CV0-001 CompTIA Cloud+ Certification Practice Exam Set 10

A system administrator is planning storage infrastructure to store backup copies of virtual machines that are at least 5 GB in size. Which of the following file systems can be used in this scenario? (Select TWO).
A. SMB
B. RAW
C. EXT
D. FAT
E. NTFS


Options are :

  • C,E (Correct)
  • B,C
  • A,B
  • A,E

Answer : C,E

Which of the following is a concern when migrating from a private cloud to a public cloud?


Options are :

  • Limited visibility
  • Performance
  • Storage
  • Security (Correct)

Answer : Security

The BEST way to compare daily performance metrics against a “normal” operational metric is to first establish:


Options are :

  • A standard metrics process.
  • An operational baseline (Correct)
  • An analysis formula.
  • An operational goal.

Answer : An operational baseline

The corporate security department is recommending that the administrator deploys Type I hyper visor versus Type II. Which of the following is a security concern in regards to deploying a Type II hyper visor?


Options are :

  • Administration time
  • Performance benchmarks
  • Additional software (Correct)
  • Human error

Answer : Additional software

A bare metal hypervisor runs:


Options are :

  • On a virtual machine
  • On a virtual database server.
  • On top of another operating system.
  • Directly on a physical machine. (Correct)

Answer : Directly on a physical machine.

Which of the following ciphers consists of independent keys providing a key length of 168 bits?


Options are :

  • AES
  • 3DES (Correct)
  • RC5
  • RC6

Answer : 3DES

Which of the following may be used prior to encryption of information stored in a database if only weak encryption algorithms are allowed?


Options are :

  • Obfuscation (Correct)
  • Hashing
  • LUN Masking
  • Access Control Lists

Answer : Obfuscation

Which of the following would be used to advertise a public IP address on redundant WAN circuits?


Options are :

  • OSPF
  • BGP (Correct)
  • UDP
  • ICMP

Answer : BGP

Which of the following can be used to enable out-of-band management of a Windows-based host?


Options are :

  • IPMI (Correct)
  • SMTP
  • SNMP
  • WMI

Answer : IPMI

Which of the following security methods would be used to harden a switch?


Options are :

  • IDS
  • ACL (Correct)
  • VPN
  • VLAN

Answer : ACL

Which of the following protocols would allow data to be transferred securely through the cloud?


Options are :

  • SMTP
  • SFTP (Correct)
  • DHCP
  • HTTP

Answer : SFTP

A virtual campus lab is accessible by students remotely. Which of the following tools allows students to securely access the lab and take advantage of its GUI tools?


Options are :

  • HTTP
  • RDP (Correct)
  • Console port
  • SSH

Answer : RDP

Which of the following storage technologies uses file level access?


Options are :

  • iSCSI
  • NAS (Correct)
  • SAN
  • FCoE

Answer : NAS

Which of the following could an administrator perform to restore confidential data housed within a VM server in case the data becomes corrupted or overwritten?


Options are :

  • Snapshots backups
  • Daily image backups
  • Weekly image backups
  • Daily file backups (Correct)

Answer : Daily file backups

Which of the following, in conjunction with IPSec, can be configured to provide secure access to files on a NAS?


Options are :

  • FCoE
  • CIFS (Correct)
  • iSCSI
  • SSH

Answer : CIFS

Which of the following would physically block access to a zone from any device outside of the zone? 


Options are :

  • Hard zoning (Correct)
  • Access control lists
  • Soft zoning
  • LUN masking

Answer : Hard zoning

Virtual switches are:


Options are :

  • Virtual machines that are on the same network
  • Used to differentiate network traffic with tags
  • Virtualized network switching devices (Correct)
  • Physical switches running on the same network with virtual machines

Answer : Virtualized network switching devices

Which of the following is the BEST technique an administrator can use to keep copies of various VM states while servers are online? 


Options are :

  • Cold backup
  • Clone
  • Disk image
  • Snapshot (Correct)

Answer : Snapshot

Which of the following would be a good reason to perform a V2V migration? 


Options are :

  • Storage vendor change
  • Host vendor change
  • Network vendor change
  • Hyper visor vendor change (Correct)

Answer : Hyper visor vendor change

Which of the following cloud services would MOST likely be used to deliver web applications?


Options are :

  • IaaS
  • SaaS (Correct)
  • PaaS
  • DaaS

Answer : SaaS

During the company’s last DR exercise, the administrator noticed that the backup site (Site B) was  responding 35% slower to ICMP packets than the primary site (Site A). Which of the following tests can help the administrator determine the root cause of a slow network?


Options are :

  • Replication test
  • Latency test (Correct)
  • Load balancing test
  • Bandwidth test

Answer : Latency test

Two independent organizations want to share authentication and other employees’ attributes to leverage a central online collaboration tool for a common project. Which of the following will allow the two companies to keep their internal authentication system while allowing visibility into the other company’s employees’ attributes?


Options are :

  • Single sign-on
  • Role-based access control
  • Multi-factor authentication
  • Federation (Correct)

Answer : Federation

A company has deployed a website which is mirrored at a secondary data center. Which of the following should be changed to route users to the secondary data center in case of a primary site failure?


Options are :

  • Disaster recovery plan
  • ARP table
  • Virtual address
  • DNS record (Correct)

Answer : DNS record

Which of the following is often used by a certificate to keep the contents of the page confidential?


Options are :

  • RC4
  • 3DES
  • RSA (Correct)
  • AES

Answer : RSA

A security administrator is being hired to perform a penetration test of a third-party cloud provider as part of an annual security audit. Which of the following is the FIRST step that must be performed?


Options are :

  • Scan for vulnerabilities
  • Research publicized incidents
  • Attempt known exploits
  • Get written permission (Correct)

Answer : Get written permission

A round robin is an example of which of the following methods of network optimization?


Options are :

  • Multipathing
  • Subnetting
  • LUN masking
  • Load balancing (Correct)

Answer : Load balancing

Which of the following is true about physical and virtual CPUs?


Options are :

  • There can only be one virtual system for each core CPU
  • A system can allocate more virtual CPUs than core CPUs. (Correct)
  • A system can only have as many virtual CPUs as core CPUs.
  • The number of virtual CPUs is independent from the virtual system.

Answer : A system can allocate more virtual CPUs than core CPUs.

Which of the following provides a company with the BEST equipment to minimize downtime in the event of catastrophic damage to their main data center?


Options are :

  • Warm site
  • Cold site
  • Hot site (Correct)
  • Offsite storage

Answer : Hot site

Which of the following cloud delivery models consists of private internal resources and external provider resources?


Options are :

  • Hybrid (Correct)
  • Community
  • Private
  • Public

Answer : Hybrid

Which of the following tests would be MOST appropriate when determining the need for patches and updates to servers in the data center?


Options are :

  • Latency testing
  • Penetration testing
  • Bandwidth determination
  • Risk assessment (Correct)

Answer : Risk assessment

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions