CompTIA Cloud+ Certification Test Set 4

Users on a network report that they are unable to access any external websites, however, they are able to access resources by IP address. Which of the following command line utilities would be used FIRST in troubleshooting this problem?


Options are :

  • netstat
  • ipconfig
  • telnet
  • nslookup (Correct)

Answer : nslookup

Which of the following cloud delivery models is deployed over a company intranet or company-hosted datacenter?


Options are :

  • Private cloud (Correct)
  • Community cloud
  • Public cloud
  • Hybrid cloud

Answer : Private cloud

Which of the following MUST be in a zone?


Options are :

  • Fibre Channel
  • Target (Correct)
  • HBA
  • CNA
  • Initiator (Correct)

Answer : Target Initiator

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

Users have been reporting slow response times on a database server. The administrator noticed the server at any given time has between 30 to 50 users connected to various databases. Additional research shows disk metrics such as disk queuing and disk access rates are both around 10% to 15%. Which of the following can be the root cause of this slow performing server?


Options are :

  • I/O tuning is disabled.
  • The CPU time reservation is small.
  • The server has fewer resources than required. (Correct)
  • The swap disk space is small.

Answer : The server has fewer resources than required.

Which of the following describes federated access control?


Options are :

  • Trusted (Correct)
  • Digital Identity
  • Federated Communication
  • Secure Sockets Layer

Answer : Trusted

Which of the following access control types allows users to assign security attributes to objects such as files and directories?


Options are :

  • Rule set based
  • Discretionary (Correct)
  • Role based
  • Mandatory

Answer : Discretionary

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

A datacenter migration is taking place and the administrator has been tasked with reducing the footprint of the new datacenter by virtualizing as many servers as possible. A physical server has been flagged as a candidate for relocation to the new data center. Which of the following methods would be the FIRST method for relocating the server to the new data center?


Options are :

  • V2V
  • P2V (Correct)
  • P2P
  • V2P

Answer : P2V

A company is required to provide their customers with zero downtime for its web application. Which of the following would satisfy this requirement?


Options are :

  • Multipathing
  • Load balancing
  • Cold site
  • High availability (Correct)

Answer : High availability

Which of the following factors yields cost savings in cloud computing?


Options are :

  • Availability
  • Shared resources (Correct)
  • On premises
  • Multi-tenancy (Correct)
  • Ubiquitous access

Answer : Shared resources Multi-tenancy

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Which of the following is a subcomponent of a virtual machine?


Options are :

  • Virtual HBA (Correct)
  • Virtual shield
  • Virtual switch
  • Virtual OS

Answer : Virtual HBA

A catastrophic disk failure occurred on a company's critical database. After a technician performs a full system restore, one of the business units realizes that the current backup does not hold fresh enough information. Which of the following should the company revise?


Options are :

  • RTO
  • MTBF
  • MTTR
  • RPO (Correct)

Answer : RPO

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

Which of the following would be used to prove the existence of vulnerabilities on a network?


Options are :

  • Vulnerability assessment
  • Penetration testing (Correct)
  • Business impact analysis
  • Risk assessment

Answer : Penetration testing

Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?


Options are :

  • CHAP
  • VPN (Correct)
  • PKI
  • AES

Answer : VPN

Which of the following should an administrator implement when connecting the company's existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?


Options are :

  • A proxy server
  • An IPSec tunnel (Correct)
  • A load balancing solution
  • A server clustering solution

Answer : An IPSec tunnel

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 7

In which of the following cloud services will the customer be responsible for securing provisioned hosts?


Options are :

  • DaaS
  • IaaS (Correct)
  • PaaS
  • SaaS

Answer : IaaS

Which of the following uses the business model of shared resources in a cloud environment?


Options are :

  • Elasticity
  • Cloud bursting
  • Self-serve
  • Multi-tenancy (Correct)

Answer : Multi-tenancy

Which of the following can be used to encrypt data at rest on a VM located in the cloud?


Options are :

  • TLS
  • AES (Correct)
  • VPN
  • SSL

Answer : AES

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 4

Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?


Options are :

  • RAID 0
  • RAID 5
  • Type II (Correct)
  • Type I

Answer : Type II

Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops. Which of the following should the lab administrator implement to allow students to upload files?


Options are :

  • Resource pooling
  • Secure FTP
  • Storage quotas
  • Port mapping (Correct)

Answer : Port mapping

A company has five servers and wishes to consolidate into a single physical server. Which of the following migration methods would accomplish this?


Options are :

  • P2V (Correct)
  • V2V
  • P2P
  • V2P

Answer : P2V

CompTIA Cloud Essentials Cert Exam Prep CL0-002 Set 3

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?


Options are :

  • Native
  • Type I
  • Type II (Correct)
  • Bare Metal

Answer : Type II

A company has virtualized all of their servers on one physical server located on the company's first floor datacenter. The company also uses security software from a third-party cloud vendor as part of a SaaS contract. The overall cloud network model for this company's network is BEST described by which of the following?


Options are :

  • Hybrid (Correct)
  • On-site private
  • Offsite public
  • Community

Answer : Hybrid

Although the SAN appears to be running without any problems, the technician is unable to reach the SANs web enabled management interface. Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?


Options are :

  • arp
  • ipconfig
  • traceroute (Correct)
  • ping

Answer : traceroute

Mock : CompTIA Network+ (N10-007)

Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?


Options are :

  • RAID 1 (Correct)
  • RAID 10
  • RAID 5
  • RAID 0

Answer : RAID 1

Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?


Options are :

  • Obfuscation
  • Log review (Correct)
  • LUN masking
  • Authentication

Answer : Log review

Which of the following protocols is MOST likely used by a switch to communicate status information to an administrator?


Options are :

  • SMTP
  • NNTP
  • HTTP
  • SNMP (Correct)

Answer : SNMP

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 9

Which of the following is true about a Type II hypervisor?


Options are :

  • It requires a primary hypervisor to function properly.
  • It provides slower performance than a Type I hypervisor installed on the same hardware. (Correct)
  • It provides direct hardware access through the use of specialized drivers.
  • It implements stronger security controls than a Type I supervisor at the same patch level.

Answer : It provides slower performance than a Type I hypervisor installed on the same hardware.

Which of the following should be installed on VMs to report and take action against potential threats?


Options are :

  • NIPS
  • NIDS
  • HIPS (Correct)
  • HIDS

Answer : HIPS

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?


Options are :

  • Public
  • Community
  • Hybrid
  • Private (Correct)

Answer : Private

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

An administrator needs to provide Internet access to all internal systems using a single IP address. Which of the following should the administrator implement?


Options are :

  • Virtual switching
  • NAT (Correct)
  • VLAN tagging
  • PAT

Answer : NAT

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions