Test : CompTIA Cloud+ Certification

Which of the following allows a network device to process storage traffic without significant delays, even if the amount of other network traffic has saturated the link?

Options are :

  • Jumbo frames
  • QoS (Correct)
  • Load balancing
  • Caching

Answer : QoS

Which of the following tools would an administrator use to configure a host server when the WAN to the company's network was down?

Options are :

  • Virtual Private Network
  • Intrusion Detection System
  • Access Control Lists
  • Console Port (Correct)

Answer : Console Port

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 5

Which of the following protocols is MOST likely used by a switch to communicate status information to an administrator?

Options are :

  • HTTP
  • SMTP
  • SNMP (Correct)
  • NNTP

Answer : SNMP

A technician wants to configure a server for storage redundancy so that if any two of the four drives fail, the server is still operational. Which of the following should the technician configure?

Options are :

  • RAID 6 (Correct)
  • RAID 5
  • RAID 1
  • RAID 0

Answer : RAID 6

A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?

Options are :

  • Replication
  • Redundancy (Correct)
  • Failback
  • Latency

Answer : Redundancy

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 1

Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?

Options are :

  • Extra processing is needed to store encryption keys used for secure transmission between the server and the network.
  • Significant processing is used to create and maintain the cache on multi-core processors.
  • Some processing is required for operational overhead on the processor and between the physical and virtualized processors. (Correct)
  • Additional processing is used to run ports and services not turned off through the process of server hardening.

Answer : Some processing is required for operational overhead on the processor and between the physical and virtualized processors.

A small business is moving ten physical servers to the cloud. Which of the following should the cloud provider implement to ensure that all ten servers can dynamically share memory resources with other tenants as needed while not interfering with the other tenants?

Options are :

  • Resource pooling (Correct)
  • Load balancing
  • Soft limits
  • Caching

Answer : Resource pooling

Which of the following should an administrator implement when connecting the company's existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?

Options are :

  • An IPSec tunnel (Correct)
  • A server clustering solution
  • A load balancing solution
  • A proxy server

Answer : An IPSec tunnel

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 5

Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?

Options are :

  • CHAP
  • AES
  • PKI
  • VPN (Correct)

Answer : VPN

Which of the following tables would an administrator use to find a list of paths to network nodes?

Options are :

  • Port table
  • Route table (Correct)
  • ARP table
  • VPN tagging

Answer : Route table

A start-up company has recently gone public and is experiencing unexpected growth. Which of the following cloud service models would allow the company to provide internal email quickly to new employees?

Options are :

  • SaaS
  • SaaS (Correct)
  • PaaS
  • CaaS

Answer : SaaS

SK0-004 CompTIA Server+ Certification Practice Exam Set 2

A company wants to migrate its critical application to a public cloud but the security administrator is concerned with the application's data confidentiality requirements. Which of the following can be done to review if the appropriate management security controls are in place at the provider?

Options are :

  • Vulnerability assessment
  • Policy and procedure audit (Correct)
  • Performance and application testing
  • Penetration testing

Answer : Policy and procedure audit

A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met. Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards?

Options are :

  • Bandwidth assessment
  • Application delivery
  • Penetration test (Correct)
  • Replication consistency

Answer : Penetration test

Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized. Which of the following should be used to ensure access is controlled appropriately between devices? (Select TWO).

Options are :

  • Supernetting
  • Soft Zoning (Correct)
  • Subnetting
  • LUN Masking (Correct)
  • Hard Zoning

Answer : Soft Zoning LUN Masking

CompTIA N10-004 Network+ Certification Practice Test Set 2

Which of the following storage technologies is file-based?

Options are :

  • WAN
  • SAN
  • NAS (Correct)
  • DAS

Answer : NAS

Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?

Options are :

  • Bridge the vNIC (Correct)
  • Set the vNIC speed to half-duplex
  • Set the vNIC speed to full-duplex
  • Add an addition vNIC

Answer : Bridge the vNIC

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?

Options are :

  • Audit logs (Correct)
  • IDS
  • Firewall
  • Antivirus

Answer : Audit logs

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 2

Ubiquitous access to cloud computing means:

Options are :

  • international access across country borders
  • access by authorized personnel only
  • access by any device through any network connection (Correct)
  • access by any person

Answer : access by any device through any network connection

Users have been reporting slow response times on a database server. The administrator noticed the server at any given time has between 30 to 50 users connected to various databases. Additional research shows disk metrics such as disk queuing and disk access rates are both around 10% to 15%. Which of the following can be the root cause of this slow performing server?

Options are :

  • I/O tuning is disabled.
  • The CPU time reservation is small.
  • The server has fewer resources than required. (Correct)
  • The swap disk space is small.

Answer : The server has fewer resources than required.

Which of the following access control types allows users to assign security attributes to objects such as files and directories?

Options are :

  • Rule set based
  • Mandatory
  • Role based
  • Discretionary (Correct)

Answer : Discretionary

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 8

To avoid the same LUN showing up multiple times in client hosts, an administrator should implement:

Options are :

  • Multiple initiators
  • Multipathing software (Correct)
  • Multiple HBAs
  • Multiple zones

Answer : Multipathing software

Which of the following can be used to encrypt data at rest on a VM located in the cloud?

Options are :

  • TLS
  • VPN
  • SSL
  • AES (Correct)

Answer : AES

 A company is required to provide their customers with zero downtime for its web application. Which of the following would satisfy this requirement?

Options are :

  • Multipathing
  • Cold site
  • Load balancing
  • High availability (Correct)

Answer : High availability

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 3

How many cores are available to the resource pool with a Type I hypervisor that has 4 quad core processors installed?

Options are :

  • 24
  • 64
  • 32
  • 16 (Correct)

Answer : 16

A web hosting company received reports of slow performance from four out of the five clients. Upon investigation, it was determined that a hosted virtual machine was using more RAM and CPU than the others. Which of the following MOST likely contributed to the issue?

Options are :

  • Hard quota limits
  • Resource pooling (Correct)
  • Soft quota limits
  • Storage allocation

Answer : Resource pooling

Which of the following describes the access control method where data owners authorize who is granted access to their files?

Options are :

  • Mandatory access control
  • Access control list
  • Discretionary access control (Correct)
  • Role-based access control

Answer : Discretionary access control

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

Which of the following reduces the risk of known attacks from being successful?

Options are :

  • Encryption methods
  • Patching frequency (Correct)
  • DLP techniques
  • Mandatory access controls

Answer : Patching frequency

Which of the following is a subcomponent of a virtual machine?

Options are :

  • Virtual OS
  • Virtual HBA (Correct)
  • Virtual switch
  • Virtual shield

Answer : Virtual HBA

Some of the VMs in an environment are experiencing network connectivity loss. The VM management network has no connectivity issues. Which of the following could cause this connectivity issue?

Options are :

  • Wrong NIC load balancing mode
  • NIC teaming is disabled
  • Faulty host NIC port (Correct)
  • Slow NIC

Answer : Faulty host NIC port

SK0-004 CompTIA Server+ Certification Practice Exam Set 1

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?

Options are :

  • Disable firewall
  • Patch system (Correct)
  • Update drivers
  • Defrag system

Answer : Patch system

Which of the following cloud delivery models is deployed over a company intranet or company- hosted datacenter?

Options are :

  • Community cloud
  • Public cloud
  • Private cloud (Correct)
  • Hybrid cloud

Answer : Private cloud

Which of the following hypervisor types runs on a host operating system that provides virtualization services, including memory management and device support?

Options are :

  • Proprietary hypervisor
  • Type I hypervisor
  • Type II hypervisor (Correct)
  • Open source hypervisor

Answer : Type II hypervisor

CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 7

Users on a network report that they are unable to access any external websites, however, they are able to access resources by IP address. Which of the following command line utilities would be used FIRST in troubleshooting this problem?

Options are :

  • netstat
  • nslookup (Correct)
  • telnet
  • ipconfig

Answer : nslookup

A web server is offline. Which of the following will allow the FASTEST possible recovery of the web server?

Options are :

  • Operating system backups only
  • Operating system and application backups
  • File backups
  • Image backups (Correct)

Answer : Image backups

A storage administrator wants to limit an operating system from accessing all of the storage within the array. Which of the following could be enabled on the SAN?

Options are :

  • Implement different file formats
  • Access control lists
  • Data at rest encryption
  • LUN masking (Correct)

Answer : LUN masking

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

Which of the following MUST be in a zone? (Select TWO).

Options are :

  • HBA
  • Fibre Channel
  • CNA
  • Initiator (Correct)
  • Target (Correct)

Answer : Initiator Target

Which of the following could be assigned to a virtual CPU?

Options are :

  • Cores (Correct)
  • HBAs
  • Stepping
  • LUNs

Answer : Cores

Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?

Options are :

  • USB
  • Tape
  • HDD
  • SSD (Correct)

Answer : SSD

N10-006 CompTIA Network+ Certification Practice Test Set 9

Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?

Options are :

  • Replicas
  • Blob data
  • Object ID
  • Metadata (Correct)

Answer : Metadata

In which of the following cloud services will the customer be responsible for securing provisioned hosts?

Options are :

  • PaaS
  • DaaS
  • SaaS
  • IaaS (Correct)

Answer : IaaS

Which of the following will provide the MOST network address information possible for a system that belongs to a tenant in a private cloud?

Options are :

  • telnet
  • traceroute
  • nslookup
  • ipconfig (Correct)

Answer : ipconfig

CL0-001 CompTIA Cloud Essentials Practice Test Set 7

Which of the following is a MINIMUM requirement for VM online migration?

Options are :

  • Same network equipment between source and target hosts.
  • Same CPU family between source and target hosts. (Correct)
  • Same hardware vendor for the datacenter.
  • Same hypervisor versions between source and target hosts.

Answer : Same CPU family between source and target hosts.

Which of the following BEST defines RAID 4?

Options are :

  • RAID 4 requires a minimum of 4 disks.
  • RAID 4 has a dedicated parity drive. (Correct)
  • RAID 4 is less secure than RAID 5.
  • RAID 4 allows two failed drives.

Answer : RAID 4 has a dedicated parity drive.

 Which of the following cloud services provides billing, payroll, contract management, and human resource management functions?

Options are :

  • SaaS
  • BPaaS (Correct)
  • CaaS
  • DaaS

Answer : BPaaS

JK0-802 CompTIA A+ Certification Exam Set 3

Which of the following networking components would be used to connect two subnets in a virtual environment?

Options are :

  • Virtual router (Correct)
  • Virtual HBA
  • Virtual switch
  • Virtual disks

Answer : Virtual router

An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration?

Options are :

  • Migrate the server in a development environment
  • Harden the operating system
  • Establish a performance baseline
  • Contact the vendor for compatibility requirements (Correct)

Answer : Contact the vendor for compatibility requirements

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions