C-Plus Chapter 7-8
Owen has just installed Linux as a virtual machine on the company's cloud service provider. He has configured the server to define a set of users to determine who has access to individual files and folders. Which of the following terms can describe the set of users?
a. ACL
Doreen wants to configure the new application she is deploying to use object storage for the logs. Which of the following object-based storage should she choose?
a. Append blob
Fictional Corp archives all of the video footage from its IP cameras that is older than 1 week. This footage is very rarely ever accessed. Which of the following is the best solution for how they should store this data?
a. Cold storage
James works for a company where administrators and users add individual granular permissions to various resources. Which of the following describes the access control methods used by this company?
a. DAC
Fictional Corp has just received a shipment of 100 four-terabyte hard drives for the creation of a new application service. Which of the following will have an effect on the total amount of storage capacity that they can provide for this new service?
a. HA
Allen is visiting one of his client's data centers and, after signing in, is escorted through the premises the entire time. He notices that, in order to gain access to the data center, the employee had to swipe a proximity badge, key in a 6 digit code, and place his finger on a scanner. Which of the following describes the type of security that he just witnessed?
a. MFA
Fictional Corp is expanding their presence to Europe. As part of their expansion, they realized that they need to consider some changes to the design of the cloud infrastructure they host on a cloud service provider. Which of the following might they decide to implement?
a. Multi-regional storage
Trent is designing the technology infrastructure to use at his company's new small office in the Caribbean. After researching the ISPs in the area, he sees that the amount of bandwidth available at that specific location is going to be rather limited. Which of the following may he want to install in order to provide local file storage for the office?
a. NAS
Kevin is implementing SSO functionality for his organization. Which of the following authentication standards could he use to implement it?
a. SAML
Edgar is about to make some changes to a virtual machine. However, he knows that some of the changes may not be successful and wants a quick way to restore back to the original configuration and data in the case of failure. Which of the following strategies could allow Edgar to accomplish this goal?
a. Snapshot
Caroline is trying to access one of her company's custom cloud-based web applications. She sees a bright red screen advising that there is a security problem with the site and that she should not trust the contents of it. Which of the following most likely occurred that an administrator should probably check first?
a. The site's digital certificate has expired.
Daniel is looking for a good solution to store the log files from servers in his organization. He knows that the log files will never change. Which of the following describes the type of data he is looking to store and manage?
a. WORM
A large social media platform is planning on converting from filesystem storage to object storage for the many photos that users upload. Which of the following types of object-based storage might they choose?
b. Block blob
Sean has implemented an automatic account locking policy that will lock a user account after 5 invalid attempts. Which of the following types of attacks will this help thwart?
b. Brute force
Fictional Corp has an on-premises data center where content is written once and then referenced by its content rather than by its location on a disk. Which of the following types of storage are they most likely using?
b. CAS
Sid wants to create a new copy of a server so that he can test some patches to the server outside of the production environment. Which of the following describes the method described?
b. Cloning
Greg is analyzing a server and notices that the storage space is now 90 percent full. He wants to save some space by deleting some of the historical records on the server. Which of the following might prevent him from doing so?
b. Compliance with regulations
Beau has a small external RAID array connected to his workstation to store local backups of the applications that he develops. Which of the following describe the type of storage solution he is using?
b. DAS
Roberta is trying to find a way to save space on the SAN that acts as storage for all of the home directories in her organization. Which of the following might help Roberta accomplish this goal?
b. Deduplication
Milo has set up smart cards for users in the company's main office. He wants to tie them into the authentication systems so that users can log into their workstations with them as well as access certain resources. Which of the following does he need to assign to each user in order to make this integration work?
b. Digital certificate
Fictional Corp uses a cloud service provider that provides a framework of techniques and tools for managing the identities of people and applications that allow for access to cloud resources. Which of the following describe this framework?
b. IAM
Alexandra has scheduled a full backup of one of the servers she manages for the first day of every month. Every week after that, any data that has changed since the previous backup of any kind is backed up. Which of the following describes these weekly backups?
b. Incremental
Lincoln is assigning permissions to users and groups for a new application that he is deploying. As he's doing this, which of the following principles should he make sure he follows?
b. Least privilege
Sebastian is trying to access a resource that has been labeled as top secret, but he only has secret clearance. Which of the following access control methods does his organization use?
b. Mandatory access control
Martin wants to maintain an exact copy of the data from one of the data storage locations in a separate location for disaster recovery purposes. The copy of the data will not be actively used unless the systems have to failover to the copy. Which of the following describes the type of redundancy he is wanting to implement?
b. Mirroring
Sharon is having trouble logging into the new cloud-based web application that her small company uses. It asks whether she wants to use a local account or an OpenID account. Which of the following is used by OpenID in order to implement authentication?
b. OAuth
Sylvester has several very critical web applications that he is responsible for. These applications are hosted in the company's on-premises data center. He wants to ensure that if something happens to one of the applications or the data that it can be recovered as fast as possible. Which of the following would allow him the quickest recovery time?
b. Online
Steven has been tasked with planning the move from an infrastructure where administrators and users add permissions to resources individually to one where users are assigned to groups based upon the department they work in and what they do in the department and then assigning the groups to the resources. Which of the following has he been tasked with planning?
b. RBAC
Kendra has received the list of requirements from the Finance department for a new application that is being developed. The application will be hosted on a cloud service provider, and she needs to ensure that she is able to guarantee that the application is up and running when they need it. Which of the following documents might she create to outline exactly what they are going to provide that will also help in determining the necessary infrastructure and timelines for performing backups?
b. SLA
Fictional Corp has a variety of applications deployed across multiple cloud service providers. Claude has been tasked with making sure that users aren't required to have separate accounts for each application. Which of the following should he look at using to meet that goal?
b. SSO
Kira needs to implement multifactor authentication for one of the new cloud applications. She needs to include something that you have and something that you know. Which of the following would meet those requirements? (Choose two.)
b. Smart card reader c. Password
Juanita wants to create a data replication system where the data is constantly written to two locations at the same time. Which of the following describes this type of configuration?
b. Synchronous replication
Rose is implementing digital certificates for all of the users in her organization. Which of the following certificate types should she use?
b. TLS
Fictional Corp is operating at redundancy level RF3. How many resource failures can they tolerate and still maintain operation?
c. 2
Joe has been asked about one of the storage systems his company maintains. This system writes the data to storage in one region and periodically copies the data to another region. What term can he use to describe this configuration?
c. Asynchronous replication
Nedra is assigning permissions to groups of users on the network for a new cloud-based application that she has just installed. Which of the following do her actions specifically enable?
c. Authorization
Terrance is designing storage for a startup company and needs to ensure from the beginning that it will be able to handle high levels of variety in high volumes and arriving in high velocity. Which of the following technologies is he designing for?
c. Big data
Judy's company is implementing a new authentication technology that requires assigning certificates to users and issuing smart cards. Which of the following does she need to install and configure to manage the certificates?
c. CA
Roz is looking to save disk space on the servers by migrating log files older than 30 days to another server. Which of the following might she use to combine the files into one file that is smaller than the combined size of the originals?
c. Compression
Tia has run a report on one of the Linux servers she manages and sees that one of the users has not changed their password in over two years. Which of the following parameters should she configure on the server?
c. Expiration
Sophia needs to make sure that everything on certain systems gets backed up once per week. What is the technical term that is used to describe this type of backup?
c. Full
Eddie is creating a new virtual machine on the cloud service provider his company uses. One of the specs that he's looking at describes the number of read and write operations that can be completed over certain periods of time. Which of the following specs is he comparing?
c. IOPS
Darius manages a directory of users for one of the domains within his organization. Which of the following describes the protocol in use for querying the directory?
c. LDAP
Noah has gone to work for the government and sees that some systems use a method of labeling data as classified, secret, and top secret rather than creating groups of users and applying permissions for those groups. Which of the following describes these systems of labeling data?
c. MAC
Sarah has deployed a private cloud infrastructure that requires users to insert a smart card into their computer or into a card reader in order to authenticate them to use the applications. The smart card is associated with a certificate for each user, which is verified against a certificate authority. Which of the following has she deployed?
c. PKI
Nicki is creating an object storage type to store VM disks. Which of the following is the best object-based solution to store these types of data?
c. Page blob
Blake has been examining the logs on one of the servers that he is responsible for that is hosted on a cloud service provider. He finds an instance where one of the employees has managed to give himself unauthorized administrative access on the server. Which of the following has occurred?
c. Privilege escalation
Owen has been tasked with having multifactor authentication installed for entrances into the company's data center. Which of the following would meet that requirement?
c. Proximity badge reader and fingerprint scanner
Startup Inc. is developing a new application that they intend to use a cloud service provider to host. Initially, they plan on only launching the app in the United States and then growing from there once they have reached critical mass. Which of the following storage designs might they use initially in order to save on costs?
c. Regional storage
Piper is auditing the accounts on the cloud platform her company uses. She sees a master user that retains complete access and action permissions no matter what permissions are also given to the other users. Which of the following is the username for that account?
c. Root
Rick needs to expand the storage for his company's large private cloud. Which of the following types of storage do they most likely use?
c. SAN
Cherise has been tasked with increasing the security for the company's data center. Currently there is a proximity badge reader on the door. She is considering adding an iris camera to the door. Once it is in place, which of the following factors will be used for authentication into the data center? (Choose all that apply.)
c. Something that you are d. Something that you have
Fictional Corp is trying out a new experimental technology that analyzes how users type as part of a multifactor authentication implementation. Which of the following categories of authentication factors would this fall into?
c. Something you do
Mark manages a custom application that resides on a cloud service provider that relies on users to authenticate by means of entering a username and password. Which of the following factors of authentication does this application use?
c. Something you know
Fred is trying to access the company's cloud-based CRM system while traveling abroad in Europe. He receives a message that access to this application is not allowed from the country he is currently in and lists the IP address detected by his connection. Which of the following factors of authentication is the CRM system using?
c. Somewhere you are
Emily is analyzing the logs for one of the servers in her organization. She sees three failed attempts to log in with an incorrect password. She then sees continued attempts to log in with a different error message. Which of the following could be the reason the error message changed?
c. The account is now locked after 3 failed attempts, so the error message has most likely changed from a failed password to one reflecting a locked account.
Martin is running an analysis on the logs from one of the web servers that resides on the company's private cloud. He finds that some users are accessing a site they shouldn't be able to, as the firewall should have rules to prevent them from accessing the server. Which of the following might be how they were able to access the site?
c. The rules on the firewall were listed in an incorrect order.
Lorna manages a private cloud with 500 terabytes of storage. However, the servers in the cloud have a total provisioned footprint of 800 terabytes. Which of the following describes the provisioning model that she is using?
c. Thin provisioning
Alex is the network administrator for a Windows Server network. Which of the following is most likely in use to manage the users and other resources on that network?
d. AD
Stan is walking past a row of cubicles when he notices someone's password written down on a sticky note that is attached to a monitor. The password is passwordpassword3. Besides the obvious problem of being the word password repeated followed by a single number, which of the following policies isn't in place that should be?
d. Complexity
Cindy has a scheduled job to back up the web server every day at 1 am. Every hour she wants to run another backup to archive anything that has changed since the full backup. Which of the following describes the hourly backup process she wants to implement?
d. Differential
Andrew manages a variety of applications spread out between multiple cloud providers. Users can sign into any of the cloud applications with the same username and password. Which of the following has been implemented?
d. Federation
Bianca manages the e-mail server for Fictional Corp. All of the employees' e-mails are encrypted using the user's keys. One of the user's certificates expires, so a new certificate is installed. However, now they can no longer access their archived e-mails. Which of the following does Bianca need to do to give this user access to their archived e-mails?
d. Import the keys for the old certificate so the e-mails can be decrypted and then re-encrypt them using the new certificate.
Ivan is responsible for making tape backups of one of the on-premises servers in the data center and then taking the tapes to a lockbox at a local bank for safe keeping. Which of the following describes the type of backup that he is doing?
d. Offline
Julia is designing a new customer relationship management application that will contain a number of types of information: customer list, products, inventory, orders, etc. Which of the following best suits the method of how she may want to store this data?
d. Relational database
Otis wants to give a mobile app short-term access to a resource without having to store long-term user credentials (such as access keys) in the app. Which of the following describes the method he can use to do that?
d. Roles
Cody suspects that his company has been the subject of an attack after reports from multiple users that they are missing files. He examines the logs and sees where it appears that the user logged in successfully for each of the users in question and that the strong encryption protocol was enforced and used each time. Which of the following may have occurred?
d. Social engineering
Tracey has built a private cloud in her organization with restrictions in place to prevent provisioning more disk space than is physically available. Which of the following describes this principle?
d. Thick provisioning
Fictional Corp has assigned each user within their Active Directory implementation a username. This username is a form of:
d. identity