CompTIA Cloud Essentials Practice Questions
What are two aspects of the service transition phase? (Choose two) A. Change Management B. Knowledge Management C. Information Security Management D. Service Level Management E. Financial Management
AB
When creating cloud virtual servers, which of the following must be specified? (Choose two.) A. Username and password B. Server name C. IP address D. Operating system licensing
AB
Which of the following are examples of SaaS? (Choose two) A. Twitter B. Gmail C. AWS S3 D. Azure
AB
Which of the following are often associated with cloud technologies? (Choose two) A. Web-based B. SOA C. Monolithic D. Client-only
AB
The maintenance of software libraries is the most critical for a cloud vendor offering what type of cloud service? A. IaaS B. SaaS C. PaaS D. NaaS
C
What cloud computing characteristic ensures services and data are always reachable? A. Confidentiality B. Integrity C. Availability D. Scalability
C
What does Microsoft use as a virtualization product? A. vSphere B. Fusion C. Hyper-V D. ZenWorks
C
When developing your plan of action, it is most important to consider which of the following? A. Speed of change B. Costs C. Potential effects D. Ease of documentation
C
Where is the most likely use of FC as the communication protocol in storage? A. DAS B. NAS C. SAN D. Object-based
C
Which is not a typical area of interaction between cloud and non-cloud resources? A. Firewalling B. Authentication C. Physical security D. Internet connectivity to the cloud
C
Which network component might cause an issue even though its design is to improve network performance? A. NAT B. SNMP C. QoS D. Virtualization
C
Which of the following cloud features increases the available IT infrastructure resources to meet the demands? A. Reliability B. Resource metering C. Scalability D. Broad network access
C
Which of the following hypervisor types requires the least overhead? A. Type II B. open source C. Type I D. hosted
C
Which of the following is NOT a major focus in this course? A. Business impacts B. Risk mitigation C. General networking concepts D. Technology options
C
Which of the following is not a recommended technique when migrating applications to the cloud? A. Consider a pilot B. Target non-mission critical apps first C. PaaS first D. Target easy apps to migrate first
C
Which of the following is not a typical account lifecycle event? A. Deletion B. Creation C. Move D. Deactivation
C
Which of the following is not an example of a maintenance task we would automate in a cloud environment? A. Cleanup of orphaned resources B. Clearing of log files C. Provision and deployment of a new firewall D. Removal of inactive accounts
C
Which of the following is the MOST likely reason for subscribing to PaaS? A. Virus protection B. Software application access C. Application development D. Infrastructure tuning
C
Which of the following is the meaning of IaaS? A. IT as a Service B. Information as a Service C. Infrastructure as a Service D. Identity as a Service
C
Which of the following might factor into an exit strategy for a cloud customer? A. Vendor lock-in B. Self-service C. Standardization D. Automation
C
In a RAID 6 environment a technician is trying to calculate how many read operations would be made. How many read operations would be required in RAID 6? A. One B. Four C. Two D. Three
D
You must ensure that your business computing resources can quickly grow as business demands change. Which of the following allows this? A. Confidentiality B. Integrity C. Availability D. Scalability
D
[Blank] protects data contents, while [blank] ensures that data has not been tampered with. A. Availability, scalability B. Integrity, confidentiality C. Scalability, availability D. Confidentiality, integrity
D
Which of the following is not a typical concern for your deployment plan regarding a key internal application? A. Dynamic IP address needs B. Direct access to HW requirement C. Large file transfers D. Legacy API usage
A
Which of the following allows authentication based on something you are? (Select TWO) A. Passwords B. Access badge C. Retina scan D. Key fobs E. Voice recognition F. PIN
CE
A webmail service hosted by an MSP for which of the following is considered a private cloud? A. A single company B. Nonprofit companies C. Many companies D. Marketing companies
A
An IT organization tends to be more concerned about service reliability than resource availability when they move to the cloud. True or false? A. True B. False
A
As a developer for a software company, you have decided to build and test your web applications in a cloud environment. Which type of cloud service best meets your needs? A. PaaS B. SaaS C. IaaS D. Xaas
A
Cloud technologies often used a shared infrastructure? True or false? A. True B. False
A
Compliance in the context of the cloud means meeting regulatory or legal requirements. True or false? A. True B. False
A
Data that's been unaltered during transmission is an example of which of the following? A. Integrity B. Authentication C. Accounting D. Logging
A
For which of the following protocols will an administrator configure a trap to collect system state data? A. SNMP B. FTPS C. IPMI D. SMTP
A
IAM is part of what area of ITIL? A. Information Security Management B. Service Transition C. Change Management D. Incident Response
A
In AWS, different Availability Zones are located in which construct? A. Regions B. Data Centers C. Areas D. Continents
A
Load Balancing can provide which of the following? A. Availability B. Troubleshooting C. Compliance D. Auditing
A
The client OS is virtualized with VDI. True or false? A. True B. False
A
True or false? Cloud computing is a form of outsourcing. A. True B. False
A
What is a benefit of PaaS? A. Rapid application development B. Replication C. High bandwidth D. Low latency
A
What is critical to have in place in the event your cloud provider ceases operations? A. Exit strategy B. SLA documents C. Security audit D. Compliance review
A
What is the measure of delay when using cloud services? A. Latency B. SLA C. Packet loss D. Attenuation
A
What protocol is recommended when connecting to virtual machines in your cloud provider? A. SSH B. HTTP C. Telnet D. FTP
A
When a company participates with others to provide cloud services, which of the following is this an example of? A. Community B. Hybrid C. Public D. Private
A
When a company uses its own internal cloud IaaS, which of the following deployment types is this an example of? A. Private B. Community C. Hybrid D. Public
A
When comparing cloud and outsourcing services, the cloud providers have more customers than outsourcing. True or false? A. True B. False
A
When using Hyper-V's TURN OFF feature, data loss could occur within the virtual machine. True or False? A. True B. False
A
Which migration type should be performed if you discover your app did not support virtualization properly? A. V2P B. V2V C. P2V D. P2P
A
Which of the following backs up everything since the last full backup? A. Differential B. Daily C. Read only replica D. Incremental
A
Which of the following commands provides measurements of round-trip network latency? A. ping B. route C. arp D. nslookup
A
Which of the following featured applications were built using component services that could be distributed across connected systems? A. SOA B. Virtualized APIs C. Distributed middleware D. ASP
A
Which of the following is not a major concern or risk when moving to the cloud? A. On-demand B. Integration C. Security D. Replication
A
Which of the following might you need to adjust in order to ping test your EC2 instance? A. Security Group B. S3 C. IAM D. KMS
A
Which of the following should an administrator use when marking VLAN traffic? A. Virtual Local Area Network tagging B. Network Address Translation C. Subnetting D. Port Address Translation
A
Which option describes a benefit of virtualized servers? A. Shared hardware B. Individual hardware per virtual server C. Physical servers taking less room space than virtual servers D. Virtual servers taking less disk space than physical servers
A
Which term from the past describes the sharing of mainframe computing resources? A. Time-sharing B. Time division multiplexing C. Mainframe-sharing D. XaaS
A
Why is the phrase "noisy neighbor" often used in Cloud? A. Contention for shared resources B. SLA failures C. Lack of monitoring tools D. Global regions
A
You are the IT director for a retail clothing outlet. Your competitors are using Internet-delivered inventory, storage, and backup solutions from a specific provider. You conclude it is best that your company use the same services from the same provider. What type of cloud will you be subscribing to? A. Community cloud B. Retail cloud C. Private cloud D. Public cloud
A
_____ is an example of standardization with cloud adoption? A. API B. As a Service C. Patches and updates D. Private cloud
A
What is not a common cloud component categorization? A. Application B. Legacy C. Compute D. Network E. Storage F. Security
B
Which of the following are valid reasons for a firm's not adopting a cloud solution? (Choose two.) A. Local hardware is being fully utilized for unchanging IT workloads. B. The number of employees rarely changes. C. The number of employees changes often. D. The firm experiences unpredictable project spikes throughout the year.
AB
Which two of the following are often considered critical deployment steps for cloud? (Choose two) A. Risk assessment B. Pilot C. Scrum techniques D. Forklift upgrade
AB
Which of the following provide incentive for a company to adopt cloud solutions? (Choose three) A. Excess resources B. Large sunk expense costs C. Predictable and fixed workloads D. Variable user base
ABD
Regarding certificates and your cloud infrastructure, which of the following are common issues ? (Choose two) A. Expiration B. Corruption C. Misconfiguration D. Public key capture
AC
Which of the following are related to cloud computing costs? (Choose two.) A. Monthly subscription B. Server hardware costs C. Usage fees D. Software licensing costs
AC
Which of the following might govern how we need to report metrics for our cloud infrastructure? (Choose two) A. Based on SLA B. Public cloud vendor requirement C. Corporate policy D. Third party mandate
AC
For which businesses would cloud computing be best suited? (Choose two.) A. Waterfront marketplace that thrives during the summer tourist season B. Rural medical practice with four employees C. Law enforcement agency D. A new company start-up that manufactures watercraft
AD
AWS is a classic example of which of the following? A. Private B. Public C. Community D. Hybrid
B
Cloud costs tend to be most comparable to what type of cost? A. A lease for a new building B. An electric utility bill C. A bill for initial server acquisitions D. None of these options are correct
B
Cloud services tend to feature much longer contract durations compared to traditional outsourcing. True or false? A. True B. False
B
Compared to Type II hypervisors, Type I hypervisors generally have lower: A. numbers of VMs per host B. requirements for host overhead C. numbers of hosts installed in datacenters D. costs
B
How are cloud computing and outsourcing similar? A. Immediate scalability B. Vendor lock-in C. Long contract renegotiation D. Tailor-made client solutions
B
If a top-to-bottom troubleshooting approach is used, which layer of the OSI model should you start with? A. Physical B. Application C. Network D. Presentation
B
If you are using AWS as your public cloud, it is your responsibility to ensure all aspects of compliance. True or false? A. True B. False
B
Incident management is part of what ITIL service phase? A. Service Strategy B. Service Operation C. Service Design D. Service Transition
B
Purchasing software and providing it to a third party that installs and manages that software is an example of which of the following? A. Virtualization B. Application service provider C. Platform as a service D. Private cloud
B
Regarding your disaster recovery method, which of the following should be a key consideration? A. Hypervisor type B. Bandwidth C. API selection D. Hardware vendor
B
S3 is an example of which type of storage technology? A. File-based B. Object-based C. Block-based D. Folder-based
B
There is often a single level of cloud service you should recommend. True or false? A. True B. False
B
True or false? Virtual servers are used only in public clouds. A. True B. False
B
Using AWS EC2 instances is an example of which of the following? A. BPaaS B. IaaS C. PaaS D. SaaS
B
What aspect of cloud computing allows you to save on costs in a direct fashion? A. Read-only replicas B. On-demand C. Resource metering D. Quickly expanding storage
B
What deployment model is the most popular today and allows companies to host their own cloud services while relying on cloud vendors for other services? A. Public B. Hybrid C. Community D. Private
B
What does "follow the sun" mean in terms of workload migrations? A. You can safely ignore time zone concerns when provisioning resources B. Services must be available at sun up in a certain region C. Always use GMT when scheduling services D. Never have a service running for more than 24 hours
B
What is the point of a Blue - Green deployment model? A. Both environments can serve requests increasing scalability B. To permit testing, one of the two deployments is not active C. Each deployment is in a different region to increase HA D. Each deployment always runs a different code version
B
What took place in the 1960s that was an early example of the cloud technology we see today? A. Web-based E-mail B. Expensive computer hardware was shared C. Application Service Providers D. Service-oriented Architecture
B
What type of app might be an excellent first choice for migration? A. Monolithic B. Simple desktop productivity app C. Transaction-based D. Mission-critical
B
When it comes to performance, which of the following is critical when trying to ensure a successful cloud adoption? A. Replication B. SLA C. Time D. Rate per MB
B
Which AWS S3 technology allows for the cloning of original files before modification to them? A. Encryption B. Versioning C. Bucket Mirroring D. Object logging
B
Which CPU technology might be required by your VMware image in order for it to function properly? A. Ballooning B. VT-x C. Caching D. Bursting
B
Which cloud technique should be considered if you wanted to ease the administration required for a common, simple task? A. Elasticity B. Automation C. Load balancing D. Orchestration
B
Which of the following is NOT a recognized cloud classification model? A. IaaS B. QoS C. PaaS D. SaaS
B
Which of the following is a common measurement tool for performance statistics that provides a starting point? A. Set B. Baseline C. Group D. SLA
B
Which of the following is a small update designed to fix a flaw and is often considered an emergency measure? A. Rollback B. Hotfix C. Update D. Patch
B
Which of the following is an example of PaaS? A. SalesForce B. Azure C. Gmail D. DropBox
B
Which of the following is an example of a resource pooling technology? A. Hotmail B. Cisco UCS C. Gmail D. Open standards
B
Which of the following is not a cloud deployment option? A. Public B. Open Standard C. Private D. Community
B
Which of the following is not a major concern you should have when thinking about cloud technologies and security? A. Consider applicable laws and regulations B. Always use the latest in security technologies C. Consider best practices for resources D. Consider your company security policy
B
Which of the following is not a negative indicator for a company moving to the cloud? A. Possessing a large data center B. Failing to meet increased demand C. Compliance issues D. The need for assured operational characteristics
B
Which of the following is not a service phase in ITIL? A. Operation B. Disposal C. Transition D. Strategy E. Design
B
Which of the following is the MOST widely used example of cloud computing? A. Business ratings B. Online email C. Online education D. Geo-caching
B
Which of the following is the least critical to document? A. Findings B. Time per phase C. Actions D. Outcomes
B
Which of the following is the meaning of SaaS? A. Solutions as a Service B. Software as a Service C. Servers as a Service D. Security as a Service
B
Which of the following permits dynamic elasticity? A. Auto Encryption B. Auto Scaling C. Replication D. Auto Migration
B
Which of the following will allow an administrator to quickly revert a VM back to a previous state? A. Metadata B. Snapshots C. Extended metadata D. Cloning
B
Within AWS, which security structure should be used to control the traffic flowing between your subnets in your VPC? A. Security Group B. Network ACL C. Role D. WAF
B
Within IT, what does CMDB stand for? A. Cloud Management Database B. Configuration Management Database C. Cloud Management Data Block D. Configuration Monitoring Database
B
You've decided to provide a web application and scale it by using many small Linux instances. Adding four instances and load balancing between them over the last month is an example of which of the following? A. Scaling up B. Scaling out C. Scaling down D. Scaling in
B
Your public cloud environment is configured such that additional cloud storage is allocated to a virtual server when the used disk space on that server reaches more than 80 percent of disk capacity. Which term best describes this configuration? A. Elasticity B. Automation C. Self-service D. Disk latency
B
How does cloud computing help an organization as new opportunities arise? (Choose two.) A. Shifting operating expenses to capital expenses B. Speedy addition of computing resources C. Less cost for new server hardware D. Speedy removal of computing resources
BD
Regarding automation, why is the need to troubleshoot so common? (Choose two) A. Newness of the approach B. Level of complexity C. Stability of the Internet D. Lack of feedback
BD
Which of the following statements are true? (Choose two.) A. Public clouds are for the exclusive use of a single organization. B. Private clouds are for the exclusive use of a single organization C. Public clouds are offered over an intranet. D. Public clouds are offered over the Internet.
BD
You've discovered that your theory of probable cause for a cloud issue is not correct. Which of the following are common next steps? (Choose two) A. Adopt the "divide and conquer" approach B. Escalate C. Document your results D. Establish a new theory
BD
Match the virtual network technology with the best definition. 1. VXLAN 2. DMZ 3. Microsegmentation 4. Subnet A. Each host in it's own domain B. 16 Million IDs C. Sizing for future expansion is important D. Services secured for outside network access
BDAC
A community name is used by: A. WMI B. SMTP C. SNMP D. SMS
C
A company's email software vendor charged them $500 a month to use software, licensed for the maximum number of active email addresses. The company switched to a cloud-based email software that charged based on the number of active email addresses each month. The company was billed $100 the first month, $200 the second month, and $100 for the remaining 10 months of the year. After a year, how much money did the company save by switching to cloud computing? A. $1,300 B. $4,500 C. $4,700 D. $6,000
C
Following the deployment of your cloud resources, which of the following would you most likely not be monitoring? A. CPU utilization B. RAM utilization C. Root account access D. Storage utilization
C
In Microsoft Azure, which component of networking allows for easier management of cloud components? A. Virtual Partitions B. Virtual Collections C. Resource Groups D. Virtual Private Clouds
C
In keeping with organizational goals of a corporation when deploying an application to a cloud services provider, which of the following is NOT a selection criteria for choosing a pilot? A. Security of application data B. Usability in a cloud environment C. Successful completion D. Low impact of failure
C
In using a structured approach to explore the potential impact of cloud computing in an organization undergoing the impact and changes that occur during Cloud service adoption, which of the following is an ITIL Service Lifecycle consideration? A. Service Upgrade B. Service Disconnection C. Service Operation D. Service Continuance
C
Which of the following provisioning types is most suitable for a virtual hard disk with 200 GB of space, and ensures that disk storage can be flexibly allocated between virtual machines? A. Thick provisioning B. Random provisioning C. Thin provisioning D. Test provisioning
C
Which of the following recognized approaches for managing an organization's technology environment can be applied to cloud computing services? A. American National Standards Institute (ANSI) B. National Institute of Standards and Technology (NIST) C. Information Technology Infrastructure Library (ITIL) D. Project Management Institute (PMI)
C
Which of the following storage provisioning methods is implemented at the hardware level of a SAN and can be completed in either a soft or hard basis? A. LUN masking B. Network share creation C. Zoning D. Multipathing
C
Which of the following terms can be defined as the use of a third party to assist in authentication? A. Logging B. WAP C. Federation D. Encryption
C
Which type of cost tends to be variable? A. CAPEX B. Initial investment costs C. OPEX D. Sunk costs
C
While troubleshooting your cloud issue, you discover there are multiple problems. Which of the following should you do? A. Group the problems together and solve holistically B. Escalate C. Approach each individually D. Begin the establishment of a new theory
C
With cloud computing services, hardware purchases, software purchases, and IT support are the responsibility of whom? A. Internet service provider B. RraaS provider C. SaaS provider D. Application service provider
C
You are linking your company's Microsoft Active Directory user accounts to your cloud provider for federated identity management. What type of configuration must you create within your company? A. Identity trust B. XML provider C. Relying party trust D. JSON provider
C
Your company runs a virtualized web application server in-house. You decide to make the web applications available over the Internet through a cloud provider. Which method represents the quickest way to accomplish this? A. Create a new cloud server, install web services, and install and configure web applications. B. Create a new cloud server, install web services, and import web application data. C. Migrate your in-house web application server to the cloud. D. This cannot be done — only generic applications are available through the cloud.
C
[Blank] and [blank] give cloud customers a competitive advantage. A. Integrity, confidentiality B. Availability, integrity C. Time to market, collaboration D. Collaboration, confidentiality
C
If you're engaged with a Google Cloud IaaS, which of the following should not concern you? A. Disabling unneeded ports and services B. Security patching for VMs C. Installation of anti-malware on the VM D. Physical security of the host
D
A user account that gains the needed permissions from a group membership is known as which of the following? A. Mandatory access control B. Open access C. Non-discretionary access control D. Discretionary access control
D
Developers build these components in the cloud. A. Federation identity providers B. Cloud load balancers C. SaaS user mailboxes D. Web services
D
For software libraries, which of the following platforms play a vital role in cloud services? A. SaaS B. BPaaS C. IaaS D. PaaS
D
In using a structured approach to explore the potential impact of cloud computing in an organization undergoing the impact and changes that occur during Cloud service adoption, which of the following is an ITIL Service Lifecycle consideration? A. Service Occurrence B. Service Optimization C. Service Ownership D. Service Operation
D
Regarding cloud technology, what does BCP stand for? A. Backup Colocation Procedure B. Big Compute Processing C. Business Progress Planning D. Business Continuity Plan
D
The organized controlled collection, and execution of many tasks is what in the cloud? A. Scalability B. Scripting C. Automation D. Orchestration
D
To convey the identity of a user, which of the following is passed between a federation server and a domain? A. Username and password B. SID only C. Password only D. Token
D
What does GRE offer for security when it tunnels IP traffic? A. DES B. AES C. 3DES D. Nothing
D
What type of replication strategy copies data to a redundant storage location immediately as data is written? A. Asynchronous B. Intra-region C. Inter-region D. Synchronous
D
Which is not a typical step with virtual machine (server) creation in a public cloud? A. Selection of the OS B. Sizing of the hardware resources C. Securing access to the VM D. Downloading of OS software
D
Which of following is the MOST beneficial aspect of public cloud deployment for a startup company? A. Ease of infrastructure management B. Reduced Mean Time to Implement C. Shared company resources D. No upfront capital expenditure
D
Which of the following high availability solutions would a cloud service provider use when deploying Software as a Service? A. Virtual switches B. Multipathing C. Load balancing D. Clustering servers
D
Which of the following is a benefit of outsourcing? A. Immediate scalability B. Vendor lock-in C. Long contract renegotiation D. Tailor-made client solutions
D
Which of the following is a commonality between cloud and outsourcing? A. Tailor made solutions B. Contract length C. Both are very specific to IT D. Vendor lock-in
D
Which of the following is a traditional approach to application development? A. Agile B. Iterative C. Test and Run D. Waterfall
D
Which of the following is a valid advantage of server virtualization? A. Fully automated elasticity B. Unlimited virtual machine usage C. No need for a software layer D. Independent hardware
D
Which of the following is an early example of cloud technology? A. Top of rack policy enforcement B. Infrastructure As A Service C. Data center interconnects D. Web-based email in the form of Hotmail
D
Which of the following is false? A. Vulnerability testing seeks to find security flaws in the IT infrastructure B. Load testing can be critical to test promised service levels C. Common deployment types include Production, Development, and QA D. With public clouds, you can typically perform penetration testing whenever it's convenient for you
D
Which of the following is not a typical choice you must make regarding a target host in the cloud? A. RAM B. Disk Type C. CPUs D. 64-bit vs 32-bit
D
Which of the following is not a typical part of a cloud deployment execution plan? A. Workflow execution B. Documentation C. Change management D. Access audits
D
Which of the following is not a valid method of demonstrating strategic flexibility? A. Moving to a new application B. Avoiding vendor lock-in be ensuring migration to another cloud C. Bringing the IT infrastructure components in house D. Performing an annual independent audit of the cloud provider hardware
D
Which of the following is not considered a cloud computing risk? A. Loss of network connectivity B. Data stored in the cloud C. Network latency D. Host-based firewalls
D
Which of the following is related to monitoring and can be defined as an occurrence that is out of the ordinary? A. Event B. Correlation C. Baseline D. Anomaly
D
Which of the following is the meaning of PaaS? A. Ping as a Service B. Process as a Service C. Programming as a Service D. Platform as a Service
D
Which of the following methods can an Administrator use to force an array to allow data to be distributed one node at a time in a private cloud implementation? A. Least connections B. Least used C. Best bandwidth D. Round robin
D
Which of the following statements regarding CompTIA Cloud Essentials is incorrect? A. The certification is a Specialty certification B. There is an exam that maps to this course C. This course prepares you for the exam D. The course is specific to Cisco systems
D
Which property is associated with thin provisioning? A. Compression B. Tiering C. Strict reservations D. Dynamic expansion
D
Which term best describes the ability to rapidly increase user accounts for a given cloud service? A. Volatility B. Synchronicity C. Viability D. Elasticity
D
Order these troubleshooting methodology steps with the first step on top to the last step on the bottom. A. Establish a theory B. Implement preventative measures C. Establish a plan of action D. Identify the problem
DACB
Which of the following head-to-head comparisons might you engage in with your deployment test data? (Choose two) A. Existing logs B. Compliance reports C. User feedback D. SLAs E. Baselines
DE
In cloud security, what does MFA stand for?
Multi-Factor Authentication