CV0-001 CompTIA Cloud+ Certification Practice Exam Set 1

Which of the following should be installed on VMs to report and take action against potential threats?

Options are :

  • NIPS
  • NIDS
  • HIPS (Correct)
  • HIDS

Answer : HIPS

An administrator is tasked to reduce the companyís data center power utilization. Currently there are 500 physical servers in the data center and 600 virtual servers with five additional available host servers. Which of the following should the administrator perform?

Options are :

  • Migrate servers using V2P technology
  • None
  • Migrate servers using V2V technology
  • Migrate servers using P2V technology (Correct)
  • Perform an offline migration of virtual servers

Answer : Migrate servers using P2V technology

Which of the following uses the business model of shared resources in a cloud environment? 

Options are :

  • Multi-tenancy (Correct)
  • Cloud bursting
  • Self-serve
  • Elasticity

Answer : Multi-tenancy

Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?

Options are :

  • Pay-as-you-grow
  • Multi-tenancy
  • Rapid deployment
  • Cloud bursting (Correct)

Answer : Cloud bursting

Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share? 

Options are :

  • Authentication
  • LUN masking
  • Obfuscation
  • Log review (Correct)

Answer : Log review

Which of the following only uses Fibre Channel to implement a storage infrastructure? 

Options are :

  • SMB
  • SAN (Correct)
  • NFS
  • NAS

Answer : SAN

An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently. Which of the following is MOST likely the issue with the new servers? 

Options are :

  • The VM servers were not properly configured (Correct)
  • The server is missing security patches
  • The dynamic resource pool is malfunctioning
  • There are insufficient resources available on the host.

Answer : The VM servers were not properly configured

Which of the following is MOST likely to be retrieved from an individually addressable blob?

Options are :

  • An object ID
  • An image (Correct)
  • A sequence number
  • A hash

Answer : An image

Although the SAN appears to be running without any problems, the technician is unable to reach the SANís web enabled management interface. Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?

Options are :

  • arp
  • ipconfig
  • ping
  • trace route (Correct)

Answer : trace route

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?

Options are :

  • LUN Masking (Correct)
  • SAN Zoning
  • Port Zoning
  • Multi pathing

Answer : LUN Masking

An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography. Which of the following should the administrator implement NEXT? 

Options are :

  • SSL
  • RC5
  • Access controls (Correct)
  • Zoning

Answer : Access controls

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?

Options are :

  • Community
  • Public
  • Private (Correct)
  • Hybrid

Answer : Private

A company has decided to reduce their data center size. An administrator for the company has been tasked to virtualize many of the companyís servers. Which of the following should the administrator perform to accomplish this goal?

Options are :

  • V2P
  • P2V (Correct)
  • P2P
  • V2V

Answer : P2V

Which of the following is used to locate a specific area of storage in a cloud environment?

Options are :

  • Replicas
  • SAN
  • Metadata
  • Object ID (Correct)

Answer : Object ID

Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors? 

Options are :

  • Additional processing is used to run ports and services not turned off through the process of server hardening
  • Extra processing is needed to store encryption keys used for secure transmission between the server and the network
  • Significant processing is used to create and maintain the cache on multi-core processors.
  • Some processing is required for operational overhead on the processor and between the physical and virtualized processors (Correct)

Answer : Some processing is required for operational overhead on the processor and between the physical and virtualized processors

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?

Options are :

  • Native
  • Type I
  • Bare Metal
  • Type II (Correct)

Answer : Type II

A technician wants to remotely gather a list of all the software running on the client PCs throughout the organization. Which of the following should be used to gather this information?

Options are :

  • SNMP
  • Syslog
  • SQL
  • WMI (Correct)

Answer : WMI

Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?

Options are :

  • LUN
  • NAS
  • HBA (Correct)
  • DAS

Answer : HBA

Which of the following is MOST important when factoring network level security in a public cloud environment?

Options are :

  • Ensuring confidentiality (Correct)
  • Ensuring good user experience
  • Ensuring high availability
  • Ensuring redundancy
  • None of the above

Answer : Ensuring confidentiality

Which of the following technologies would MOST likely be used for personal use to virtualize a desktop? 

Options are :

  • Type I
  • RAID 5
  • Type II (Correct)
  • RAID 0

Answer : Type II

A company wants to migrate its critical application to a public cloud but the security administrator is concerned with the applicationís data confidentiality requirements. Which of the following can be done to review if the appropriate management security controls are in place at the provider? 

Options are :

  • Policy and procedure audit (Correct)
  • Vulnerability assessment
  • Performance and application testing
  • Penetration testing

Answer : Policy and procedure audit

Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops. Which of the following should the lab administrator implement to allow students to upload files?

Options are :

  • Storage quotas
  • Port mapping (Correct)
  • Resource pooling
  • Secure FTP

Answer : Port mapping

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?

Options are :

  • Disable firewall
  • Defrag system
  • Update drivers
  • Patch system (Correct)

Answer : Patch system

A catastrophic disk failure occurred on a companyís critical database. After a technician performs a full system restore, one of the business units realizes that the current backup does not hold fresh enough information. Which of the following should the company revise? 

Options are :

  • MTBF
  • MTTR
  • RTO
  • RPO (Correct)

Answer : RPO

An administrator is creating a new VM template and has a requirement that the OS must be hardened. Which of the following should be performed to harden a guest OS?

Options are :

  • Encrypt the hard drive
  • Run defrag
  • Rename administrator account (Correct)
  • Change page file

Answer : Rename administrator account

Which of the following storage technologies is file-based?

Options are :

  • NAS (Correct)
  • DAS
  • WAN
  • SAN

Answer : NAS

Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?

Options are :

  • RAID 5
  • RAID 10
  • RAID 0
  • RAID 1 (Correct)

Answer : RAID 1

Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?

Options are :

  • Set the vNIC speed to full-duplex
  • Add an addition vNIC
  • Set the vNIC speed to half-duplex
  • Bridge the vNIC (Correct)

Answer : Bridge the vNIC

Which of the following allows a network device to process storage traffic without significant delays, even if the amount of other network traffic has saturated the link?

Options are :

  • QoS (Correct)
  • Jumbo frames
  • Load balancing
  • Caching

Answer : QoS

In which of the following cloud services will the customer be responsible for securing provisioned hosts? 

Options are :

  • PaaS
  • SaaS
  • IaaS (Correct)
  • DaaS

Answer : IaaS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions