ITN 257 - Midterm All Modules Combined

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Thelonius has just created a new virtual machine. By default, the cloud service provider automatically configured it as part of a class C private network. Which of the following is the default subnet mask expressed in CIDR notation that was configured?

/24

Frederica is installing more infrastructure in her company's on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains?

VLAN

Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life, and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company?

VPC

Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection?

VPN

Andrew manages a variety of applications spread out between multiple cloud providers. Users can sign into any of the cloud applications with the same username and password. Which of the following has been implemented?

Federation

What is one difference in the virtual private clouds (VPCs) created by GCP and those created by other cloud providers?

GCP VCPs are global by default

Xena has noticed that traffic to her company's website has been increasing from across the world. She has decided to start deploying copies of that server to various regions and wants to direct traffic to the site that is closest to each user. Which of the following technologies could she use to do this?

GSLB

Reggie is troubleshooting an issue related to an incorrectly configured load balancer. He thinks he made a mistake when he was setting up the ports but isn't quite sure if that's the root cause of the issues. Interference or errors in which of the following areas will confirm Reggie's suspicions?

Health-check protocol

Fictional Corp. uses a cloud service provider that provides a framework of techniques and tools for managing the identities of people and applications that allow for access to cloud resources. Which of the following describes this framework?

IAM

Carl has created a virtual machine on the cloud service provider that his company uses and has given it a static private IP address. He wants to make this server is the new web server for the company's website. Which of the following is required to allow that server to perform in that role?

IG

Laurel is selecting a VPN protocol for her company's network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?

IKEv2

Jens was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following was Jens reading about?

IPsec

Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose?

OpenVPN

Which GCP segment type is the largest?

Region

Dwight has just moved all of the Linux servers from the VPC that they shared with some Windows servers to another VPC. Which of the following does he most likely need to do?

Remove the rules that allow port 22 from the firewall to the original VPC.

Otis wants to give a mobile app short-term access to a resource without having to store long-term user credentials (such as access keys) in the app. Which of the following describes the method he can use to do that?

Roles

Piper is auditing the accounts on the cloud platform her company uses. She sees a master user that retains complete access and action permissions no matter what permissions are also given to the other users. Which of the following is the username for that account?

Root

Kevin is implementing SSO functionality for his organization. Which of the following authentication standards could he use to implement it?

SAML

Uma has been analyzing the performance and baselines from her virtual machines that are on a cloud service provider's platform. She sees that they do not appear to be performing up to the standards that her cloud service provider guarantees. Which of the following documents outlines the standards that they are guaranteeing?

SLA

Numerous cloud service providers host various apps that are used by Fictional Corp. It is Claude's responsibility to ensure that users do not have to create unique accounts for every application. Which of the following should he consider employing to achieve that objective?

SSO

Ezekiel wants to ensure that several of the cloud resources he is responsible for managing are always available. Which of the following might best help him meet his goals of high availability?

Site mirroring between two or more regions

Kira needs to implement multifactor authentication for one of the new cloud applications. She needs to include something that you have and something that you know. Which of the following would meet those requirements? (Choose two.)

Smart card reader Password

Negan has been given the 10.50.0.0/16 subnet to create the cloud infrastructure necessary for a new subsidiary that his company is creating, Zombies Inc. He wants to create a minimum of 500 smaller networks that can hold 100 servers each out of that space to minimize broadcast traffic within each subnet. Which of the following CIDR masks could he use to meet his requirements?

/25

Tara had originally created a /28 mask for the 12 servers in the sales group server pool. However, her company has just merged with a competitor, and she needs to expand the subnet to accommodate another 20 servers. Which of the following new subnet masks will accommodate the new servers in addition to the original servers while having the fewest number of unused IP addresses remaining?

/26

Rosita has configured a subnet mask of 255.255.252.0 for the new virtual private cloud she is creating for her organization. One of the junior administrators remarks that he's never seen that kind of a subnet mask before and isn't sure how many devices the subnet would hold. How many devices should Rosita tell him that it will support?

1,022

Darryl has been given the 10.20.30.64/26 network to use for a set of virtual machines that he is provisioning on his company's private cloud. He has been told to configure the last usable IP address in the range as the gateway, or router, address. Which of the following IP addresses should he use for the gateway?

10.20.30.126

Carol has created a subnet of 10.20.30.0/27. Which of the following is the address that is used for broadcast messages within the subnet?

10.20.30.31

Finn needs to create multiple virtual networks using a /28 mask. How many devices can he put on each subnet?

14

Raven has been asked to configure the web server with a specific public class B IP address. Which of the following is a possible address she was given?

172.16.172.16

Bellamy has been asked to configure the virtual router interface for the subnetwork that contains the server with IP address 172.19.101.200 and subnet mask of 255.255.255.128. He is asked to use the first usable IP address of the subnet. Which of the following IP addresses should he use?

172.19.101.129

Octavia has set up a private cloud with a virtual machine at the IP address 172.19.101.5 and the subnet mask 255.255.255.192. She has been asked what the broadcast IP address is for the network. How should she respond?

172.19.101.63

Beth has been asked to migrate the company's virtual private clouds from class C private addresses to class B private addresses. Which of the following is a valid address for her to change the web server's IP address to?

172.30.101.50

Lexa has been asked for the subnet ID and subnet mask in CIDR notation for one of the web servers in the company's private cloud. The web server has an IP address of 192.168.1.200 and a subnet mask of 255.255.255.192. What should she tell them?

192.168.1.192/26

Marcus has been asked to configure a web server with a specific private class C IP address. Which of the following is a possible address she was given?

192.168.205.63

Gabriel has been given the 10.30.0.0 network and told to use the subnet mask 255.255.248.0 for the new cloud infrastructure he is building out for the subsidiary his company just purchased. Assuming one of the IP addresses is used for a virtual router interface on that subnet, how many virtual machines could he create in each subnetwork?

2045

Quinn is currently looking to deploy a new Microsoft SharePoint server farm, a web-based application, into its own VPC. Which of the following ports would be unnecessary for her to leave open on the firewall for usage or management purposes?

22

Abby has just created a new virtual machine. Once it has been installed, she connects to it and finds that it has configured the default subnet mask for a class A network. Which of the following subnet masks was automatically configured for this server?

255.0.0.0

Clarke is trying to come up with a subnet mask so that three servers with the IP addresses 172.16.31.10, 172.16.30.15, and 172.16.31.206 are in the same network. Which of the following subnet masks will accommodate this requirement?

255.255.254.0

Maggie wants to create a small subnetwork for the Human Resources servers that her organization uses. There are currently 10 servers, but she also needs to plan for 50 percent growth over the next two years. Which of the following subnet masks would give her adequate IP address space while leaving the fewest number of unused IP addresses in the block?

255.255.255.240

LeRoy has decided that the servers in one of the VPCs that he manages should only be reachable by IP address and they should not be able to perform any domain name lookups from the Internet. Which of the following ports should he disable on the firewall for that VPC?

53

In a cloud environment, which device might be arranged at the presentation tier of a basic three-tier infrastructure?

A user's smartphone

Marissa is wanting to implement a VPN at her company but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?

OpenVPN

Jenna's cloud service provider has just started supporting IPv6. She wants her web servers there to be accessible by both IPv4 and IPv6. Which of the following records should she add to the DNS configuration to ensure that IPv6 clients can access her company's website?

AAAA

Owen has just installed Linux as a virtual machine on the company's cloud service provider. He has configured the server to define a set of users to determine who has access to individual files and folders. Which of the following terms can describe the set of users?

ACL

Alex is the network administrator for a Windows Server network. Which of the following is most likely in use to manage the users and other resources on that network?

AD

In the network, Nedra is distributing rights to user groups for a new cloud-based application that she has set up. Which of the following especially is made possible by her actions?

Authorization

Sean has implemented an automatic account locking policy that will lock a user account after five invalid attempts. Which of the following types of attacks will this help thwart?

Brute force

Tim has three separate VPCs at the cloud service provider that his company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might he implement in order to accommodate that requirement?

Cloud peering

In order to introduce a new authentication technique, Judy's organization must issue smart cards and distribute certificates to users. Which of the following certificates will she have to install and set up?

CA

Eugene has been given the subnet 10.20.30.0/24 to use for the creation of a group of virtual machines to be used for the sales department. He is used to seeing a subnet mask in the format of four numbers separated by periods (255.255.255.0) along with the subnet ID, but isn't familiar with what the slash and a number mean after the subnet ID. He asks you to help him interpret the information. What term should you tell him to search for on a search engine to learn more about this topic?

CIDR

Davis has been analyzing the on-premises data center and determined that the data center can handle most of the traffic on a day-to-day basis. However, there are times when the bandwidth becomes saturated, and he needs to find a solution to push the excess traffic out to virtual machines on a cloud service provider. Which of the following describes the technique he is looking to implement?

Cloud bursting

Stan is walking past a row of cubicles when he notices someone's password written down on a sticky note that is attached to a monitor. The password is passwordpassword3. Besides the obvious problem of the word password repeated followed by a single number, which of the following policies isn't in place that should be?

Complexity

A year ago, Raj configured two servers on separate VLANs. He still needs them to remain on separate VLANs, but now has a need for them to be able to send certain communications to each other over a certain port. Which of the following will be necessary for him to do?

Create a route between the two VLANs, so they know how to contact each other.

James works for a company where administrators and users add individual granular permissions to various resources. Which of the following describes the access control methods used by this company?

DAC

Darnell does not want to manually assign IP addresses to clients on one of the network segments that he manages. Instead, he wants clients to obtain an IP address from a server that manages a pool of IP addresses. Which of the following technologies should he implement?

DHCP

Fictional Corp has just moved its web server from its on-premises data center to a cloud service provider. Which of the following most likely needs to be changed by an administrator?

DNS entries

Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?

DNS servers

Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement?

Different subnets for each department

Milo has set up smart cards for users in the company's main office. He wants to tie them into the authentication systems so that users can log into their workstations with them as well as access certain resources. Which of the following does he need to assign to each user in order to make this integration work?

Digital certificate

Patti's company has just migrated the only Windows server in a particular VPC to a different VPC. Which of the following should she do next?

Disable port 3389 on the firewall of the original VPC.

Kenji has decided upon a multi-cloud deployment so that the company can continue to operate even if one of the cloud service providers experiences an outage. Which of the following explains the factor that was important to Kenji in choosing this structure?

Disaster recovery

Tia has run a report on one of the Linux servers she manages and sees that one of the users has not changed their password in over two years. Which of the following parameters should she configure on the server?

Expiration

A tiny startup firm has secured a round of investment to provide them with the resources they need to distribute their smartphone app to more devices. Instead of building its own data center, they have chosen to use a public cloud, but they still want to oversee as much of the infrastructure as it can to save capital expenses associated with the purchase of hardware. Which of the above service models will provide them the most power over the security of the platform they wish to create?

IaaS

Bianca manages the e-mail server for Fictional Corp. All of the employees' e-mails are encrypted using the user's keys. One of the user's certificates expires, so a new certificate is installed. However, now they can no longer access their archived e-mails. Which of the following does Bianca need to do to give this user access to their archived e-mails?

Import the keys for the old certificate so the e-mails can be decrypted and then re-encrypt them using the new certificate.

Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose?

L2TP

Darius manages a directory of users for one of the domains within his organization. Which of the following describes the protocol in use for querying the directory?

LDAP

When Daphne tries to sign into the cloud-based email system used by her work, an error notice appears. The credit card that is stored on file appears to have expired after entering into the administrative portal. Which of the following appears to be the problem?

Licensing outage

Cara works for a startup company that up until now has been running on a single virtual machine. The virtual machine is starting to see capacity issues and she is unable to provision more CPU and memory resources to satisfy its needs. Which of the following would allow her to expand the capacity of her company's web server?

Load balancer

Since starting his new job with the government, Noah has seen that certain systems identify data as classified, secret, or top secret rather than dividing individuals into groups and assigning them authorization. Which of the following best sums up these data labeling systems?

MAC

Allen is visiting one of his client's data centers and, after signing in, is escorted through the premises the entire time. He notices that, in order to gain access to the data center, the employee had to swipe a proximity badge, key in a six-digit code, and place his finger on a scanner. Which of the following describes the type of security that he just witnessed?

MFA

Emily has just migrated the email from the company's on-premises data center to a cloud service provider. She has modified the appropriate A records, but e-mail isn't being delivered to the new servers. Which of the following records does she still need to modify?

MX

Sebastian is trying to access a resource that has been labeled as top secret, but he only has secret clearance. Which of the following access control methods does his organization use?

Mandatory access control

Sharon is having trouble logging into the new cloud-based web application that her small company uses. It asks whether she wants to use a local account or an OpenID account. Which of the following is used by OpenID in order to implement authentication?

OAuth

Jadis has just created a new Linux server on the cloud service provider that her company uses. She attempts to SSH into it, and it immediately fails. Which of the following steps might she have forgotten to do?

Open port 22 on the virtual firewall

Frederick is trying to deploy several virtual machines to a new private cloud that his company has just built in their data center. He knows that he needs to configure the virtual machines to have multiple vCPUs, but he also knows that the number of vCPUs needed outnumbers the actual number of total logical cores available on the physical servers. Which of the following might describe one of the concepts he could implement in this scenario?

Overcommitment ratio

Sarah has deployed a private cloud infrastructure that requires users to insert a smart card into their computer or into a card reader in order to authenticate them to use the applications. The smart card is associated with a certificate for each user, which is verified against a certificate authority. Which of the following has she deployed?

PKI

Jordan's manager knows that he is working on implementing a VPN connection between the company's on-premises data center and the cloud service provider his company uses. The manager was concerned that Jordan used an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following protocols was manager was concerned about?

PPTP

Jan has just migrated a virtual machine from the company's private cloud to the cloud service provider his company uses. He wants to see how the system responds as well as compare the original and new baselines. What type of testing should he perform?

Performance testing

Niles manages his company's private cloud. His manager wants to start taking advantage of the benefits that the resources of a cloud service provider can offer. However, upon starting to try and get his company's local Active Directory to authenticate users on the public cloud resources, he can't seem to get it working. Which of the following is the most likely issue?

Platform integration issue

Blake has been examining the logs on one of the servers that he is responsible for that is hosted on a cloud service provider. He finds an instance where one of the employees has managed to give himself unauthorized administrative access on the server. Which of the following has occurred?

Privilege escalation

Owen has been tasked with having multifactor authentication installed for entrances into the company's data center. Which of the following would meet that requirement?

Proximity badge reader and fingerprint scanner

Colm is designating the QoS level to the messages on his corporation's network and has determined a certain type of message should be delivered exactly once when it is sent. Which QoS level should he designate these messages?

QoS 2

Steven has been tasked with planning the move from an infrastructure where administrators and users add permissions to resources individually to one where users are assigned to groups based upon the department they work in and what they do in the department and then assigning the groups to the resources. Which of the following has he been tasked with planning?

RBAC

Rick is planning a deployment of multiple virtual machines that need to have internal IP addresses. He is unsure which address ranges he can use. He knows there is a formal document that outlines the ranges that can be used for internal addresses. Which of the following options is that formalized set of specifications?`

RFC 1918

Cody suspects that his company has been the subject of an attack after reports from multiple users that they are missing files. He examines the logs and sees where it appears that the user logged in successfully for each of the users in question and that the strong encryption protocol was enforced and used each time. Which of the following may have occurred?

Social engineering

Cherise has been tasked with increasing the security of the company's data center. Currently, there is a proximity badge reader on the door. She is considering adding an iris camera to the door. Once it is in place, which of the following factors will be used for authentication into the data center? (Choose all that apply.)

Something that you are Something that you have

Fictional Corp. is trying out a new experimental technology that analyzes how users type as part of a multifactor authentication implementation. Which of the following categories of authentication factors would this fall into?

Something you do

Fred is trying to access the company's cloud-based CRM system while traveling abroad in Europe. He receives a message that access to this application is not allowed from the country he is currently in and lists the IP address detected by his connection. Which of the following factors of authentication is the CRM system using?

Somewhere you are

A network administrator is configuring a VPC in GCP, and manually enters the routes into a routing table. What kind of routing is this considered?

Static routing

Daisy is researching load balancing solutions to implement for a new application that she is tasked with designing and deploying the infrastructure for. One of the requirements is that a client should continue communicating with the same server for the duration of their web browsing session. Which of the following features should she look for in the load balancer?

Sticky sessions

Rose is implementing digital certificates for all of the users in her organization. Which of the following certificate types should she use?

TLS

Several scripts from Fictional Corp. may be copied and pasted into the platform of their cloud service provider to construct new virtual machines with unique requirements. One of the admins checks to make sure everything was configured properly after running one of the scripts, only to discover that certain things weren't. Which of the following is most likely to be the problem?

Template misconfiguration

Sharon has just finished probing her way through a virtual machine that has been causing problems on the company's private cloud looking for clues as to what might be causing those problems. She has a theory of what could be causing the problem. What is the next step that she should perform if she is following the CompTIA troubleshooting model?

Test the theory to determine cause.

Simon was asked to create three Linux virtual machines to host the company's new sales application and database server. He is going to be using the company's cloud service provider and was given the 10.20.30.0/30 subnet to put them on. He immediately tells the person giving him this task that he cannot do what is asked of him. Why?

The /30 subnet is not large enough for 3 virtual machines.

Emily is analyzing the logs for one of the servers in her organization. She sees three failed attempts to log in with an incorrect password. She then sees continued attempts to log in with a different error message. Which of the following could be the reason the error message changed?

The account is now locked after three failed attempts, so the error message has most likely changed from a failed password to one reflecting a locked account.

Jasper was given the IP address of 10.17.101.120/15 for the virtual machine he is to create along with the default gateway of 10.0.0.1. He enters the IP address correctly along with the subnet mask 255.254.0.0. However, the virtual machine doesn't appear to be able to communicate with the Internet when he tries to ping a popular domain name. Which of the following might be the reason why?

The default gateway is incorrect.

Your organization's legal department has requested that you audit the licenses you are using for the operating system your organization uses. As you start analyzing the on-premises cloud systems, you need to ensure that you have the correct number of licenses. Which of the following should you ensure to count on the machine?

The number of CPU cores

Martin is running an analysis on the logs from one of the web servers that reside on the company's private cloud. He finds that some users are accessing a site they shouldn't be able to, as the firewall should have rules to prevent them from accessing the server. Which of the following might be how they were able to access the site?

The rules on the firewall were listed in an incorrect order.

Hershel is working with a virtual network that has the subnet mask 255.255.255.192. He changes the IP address of one of the servers from 172.16.25.183 to 172.16.25.193. What is the result of this change?

The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a router.

Caroline is trying to access one of her company's custom cloud-based web applications. She sees a bright red screen advising that there is a security problem with the site and that she should not trust its contents. Which of the following most likely occurred that an administrator should probably check first?

The site's digital certificate has expired.

Frasier is comparing the logs from the firewall to the logs on the web server after a security incident. He is trying to correlate the events, but it appears that the traffic took several minutes to reach the web server from the firewall for each of the various attempts. Which of the following could be the issue?

Time synchronization

Greta manages the on-premises networks for her company's Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement?

VXLAN

Morgan has hardened the virtual machines in the subnet he's just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment?

Virtual firewall

Glenn has been tasked with creating a few new virtual machines for a new project that will be used by the finance department. It will contain sensitive data about the company and its operations. Which of the following is the most important thing for Glenn to consider as he's creating the virtual machines?

Which region he is creating the virtual machines in

Yolanda wants to see a list of MAC addresses that one of her servers has been communicating with. Which of the following command line tools will display that information?

arp

Justin wants to look at the current IP configuration on a Linux server. Which of the following tools can he use to view this information? (Choose two)

ifconfig ip

Fictional Corp. has assigned each user within their Active Directory implementation a username. This username is a form of:

identity

Geoff is working on a Windows server that has two network interfaces. One is assigned an IP address by a DHCP server while the other is a static IP address. He wants to see what the current dynamic IP address is. Which of the following command line utilities can he use to view that information?

ipconfig

Olivia manages a group of Windows and Linux servers. She knows there is a command that she can use to view currently open network connections that works on both platforms. Which of the following commands will she most likely use?

netstat

Isabel is troubleshooting a DNS issue on one of her Windows servers. Which of the following commands might let her look up the DNS records so she can track down where the problem might be?

nslookup

Jaysen is trying to determine whether one of the new servers he set up on the cloud service provider is reachable and online from his current workstation. Which of the following tools is he most likely trying to use?

ping

Adrienne wants to be able to analyze the traffic coming into a Linux server's network interface. Which of the following command line utilities will allow her to see this information?

tcpdump

Vahé is working on a Linux system and wants to determine which routers a packet will traverse when a packet is sent to a certain destination. Which of the following command line tools can he use to find that information?

traceroute

Denis is trying to determine which route's packets are traveling over when accessing his company's chosen cloud service provider. Which of the following Windows tools can help him discover that information?

tracert

Khalil is designing the configuration for his VMs and has determined it must handle 24 threads simultaneously. How many CPUs are needed if each has a quad-core processor with SMT enabled?

3

Omari is configuring the CPUs for his company's VMs that handle sales. There are a total of 32 VMs that need support, and Omari is using quad-core processor CPUs. To reduce lagging for the customers, the company has decided to disable SMT on the CPUs. How many CPUs does Omari need to configure to accomplish this?

8

In order to make changes, Zara is creating a configuration management tool that uses a system that delivers XML messages to endpoints on multiple platforms. What sort of technologies is she employing?

API

Bob has submitted a modification request, which will need to be examined at the following regular meeting to decide whether or not it should be carried out. Which of the following groups is in charge of examining this modification and approving it or rejecting it?

CAB

A large e-commerce platform sells and ships millions of dollars' worth of goods every day. Which of the following concepts is most likely the most important thing for them to consider in the design of their IT infrastructure?

Minimizing downtime

A company is employing a virtual desktop infrastructure (VDI) for its employees who work at the office some days and at client sites on other days. The user requests a setup where they can save files on their virtual desktop to revisit later. What kind of setup will be appropriate?

Persistent instance

Fictional Corp. has made the decision to outsource the creation of a cloud application that will be used by its sales department. Which method from the list below may the business utilize to request bids for the project?

RFP

Selma is determining what type of network connection to use for her corporation's web server VMs. Which connection mode should she use to connect these servers to the rest of the network?

bridged mode

Fictional Corp. has grown exponentially over the first few years of its existence. Until now it had been using commercial off-the-shelf software. They've decided to create a development team and need to decide what the best method of development management is. Which of the following are the two most common methods that they might choose from?

Agile Waterfall

Fictional Corp has just finished migrating several servers from an on-premises data center to a cloud service provider (CSP). However, users are now complaining that they are running much slower than before. Which of the following would NOT be a contributing factor as to why they seem slower?

Amount of disk space provisioned for virtual machines at the CSP

The creation, upkeep, and retirement of the programs that Fictional Corp. develops and employs internally are overseen by a procedure. Which of the following statements most accurately sums up this oversight and procedure?

Application life cycle management

Janelle's company has adopted the CompTIA troubleshooting model as part of their standard operating procedures to use when troubleshooting issues. She sees the step listed as identify the problem. Which of the following should she do as part of that step?

Ask the user probing questions to determine whether any recent changes have been made.

Greg is deploying a new application that will originally have 1 terabyte of disk space allocated to storing user files. However, since it is a new application, he is unsure how quickly the disk space may fill up and need to grow to accommodate new files. Which of the following cloud features should he ensure is configured correctly so as not to cause any errors to be displayed to users about the storage space being full?

Auto-scaling

Fictional Corp. has recently implemented a change management process where a group of employees, through regular meetings, must approve or deny the changes that are proposed through a formalized process. What is the name of the team of employees that is responsible for approving or denying the requested changes?

CAB

To oversee the IT infrastructure team, Ward has been engaged by Fictional Corp. How they manage all the data about their servers, operating systems, networking hardware, and apps is one of the first questions he poses. He is told that some individuals have some of the data in spreadsheets, but that there seem to be several copies of that spreadsheet circulating. He could choose to implement which of the following?

CMDB

One of the virtual machines on the CSP they use, which runs a couple of the company's apps, has had a new update implemented by George. He checked everything again, compared the outcomes to the original, authorized request, and decided the alteration was effective. What action should George take after that?

Change documentation

One of the internal company-developed cloud apps has received updates from Cara. She opened the internal tracking program and noticed that the change evaluation stage had just been completed. What stage of the change management process should it be at right now?

Change implementation

One of the sales managers has requested improvements to one of the online programs his team uses from the development team. The development team manager told him that although he had made several excellent proposals, they couldn't be implemented without following the prescribed procedure. What should the development manager request from the sales manager?

Change request

Robert has just finished putting into effect a change that the change advisory board has authorized. Which of the following should be done as the next action once the modification has been implemented?

Change review

A small business has made the decision to host its website in-house in its server room since they have the extra capacity. But periodically, for a few days at a time, their website becomes extremely popular, making it entirely inaccessible to all users. Which of the following could help them with their issue?

Cloud bursting

A tiny company decided to host its website internally in its server room because they have the extra space. However, their website occasionally experiences high popularity spikes that render it completely inaccessible to all users for a few days at a time. Which of the following might aid them in solving their problem?

Cloud bursting

Fictional Corp is building a private cloud in their data center. They want to ensure extra resources are available if a server fails. Which of the following technologies might they build their cloud upon?

Cluster

Startup Widgets Inc. wants to control its own hardware and software. They do not have that much time set up in their timetable even though they are aware that finding land on which to build their own data center might take several months. Which of the following would enable them to create their own private cloud using their own hardware and have the option to move into their own data center if necessary?

Colocation

As the new development manager of Widget Co., Frank was just hired. He was hired because he suggested that he could put innovative techniques into practice, such as one where modifications are introduced in little doses every 24 hours. He advised the team members to conduct some research because some of them don't entirely comprehend it. What search phrase would they use to get the details they require to learn more about this approach?

Continuous delivery

Fictional Corp. has previously had a release schedule where changes were released into production on the first and third Saturday of every month. However, it has been suggested that it would be more efficient to push the changes to production as soon as the code has passed testing. Which of the following methodologies is being suggested?

Continuous deployment

A large telecom company currently has both wireless and landline operations and wants to divest itself of the landline division. However, a lot of the servers that run each separate division are located in the same data center. Before they sell off the landline division, they want to migrate the servers out of that data center. Which of the following would be the best and most cost-effective solution so that they can preserve the capital that they have on hand while not taking on any new debt?

Convert the servers to virtual machines and migrate them to a cloud service provider.

Frank is configuring a virtual machine that will reside on a CSP's infrastructure that will eventually need multiple terabytes of storage for data. However, he decides to only configure it with one terabyte in the beginning and then provision more disk space as necessary. Which of the following is the most likely reason for his decision?

Cost

Applications and data from Fictional Corp.'s on-premises physical servers are now being transferred to a cloud service provider. Although they successfully transferred the application code, they still need to move the servers that host the underlying database. Which of the following might provide the most risk when moving database servers?

Data integrity

Thomas has the responsibility of automating as many processes as he can. He starts working on the first system he is aware would substantially benefit from automation. What should he do first before putting the automation into place?

Design a workflow.

The IT management team at Fictional Corp has determined that, given their expanded infrastructure, they should consider automating some of the settings and virtual machine deployments. They wish to leverage APIs for monitoring as well as managing the installation and setup of operating systems and software. Which of the following best characterizes the setting they aim to establish and use?

DevOps

Fictional Corp has built a private cloud in its data center. That data center is in a region of the country that is prone to earthquakes. They want to ensure the company can continue operating if a major earthquake hits and knocks out the power and Internet services. Which of the following strategies should they implement?

Disaster recovery

Darren has been using Kubernetes for container management with the deployments his company has been using on the Google Cloud Platform. However, he is now being told that the company is going to be migrating to a different container management platform with Azure and AWS. Which of the following tools might he need to learn to make this transition and start deploying applications on the new platform?

Docker Swarm

Carrie has just completed checking to make sure the system is now operating regularly after fixing a problem with a troublesome virtual machine. Which of the following should she complete as she closes the ticketing system's issue?

Document findings, actions, and outcomes.

Jason is working on a Saturday afternoon and has determined that a newly discovered vulnerability affects a group of servers that contain critical data for the company. The operating system manufacturer released a fix overnight, but the company's change management processes require approval before patching any of the systems. Which group could possibly give Jason approval on a weekend outside of their normally scheduled meetings?

ECAB

A holiday ornament manufacturer sees traffic increase to their website in a couple of months leading up to the holiday, but then it tapers off and is very low for the rest of the year. Which of the following benefits of cloud computing might they be the most interested in for this use?

Elasticity

Fictional Corp has decided to migrate much of its on-premises data center to a cloud service provider to take advantage of some of the benefits of cloud computing. The most important benefit they found was the ability to expand and grow (or shrink) as needed without any delay due to shipping and installing the hardware required for an on-premises data center. Which common cloud terms were the most important factor in their decision?

Elasticity

Wayne has received reports from users that several web applications are running very slowly at times. He is analyzing the virtual machine they reside on and sees that it is maxing out its resources on a regular basis. Which of the following cloud features should he configure so that more resources would be available on demand?

Elasticity

Jim is a technician at Fictional Corp. and has been assigned a ticket from the service desk to investigate a problem into one of the cloud applications being used by the company. He has a theory as to what could be causing the problem and tested it to determine the actual cause of the problem. Which of the following should Jim do next?

Establish a plan of action to resolve the problem and implement the solution.

John has received a ticket from the service desk describing an issue that a user is having with a cloud application. The ticket describes the issue that the user is having along with the answers to the probing questions that the service desk technician had asked. Which of the following is the next step in the troubleshooting model?

Establish a theory of probable cause.

Pedro is looking for internal and external clues as to what may be causing a problem that has been reported via their ticketing system. Which of the following steps is he currently on from the troubleshooting model?

Establish a theory of probable cause.

Instead of outsourcing the infrastructure to a third -party provider, Craig wants to establish a computer infrastructure that would enable developers within his organization to build apps on a platform that is mostly hosted internally. He does, however, desire simple access to AWS goods. Craig might utilize which of the following to do this.

Eucalyptus

Bonnie has been charged with doing an investigation of the firewall infrastructure at her workplace. The company employs a lot of employees who work remotely from their homes in addition to having several office sites spread out around the United States. She discovers that a large number of the current firewalls are no longer maintained by the manufacturer and has persuaded the corporation to set aside some funds to acquire a replacement. Which of the following options may she suggest in their place?

FWaaS

Sarika is considering using serverless computing to operate some of the applications needed in her company's network. She needs to describe this concept quickly to her team as they try to make the decision. Which of the following best describes serverless computing?

FaaS

A social media organization has grown from its initial startup phase to being widely known within the United States. It has decided that it is time to broaden its horizons and see if it can grow its user base globally as well. They have plans to expand into Europe within the next 12 months. Which of the following should they become familiar with before they start marketing the platform to European users?

GDPR

Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulations out there that pertain to storing PII that are different from other industries. Which of the following sets of laws and regulations is he specifically thinking of that do not apply to other industries?

HIPAA

Fictional Corp. is in need of a cloud service provider. They have whittled down their options to two CSPs that might satisfy their technical requirements after taking into account a number of factors. Which action might they additionally think about doing before committing to any agreements or opening an account on such platforms?

Have the various agreements reviewed by the legal department.

Bill is trying to create a new web application to replace an existing system that is becoming outdated. The old application has been modified a number of times and the code has become rather convoluted over time, so he has decided to start over. However, the application that it is replacing needs to be usable 24 hours a day, 7 days a week, 365 days per year with as little downtime as possible. Which of the following would be the type of system Bill is trying to create by adding in redundancy wherever he can?

High availability

Margaret has designed an application and the underlying systems that it resides on to have a five-nine uptime or 99.999%. Which of the following techniques has she implemented?

High availability

A data center held by Business Management Inc. is used to run numerous internal applications. They want to shift their email to a cloud service provider to guarantee that mail would still be sent in the event of Internet connection failures. They also want to use a single directory service so they don't have to create duplicate user accounts for the internal and external platforms. Which of the ensuing service categories most closely matches Business Management Inc.'s needs?

Hybrid cloud

Multiple internal applications are run via a data center owned by Fictional Corp. To ensure that mail is still delivered in the event of Internet connection outages, they wish to move their email to a cloud service provider. In order to avoid having to generate duplicate user accounts on the internal and external systems, they also wish to use a single directory service. Which of the following service categories best fits Fictional Corp's requirements?

Hybrid cloud

The chief technology officer of an organization just returned from a technology conference where he learned about a set of best practices that many other organizations have put into place to help them be more efficient with their operations. Some of the topics covered by these best practices include change management and systems that store maintenance and configuration information for systems. He has determined that he wants everyone in his organization trained and up to speed on at least the foundational level of knowledge of these practices. What is the topic that the managers in IT should begin looking for training on?

ITIL

Danny is looking at deploying a new application that requires root-level access to the server. He is currently researching the capabilities of various cloud service providers but is only finding one type of implementation that would meet the requirements set forth by the application developer. Which of the following types of cloud offerings is he most likely going to need?

IaaS

Mark is considering installing a new application that needs server root access. He is currently looking into the possibilities of other cloud service providers, but so far, he has only found one kind of implementation that would satisfy the application developer's specifications. Which of the aforementioned cloud service packages is he most likely to require?

IaaS

A user calls into the service desk stating they're having a problem accessing a particular cloud application. The service desk technician asks them some probing questions to see if there have been any changes to their local computer and what they were doing when it stopped working. Which step of the troubleshooting model describes the step that the process is currently at?

Identify the problem.

Ted's job is to convert the organization's on-premises server architecture to a cloud-based system. He is aware that the company's data center's servers are still pretty young and have a ways to go before they need to be replaced. He is aware that security is a crucial consideration in all decisions, though. Which of the following is least likely to be taken into account when deciding how to prepare for secrecy in security?

If the company were to deploy a private cloud, what kind of uptime requirements would the system need in order to meet the SLAs?

Dione is managing the containers her company uses to support various applications. She has written the code for an application and defined its variables and dependencies. Where will she store this information?

In a docker image file

Maria would like to recommend a serverless computing solution to her customer. What is one advantage of serverless?

It is more convenient since the customer doesn't have manage the server.

Max has been hired as a consultant to help revamp the procedures that the IT department uses. He sees a lot of things that they are doing correctly, but sees that the information in the trouble tickets is severely lacking of detail. Which of the following systems would Max most likely recommend putting into place that could have been populated from ticket information if it had been there?

Knowledge base

Ned is working on implementing an open-source container management service because it has some orchestration features that his organization would really benefit from. Which of the following is a possible solution he may be working with?

Kubernetes

On the platform used by his company's cloud service provider, Kevin has developed a web application that will be housed there. However, the database for the application must be located in the data center of the organization, which has a private cloud. Which of the following during connection testing could be the main worry?

Latency

A social video sharing platform has grown quite popular in the United States and has decided to expand to Europe. They want to open a second data center there as part of their expansion. Which of the following is perhaps one of the biggest pieces of the expansion that they want to consider a part of the data storage strategies?

Legal restrictions

For the company he works for, Eddie's virtual machine is currently the only web server in use. Eddie wants to deploy a second web server to assist handle the increased website traffic and handle some of the queries. Which of the following innovations, in addition to the second web server, should Eddie consider implementing?

Load balancer

Kathryn has been given the responsibility of moving a number of on-premises apps from the company's data center servers to a cloud service provider. She has transferred photos from the local systems to the CSP's platform as part of the process, and she now wants to do some tests to see how well the environment grows as demand rises. Which of the following statements most accurately sums up the testing she is conducting at this point in the migration?

Load testing

With the help of a dashboard application, Jeff can quickly view all of the virtual machines that are part of his cloud architecture. He observes that one of the systems has a memory use percentage of 95 percent. Which of the following testing modalities may have been disregarded for that system?

Load testing

The merger of Fictional Corp. and Widgets Inc is now underway. They both utilize several cloud service providers to offer their staff the many apps they require to do their tasks. The firms' IT departments have been charged with combining their IT infrastructures. Combining the directory services for the two organizations so that all users are in a single sizable LDAP database is one of the first things they are considering. Due to the complexity of the deployed apps, switching from one cloud service provider to another is now not an option. Which of the following best characterizes the kind of infrastructure they will have once they have connected all the infrastructures?

Multi-cloud

Alejandro wants to set up a few more virtual machines to use the DHCP services that their cloud service provider offers. The CSP's site offers a number of higher-level categories in which to divide up their products. When configuring this service for his company's use, where should he most likely look?

Network components

A huge Fortune 500 firm wants to transfer 5 petabytes of data to a cloud service provider from its data center, which is packed with servers. According to some projections, transferring all of this data to a cloud service provider may take years. Which of the following would the business most likely need to take into account in order to finish this relocation quickly?

Offline transfer

Aaron's manager is aware that businesses can build their own clouds inside of their current data centers. He has been entrusted with looking at technologies that could retain their data on-premises and make better use of the technology in their data centers. Which of the following items would Aaron suggest?

OpenStack

Juan is implementing automation processes into some of the cloud infrastructures that his organization uses. Which of the following terms best describes the design, development, and optimization of these automation tools?

Orchestration

Roz configures new virtual machines in the company's private cloud. She knows that the virtual machines need a total of 512 GiB of memory. However, the physical machine she's deploying them to only has 256 GiB installed. When configured correctly, which of the following technologies could allow her to deploy the virtual machines to this hardware?

Overcommitment ratio

There have been multiple performance issues with the virtual machines that reside on one of the hosts in the data center at Fictional Corp. After a bit of research, it is discovered that during peak hours, they are all concurrently trying to use all the vCPUs that have been configured for them. Which of the following was set too high in this configuration?

Overcommitment ratio

In its data center, Fictional Corp. currently makes use of a private cloud. The CTO has asked the cloud team to create a hybrid cloud as soon as feasible after learning more lately about hybrid cloud solutions and their advantages. Which of the following categories of cloud services ought they to begin considering incorporating into their system?

Public

Fictional Corp's vice president of sales has just returned from a conference where he learned about a great customer relationship management platform that he would like for the company to begin using. This platform doesn't require any investment in hardware, operating systems, or any other software, and only requires administration of user accounts and configuration of the types of data that it needs to store. Users would access it through their web browser, and the administration and maintenance tasks for the IT department would be minimal. Which of the following is the VP suggesting that the company use?

Public cloud

Chris has discovered a technique for assisting with memory allocation that he can configure on some of his virtualized systems. Using this method, a driver is installed on each of a host's virtual machines. This driver enables the host to control a bogus process on the virtual machine, causing the VM to allocate memory to that process. Rather than using the memory that has been allocated to the process, the host can assign it to another virtual machine so that it can use it instead. Which of the following best describes the memory reclamation process that Chris is thinking about using?

Ballooning

Fictional Corp wants to start migrating a bunch of internal applications to a CSP. However, they are in a rural area, and their only connection option is a T1. However, they know that the move would save them money in electrical expenses and reduce the maintenance burden of monitoring and controlling the various firewalls and other related equipment. Which of the following will likely be the biggest hurdle for them?

Bandwidth limitations

The goal of Fictional Corp. is to investigate its data center's systems to ascertain how they function under typical circumstances and to estimate what resources would need to be placed on a cloud service provider if they were to make that transfer. Which of the following accurately sums up the documents that Fictional Corp. wants to review?

Baselines

Jana is trying to optimize the cloud infrastructure of her organization for availability. She wants to ensure that the virtual machines that normally use a certain amount of memory can use more physical memory up to a predefined level in cases of heavy workloads. Which of the following features should she look at configuring?

Bursting

Fictional Corp has multiple monitoring systems in place to report various events that occur as soon as they happen. However, they have also tried to design the infrastructure so that it can withstand and compensate for these failures and outages and allow the system to still function so that the users do not notice the failure. Which of the following terms could be used to describe the theory they used when designing their infrastructure?

Resiliency

Fictional Corp. has been using its current cloud service provider for the past year. They have been mostly happy with the service provided up until about a month ago when various virtual machines started becoming unavailable for hours at a time. The CSP has a guarantee of a 99.999 percent uptime, which means they should only have about 5.26 minutes of downtime per year. Which of the following defines the guarantee the CSP is not meeting?

SLA

Timothy is in charge of keeping track of how effectively the company's apps are running both on their internal private cloud and on the cloud service provider. The IT department had committed to making sure that the services were available to varying degrees based on their criticality when the apps were first established. He must thus consult the paperwork for each of those services in order to understand how they need to be functioning. Which document is Timothy probably alluding to?

SLA

Jeff has recently started working as a systems administrator at Fictional Corp. He is informed that one of his duties would be overseeing the company's data center's backup procedures for on-premises systems. He is told about documentation that he should use to make sure that everything is done correctly. What type of documentation was he referred to?

SOPs

Fictional Corp. is looking at solutions for their new CRM system for the sales department. The IT staff already has a fairly heavy workload, but they do not want to hire any additional IT staff. In order to reduce the maintenance burden of the new system, which of the following types of CRM should they choose to meet these needs?

SaaS

Faith has been given the responsibility of moving as many systems as she can to the cloud. Although she has a list of the systems that the IT department is aware of, she has overheard staff members discussing additional systems that are not on her list. Which of the following statements best sums up the systems she still needs to learn more about?

Shadow IT

Henry has just been hired as a security engineer and has been tasked with analyzing the cloud infrastructure that the company uses. Which of the following might Henry be concerned about if he discovers that critical data is being stored in that environment?

Shared compute

Brice is working on a plan to move some or all of his company's network to VMs. He is concerned about the cost effectiveness, however, and wants to make sure the VM instances are only used where feasible. Which factor should have the least impact on the total cost of moving to VMs?

The volume of ingress traffic

Tiffany is considering the use of an instance template for use with her company's VMs. What is the major advantage of using an instance template?

They ensure every instance is configured in the same way. They allow data to be transferred more rapidly.

Carolyn is considering using containers for her network instead of VMs. Choose two of the major advantages of using containers instead of VMs?

They use only the parts of the OS needed for the application. They allow the use of more applications than VMs.

Vikal decides to use a hypervisor that is installed directly into the firmware of his servers at his publishing company. What kind of hypervisor has he installed?

Type 1 hypervisor

Creative Co. needs a new private cloud setup. However, they want their field workers who operate remotely to have access to the private cloud's resources. Which of the following solutions may Creative Co. put into practice to enable users to establish secure connections from their PCs across the Internet into the private cloud?

VPN

Brian has built a private cloud in his company's data center. He has just racked up a server and turned it on for the first time. Which of the following extensions might he see that he should ensure are enabled in the UEFI/BIOS setup before continuing to install the operating system and configure the server to be part of the private cloud? (Choose two.)`

VT-x AMD-V

Teddy recently got a call from a user who said that after Teddy repaired one problem with a cloud-based program a few hours ago, another section of the application is now malfunctioning. He most likely skipped which of the following phases in the troubleshooting model?

Verify full system functionality, and, if applicable, implement preventive measures.

Which of the following steps of the troubleshooting model, if not done, could potentially cause users to experience new issues or problems with a system?

Verify full system functionality, and, if applicable, implement preventive measures.

Martin has been tasked with identifying any holes in the organization's cloud infrastructure and producing a report that will be given to top management. He is not to really try to take advantage of any of the vulnerabilities to see how much they could compromise the system. Which of the following is the request made to Martin?

Vulnerability testing

Anna is trying to determine how to organize the virtual machines at the university where she works. There are 30 VMs that are all located at the main campus that must run high-speed applications. Which placement group should she choose for these VMs?

cluster

Kim is trying to keep the containers used to support the applications being used by her 80 employees from being overloaded with traffic. She decides to configure the containers to only accept a maximum of 60 requests for work at any one time. What term describes the strategy she is using?

concurrency control

Robert is troubleshooting the containers his company uses to run some of its applications. He decides to set a constant flow of traffic to the service to avoid service slowdowns. What is this an example of?

rate limiting


Set pelajaran terkait

Real Estate Principles Chapter 19

View Set

Japanese Anime/Manga Unit 5: Hybridized new genres

View Set

Chapter 14: Gene Regulation in Bacteria

View Set

Chapter 9: Understanding Landscapes

View Set

Chem-Bonding and Intermolecular Forces;thermodynamics

View Set

CH 13: Palliative and End-of-Life Care

View Set