Cloud Computing Midterm

Ace your homework & exams now with Quizwiz!

Q. What type of account do you use to sign into Azure CLI? a. Cloud b. Microsoft c. Portal d. Windows

B

Q. Which AWS service is used to manage VM instances? a. Billing Dashboard b. EC2 c. VPC d. Management console

B

Q. What is the default port for RDP (Remote Desktop Protocol)? a. 443 b. 80 c. 3389 d. 22

C

Q. VM Instances in Azure Which Azure service is used to create VM instances? a. Virtual machines b. Kubernetes c. App services d. Resource groups

A

Q. What Windows command shows network interface information? a. ipconfig b. ifconfig c. iwconfig d. inconfig

A

Q. Which feature in Azure is used to track expenses? a. Subscriptions b. Resource groups c. Blades d. Notifications

A

Q. Which protocols can create a secure remote access connection between a Windows computer and a Windows VM instance? Choose all that apply. a. RDP b. FTP c. HTTP d. SSH

A,D

Question : Your team needs a tool that can provide guidance and recommendations that can be used to improve an Azure environment. Which of the following service can be used for this purpose? • Azure Advisor • Azure Cognitive services • Azure Application Insights • Azure Devops

A. Azure Advisor The Azure Advisor tool can be used to provide recommendations for your Azure environment from different fronts such as Security and Cost.

Q. Douglas is setting up VM instances on a Hyper-V server to host some basic web server and legacy software workloads along with some light app testing. He needs to know how many vCPUs to allocate to each VM. The server's motherboard has two CPU sockets, both populated with eight-core processors, and hyperthreading is enabled. He's decided that the VMs' workloads can easily handle a 3:1 overcommitment ratio. He plans on creating 15 VMs at first and eventually increasing to 25 VMs as he fine-tunes the workloads and resource allocations. How many vCPUs should Douglas initially allocate to each VM? A. 1 B. 6 C. 32 D. 96 Ø

Answer: A. 1 Ø Explanation: For this relatively small virtualization scenario, best practice is to start with one vCPU and increase that number only as needed.

Q. Mykel and his team recently completed a major migration of several business-critical applications to the AWS public cloud, and they're performing some final tests before going live. While taking a short break at a nearby coffee shop, Mykel decides to remote into one of the primary servers from his personal laptop so he can make additional configuration changes. As he's completing the changes, it occurs to him that this particular server is supposed to be locked down to provide access only from his computer back at his desk. He pokes around in the account to see how much access he has with this user account and then returns to the office to address the problem. What kind of testing did Mykel use to identify this issue? A. Vulnerability testing B. Penetration testing C. Performance testing D. Load testing

Answer: B. Penetration testing Ø Explanation: Mykel discovered a vulnerability and also took advantage of that vulnerability, which is penetration testing

Question : Your team needs to use a tool that can be used to build intelligent Artificial Intelligence based applications. Which of the following service can be used for this purpose? • Azure Advisor • Azure Cognitive services • Azure Application Insights • Azure Devops

Azure Cognitive services Explanation Azure Cognitive services is a collection of SDK's and API's that can be used to develop applications with Artificial Intelligence capabilities without the developer needing to have knowledge on the underlying implementation.

1. What is Virtual Network and Subnet?

a. A Virtual Network (VNet) is a logical representation of your network in the cloud. b. Subnet is a range of IP addresses in the VNet

1. What is Quality of Service?

a. Quality of Service (QoS) is a set of technologies for managing network traffic in a cost-effective manner to enhance user experiences for home and enterprise environments.

Q. Vicki works from home developing apps for managing highly regulated data, such as patients' medical history or customers' payment information. She's always concerned with prioritizing data security and ensuring that no programming loopholes would allow hackers access to data managed by one of her apps. During the development process, Vicki performs some initial, lightweight testing of her apps in a few OS environments running in VMs on her home computer, and then she passes each app along to a team at another location for more intense and thorough testing. Which hypervisor is Vicki most likely using? A. ESXi B. VirtualBox C. Windows Server 2016 D. XenServer

Answer: B. VirtualBox Ø Explanation: Vicki is running a hypervisor on her home computer for light testing. Only a type 2 hypervisor is needed, and VirtualBox is the only type 2 hypervisor in this list.

Q. Ginny is building a series of subnets in her AWS cloud that will host VMs used to test applications her company is developing. The applications are tested by a team of users who are specialists in their respective industries. Ginny establishes the subnets, spins up a few experimental VMs, and starts testing her connections. She realizes there's a misconfiguration in one of the VMs and needs to remote into it to make some changes. What piece of information does Ginny need to collect from AWS first? A. The VM's user password B. The subnet's private IP address C. The VM's public IP address D. The AWS account's key pair

Answer: C. The VM's public IP address Ginny will need to check her AWS account to determine the VM's public IP address in order to establish the remote connection. She should already have the VM's user password

Q. Brian is moving his network's backup DHCP server to a VM running Ubuntu Server. The VM will provide a couple of other network services as well, including DNS. Which networking mode should Brian assign to the Ubuntu VM? A. NAT mode B. DHCP mode C. Host-only mode D. Bridged mode Ø

Answer: D. Bridged mode Ø Explanation: The VM must be accessible to the rest of the network through a static IP address. Only bridged mode will make the VM consistently available to other network devices.

Q. Anika has run into a problem with the VPN connection to her company's cloud-hosted database. She has a good Internet connection and can access her work email account, which uses the same sign-in credentials as the VPN. But she still can't pull reports from the database service. She calls Patrick, who works for the company's help desk. As Anika describes the problem to Patrick, he tells her to try again and make sure she's using the right password, then to restart her router, and if that still doesn't fix it, to restart her computer. Which troubleshooting step did Patrick fail to complete in the correct order? A. Test the theory to determine cause B. Document findings, actions, and outcomes C. Establish a plan of action and implement the solution D. Establish a theory of probable cause

Answer: D. Establish a theory of probable cause Ø Explanation: Patrick tried several haphazard possible solutions that were unrelated and disorganized without considering what the probable cause of the problem might be.

Question : Your team needs to have a tool that can be used to monitor web applications deployed to Azure. Which of the following service can be used for this purpose? • Azure Advisor • Azure Cognitive services • Azure Application Insights(Correct) • Azure Devops

Azure Application Insights(Correct) Explanation Azure Application Insights can be used to monitor web applications on different platforms. This tool can also be used to diagnose issues that can occur within your web-based applications.

Q. What Azure resource allows an instance to be accessed from the Internet? a. Private IP address b. Virtual network c. RDP d. Public IP address

D

Q. What cloud resource gives VM instances access to a subnet? a. Dashboard b. Address space c. VNet d. Interface

D

1. What is an availability zone in Azure?

a. Availability Zones are physically separate locations within an Azure region. Each Availability Zone is made up of one or more data centers equipped with independent power, cooling and networking.

1. What is Blobs in Azure?

a. Blobs - Massively scalable object store in the cloud i. Simple REST interface (Put, Get, Delete) ii. Data sharing - share documents, pictures, video, music, etc. iii. Big Data - store raw data/logs and compute/map reduce over data iv. Backups - data and device backups

1. What is Cloud Computing?

a. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. b. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.

1. What are three service models in Cloud Computing? Explain each service in detail.

a. IaaS or Infrastructure as a Service is basically a virtual provision of computing resources over the cloud. An IaaS cloud provider can give you the entire range of computing infrastructures such as storage, servers, networking hardware alongside maintenance and support. b. Platform as a Service or PaaS is essentially a cloud base where you can develop, test and organize the different applications for your business. Implementing PaaS simplifies the process of enterprise software development. The virtual runtime environment provided by PaaS gives a favorable space for developing and testing applications. c. SAS i. Affordable - SaaS is affordable as it eliminates the costs involved in the purchase, installation, maintenance and upgrades of computing hardware. ii. Anywhere Accessibility - With SaaS, you can access the services from anywhere using any device such as smartphones, which eliminates the constraints set by on-premise software. iii. Ready to Use - You can quickly set up SaaS services so that they become functional in no time. All it takes is that you sign up for the service to get access to fast and powerful computing resources.

1. What is load balancing? Why need it?

a. Load balancing is a technique to distribute workload evenly across two or more computers, network links, CPUs, hard drives, or other resources, in order to get optimal resource utilization, maximize throughput, minimize response time, and avoid overload. b. Needs: i. Improve resource utilization ii. Improve system performance iii. Improve energy efficiency

1. Difference between Public cloud and Private cloud?

a. Public Cloud i. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. ii. Also known as external cloud or multi-tenant cloud, this model essentially represents a cloud environment that is openly accessible. iii. Basic characteristics: 1. Homogeneous infrastructure 2. Common policies 3. Shared resources and multi-tenant 4. Leased or rented infrastructure 5. Economies of scale b. Private Cloud i. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. ii. Also referred to as internal cloud or on-premise cloud, a private cloud intentionally limits access to its resources to service consumers that belong to the same organization that owns the cloud. iii. Basic characteristics: 1. Heterogeneous infrastructure 2. Customized and tailored policies 3. Dedicated resources 4. In-house infrastructure 5. End-to-end control

1. What is Elasticity?

a. The ability to apply a quantifiable methodology that allows for the basis of an adaptive introspection with in a real time infrastructure.

1. What is thin client?

a. Thin client is a computer or a computer program which depends heavily on some other computer to fulfill its traditional computational roles. This stands in contrast to the traditional fat client, a computer designed to take on these roles by itself. b. Characteristics: i. Cheap client hardware 1. While the cloud providers handle several client sessions at once, the clients can be made out of much cheaper hardware. ii. Diversity of end devices 1. End-user can access cloud service via plenty of various electronic devices, which include mobile phones and smart TV. iii. Client simplicity 1. Client local system do not need complete operational functionalities.

Q. Raul's company has narrowed their options to a small handful of CSPs. All of these CSPs offer a wide variety of cloud services and meet all of the company's security requirements. Cheri, Raul's boss, is now asking him to recommend what type of cloud services would best fit their needs. She explains they want to start with cloud-based email and an office productivity suite that enables easy file sharing among team members. Which cloud service model should Raul recommend they use to accomplish these goals? A. SaaS B. IaaS C. RaaS D. PaaS

Answer: A. SaaS Explanation: Email, office productivity apps, and file sharing are all services offered by SaaS products.

Q. What step must be performed before attaching a new interface to a VM? a. Create a new subnet. b. Calculate a new subnet. c. Power down the VM. d. Delete the VNet.

C

Question : A team currently has several computers in their on-premise environment that runs on Windows 10. They need to share files by enabling mapped drives from the computers. Which of the following would be an ideal storage solution for this requirement? • Using the Azure storage - BLOB service • Using the Azure storage - File service • Using the Azure storage - Queue service • Using the Azure storage - Table service

Using the Azure storage - File service (Correct) Explanation You can use the File service to create file shares. The file shares can be mapped as network drives from the Windows 10 machines.

1. What is Scalability?

a. A desirable property of a system, a network, or a process, which indicates its ability to either handle growing amounts of work in a graceful manner or to be readily enlarged.

1. What is Network Security Group?

a. A network security group contains security rules that allow or deny Inbound / Outbound network traffic to or from several types of Azure resources.

1. What is Service Level Agreement?

a. A service-level agreement (SLA) is a contract between a network service provider and a customer that specifies, usually in measurable terms (QoS), what services the network service provider will furnish

1. What is Application Security Group?

a. Application security groups enable you to configure network security as a natural extension of an application's structure, allowing you to group virtual machines and define network security policies based on those groups.

1. What is fault tolerant system? What are the characteristics of the system?

a. Fault-tolerance is the property that enables a system to continue operating properly in the event of the failure of some of its components. b. If its operating quality decreases at all, the decrease is proportional to the severity of the failure, as compared to a naively-designed system in which even a small failure can cause total breakdown. c. Four characteristics: i. No single point of failure ii. Fault detection and isolation to the failing component iii. Fault containment to prevent propagation of the failure iv. Availability of reversion modes


Related study sets

SURVEY SYMBOLS: Subdivision and/or Consolidation

View Set

EMT - MOD 7 Review: Chapters 32-34

View Set

273 Week 2 PrepU: Skin Integrity and Wound Care

View Set

Chapter 18: Sexually Transmitted Infections

View Set