CV0-001 CompTIA Cloud+ Certification Practice Exam Set 1

Which of the following should be installed on VMs to report and take action against potential threats?


Options are :

  • NIPS
  • NIDS
  • HIPS
  • HIDS

Answer : HIPS

CompTIA A+ (220-1001) Test Prep, Exams and Simulations Set 3

An administrator is tasked to reduce the company’s data center power utilization. Currently there are 500 physical servers in the data center and 600 virtual servers with five additional available host servers. Which of the following should the administrator perform?


Options are :

  • Migrate servers using V2P technology
  • None
  • Migrate servers using V2V technology
  • Migrate servers using P2V technology
  • Perform an offline migration of virtual servers

Answer : Migrate servers using P2V technology

Which of the following uses the business model of shared resources in a cloud environment? 


Options are :

  • Multi-tenancy
  • Cloud bursting
  • Self-serve
  • Elasticity

Answer : Multi-tenancy

Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?


Options are :

  • Pay-as-you-grow
  • Multi-tenancy
  • Rapid deployment
  • Cloud bursting

Answer : Cloud bursting

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 4

Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share? 


Options are :

  • Authentication
  • LUN masking
  • Obfuscation
  • Log review

Answer : Log review

Which of the following only uses Fibre Channel to implement a storage infrastructure? 


Options are :

  • SMB
  • SAN
  • NFS
  • NAS

Answer : SAN

An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently. Which of the following is MOST likely the issue with the new servers? 


Options are :

  • The VM servers were not properly configured
  • The server is missing security patches
  • The dynamic resource pool is malfunctioning
  • There are insufficient resources available on the host.

Answer : The VM servers were not properly configured

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 2

Which of the following is MOST likely to be retrieved from an individually addressable blob?


Options are :

  • An object ID
  • An image
  • A sequence number
  • A hash

Answer : An image

Although the SAN appears to be running without any problems, the technician is unable to reach the SAN’s web enabled management interface. Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?


Options are :

  • arp
  • ipconfig
  • ping
  • trace route

Answer : trace route

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?


Options are :

  • LUN Masking
  • SAN Zoning
  • Port Zoning
  • Multi pathing

Answer : LUN Masking

LX0-104 CompTIA Linux+ [Powered by LPI] Exam Set 6

An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography. Which of the following should the administrator implement NEXT? 


Options are :

  • SSL
  • RC5
  • Access controls
  • Zoning

Answer : Access controls

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?


Options are :

  • Community
  • Public
  • Private
  • Hybrid

Answer : Private

A company has decided to reduce their data center size. An administrator for the company has been tasked to virtualize many of the company’s servers. Which of the following should the administrator perform to accomplish this goal?


Options are :

  • V2P
  • P2V
  • P2P
  • V2V

Answer : P2V

CompTIA SY0-401 Security Certification Practice Exam Set 10

Which of the following is used to locate a specific area of storage in a cloud environment?


Options are :

  • Replicas
  • SAN
  • Metadata
  • Object ID

Answer : Object ID

Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors? 


Options are :

  • Additional processing is used to run ports and services not turned off through the process of server hardening
  • Extra processing is needed to store encryption keys used for secure transmission between the server and the network
  • Significant processing is used to create and maintain the cache on multi-core processors.
  • Some processing is required for operational overhead on the processor and between the physical and virtualized processors

Answer : Some processing is required for operational overhead on the processor and between the physical and virtualized processors

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?


Options are :

  • Native
  • Type I
  • Bare Metal
  • Type II

Answer : Type II

BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 5

A technician wants to remotely gather a list of all the software running on the client PCs throughout the organization. Which of the following should be used to gather this information?


Options are :

  • SNMP
  • Syslog
  • SQL
  • WMI

Answer : WMI

Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?


Options are :

  • LUN
  • NAS
  • HBA
  • DAS

Answer : HBA

Which of the following is MOST important when factoring network level security in a public cloud environment?


Options are :

  • Ensuring confidentiality
  • Ensuring good user experience
  • Ensuring high availability
  • Ensuring redundancy
  • None of the above

Answer : Ensuring confidentiality

220-701 A+ Essentials Certification Practice Exam Set 12

Which of the following technologies would MOST likely be used for personal use to virtualize a desktop? 


Options are :

  • Type I
  • RAID 5
  • Type II
  • RAID 0

Answer : Type II

A company wants to migrate its critical application to a public cloud but the security administrator is concerned with the application’s data confidentiality requirements. Which of the following can be done to review if the appropriate management security controls are in place at the provider? 


Options are :

  • Policy and procedure audit
  • Vulnerability assessment
  • Performance and application testing
  • Penetration testing

Answer : Policy and procedure audit

Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops. Which of the following should the lab administrator implement to allow students to upload files?


Options are :

  • Storage quotas
  • Port mapping
  • Resource pooling
  • Secure FTP

Answer : Port mapping

CT0-101 Convergence+ Certification Practice Exam Set 2

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?


Options are :

  • Disable firewall
  • Defrag system
  • Update drivers
  • Patch system

Answer : Patch system

A catastrophic disk failure occurred on a company’s critical database. After a technician performs a full system restore, one of the business units realizes that the current backup does not hold fresh enough information. Which of the following should the company revise? 


Options are :

  • MTBF
  • MTTR
  • RTO
  • RPO

Answer : RPO

An administrator is creating a new VM template and has a requirement that the OS must be hardened. Which of the following should be performed to harden a guest OS?


Options are :

  • Encrypt the hard drive
  • Run defrag
  • Rename administrator account
  • Change page file

Answer : Rename administrator account

JK0-019 CompTIA E2C Network + Certification Exam Set 7

Which of the following storage technologies is file-based?


Options are :

  • NAS
  • DAS
  • WAN
  • SAN

Answer : NAS

Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?


Options are :

  • RAID 5
  • RAID 10
  • RAID 0
  • RAID 1

Answer : RAID 1

Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?


Options are :

  • Set the vNIC speed to full-duplex
  • Add an addition vNIC
  • Set the vNIC speed to half-duplex
  • Bridge the vNIC

Answer : Bridge the vNIC

Comptia A+ (220-801) Certification Exam Practice Test Set 1

Which of the following allows a network device to process storage traffic without significant delays, even if the amount of other network traffic has saturated the link?


Options are :

  • QoS
  • Jumbo frames
  • Load balancing
  • Caching

Answer : QoS

In which of the following cloud services will the customer be responsible for securing provisioned hosts? 


Options are :

  • PaaS
  • SaaS
  • IaaS
  • DaaS

Answer : IaaS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions