CompTIA Cloud+ Certification Test Set 2

Which of the following can an administrator implement to achieve boot on SAN?


Options are :

  • Thin provisioning
  • NPIV
  • vNIC
  • NAT

Answer : NPIV

220-801 CompTIA A+ Certification Practice Exam Set 1

Which of the following would mitigate a ping of death attack?


Options are :

  • IDS appliance
  • Proxy appliance
  • Load balancing appliance
  • Firewall appliance

Answer : Firewall appliance

Hardware compatibility among multiple hosts guarantees which of the following?


Options are :

  • Online VM migrations
  • Host migrations
  • Supportability
  • Storage migrations

Answer : Online VM migrations

The Chief Technology Officer (CTO) has recently implemented a policy requiring all critical systems, including the virtualized environment to be highly available in the primary datacenter. The organization also maintains a cold site for disaster recovery. Which of the following BEST satisfies this requirement?


Options are :

  • Implement two hosts in a geo-cluster, one in the primary datacenter and one in the cold site.
  • Implement data mirroring between the primary datacenter to the cold site.
  • Implement two hosts in a local cluster in the primary datacenter.
  • Implement two hosts in the primary datacenter.

Answer : Implement two hosts in a local cluster in the primary datacenter.

220-802 CompTIA A+ Certification Practice Exam Set 8

An administrator has implemented a self-service provisioning portal in the company and has associated a cost to CPU, memory, storage, and OS type. Which of the following cloud computing options has been configured?


Options are :

  • Reservations
  • Multi-tenancy
  • Chargeback
  • Cloud bursting

Answer : Chargeback

Which of the following encryption technologies would MOST likely be used to protect in-transit user data on a publicly accessible service?


Options are :

  • AES
  • IPSEC
  • RSA
  • SSL

Answer : SSL

Which of the following ports is generally associated with a UDP based service?


Options are :

  • 25
  • 80
  • 22
  • 53

Answer : 53

CompTIA Security+ SY0-501 Questions & Answers Set 2

Which of the following terms would describe a cloud characteristic that hosts separate customers on shared infrastructure?


Options are :

  • Multi-tenancy
  • Flexible
  • Diversified
  • Fractured

Answer : Multi-tenancy

A company wants to build a cloud environment where individual departments can host applications and data on shared resources, but users cannot access data that is outside of their department without specific permissions. To deploy an architecture that meets this requirement, the network administrator will need to employ which of the following configurations on the switches?


Options are :

  • VLANs
  • Port security
  • Routing tables
  • Packet shaping

Answer : VLANs

A government agency wants to create a common environment that would allow them to share documents with other agencies using a cloud model. Which of the following would be the BEST approach?


Options are :

  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud

Answer : Community cloud

Mock Test : CompTIA Network+ (N10-007)

Which of the following are components of an Object-Based Storage system?


Options are :

  • HBAs
  • Mainframes
  • Nodes
  • Private Network
  • Public Network

Answer : Nodes Private Network

The Chief Information Officer (CIO) of a company is tasked to save costs by reducing datacenter space. The administrator explains that virtualization of servers will support this task as a benefit of migrating to a cloud environment known as:


Options are :

  • Increased availability.
  • Infrastructure consolidation.
  • Increased server efficiency.
  • Total cost of ownership reduction.

Answer : Infrastructure consolidation.

Which of the following backup types will enable scheduled point-in-time recovery of data and is accessible to end-users?


Options are :

  • Virtual machine cloning
  • Asynchronous replication
  • Image backup
  • File system snapshot

Answer : File system snapshot

CompTIA JK0-018 Security+ E2C Certification Practice Exam Set 2

Which of the following provides insight information when investigating potential security breaches but does not make changes to the environment?


Options are :

  • Firewalls
  • IDS
  • ACLs
  • IPS
  • Log reviews

Answer : IDS Log reviews

An IPS is used to:


Options are :

  • Authenticate users.
  • Detect unauthorized access.
  • Establish SSL access.
  • Block unauthorized access.

Answer : Block unauthorized access.

Which of the following is an example of vertical scaling?


Options are :

  • Adding memory to a host
  • Adding memory to the VM guest
  • Migrating all VM guests from one host to another in a cluster
  • Adding CPU to a VM guest

Answer : Adding memory to a host

BR0-001 CompTIA Bridge Security+ Certification Practice Exam Set 4

An administrator deployed a VM from a template which has the firewall disabled. The server IP address is manually assigned. The administrator cannot ping the server by IP address or DNS hostname and has logged in from the hypervisor management console to verify the TCP/IP settings are correct. Which of the following is MOST likely the cause of the issue?


Options are :

  • The virtual NIC is not bridged.
  • The VLAN tag is incorrect.
  • The routing table is incorrect.
  • The guest tools are not installed.

Answer : The virtual NIC is not bridged.

The Chief Information Officer (CIO) of a company would like to close one of the company's four datacenters. The CIO has asked the administrator to perform tests to determine if the servers can be migrated to a public cloud located in another region. Which of the following tests should the administrator perform specific to the location change, to determine if user experience will be impacted?


Options are :

  • I/O throttling
  • CPU wait time
  • Network latency
  • File read/write

Answer : Network latency

Which of the following protocols could be used to identify the OS version installed on a server?


Options are :

  • SMTP
  • IMAP
  • WMI
  • TLS

Answer : WMI

220-701 A+ Essentials Certification Practice Exam Set 6

A company just received a shipment of brand new blade servers and an administrator has been tasked with virtualizing the blade fabric switches. Which of the following would be used to accomplish this?


Options are :

  • V2P
  • P2V
  • NPIV
  • iSNS

Answer : NPIV

Which of the following hypervisor types runs on a host operating system that provides virtualization services,  cluding memory management and device support?


Options are :

  • Type II hypervisor
  • Open source hypervisor
  • Type I hypervisor
  • Proprietary hypervisor

Answer : Type II hypervisor

SK0-004 CompTIA Server+ Certification Practice Exam Set 6

A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?


Options are :

  • Failback
  • Redundancy
  • Replication
  • Latency

Answer : Redundancy

A web hosting company received reports of slow performance from four out of the five clients. Upon investigation, it was determined that a hosted virtual machine was using more RAM and CPU than the others. Which of the following MOST likely contributed to the issue?


Options are :

  • Storage allocation
  • Soft quota limits
  • Resource pooling
  • Hard quota limits

Answer : Resource pooling

Which of the following could be assigned to a virtual CPU?


Options are :

  • LUNs
  • Stepping
  • HBAs
  • Cores

Answer : Cores

220-702 CompTIA A+ Practical Application Practice Exam Set 11

A company has an existing internal network that hosts confidential information. However, this network also has a connection to a separate site. The separate site is managed by a third party organization that has an SLA with the company. Which of the following BEST defines this cloud delivery model?


Options are :

  • Hybrid Cloud
  • Community Cloud
  • Public Cloud
  • Private Cloud

Answer : Hybrid Cloud

Which of the following cloud services provides billing, payroll, contract management, and human resource management functions?


Options are :

  • SaaS
  • DaaS
  • CaaS
  • BPaaS

Answer : BPaaS

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?


Options are :

  • Firewall
  • IDS
  • Audit logs
  • Antivirus

Answer : Audit logs

CompTIA CAS-002 Advanced Security Practitioner Certify Exam Set 3

Which of the following is an example of two-factor authentication when accessing a virtual server?


Options are :

  • Username/password and fingerprints
  • Username/password and PIN
  • Multiple usernames/passwords for all websites
  • Username/password, fingerprint scanner, and key fob

Answer : Username/password and fingerprints

A storage administrator wants to limit an operating system from accessing all of the storage within the array. Which of the following could be enabled on the SAN?


Options are :

  • Access control lists
  • Data at rest encryption
  • Implement different file formats
  • LUN masking

Answer : LUN masking

Which of the following access control methods could allow for a network user to sign onto their corporate network and their suppliers network portal without having to enter their ID and password more than once?


Options are :

  • Role-based access control
  • Discretionary access control
  • Mandatory access control
  • Federated access control

Answer : Federated access control

CompTIA JK0-801 A+ Certification Practical Exam Set 9

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions