C849 Practice Test B

Ace your homework & exams now with Quizwiz!

You have migrated to the cloud, and users have access to cloud-based productivity software. There are 10 users in the finance group. Each user has a laptop, a tablet, and a smartphone that can access the productivity software. Using a subscription model, how many software licenses will you need to purchase for the finance department? A 10 B 20 C 30 D 25

A 10

Which of the following things are determined by a feasibility study during cloud assessment? Each correct answer represents a complete solution. Choose all that apply. A A migration path to the cloud B Compliance, security, and privacy guidelines C Incident resolution time D Prioritized allocation of resources

A A migration path to the cloud B Compliance, security, and privacy guidelines

Lucas is the network administrator for a company. Management has asked him to prepare a report regarding the performance of the current environment so that they can manage or improve the performance of their environment. What will he use to accomplish this task? A Baseline B Gap analysis C Feasibility study D Multifactor authentication

A Baseline

Which of the following cloud storage types allows files to be broken into more manageable chunks rather than being stored as one entity? A Block B Blob C Object D File

A Block

Jane is working as a cloud architect at ABC Inc. Management has asked her to migrate the on-premises assets to the public cloud model. For that purpose, she has matched VM performance levels to her established baselines/requirements. She knows that her organization may need to adjust hardware resources to match cloud capacity with future growth. What cloud characteristics can she use to match the future cloud capacity? Each correct answer represents a complete solution. Choose all that apply. A Elasticity B On-demand C Resiliency virtualization D Pay-as-you-go E Resource pooling F Availability zones

A Elasticity B On-demand D Pay-as-you-go

Which of the following helps to determine the practicality of the proposed move to the cloud? A Feasibility study B Baseline C Blockchain D Gap analysis

A Feasibility study

What will you use to virtualize a system if you have the following requirements: Allow multiple OSs to share the same host. Manage the physical resource allocation of the virtual OSs. A Hypervisor B Switch C Proxy server D Firewall

A Hypervisor

Which of the following features does a content delivery network (CDN) provide? Each correct answer represents a complete solution. Choose all that apply. A Increased reliability B Increased website performance C Greater elasticity D Resource pooling E Greater scalability

A Increased reliability B Increased website performance E Greater scalability

Which of the following statements are correct regarding a gap analysis? Each correct answer represents a complete solution. Choose all that apply. A It prioritizes the allocation of resources. B It identifies policies that are not being met with the mitigation plan. C It provides a plan for remediation. D It identifies which technical features or functions have been left out of the migration plan.

A It prioritizes the allocation of resources. D It identifies which technical features or functions have been left out of the migration plan.

Which of the following risk responses decides to initiate actions to prevent any risk from taking place? A Mitigation B Transfer C Avoidance D Acceptance

A Mitigation

Which of the following provides directions, guidance, and goals for an organization? A Policy B Agenda C Manual D Procedure

A Policy

You are working as a cloud architect at ABC Inc. Management has asked you to implement an internal virtualized infrastructure to provide the company's employees with on-demand storage which should be accessible through a web interface over the public Internet. Which of the following cloud deployment models will you use to implement this? A Private B Native C Community D Public

A Private

The finance department wants you to convert the IT infrastructure capital expenditures to operating expenditures. Which of the following would do this? A Switch to a pay-as-you-go model B Depreciate the IT assets on a shorter time horizon C Switch to BYOL licensing D Negotiate billing terms for new IT hardware

A Switch to a pay-as-you-go model

You are working as a cloud engineer at XYZ Inc. You are managing the MySQL database backend that runs on a multi-CPU instance that has reached 100 percent utilization. The database can run on only a single server. What should you use to support the requirements of this database? A Vertical scaling B Horizontal scaling C Resource tagging D Pooling

A Vertical scaling

Which of the following is used to store all the components required for executing a microservice in the same package? A Bootstrapping B Containerization C Multitenancy D Federation

B Containerization

Which of the following are not the benefits of using digital marketing? Each correct answer represents a complete solution. Choose all that apply. A Campaign automation and integration B Financial modeling C Data extraction D Enhanced analytics

B Financial modeling C Data extraction

Flora is working as a security analyst at BigCo. She uses the Internet frequently, which increases the probability of external attacks on the company's network and resources. So, she wants to implement a networking service to protect her company's network from external attacks. Which of the following will she use to achieve her aim? A Switch B Firewall C Packet filter D Optical cable

B Firewall

Linux as an operating system utilizes which license type? A Pay-for-use B Free-for-use C Lease-for-use D Rent-for-use

B Free-for-use

Meghan is working as a cloud analyst at Congruence Corp. Management has informed her about the data breach in the company's datacenter. For this, she investigated the security of the datacenter and found that the data in transit are intercepted by an attacker. Which of the following has the attacker compromised during the attack? A Scalability B Integrity C Confidentiality D Availability

B Integrity

You are setting up a cloud solution for your company, and it needs to be optimized for unstructured data. Which storage type is appropriate? A Block B Object C Cold D File

B Object

Which of the following analyses is dependent on the perceived value of an asset? A Quantitative B Qualitative C Perceptive D Evaluative

B Qualitative

Bella has been updating the disaster recovery procedures for her client's business continuity plan. The disaster recovery procedure should define the maximum age of files that must be recovered from backups to restore normal operations. Which of the following will she include in the disaster recovery procedure? A Instance recovery B Recovery point objective C Recovery time objective D Crash recovery

B Recovery point objective

Ben is working as a cloud administrator in a company. His team has developed some new updates/patches for the company's cloud application. Management has asked Ben to verify that the patches developed by his team do not introduce issues in the cloud application. What type of testing does he need to conduct to ensure this? A White-box B Regression C Black-box D Unit

B Regression

You are searching for the right cloud vendor for your organization. Which of the following should be your first step? A Pilot B Request for information C Request for quotation D Request for proposal

B Request for information

Which of the following documents specifies metrics to determine whether a cloud service provider is delivering the things specified in the statement of work (SOW)? A Success criteria B Service level agreement C Request for information D Proof of concept

B Service level agreement

Which of the following keeps data synced between two or more locations in real-time? A Reserved B Synchronous C Asynchronous D Autoscaling

B Synchronous

The municipality has approved the construction of a new water treatment plant that will be directly adjacent to your current data center. This will increase the likelihood of flooding in the area. You make a recommendation to move all of your infrastructures to the cloud. Which of the following risk response is used in the scenario? A Transfer B Mitigation C Avoidance D Reject

C Avoidance

A medical company wants to take advantage of a complex application but wants to realize the cost savings by accessing a shared instance of the application hosted in the cloud. Because of regulatory requirements, what type of cloud delivery model would you recommend to use? A Phased B Private C Community D Public

C Community

Which of the following is the network of devices that can communicate with each other and exchange data? A Blockchain B Containerization C Internet of Things D Secure Shell

C Internet of Things

Which of the following statements are false regarding synchronous replication? Each correct answer represents a complete solution. Choose all that apply A It is limited by the distance between the locations. B It writes data to multiple locations in real time. C It is implemented by a content delivery network. D It records events or actions that have occurred against an asset.

C It is implemented by a content delivery network. D It records events or actions that have occurred against an asset.

Ronald, a cloud+ student, is studying a process that can create workflows, which connect separate pieces of automation. What is he learning about? A Replication B Reserved instance C Orchestration D Patching

C Orchestration

Allen needs to evaluate, test, and deploy software updates. Which of the following techniques will she use? A Asset B Change C Patching D Privilege

C Patching

You want to test a solution from a CSP to show that a new technology works properly. Which type of evaluation should you perform? A Managed B Proof of value C Proof of concept D Pilot

C Proof of concept

William, a cloud administrator, is working on a large-scale migration project that requires moving an on-premises data slot to the public cloud. This on-premises data slot has multiple commercial applications that can't be refactored. Which of the following migration approaches will he use? A Shift and replace B Transactional replication C Rehosting D Rip and replace

C Rehosting

Your CTO wants to ensure that company users in Asia, Europe, and South America have access to cloud resources. Which cloud characteristic should be considered to meet the business need? A Self-service B Shared responsibility C Scalability D Broad network access

C Scalability

Thomas is working as a cloud administrator at BigCo. He received a request from a user regarding application access. The user wants to enter a username and a password at the beginning of a session and access multiple applications, and does not want to re-authenticate himself for accessing each application. Which of the following authentication processes will Thomas use to accomplish this task? A Mutual authentication B Biometric C Single sign-on D Secure socket layer

C Single sign-on

What refers to a short-term process designed to have employees develop skills or obtain knowledge to perform their jobs? A Pilot B Professional development C Training D Proof of concept

C Training

Over the past three months, two windows have been broken in your store's front. Each window has cost several thousands of dollars to replace. You contacted a security company that will install video surveillance cameras and also will patrol the area at random intervals throughout the night for $200 a month. They will also pay to replace any broken window and prosecute any individuals caught damaging property. You weigh the options and determine that it will save you money for at least the first two years. This is best described as what type of risk response technique? A Mitigation B Reject C Transfer D Avoidance

C Transfer

Which of the following security assessments is used to perform tests against known threats and bugs in software that can cause data corruption? A Blockchain B Unit testing C Vulnerability scanning D Footprinting

C Vulnerability scanning

What is defined by the Health Insurance Portability and Accountability Act (HIPAA) and must be protected by an organization under the jurisdiction of HIPAA? A Personally identifiable information B Payment card industry data security standard C Application normative framework D Protected health information

D Protected health information

Layla, a cloud+ student, is learning a backup process that makes a copy of block storage that can be either restored or used as a source of an instance's image. What is she learning about? A Chargeback B Right-sizing C Orchestration D Snapshot

D Snapshot

Which of the following cloud networking services separates the forwarding of network packets from the logical decision-making process? A Firewall B Domain Name System C Content delivery network D Software-defined networking

D Software-defined networking

Which of the following helps to establish the identity of an entity with adequate assurance? A Authorization B Identification C Identity and access management D Authentication

D Authentication

What refers to the copying snapshots of instances to different locations to protect against data loss or corruption? A Geo-redundancy B Replication C Object storage D Backup

D Backup

What refers to the continuous execution of the first three steps (dev, build, and test) in an application development life cycle? A Chargeback B Automation C Continuous delivery D Continuous integration

D Continuous integration

Which of the following stipulates and outlines the books and record-keeping requirements? A Federal Information Processing Standard B Federal Risk and Authorization Management Program C Family Educational Rights and Privacy Act D Financial Industry Regulatory Authority

D Financial Industry Regulatory Authority

You are negotiating an SLA with a CSP. Which of the following high availability guarantees is likely to cost you the most? A Four nines B Three nines C None of these D Five nines

D Five nines

Which of the following is implemented by a content delivery network (CDN)? A Orchestration B Logging C Runbook D Geo-redundancy

D Geo-redundancy

Your current cloud contract is expiring, and you need to quickly move to a different provider. Which type of migration is best in this situation? A Rip and replace B Phased C Shift and replace D Lift and shift

D Lift and shift

Lauren's healthcare provider maintains data such as the patient's health, treatments, and medical billing. What type of data is this? A Payment application data security standard B Payment card industry data security standard C Personally identifiable information D Protected health information

D Protected health information


Related study sets

McGRAW-HILL'S Conversational American English

View Set

Human Resources BUSI 342 Retaining and Recruiting Human Capital Assignment

View Set

Parts of the Brain involved in memory

View Set

Nurs 327 musculoskeletal (final chapters)

View Set