CompTIA Cloud+ Certification Exam Prep CV002 - 2019 Set 3

 A company is required to provide their customers with zero downtime for its web application. Which of the following would satisfy this requirement?


Options are :

  • Multipathing
  • High availability
  • Load balancing
  • Cold site

Answer :High availability

SY0-401 CompTIA Security+ Certification Practice Exam Set 1

Which of the following access control types allows users to assign security attributes to objects such as files and directories?


Options are :

  • Discretionary
  • Rule set based
  • Mandatory
  • Role based

Answer :Discretionary

Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?


Options are :

  • Tape
  • HDD
  • USB
  • SSD

Answer :SSD

Which of the following reduces the risk of known attacks from being successful?


Options are :

  • Mandatory access controls
  • Patching frequency
  • DLP techniques
  • Encryption methods

Answer :Patching frequency

CompTIA N10-004 Network+ Certification Practice Test Set 3

Which of the following networking components would be used to connect two subnets in a virtual environment?


Options are :

  • Virtual router
  • Virtual switch
  • Virtual HBA
  • Virtual disks

Answer :Virtual router

How many cores are available to the resource pool with a Type I hypervisor that has 4 quad core processors installed?


Options are :

  • 64
  • 24
  • 16
  • 32

Answer :16

A storage administrator wants to limit an operating system from accessing all of the storage within the array. Which of the following could be enabled on the SAN?


Options are :

  • LUN masking
  • Data at rest encryption
  • Access control lists
  • Implement different file formats

Answer :LUN masking

CompTIA A+ 220 902 Test Set 2

An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration?


Options are :

  • Contact the vendor for compatibility requirements
  • Establish a performance baseline
  • Harden the operating system
  • Migrate the server in a development environment

Answer : Contact the vendor for compatibility requirements

Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?


Options are :

  • Metadata
  • Object ID
  • Replicas
  • Blob data

Answer :Metadata

Which of the following is a MINIMUM requirement for VM online migration?


Options are :

  • Same network equipment between source and target hosts.
  • Same hardware vendor for the datacenter.
  • Same CPU family between source and target hosts.
  • Same hypervisor versions between source and target hosts.

Answer :Same CPU family between source and target hosts.

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 6

Which of the following will provide the MOST network address information possible for a system that belongs to a tenant in a private cloud?


Options are :

  • telnet
  • ipconfig
  • nslookup
  • traceroute

Answer :ipconfig

Ubiquitous access to cloud computing means:


Options are :

  • access by authorized personnel only
  • international access across country borders
  • access by any device through any network connection
  • access by any person

Answer :access by any device through any network connection

Which of the following cloud delivery models is deployed over a company intranet or company- hosted datacenter?


Options are :

  • Community cloud
  • Public cloud
  • Hybrid cloud
  • Private cloud

Answer :Private cloud

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

A web server is offline. Which of the following will allow the FASTEST possible recovery of the web server?


Options are :

  • Operating system and application backups
  • File backups
  • Image backups
  • Operating system backups only

Answer :Image backups

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?


Options are :

  • IDS
  • Antivirus
  • Firewall
  • Audit logs

Answer :Audit logs

A technician wants to configure a server for storage redundancy so that if any two of the four drives fail, the server is still operational. Which of the following should the technician configure?


Options are :

  • RAID 5
  • RAID 0
  • RAID 1
  • RAID 6

Answer :RAID 6

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 8

A system administrator currently has two web server VMs on one host. Users are reporting that query searches within the site are slow. The system administrator notices that the host CPU is above the threshold. Which of the following should be completed?


Options are :

  • Defragment the hard drives on the server.
  • Rebuild the two web server VMs.
  • Install another NIC for the creation of a network bridge.
  • Migrate one web server to another host.

Answer :Migrate one web server to another host.

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?


Options are :

  • SAN Zoning
  • LUN Masking
  • Multipathing
  • Port Zoning

Answer :LUN Masking

A company has five servers and wishes to consolidate into a single physical server. Which of the following migration methods would accomplish this?


Options are :

  • V2P
  • P2V
  • P2P
  • V2V

Answer :P2V

220-701 A+ Essentials Certification Practice Exam Set 6

A catastrophic disk failure occurred on a company's critical database. After a technician performs a full system restore, one of the business units realizes that the current backup does not hold fresh enough information. Which of the following should the company revise?


Options are :

  • MTTR
  • RPO
  • MTBF
  • RTO

Answer :RPO

A company has an existing internal network that hosts confidential information. However, this network also has a connection to a separate site. The separate site is managed by a third party organization that has an SLA with the company. Which of the following BEST defines this cloud delivery model?


Options are :

  • Private Cloud
  • Community Cloud
  • Hybrid Cloud
  • Public Cloud

Answer :Hybrid Cloud

Which of the following tools would an administrator use to configure a host server when the WAN to the company's network was down?


Options are :

  • Intrusion Detection System
  • Console Port
  • Virtual Private Network
  • Access Control Lists

Answer :Console Port

220-701 A+ Essentials Certification Practice Exam Set 7

A system administrator wants to create a mitigation strategy to quickly roll back a virtual image after applying the latest updates. Which of the following would the administrator utilize?


Options are :

  • File backup
  • Snapshot
  • Offline backup
  • Image backup

Answer :Snapshot

Which of the following is MOST important when working in highly available virtual environments?


Options are :

  • Heartbeat VLAN
  • Virtual network
  • Storage VLAN
  • Wide area network

Answer :Heartbeat VLAN

Which of the following factors yields cost savings in cloud computing? (Select TWO).


Options are :

  • Shared resources
  • Ubiquitous access
  • Availability
  • Multi-tenancy
  • On premises

Answer :Shared resources Multi-tenancy

CompTIA Cloud Essentials Cert Exam Prep CL0-002 Set 5

Which of the following would be used to prove the existence of vulnerabilities on a network?


Options are :

  • Penetration testing
  • Risk assessment
  • Business impact analysis
  • Vulnerability assessment

Answer :Penetration testing

An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system. Which of the following should the administrator do to accomplish this task?


Options are :

  • Install the patch on a development server
  • Install the patch on a test server
  • Create a snapshot
  • Create a full backup

Answer :Create a snapshot

Which of the following business continuity designs provides the highest degree of fault tolerance?


Options are :

  • Cold Site
  • Site Mirroring
  • Warm Site
  • Hot Site

Answer :Site Mirroring

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 5

Which of the following is an example of two-factor authentication when accessing a virtual server?


Options are :

  • Username/password and PIN
  • Username/password and fingerprints
  • Multiple usernames/passwords for all websites
  • Username/password, fingerprint scanner, and key fob

Answer :Username/password and fingerprints

Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?


Options are :

  • Pay-as-you-grow
  • Rapid deployment
  • Multi-tenancy
  • Cloud bursting

Answer :Cloud bursting

An administrator is tasked to reduce the company's datacenter power utilization. Currently there are 500 physical servers in the datacenter and 600 virtual servers with five additional available host servers. Which of the following should the administrator perform?


Options are :

  • Migrate servers using V2V technology
  • Perform an offline migration of virtual servers
  • Migrate servers using V2P technology
  • Migrate servers using P2V technology

Answer :Migrate servers using P2V technology

220-802 CompTIA A+ Certification Practice Exam Set 8

A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company's servers. Which of the following should the administrator perform to accomplish this goal?


Options are :

  • V2P
  • V2V
  • P2P
  • P2V

Answer :P2V

Which of the following would an administrator implement between a host and a guest to allow the virtual server to connect to a third party USB drive license key?


Options are :

  • NAT
  • Port mapping
  • Console port
  • PAT

Answer :Port mapping

The network administrator creates a DNS A record. Which of the following tools can identify which IP has been assigned to a FQDN?


Options are :

  • tracert
  • ipconfig
  • arp
  • nslookup

Answer :nslookup

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 20

Which of the following tables would an administrator use to find a list of paths to network nodes?


Options are :

  • Port table
  • Route table
  • VPN tagging
  • ARP table

Answer :Route table

Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?


Options are :

  • Obfuscation
  • Log review
  • Authentication
  • LUN masking

Answer :Log review

Which of the following should be installed on VMs to report and take action against potential threats?


Options are :

  • NIDS
  • HIDS
  • HIPS
  • NIPS

Answer :HIPS

HT0-201 CEA- CompTIA DHTI+ Certification Practice Exam Set 2

Which of the following only uses Fibre Channel to implement a storage infrastructure?


Options are :

  • SAN
  • SMB
  • NAS
  • NFS

Answer :SAN

Which of the following is true about a Type II hypervisor?


Options are :

  • It implements stronger security controls than a Type I supervisor at the same patch level.
  • It provides direct hardware access through the use of specialized drivers.
  • It provides slower performance than a Type I hypervisor installed on the same hardware.
  • It requires a primary hypervisor to function properly.

Answer :It provides slower performance than a Type I hypervisor installed on the same hardware.

Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?


Options are :

  • PKI
  • AES
  • VPN
  • CHAP

Answer :VPN

CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 4

An external USB hard drive physically attached to a server is a:


Options are :

  • NAS
  • VLAN
  • DAS
  • SAN

Answer :DAS

Which of the following network terms describes the process of grouping similar traffic on a network?


Options are :

  • Route tables
  • VLAN tagging
  • Supernetting
  • Virtual switches

Answer :VLAN tagging

Which of the following would allow the knowledge management division to maximize the ability to find documents within an online document repository?


Options are :

  • Metadata
  • Object ID
  • Rapid deployment
  • Access control

Answer :Metadata

Practice Exam : CompTIA A+ Certification 220-902

After an administrator successfully migrated the last physical application server to a virtual environment, the help desk reported slow performance. Which of the following should the administrator have done FIRST before migrating this server?


Options are :

  • Take a backup of the application server after the migration.
  • Apply operating system patches to the application server after the migration.
  • Migrate the application server in a test environment and have users test it.
  • Contact the vendor to see if the application is supported in a virtual environment.

Answer : Contact the vendor to see if the application is supported in a virtual environment.

An administrator is creating a new VM template and has a requirement that the OS must be hardened. Which of the following should be performed to harden a guest OS?


Options are :

  • Change page file
  • Rename administrator account
  • Encrypt the hard drive
  • Run defrag

Answer :Rename administrator account

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions