotfix

d. Rolling

Which of the following allows a user to log in just one time and be granted access rights to multiple systems? a. 3DES b. IPSec c. SSL d. SSO

d. SSO

Peter has been tasked to develop a cross-cloud provider migration plan as part of his company's business continuity plan. As he assesses the feasibility of migrating applications from one public cloud provider to another, what does he find is the service model that has the most lock-ins and is the most complex to migrate? a. IaaS b. PaaS c. CaaS d. SaaS

d. SaaS

Which of the following enables a service provider to make applications available over the internet? a. DHCP b. SAN c. CaaS d. SaaS

d. SaaS

Carol is a cloud customer that your consulting company is assisting with their migration. She wants to know about the cloud operations responsibility of your organization. What model will you suggest Carol go through? a. Baselines b. Availability zones c. Community d. Shared responsibility

d. Shared responsibility

You are a web server administrator of your company. You want to authenticate the end user for all the applications the user has been given rights to and eliminates further prompts when the user switches applications during the same session. Which approach of access control should you use? a. Role-based access control b. Mandatory access control c. Multifactor authentication d. Single sign-on

d. Single sign-on

Will is testing his backup DR site and using his DNS configuration to load balance the primary and backup sites. He wants to verify that the database in the DR facility is updated in real time and remains current with the production replica in the primary data center. What type of updates should he define in his primary data center servers prior to enabling the DNS load balancing? a. Volume sync b. Mirroring c. RAID 5 d. Synchronous replication e. Asynchronous replication

d. Synchronous replication

Which of the following is referred to as the measurement of the difference between the current reading and the baseline value? a. Baseline b. Metric c. Smoothing d. Variance

d. Variance

You are monitoring your public clouds object reporting system on a web-based dashboard. A custom graph has been created that compares actual memory and CPU load to the baseline. What is the difference between these two values called? a. Triggers b. Baseline imbalance c. Deviation d. Variance

d. Variance

What are tightly coupled computers that allow for software patching without incurring downtime called? a. Blue-green b. Hotfix c. Runbook d. cluster

d. cluster

Which of the following is the variable delay between packets from source to destination? a. Latency b. Packet loss c. QoS d. jitter

d. jitter

Which of the following is the process of upgrading or replacing a server with one that has greater capabilities? a. Horizontal scaling b. Elasticity c. Autoscaling d. vertical scaling

d. vertical scaling

Pete is concerned about stored data that is replicated to a standby zone but not immediately. The delay means there is going to be a short period of time where the data is not consistent. Which storage replication service ensures eventual consistency? a. Tier 1 b. File-based c. RAID 6 d. Synchronous e. Asynchronous f. Block

e. Asynchronous

Cloud capacity can be measured by comparing current usage to what? a. NTP b. Automation c. Orchestration d. APIs e. Baseline

e. Baseline

What type of scaling includes adding additional servers to an existing pool? a. Vertical b. Auto-scale c. Elasticity d. Round robin e. Horizontal

e. Horizontal

Which of the following is defined as the variable delay between packets from source to destination? a. Latency b. QOS d. Capacity e. Jitter

e. Jitter

Matts is preparing a change management plan to add CPU capacity to a busy database server used by his order entry department. What type of scaling involves replacing an existing server with another that has more capabilities? a. Horizontal b. Round robin c. Elasticity d. Auto-scale e. Vertical

e. Vertical


संबंधित स्टडी सेट्स

CIS 150 Practice11: PowerPoint Chapter 3 (2016v1)

View Set

4 Life insurance Policies Provisions, options and riders

View Set

Fundamentals of Robotics for SCORBOT-ER4u

View Set

Chapter 8 - The Sun and Other Stars

View Set

Biology - Biotechnology and Genomics

View Set

A.P Computer Science Practice Questions for CodeHS Unit 13 and 3.11 - 3.18 College Board

View Set

System Security Management Quiz 8

View Set