C-Plus Chapter 9-10

Ace your homework & exams now with Quizwiz!

Mavis wants to develop an application that can talk to one of the cloud-based services her company uses. As part of the design process, she needs to take into account the structure and type of messages that are sent back and forth from the service. Which of the following describes the endpoint that her application will be communicating with for that service?

c. API

Gary is reading one of the marketing e-mails that he receives as part of his company's Azure subscription. This particular e-mail highlights a tool that he's interested in learning more about. The tool is described as a security tool that relies on learning-based analytics to better monitor activities, identify threats, and prioritize alerts for follow-up by security staff. Which of the following should he look up in the Azure portal to learn more about it?

a. ATP

Cadence is analyzing disk space usage on one of the Linux virtual machines she manages. She noticed that log files are taking up more space than necessary. Which of the following automation jobs could she set up to resolve this issue?

a. Archive all log files older than 30 days to cold storage.

Startup Inc. has chosen the Azure platform as its cloud service provider. Which of the following tools might they use for configuration management, update management, and process automation?

a. Automation

Miriam is performing a quarterly review of all web-based applications that the company uses. She sees that one of the finance department's applications has an update available for it. After downloading the update, she applies the update to a duplicate of the production environment that does not receive any traffic. After verifying that everything looks good, she transfers all of the traffic over to that server and updates the formerly active server. Which of the following deployment types has she chosen for this application update?

a. Blue-green deployment

Piper needs a storage solution for snapshots of the virtual machines and databases within her company's cloud infrastructure. These snapshots should rarely be needed. Which of the following solutions should she use?

a. Cold backup

Omar needs to install an update to the web servers so that the development team can use some of the new libraries and functions for the .NET application they are modifying. However, upon trying to install the latest .NET framework, an error is displayed stating that another update must be installed first. Which of the following technical terms describes why the .NET framework cannot be installed yet?

a. Dependencies

Syed is implementing an event monitoring system that will be able to look at all events and determine if there is a pattern established by the different events that occur. Which of the following would be a feature of this monitoring system?

a. Event correlation

Marvin runs one of the operating system utilities on a server and receives a message that several of the files appear to have been modified or corrupted. The operating system is recommending reinstalling those files from the installation source. Which of the following tools could have alerted Marvin or other administrators when the files were originally changed?

a. FIM

Sandra gets a text message at 9 pm while she is at home that there is a problem with one of the servers she is responsible for. The message indicates that it is a major issue. She hurriedly grabs her laptop and logs into the VPN to check on the problem and start troubleshooting, but finds that the system appears to be running just fine. Which of the following might describe this situation?

a. False positive

Eleanor is trying to secure a couple of servers that she manages. After hardening the servers, she installs a piece of software on each of them that will detect intrusions, log the event, and notify the administration team. She does not want it to automatically stop the intrusions due to the possibility of false positives. Which of the following has she installed?

a. HIDS

Trey is designing a system that should maintain a 99.999% uptime by implementing multiple data centers located in different geographical regions with multiple Internet connections at each data center. Within the data centers there are redundant routers, switches, and even multiple private clouds. Which of the following is Trey designing for?

a. High availability

Teri logs into the cloud service provider's portal and reviews the reports that are available as part of her monthly analysis. She sees that one of the web applications currently using four web servers is experiencing an increase in traffic after a recent marketing campaign by the company, and she decides to add another two virtual machines to act as more web servers to help ease the load on the existing ones. Which of the following describes the procedure Teri performed?

a. Horizontal scaling

Sven wants to ensure that his infrastructure is protected from attacks against the applications themselves and the automation and orchestration that helps keep everything together. In some areas he implements a technology that can only detect attacks, while in others he implements a technology that can also stop the attack in progress. Which of the following terms can be used to describe the technology that he has implemented?

a. IDP

Mason is doing an annual review of his company's disaster recovery procedures. Currently, the organization stores all of the backups for its on-premises data center on a cloud service provider in cold storage. However, the company has seen rapid growth over the past couple of years and he's concerned that this could be a problem. Which of the following might be the concern?

a. Local bandwidth limitations for restoring from the cloud.

Seth is trying to determine whether his organization has enough spare parts on hand in case of component failure within their private cloud. One of the components that he is analyzing the inventory for is hard drives and finds that on average the model they use lasts three years before they fail. Which of the following terms describes this concept?

a. MTTF

Merlin wants to create a new script that will communicate with several of his CSP's APIs. Which of the following scripting languages might he use to create the script?

a. Python

Garrett has developed an application and is ready for the user acceptance team to go through and verify that everything is functional and working as it should while reporting any bugs they may identify. Which of the following environments should he copy the application to for them to begin their work?

a. QA

Desiree works for a web hosting company that adds new accounts and removes others on a regular basis. Which of the following should she automate for customers that have cancelled their service? (Choose two.)

a. Remove DNS entries for their sites. b. Archive the customer's sites and logs for 30 days and then delete them.

Fictional Corp currently has an alerting system set up to e-mail notifications to administrators. However, it has been pointed out that it may take a while for an administrator to see one of those e-mails, so they would like to have notifications sent to their mobile phones instead. Which of the following settings should they look for in the configuration of their alerting system?

a. SMS

Zane's company has chosen to use Ansible for its primary automation tool. Which of the following is the default protocol used by this tool that he might need to ensure it is open on the firewall in order for it to work correctly?

a. SSH

Dave manages a large network and has researched a bunch of automation tools. He decides on one that requires the installation of an agent, called a minion, on the nodes to be automated, which are then called minions. Which of the following automation tools did Dave choose?

a. SaltStack

Summer is analyzing one of the company's database servers and sees that it is currently using 90 percent of its allocated disk space. Which of the following could she do without creating another server to split the load with?

a. Scale up

Wyatt notices a message on the dashboard that one of the servers is no longer reachable by the automation system. He remotes into the server by name and is able to connect just fine. He pings the server by name from his workstation and it comes back with a different IP address than what is in the automation system. Which of the following is a possible reason why?

a. The server somehow changed from a static IP address to DHCP and is now receiving a different IP address and the automation system isn't configured to detect IP address changes automatically.

Julia uses AWS's CloudFormation tool to manage many of her company's resources. Which of the following may be used as part of the template configuration? (Choose two)

a. YAML c. JSON

Amber has been researching automation tools and believes that Puppet is the best option for her company to use. She is currently testing the open-source version but is considering asking for budget to be allocated so that she can implement the enterprise version. How many nodes can she run the enterprise version on before needing to start paying for the product?

b. 10

Serena wants to implement as much automation in her organization as possible. One of her next tasks is to create a process where the system can duplicate a virtual machine on the fly. Which of the following terms might describe this automation process?

b. Cloning

Fictional Corp has chosen to use AWS as its cloud service provider. One of the key benefits that it liked about the platform was a service that allows technicians to monitor metrics across AWS services by collating data in one or more dashboards, tracking events, or generating alerts. Which of the following AWS services were they impressed by?

b. CloudWatch

Jennifer is analyzing her company's backup plan as part of business continuity planning. She finds that the cloud service provider that her company uses offers a service that would allow her team to spin up VMs from existing images in order to bring systems back online quickly. Which of the following would describe this offering from this CSP?

b. DRaaS

Fictional Corp has multiple branch offices all over the world with servers located in them so that the web applications they offer to their local users are as fast as possible. They also have applications installed on them that are offered to their customers for the same reason. Which of the following terms might describe these branch offices and the infrastructure Fictional Corp is using?

b. Edge site

Fictional Corp has decided to use a cloud service provider rather than continue to build out the standard infrastructure they had been creating and using in their on-premises data center. The primary deciding factor is that the cloud services can add or remove resources from servers or add or remove virtual machines without any human intervention. Which of the following features is the reason why Fictional Corp chose to use a cloud service provider?

b. Elasticity

Fatima is implementing a new monitoring system that is looking for detectable changes in a cloud resource's state. Which of the following describes these changes of state?

b. Event

Tomas is going to be deploying a new cloud-based point-of-sale application for the organization that will be run within web browsers on computers located in his company's retail stores. He knows that the system must experience as little downtime as possible. Which of the following technologies might he choose to implement?

b. Failover cluster (FC)

Sigmund has created a new web application server for the psychology department at the university he works for. He wants to install a tool on the server that will detect any security breaches, alert the administrative team, log the event, and attempt to stop the security breach before the attacker is able to gain further access or cause any damage. Which of the following types of tools might he install?

b. HIPS

Marty has set up site mirroring to create a duplicate of the web server cluster. The clusters are arranged in an active-active configuration so that they both answer requests simultaneously. If something ever happens to one of the clusters, the traffic will transfer over to the other. Which of the following describes this type of configuration?

b. Hot standby

Jeanette just finished watching a video on a popular social media site about a technology that can provision and manage IT infrastructure through configuration files that can be automated rather than interactive tools that require manual configuration. Which of the following technologies was she learning about?

b. IaC

James is looking at his company's dashboard that is laid out with a number of metrics and goals that are measured for the company's cloud deployment. Which of the following is a common term used for a metric that the company may measure and report on?

b. KPI

Alex is working on new corporate guidelines that prioritizes services for business continuity protection and how much money should be invested in protecting those resources. These guidelines support the standards defined by the service level agreement. Which of the following is the document described in this scenario?

b. OLA

Zoie is using AWS as her company's chosen cloud service provider. She is interested in one of their service offerings that allows you to design the backup resources you need and leave them in a stopped state so you're not charged as much as what you would pay for running services. Which of the following is the method that this describes?

b. Pilot light

User acceptance testing has just been completed on a new application and it is ready for the rest of the user base at Fictional Corp to start using it. Which of the following environments should the application be copied to?

b. Production

Reina has configured an orchestration model for her company's infrastructure that requires servers to connect to the centralized server once an hour to determine if there should be any configuration changes made. Which of the following is she using?

b. Pull model

Taryn is creating the service design package for a new application. As part of the initial design, she needs to consider company policies and guidelines. One of those guidelines states that the category of service she's designing should not take any more than 4 hours to restore. Which of the following describes the guidelines she needs to take into account?

b. RTO

Tanesha is currently documenting all of the steps necessary to perform various functions that her team is responsible for. Which of the following describes what she is creating?

b. Runbook

Wayne is looking for an application that can collect health, performance, security, and availability information on network resources. Which of the following types of technologies should he begin researching?

b. SNMP

Trish has been analyzing the company's resources on the cloud service provider her company uses. She sees that a cluster is running at near capacity and decides to add another virtual machine to the cluster. Which of the following would describe this scenario?

b. Scale out

Taj needs to install a set of updates for an application server that will restart the server three times. Which of the following should prevent at least some of the users from calling in to report an outage? (Choose two)

b. Schedule a maintenance window. c. Perform the update when the fewest number of people are using the application.

Fictional Corp has guidelines in place that the business continuity processes should be reviewed at least once per year. As part of the review, members of the various teams responsible for carrying out certain activities meet in a conference room to discuss the business continuity plan and the disaster recovery plan and look for any gaps that may exist. Which of the following is the type of review that they are doing?

b. Tabletop exercise

Fictional Corp has recently changed its server naming convention. Halfway through the renaming, the automation stops working. Which of the following should have been done as part of the process?

b. The automation configuration should have been updated as each server name was changed.

Bob pulls up the company's dashboard and sees that one of the virtual machines is running low on storage space. He logs into the cloud provider's portal and increases the size of the virtual disk so that it will not run out unexpectedly and start causing errors. Which of the following processes has Bob just performed?

b. Vertical scaling

Jacob needs to come up with a plan so that if a natural disaster was to strike their primary data center, another data center could be brought online within two days. Which of the following solutions should he recommend?

b. Warm site

Jack gets an alert that one of his web servers is receiving more requests than it can handle given its current resources. He has decided to implement vertical scaling to resolve the issue. Which of the following could he do to meet his objective?

c. Add more vCPUs and memory to the virtual machine.

Fictional Corp's primary datacenter is located in an area that sees seasonal hurricanes every year. One particularly bad hurricane hits the area and knocks out power for the area. The generator only has 6 hours of runtime after the power goes out. Which of the following documents should they immediately reference to determine how to keep things running after the generator is out of fuel?

c. BCP

Carrie's company did not have a sufficient disaster recovery plan in place and has just had two servers fail at the same time. Their backups are a day old, but only includes the data being used by the applications that were on the servers. Which of the following describes the restoration process that she will have to pursue?

c. BMR

Ronan has just received notification of a critical update that is available for one of the operating systems that his company uses. He downloads it from the OS developer's website and patches a couple of the systems. He then allows a small amount of traffic to those servers so he can verify that there are no new error messages or issues with the deployment. Once he's verified that they have updated successfully, he issues the patch to the rest of the servers running that operating system. Which of the following types of deployments has he just performed?

c. Canary deployment

Patricia's manager informs her that the company has leased a new office space that they do not plan on using except in case of an emergency. The power is already on for the building, but she needs to locate an Internet connection for the building and arrange for a minimal level of service that can be quickly increased to faster speeds in the event that they need to use it as a data center. Which of the following describes the type of facility that Patricia's company is setting up?

c. Cold site

Sheri has been asked to create or find a commercial off-the-shelf software that can give her company's technicians a quick overview of critical services and draw attention to issues that might indicate problems. Which of the following systems is she being asked to implement?

c. Dashboard

Niles is analyzing a server and finds a problem with one of the applications. He didn't receive any notifications and thinks that perhaps it got lost in his spam folder or something else happened. After scouring the logs, he doesn't see any notifications or alerts in the system at all. Which of the following describes this situation?

c. False negative

Cecil is interested in using more of the tools available from the cloud service provider his company has chosen to use, AWS. He sees that they have various security tools available including a threat detection tool that relies on machine learning, anomaly detection, and threat intelligence to identify threats and trigger events or functions. Which of the following is the tool that he may be interested in implementing?

c. GuardDuty

Amari is planning on deploying a failover cluster for a new cloud-based deployment. She works for a comedy television channel and needs to ensure that users can access their streaming services 24/7/365. Which of the following technical terms might describe the primary benefit that she is hoping for by implementing this technology?

c. HA

Katy wants to make a few automated API calls from a new application that she is developing. Which of the following might be a valid structure for the data that she needs to send to the API endpoint?

c. JSON

Fictional Corp has decided that it wants to automate as much of the infrastructure as possible. As well, it has decided to outsource some of the monitoring capabilities. Which of the following might they outsource some of these tasks to?

c. MSP

Gisella has just returned from a security conference where she won a free year of protection and support for her company with a device that will detect intrusions on her network, alert the administrators, and log the events. Unfortunately, it will not try to stop the intrusion. Which of the following has she won?

c. NIDS

Kylie has a number of processes that she has implemented automation for. As she was researching on the best way to automate another process, she came across some information about a technique for optimizing automation processes into a single workflow. Which of the following describe this technique?

c. Orchestration

Strom works on a team that manages a number of nodes to provide commercial e-mail list services for companies. With their current infrastructure and volume, it is sometimes necessary to change the configuration of various nodes very quickly to be able to handle other functions. Which of the following would result in the quickest configuration changes being applied to the nodes?

c. Push model

Benji's manager tells him that the company is considering some changes to the backup policy because management has decided that it cannot lose any more than 2 hours' worth of data. Which of the following policies, or goals, is the manager describing?

c. RPO

Sam is reviewing the agreements that Cheers Inc. has with their chosen cloud service provider. One of those agreements states that the RTO is 2 hours and that the system will maintain a 99.9% uptime. Which of the following describes the guarantee that Sam is currently reviewing?

c. SLA

Cherice has just completed an audit of a server group that she has recently taken over. She found a number of accounts that were still active even though the users no longer worked for the company. Which of the following should she do to prevent this issue in the future?

c. Set up an automation task to disable accounts that have been inactive over 30 days automatically and send the administrator a notification.

Adele is looking at the options for automation tools and needs to choose one that does not require the installation of an agent. Which of the following tools might she choose?

d. Ansible

Olina is fairly new at Fictional Corp and is used to working at much smaller companies. Most of her former jobs have all been manual work. However, she has been told that because of its size, her new company prefers to implement technologies that can perform various processes and procedures without human intervention so that humans can spend their time monitoring the systems for errors and fixing problems when something goes wrong. Which of the following describes what Fictional Corp has implemented to much more of an extent than her previous company?

d. Automation

Quincy has been working for an organization that implemented a business continuity plan in order to plan for how to continue doing business in the case of some form of a disaster. He then goes to work for another organization and finds that they call this plan something else. Which of the following terms might this other organization use?

d. COOP

Fictional Corp has a datacenter located next to a major river. Until now, the area has never flooded before, according to records that exist, but it has now been hit with what is being called a 1000-year flood. A week later the water has receded and employees are able to get back into the building. Which of the following documents should be referenced to determine how to proceed?

d. DRP

Fictional Corp uses a cloud service provider that offers the capability to spin up new virtual machines from existing images. Which of the following is the term that describes that service?

d. DRaaS

Fictional Corp is a large company that provides critical SaaS applications for the medical industry. Even minimal downtime can cause quite a few problems for their clients. Which of the following does Fictional Corp most likely use as part of its business continuity plan?

d. Hot site

Fictional Corp implements multiple methods of keeping attackers out of its network and systems. Some of these systems may simply report on the intrusions while others will attempt to stop them while in progress. Which of the following describes the concept that Fictional Corp has implemented?

d. IDP

Jed has just spent some time analyzing some of the applications on the cloud service provider his company uses. He found that one of the applications was using a lot of resources between the servers that it was deployed on and implemented horizontal scaling to resolve the issue. Which of the following did Jed do?

d. Increased the number of servers available to the application.

Grant is reviewing his company's BCP as part of an annual review. One of the pieces of information that he finds missing is how long on average it takes to recover systems after a failure. Which of the following terms might describe the information he may want to add to the BCP?

d. MTTR

Jose just returned from a security conference where he learned about a technology that he can implement on his network that will detect security breaches on his network, log the event, and alert the administrator. He also wants it to automatically stop the breach. Which of the following technologies could he implement?

d. NIPS

Luc has installed Ansible and is trying to get it working correctly, but cannot seem to make it communicate with the various nodes that he wants to use it on. Which of the following is the most likely issue?

d. Port 22 is not open on the firewall.

Fictional Corp has chosen AWS as its primary cloud service provider. Which of the following automation tools could they use to help with configuring and managing EC2 instances?

d. SSM

Eddie has been analyzing one of the clusters hosted in their on-premises data center. He sees that several of the servers are consistently sitting idle. Which of the following techniques might she want to do?

d. Scale in

Regan has been asked to apply updates to one of the company's web application server farms. He does not want to update all of the servers at once in case there is some sort of an issue that causes a crash or failure. He decides to direct traffic away from a few servers and update those first. Once he has tested that everything is working successfully, he'll allow them to handle traffic again and then do another small group of servers. He'll continue repeating this process until all servers have been updated. Which of the following describes the deployment method that he has chosen?

d. Rolling deployment

Fictional Corp uses a technology to gather all of the log files onto a centralized server. They then use a tool that will analyze these log files and look for correlation of events. Which of the following describes the type of tool that performs this analysis?

d. SIEM


Related study sets

Statistics 2- Regression Diag. Multicollinearity

View Set

Health Promotion/Men & Womens Health NCLEX questions

View Set

Electrolytes PrepU Adaptive Quizzing

View Set