Cloud Infrastructure Chp 14
Which tool allows you to query DNS to obtain domain name or IP address mappings for a specified DNS record? Ping Ipconfig Nslookup Route
Using the nslookup command, it is possible to query the Domain Name System to obtain domain name or IP address mappings for a specified DNS record.
Users are complaining that an application is taking longer than normal to load. You need to troubleshoot why the application is experiencing startup issues. You want to gather detailed information while the application is loading. What should you enable? System logs Verbose logging Telnet ARP
Verbose logging records more detailed information than standard logging and is recommended to troubleshoot a specific problem.
Which Windows command shows the path a packet takes as it traverses routers? ipconfig tracert nslookup ping
tracert
Fred manages around 50 cloud servers in Amazon Web Services. Each cloud server is thin provisioned and Fred pays for the amount of space his servers consume. He finds that the logs on the servers are rolling over and that each server has only about six days of logs. He would like to retain 18 months of logs. What should Fred do to retain the logs while conserving space on local hard disks? Compress the log files. Request that the cloud provider de-duplicate his cloud data. Purchase and configure a cloud log archiving service. Log into the server every five days and copy the log files to his desktop.
A cloud log archiving service would allow Fred to retain the logs on the archiving service while freeing up space on the local disks. The log archival space would likely be cheaper than the production space, and log archiving services offer additional analytical and searching tools to make reviewing the logs easier.
Which protocol resolves IP addresses to MAC addresses? TCP UDP ARP ICMP
ARP
You are deploying a cloud-based Microsoft SQL Server relational database for which you have existing licenses. Which cloud deployment option should you choose? BYOD BYOL Database replication Minimal vCPUs
BYOL
Which plan of action best addresses an infected corporate desktop computer? Update the virus signatures on the host. Disable updates on the host. Run a virus scan on the host. Disable network connectivity for the host.
Disable network connectivity for the host.
How often should documentation be updated? Annually. Quarterly. It depends on how many people are working on the project. Whenever significant changes are made.
Each time a significant change is made, the documentation should be updated to reflect the change. Otherwise, coworkers, auditors, or other employees might operate off out-of-date information.
Which troubleshooting step follows problem identification? Establish a theory of probable cause. Documentation. Test the theory. Verify system functionality.
Establish a theory of probable cause.
You are configuring a cloud network firewall. The firewall must permit ping traffic from your administrative on-premises station. What type of traffic should you allow? SSH ICMP RDP UDP
ICMP
Which disk performance unit of measurement is best suited for use in establishing a performance baseline? GB storage space consumed % CPU utilization IOPS % network utilization
IOPS
What is the first step in a troubleshooting methodology? Identify assets. Identify the problem. Identify the solution. Identify threats.
Identify the problem.
You need to verify the TCP/IP configuration settings of a network adapter on a virtual machine running Microsoft Windows. Which of the following tools should you use? Ping ARP Tracert Ipconfig
Ipconfig is a Microsoft Windows command that displays the current TCP/IP network configuration settings for a network interface.
Which of the following is most likely to result in problematic network time synchronization? Incorrect RBAC permissions Lack of virtual machine guest tools Incorrect VLAN association Lack of a default gateway
Lack of virtual machine guest tools.
Which is not the name of a step in the CompTIA troubleshooting methodology? Seek approval for the requested change. Identify the problem. Document findings, actions, and outcomes. Verify full system functionality.
Requested changes were discussed in the previous chapter, and it important to seek approval for changes before making them. However, this is not the name of a step in the CompTIA troubleshooting methodology.
Your network consists of industrial computer systems along with standard office productivity tools running on desktop computers. You need a threat detection solution that will examine all device log file entries to identify correlations. What should you use? Syslog SIEM IDS IPS
SIEM
Which step in the CompTIA troubleshooting methodology implements the solution? Step 1 Step 2 Step 3 Step 4 Step 5 Step 6
Step 4 implements the solution.
You need a way to remotely execute commands against a server that is located on the internal network. Which tool can be used to accomplish this objective? Ping Dig Traceroute Telnet
Telnet allows you to connect to another computer and enter commands via the Telnet program. The commands will be executed as if you were entering them directly on the server console.
Which of the following command-line tools allows for the display of all active network connections and network protocol statistics? Netstat Ping Traceroute Ipconfig and ifconfig
The netstat command can be used to display protocol statistics and all of the currently active TCP/IP network connections, along with Ethernet statistics.
Which of the following tools can be used to verify if a host is available on the network? Ping ARP Ipconfig Ipconfig and ifconfig
The ping utility is used to troubleshoot the reachability of a host on an IP network. Ping sends an ICMP echo request packet to a specified IP address or host and waits for an ICMP reply.
Using an internal CA, you have issued a new TLS certificate for a custom website and configured the server to use it. Users complain that they cannot successfully connect to the website. What is the most likely cause of the problem? The server certificate has expired. The client certificate has expired. The server certificate is untrusted. The client certificate is untrusted.
The server certificate is untrusted.
You need to modify a routing table and create a static route. Which command-line tool can you use to accomplish this task? Ping Traceroute Route Host
You can use the route command to view and manipulate the TCP/IP routing tables and create static routes.
Which of the following tools can be used specifically to verify DNS functionality? Choose two. dig tracert ipconfig nslookup
dig, nslookup
You need to view network interface settings for a cloud-based Linux virtual machine. Which command should you issue? ipconfig tracert ifconfig nslookup
ifconfig
Which Windows command shows current network port connections? nslookup netstat ipconfig arp
netstat