.+*Cloud Computing *+. (The reading and video quiz answers)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

2-7 video (1) What is AWS's default private key file type?

.pem

2-2-3 reading Douglas is setting up VM instances on a Hyper-V server to host some basic web server and legacy software workloads along with some light app testing. He needs to know how many vCPUs to allocate to each VM. The server's motherboard has two CPU sockets, both populated with 8-core processors, and hyperthreading is enabled. He's decided that the VMs' workloads can easily handle a 3:1 overcommitment ratio. He plans on creating 15 VMs at first and eventually increasing to 25 VMs as he fine-tunes the workloads and resource allocations.

1

2-7 video (2) What port does SSH use by default?

22

2-3 video (2) What is the default port for RDP (Remote Desktop Protocol)?

3389

4-2-2 reading Adan is mapping out address pools for the subnets he plans to create in his Azure account. He has determined the network will use a CIDR /24 address space, and he needs 16 small subnets within this space.

4

3-1 video (1) What two keys do you need to configure the AWS CLI? Choose two. a. Public key b. Private key c. Access key d. Secret key

Access key Secret key

2-1-3 reading Brian is moving his network's backup DHCP server to a VM running Ubuntu Server. The VM will provide a couple of other network services as well, including DNS. Which networking mode should Brian assign to the Ubuntu VM?

Bridged mode

2-5 video (1) Which browser can be used to connect to a GCP Linux instance? Choose all that apply.

Chrome Safari Firefox Edge

2-4 video Which GCP service is used to create VM instances?

Compute Engine

1-2 video Which AWS service is used to manage VM instances?

EC2

2-2 video (1) Which AWS service is used to create VM instances?

EC2

1-5-2 reading Anika has run into a problem with the VPN connection to her company's cloud-hosted database. She has a good Internet connection and can access her work email account, which uses the same sign-in credentials as the VPN. But she still can't pull reports from the database service. She calls Patrick, who works for the company's help desk. As Anika describes the problem to Patrick, he tells her to try again and make sure she's using the right password, then restart her router, and if that still doesn't fix it, to restart her computer.

Establish a theory of probable cause

4-3-6 reading Tim is troubleshooting a problem with his VM in AWS. He created a new VPC and a new subnet, enabled auto-assign public IPs, added an IG and a VM, and attached the VM's interface to a subnet within the VPC. This is where he ran into problems. Tim has been trying for 30 minutes to open an RDP connection to the VM and it's not working. He confirmed the VM is set to allow RDP traffic, and the VPC and subnet both also allow RDP traffic. He also confirmed the VM is running.

He should configure a route to the IG

4-3 video (1) What cloud resource gives VM instances access to a subnet?

Interface

4-2 video (1) What cloud resource gives public subnets access to the Internet in AWS?

Internet gateway

3-1 video (2) Which of the following is not an output format option for AWS CLI commands?

List

3-2 video (1) What type of account do you use to sign into Azure CLI?

Microsoft

3-3-1 reading Mykel and his team recently completed a major migration of several business-critical applications to AWS's public cloud, and they're performing some final tests before going live. While taking a short break at a nearby coffee shop, Mykel decided to remote into one of the primary servers from his personal laptop so he could make some additional configuration changes. As he's completing the changes, it occurs to him that this particular server is supposed to be locked down to provide access only from his computer back at his desk. He pokes around in the account to see how much access he has with this user account and then returns to the office to address the problem.

Penetration testing

4-3 video (2) What step must be performed before attaching a new interface to a VM?

Power down the VM.

2-2 video (2) Which two key types are included in a key pair?

Private key and public key

2-3 video (3) What Azure resource allows an instance to be accessed from the Internet?

Public IP address

2-6 video (1) Which protocols can create a secure remote access connection between a Windows computer and a Windows VM instance?

RDP SSH

3-1-5 reading Corin works in the IT department of a law firm specializing in real estate closings. The firm is already using G Suite (web-based Google apps) productivity software for office staff, and they recently acquired a company-wide license for Zoom, an online video conferencing app. The next, more audacious target is their billing software. The company has been using an antiquated program for more than 20 years—longer than most of their staff has been employed. One of the accountants has been with the firm for nearly 30 years and remembers when they first started using this billing software. She says everyone hated it even then. Corin has been asked to make a recommendation as to how to proceed with this phase of the migration.

Repalce

1-2-6 reading Raul works for a small consulting firm that assists medical organizations, such as quick care facilities, and health professionals, such as doctors' offices or alternative care providers, to establish, update, and manage their IT systems. He regularly works with patient databases and must ensure that his clients' networks and other IT resources comply with strict government regulations. Raul's boss, Cheri, recently asked him to assist in upgrading their firm's data center. The CEO has decided they need to take a major step towards a more cloud-centric business model and asked Raul how the company can ensure that their cloud provider meets industry standard requirements for data security, service availability, and confidentiality.

SSAE 18

1-3-1 reading Raul's company has narrowed down their options to a small handful of CSPs. All of these CSPs offer a wide variety of cloud services and meet all of the company's security requirements. Cheri, Raul's boss, is now asking him to recommend what type of cloud services would best fit their needs. She explains they want to start with cloud-based email and an office productivity suite that enables easy file sharing among team members.

SaaS

3-2-4 reading Mia's company is moving their video database—about 34 TB—to a cloud-based storage solution. The company is located in a fairly small town, at least an hour's drive from the nearest large city, and they don't do a great deal of data transfer online for normal business operations other than regular contact through email or video conferences.

Storage appliance shipped via UPS

4-4 video What cloud resource in GCP receives an IP address range?

Subnet

4-2-1 reading Ginny is building a series of subnets in her AWS cloud that will host VMs used to test applications her company is developing. The applications are tested by a team of users who are specialists in their respective industries. Ginny establishes the subnets, spins up a few experimental VMs, and starts testing her connections. She realizes there's a misconfiguration in one of the VMs and needs to remote in to it to make some changes. What piece of information does Ginny need to collect from AWS first?

The VM's public IP address

4-2 video (2) Where does a subnet get its default route table association from?

VPC's main route table

2-3 video (1) Which Azure service is used to create VM instances?

Virtual Machines

2-1-2 reading Vicki works from home developing apps for managing highly regulated data, such as patients' medical history or customers' payment information. She's always concerned with prioritizing data security and ensuring that no programming loopholes would allow hackers access to data managed by one of her apps. During the development process, Vicki performs some initial, lightweight testing of her apps in a few different OS environments running in VMs on her home computer, and then she passes each app along to a team at another location for more intense and thorough testing.Which of the following hypervisors is Vicki most likely using?

VirtualBox

3-1 video (3) What text activates AWS CLI commands at the command line?

aws

3-2 video (2) What text activates Azure CLI commands at the command line?

az

1-3 video Which feature in Azure is used to track expenses?

b. Subscriptions

3-3 video (2) What GCP service is used to manage VM instances?

compute

3-3 video (1) Which GCP SDK tool is used to manage VM instances?

gcloud

2-7 video (3) What Linux command shows network interface information?

ifconfig

2-6 video (2) What Windows command shows network interface information?

ipconfig

2-5 video (2) What Linux command creates a new directory?

mkdir

1-4 video What feature in GCP is used to organize resources?

projects


Set pelajaran terkait

econ chapter 10: public goods and common resources

View Set

Chapter 12 - Nutrition Assessment

View Set

1.7.2 - CHARACTERISTICS OF WARRANTS

View Set