CompTIA Cloud+ Certification Exam Prep CV002 - 2019 Set 4

Which of the following storage technologies can leverage switches in its implementation?


Options are :

  • SCSI
  • HBA
  • DAS
  • SAN

Answer :SAN

CompTIA JK0-022 E2C Security Data & Host Security Exam Set 2

Which of the following allows a network device to process storage traffic without significant delays, even if the amount of other network traffic has saturated the link?


Options are :

  • Jumbo frames
  • QoS
  • Caching
  • Load balancing

Answer :QoS

Which of the following storage technologies is file-based?


Options are :

  • DAS
  • SAN
  • WAN
  • NAS

Answer :NAS

A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met. Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards?


Options are :

  • Penetration test
  • Replication consistency
  • Application delivery
  • Bandwidth assessment

Answer :Penetration test

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 5

A storage administrator has 100 terabytes of physical storage space within the SAN. Which of the following is used to enable access to the storage space?


Options are :

  • RAID configuration
  • Drive mirroring
  • Drive striping
  • LUN creation

Answer :LUN creation

 A technician wants to remotely gather a list of all the software running on the client PCs throughout the organization. Which of the following should be used to gather this information?


Options are :

  • WMI
  • SQL
  • SNMP
  • Syslog

Answer :WMI

Which of the following protocols is MOST likely used by a switch to communicate status information to an administrator?


Options are :

  • SMTP
  • HTTP
  • SNMP
  • NNTP

Answer :SNMP

CompTIA Security+ SY0 401 Test Set 3

 A user is notified that they will be terminated at the end of the day. As they start cleaning up their workstation, they try to FTP information from their workstation to a cloud-based, personal backup solution. Which of the following hardening techniques would be used to restrict their ability to transfer this information via FTP?


Options are :

  • Antivirus
  • NIDS
  • Host-based firewall
  • NIPS

Answer :Host-based firewall

An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently. Which of the following is MOST likely the issue with the new servers?


Options are :

  • The VM servers were not properly configured.
  • The dynamic resource pool is malfunctioning.
  • The server is missing security patches.
  • There are insufficient resources available on the host.

Answer :The VM servers were not properly configured.

Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?


Options are :

  • Type I
  • Type II
  • RAID 5
  • RAID 0

Answer :Type II

SY0-401 CompTIA Security+ Certification Practice Exam Set 4

Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?


Options are :

  • Set the vNIC speed to half-duplex
  • Set the vNIC speed to full-duplex
  • Add an addition vNIC
  • Bridge the vNIC

Answer :Bridge the vNIC

Network statistics show that the 1Gbps switch port used for storage traffic is fully saturated. Which of the following switch technologies can be used to provide twice the bandwidth?


Options are :

  • NAT
  • VLAN
  • Multipathing
  • Link aggregation

Answer :Link aggregation

Which of the following will allow the network administrator to verify that one IP is assigned to one VM?


Options are :

  • Reservations
  • Storage allocation
  • Virtual Local Area Network
  • Resource Pooling

Answer : Reservations

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 3

A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses. Which of the following should be implemented?


Options are :

  • Soft limit quotas
  • Reservations
  • Resource pooling
  • Entitlement allocations

Answer :Reservations

Monitoring alarms should be set based on:


Options are :

  • Support availability.
  • A high point for every performance counter in the system.
  • Acceptable application performance criteria.
  • The point of application installation.

Answer :Acceptable application performance criteria.

A company wants to migrate its critical application to a public cloud but the security administrator is concerned with the application's data confidentiality requirements. Which of the following can be done to review if the appropriate management security controls are in place at the provider?


Options are :

  • Policy and procedure audit
  • Performance and application testing
  • Vulnerability assessment
  • Penetration testing

Answer :Policy and procedure audit

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 9

Which of the following uses the business model of shared resources in a cloud environment?


Options are :

  • Self-serve
  • Multi-tenancy
  • Elasticity
  • Cloud bursting

Answer :Multi-tenancy

A small business is moving ten physical servers to the cloud. Which of the following should the cloud provider implement to ensure that all ten servers can dynamically share memory resources with other tenants as needed while not interfering with the other tenants?


Options are :

  • Caching
  • Soft limits
  • Resource pooling
  • Load balancing

Answer :Resource pooling

An administrator needs to provide Internet access to all internal systems using a single IP address. Which of the following should the administrator implement?


Options are :

  • VLAN tagging
  • PAT
  • Virtual switching
  • NAT

Answer :NAT

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 22

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?


Options are :

  • Private
  • Public
  • Hybrid
  • Community

Answer :Private

A datacenter migration is taking place and the administrator has been tasked with reducing the footprint of the new datacenter by virtualizing as many servers as possible. A physical server has been flagged as a candidate for relocation to the new data center. Which of the following methods would be the FIRST method for relocating the server to the new data center?


Options are :

  • P2V
  • V2P
  • P2P
  • V2V

Answer :P2V

A company has virtualized all of their servers on one physical server located on the company's first floor datacenter. The company also uses security software from a third-party cloud vendor as part of a SaaS contract. The overall cloud network model for this company's network is BEST described by which of the following?


Options are :

  • On-site private
  • Community
  • Hybrid
  • Offsite public

Answer :Hybrid

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

A technician would like to connect to a virtual server from inside the network, using a desktop computer. Which of the following tools could the technician use?


Options are :

  • RDP
  • SSL
  • HTTP
  • IMAP

Answer :RDP

Which of the following disk drive types would be the BEST for a mission critical application with low latency requirements?


Options are :

  • SATA
  • SSD
  • SAS
  • FC

Answer :SSD

Which of the following access control methods could allow for a network user to sign onto their corporate network and their supplier's network portal without having to enter their ID and password more than once?


Options are :

  • Mandatory access control
  • Role-based access control
  • Discretionary access control
  • Federated access control

Answer :Federated access control

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 1

Which of the following is MOST important when factoring network level security in a public cloud environment?


Options are :

  • Ensuring high availability
  • Ensuring redundancy
  • Ensuring confidentiality
  • Ensuring good user experience

Answer :Ensuring confidentiality

Although the SAN appears to be running without any problems, the technician is unable to reach the SAN's web enabled management interface. Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?


Options are :

  • ipconfig
  • traceroute
  • arp
  • ping

Answer :traceroute

Which of the following is used to locate a specific area of storage in a cloud environment?


Options are :

  • Object ID
  • SAN
  • Metadata
  • Replicas

Answer :SAN

CompTIA Advanced Security Practitioner(CASP+) Practice Exams Set 1

A technician wants to isolate storage from other network traffic. Which of the following MUST the technician implement to ensure storage traffic is securely segregated?


Options are :

  • VMFS
  • NTFS
  • PAT
  • VLAN

Answer :VLAN

Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?


Options are :

  • RAID 0
  • RAID 5
  • RAID 10
  • RAID 1

Answer :RAID 1

Which of the following is MOST likely to be retrieved from an individually addressable blob?


Options are :

  • An object ID
  • A sequence number
  • A hash
  • An image

Answer :An image

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?


Options are :

  • LUN
  • HBA
  • NAS
  • DAS

Answer :HBA

An administrator is called in to determine why a virtual desktop has been unable to connect to the corporate network. Which of the following should be run to determine if the adapter is enabled? (Select TWO).


Options are :

  • ping
  • ipconfig
  • iwconfig
  • ifconfig
  • netstat

Answer :ipconfig ifconfig

Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops. Which of the following should the lab administrator implement to allow students to upload files?


Options are :

  • Port mapping
  • Resource pooling
  • Secure FTP
  • Storage quotas

Answer :Port mapping

CompTIA JK0-801 A+ Certification Practical Exam Set 1

A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?


Options are :

  • Redundancy
  • Failback
  • Latency
  • Replication

Answer :Redundancy

The performance logs on a virtualization server show a large number of pages being written to disk at a high rate. Which of the following should the technician do?


Options are :

  • Increase the amount of swap space on the disk
  • Install and provision additional disk space
  • Increase the amount of physical memory
  • Allocate additional CPU power to the guests

Answer :Increase the amount of physical memory

Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?


Options are :

  • Significant processing is used to create and maintain the cache on multi-core processors.
  • Extra processing is needed to store encryption keys used for secure transmission between the server and the network.
  • Some processing is required for operational overhead on the processor and between the physical and virtualized processors.
  • Additional processing is used to run ports and services not turned off through the process of server hardening.

Answer :Some processing is required for operational overhead on the processor and between the physical and virtualized processors.

SK0-004 CompTIA Server+ Certification Practice Exam Set 8

 An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography. Which of the following should the administrator implement NEXT?


Options are :

  • Zoning
  • SSL
  • Access controls
  • RC5

Answer :Access controls

 Which of the following attributes BEST describes "elasticity" in cloud computing? (Select TWO).


Options are :

  • Scalable
  • Universal access
  • Off premises
  • Multi-tenancy
  • Cost effectiveness
  • Portability

Answer :Scalable Cost effectiveness

Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized. Which of the following should be used to ensure access is controlled appropriately between devices? (Select TWO).


Options are :

  • Hard Zoning
  • LUN Masking
  • Subnetting
  • Supernetting
  • Soft Zoning

Answer :LUN Masking Soft Zoning

Which of the following should an administrator implement when connecting the company's existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?


Options are :

  • A load balancing solution
  • A proxy server
  • A server clustering solution
  • An IPSec tunnel

Answer :An IPSec tunnel

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?


Options are :

  • Bare Metal
  • Type II
  • Native
  • Type I

Answer :Type II

A system administrator wants to be able to use one server to collect all of the logs on the network. Which of the following would be used to satisfy this scenario?


Options are :

  • SNMP
  • Syslog service
  • Change management database
  • Firewall logging

Answer :Syslog service

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 12

 A small startup wins a contest giving them advertising time during a major sporting event. Which of the following cloud characteristics should be in place to handle the possible spike in demand?


Options are :

  • Shared disk space
  • Scalability
  • Elasticity
  • Shared memory

Answer :Elasticity

A start-up company has recently gone public and is experiencing unexpected growth. Which of the following cloud service models would allow the company to provide internal email quickly to new employees?


Options are :

  • PaaS
  • IaaS
  • CaaS
  • SaaS

Answer :SaaS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions