Cloud Infrastructure Chp 14

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which tool allows you to query DNS to obtain domain name or IP address mappings for a specified DNS record? Ping Ipconfig Nslookup Route

Using the nslookup command, it is possible to query the Domain Name System to obtain domain name or IP address mappings for a specified DNS record.

Users are complaining that an application is taking longer than normal to load. You need to troubleshoot why the application is experiencing startup issues. You want to gather detailed information while the application is loading. What should you enable? System logs Verbose logging Telnet ARP

Verbose logging records more detailed information than standard logging and is recommended to troubleshoot a specific problem.

Which Windows command shows the path a packet takes as it traverses routers? ipconfig tracert nslookup ping

tracert

Fred manages around 50 cloud servers in Amazon Web Services. Each cloud server is thin provisioned and Fred pays for the amount of space his servers consume. He finds that the logs on the servers are rolling over and that each server has only about six days of logs. He would like to retain 18 months of logs. What should Fred do to retain the logs while conserving space on local hard disks? Compress the log files. Request that the cloud provider de-duplicate his cloud data. Purchase and configure a cloud log archiving service. Log into the server every five days and copy the log files to his desktop.

A cloud log archiving service would allow Fred to retain the logs on the archiving service while freeing up space on the local disks. The log archival space would likely be cheaper than the production space, and log archiving services offer additional analytical and searching tools to make reviewing the logs easier.

Which protocol resolves IP addresses to MAC addresses? TCP UDP ARP ICMP

ARP

You are deploying a cloud-based Microsoft SQL Server relational database for which you have existing licenses. Which cloud deployment option should you choose? BYOD BYOL Database replication Minimal vCPUs

BYOL

Which plan of action best addresses an infected corporate desktop computer? Update the virus signatures on the host. Disable updates on the host. Run a virus scan on the host. Disable network connectivity for the host.

Disable network connectivity for the host.

How often should documentation be updated? Annually. Quarterly. It depends on how many people are working on the project. Whenever significant changes are made.

Each time a significant change is made, the documentation should be updated to reflect the change. Otherwise, coworkers, auditors, or other employees might operate off out-of-date information.

Which troubleshooting step follows problem identification? Establish a theory of probable cause. Documentation. Test the theory. Verify system functionality.

Establish a theory of probable cause.

You are configuring a cloud network firewall. The firewall must permit ping traffic from your administrative on-premises station. What type of traffic should you allow? SSH ICMP RDP UDP

ICMP

Which disk performance unit of measurement is best suited for use in establishing a performance baseline? GB storage space consumed % CPU utilization IOPS % network utilization

IOPS

What is the first step in a troubleshooting methodology? Identify assets. Identify the problem. Identify the solution. Identify threats.

Identify the problem.

You need to verify the TCP/IP configuration settings of a network adapter on a virtual machine running Microsoft Windows. Which of the following tools should you use? Ping ARP Tracert Ipconfig

Ipconfig is a Microsoft Windows command that displays the current TCP/IP network configuration settings for a network interface.

Which of the following is most likely to result in problematic network time synchronization? Incorrect RBAC permissions Lack of virtual machine guest tools Incorrect VLAN association Lack of a default gateway

Lack of virtual machine guest tools.

Which is not the name of a step in the CompTIA troubleshooting methodology? Seek approval for the requested change. Identify the problem. Document findings, actions, and outcomes. Verify full system functionality.

Requested changes were discussed in the previous chapter, and it important to seek approval for changes before making them. However, this is not the name of a step in the CompTIA troubleshooting methodology.

Your network consists of industrial computer systems along with standard office productivity tools running on desktop computers. You need a threat detection solution that will examine all device log file entries to identify correlations. What should you use? Syslog SIEM IDS IPS

SIEM

Which step in the CompTIA troubleshooting methodology implements the solution? Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

Step 4 implements the solution.

You need a way to remotely execute commands against a server that is located on the internal network. Which tool can be used to accomplish this objective? Ping Dig Traceroute Telnet

Telnet allows you to connect to another computer and enter commands via the Telnet program. The commands will be executed as if you were entering them directly on the server console.

Which of the following command-line tools allows for the display of all active network connections and network protocol statistics? Netstat Ping Traceroute Ipconfig and ifconfig

The netstat command can be used to display protocol statistics and all of the currently active TCP/IP network connections, along with Ethernet statistics.

Which of the following tools can be used to verify if a host is available on the network? Ping ARP Ipconfig Ipconfig and ifconfig

The ping utility is used to troubleshoot the reachability of a host on an IP network. Ping sends an ICMP echo request packet to a specified IP address or host and waits for an ICMP reply.

Using an internal CA, you have issued a new TLS certificate for a custom website and configured the server to use it. Users complain that they cannot successfully connect to the website. What is the most likely cause of the problem? The server certificate has expired. The client certificate has expired. The server certificate is untrusted. The client certificate is untrusted.

The server certificate is untrusted.

You need to modify a routing table and create a static route. Which command-line tool can you use to accomplish this task? Ping Traceroute Route Host

You can use the route command to view and manipulate the TCP/IP routing tables and create static routes.

Which of the following tools can be used specifically to verify DNS functionality? Choose two. dig tracert ipconfig nslookup

dig, nslookup

You need to view network interface settings for a cloud-based Linux virtual machine. Which command should you issue? ipconfig tracert ifconfig nslookup

ifconfig

Which Windows command shows current network port connections? nslookup netstat ipconfig arp

netstat


Set pelajaran terkait

Ethernet max speeds and distance

View Set

천체망원경의 구조와 사용법 [지구과학]

View Set

Influence of Genetic Inheritance on Behavior Objective

View Set

Ch. 14: Shock & Multiple Organ Dysfunction Syndrome

View Set