CV0-001 CompTIA Cloud+ Certification Practice Exam Set 10

A system administrator is planning storage infrastructure to store backup copies of virtual machines that are at least 5 GB in size. Which of the following file systems can be used in this scenario? (Select TWO).
A. SMB
B. RAW
C. EXT
D. FAT
E. NTFS


Options are :

  • C,E
  • B,C
  • A,B
  • A,E

Answer : C,E

Which of the following is a concern when migrating from a private cloud to a public cloud?


Options are :

  • Limited visibility
  • Performance
  • Storage
  • Security

Answer : Security

CompTIA JK0-801 A+ Certification Certified Practice Exam Set 3

The BEST way to compare daily performance metrics against a “normal” operational metric is to first establish:


Options are :

  • A standard metrics process.
  • An operational baseline
  • An analysis formula.
  • An operational goal.

Answer : An operational baseline

The corporate security department is recommending that the administrator deploys Type I hyper visor versus Type II. Which of the following is a security concern in regards to deploying a Type II hyper visor?


Options are :

  • Administration time
  • Performance benchmarks
  • Additional software
  • Human error

Answer : Additional software

A bare metal hypervisor runs:


Options are :

  • On a virtual machine
  • On a virtual database server.
  • On top of another operating system.
  • Directly on a physical machine.

Answer : Directly on a physical machine.

CompTIA JK0-022 E2C Security Data & Host Security Exam Set 1

Which of the following ciphers consists of independent keys providing a key length of 168 bits?


Options are :

  • AES
  • 3DES
  • RC5
  • RC6

Answer : 3DES

Which of the following may be used prior to encryption of information stored in a database if only weak encryption algorithms are allowed?


Options are :

  • Obfuscation
  • Hashing
  • LUN Masking
  • Access Control Lists

Answer : Obfuscation

Which of the following would be used to advertise a public IP address on redundant WAN circuits?


Options are :

  • OSPF
  • BGP
  • UDP
  • ICMP

Answer : BGP

BR0-002 CompTIA Network + Bridge Practice Exam Set 1

Which of the following can be used to enable out-of-band management of a Windows-based host?


Options are :

  • IPMI
  • SMTP
  • SNMP
  • WMI

Answer : IPMI

Which of the following security methods would be used to harden a switch?


Options are :

  • IDS
  • ACL
  • VPN
  • VLAN

Answer : ACL

Which of the following protocols would allow data to be transferred securely through the cloud?


Options are :

  • SMTP
  • SFTP
  • DHCP
  • HTTP

Answer : SFTP

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 9

A virtual campus lab is accessible by students remotely. Which of the following tools allows students to securely access the lab and take advantage of its GUI tools?


Options are :

  • HTTP
  • RDP
  • Console port
  • SSH

Answer : RDP

Which of the following storage technologies uses file level access?


Options are :

  • iSCSI
  • NAS
  • SAN
  • FCoE

Answer : NAS

Which of the following could an administrator perform to restore confidential data housed within a VM server in case the data becomes corrupted or overwritten?


Options are :

  • Snapshots backups
  • Daily image backups
  • Weekly image backups
  • Daily file backups

Answer : Daily file backups

FC0-TS1 CompTIA Strata IT for Sales Practice Exam Set 1

Which of the following, in conjunction with IPSec, can be configured to provide secure access to files on a NAS?


Options are :

  • FCoE
  • CIFS
  • iSCSI
  • SSH

Answer : CIFS

Which of the following would physically block access to a zone from any device outside of the zone? 


Options are :

  • Hard zoning
  • Access control lists
  • Soft zoning
  • LUN masking

Answer : Hard zoning

Virtual switches are:


Options are :

  • Virtual machines that are on the same network
  • Used to differentiate network traffic with tags
  • Virtualized network switching devices
  • Physical switches running on the same network with virtual machines

Answer : Virtualized network switching devices

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 13

Which of the following is the BEST technique an administrator can use to keep copies of various VM states while servers are online? 


Options are :

  • Cold backup
  • Clone
  • Disk image
  • Snapshot

Answer : Snapshot

Which of the following would be a good reason to perform a V2V migration? 


Options are :

  • Storage vendor change
  • Host vendor change
  • Network vendor change
  • Hyper visor vendor change

Answer : Hyper visor vendor change

Which of the following cloud services would MOST likely be used to deliver web applications?


Options are :

  • IaaS
  • SaaS
  • PaaS
  • DaaS

Answer : SaaS

CL0-001 CompTIA Cloud Essentials Practice Test Set 4

During the company’s last DR exercise, the administrator noticed that the backup site (Site B) was  responding 35% slower to ICMP packets than the primary site (Site A). Which of the following tests can help the administrator determine the root cause of a slow network?


Options are :

  • Replication test
  • Latency test
  • Load balancing test
  • Bandwidth test

Answer : Latency test

Two independent organizations want to share authentication and other employees’ attributes to leverage a central online collaboration tool for a common project. Which of the following will allow the two companies to keep their internal authentication system while allowing visibility into the other company’s employees’ attributes?


Options are :

  • Single sign-on
  • Role-based access control
  • Multi-factor authentication
  • Federation

Answer : Federation

A company has deployed a website which is mirrored at a secondary data center. Which of the following should be changed to route users to the secondary data center in case of a primary site failure?


Options are :

  • Disaster recovery plan
  • ARP table
  • Virtual address
  • DNS record

Answer : DNS record

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 11

Which of the following is often used by a certificate to keep the contents of the page confidential?


Options are :

  • RC4
  • 3DES
  • RSA
  • AES

Answer : RSA

A security administrator is being hired to perform a penetration test of a third-party cloud provider as part of an annual security audit. Which of the following is the FIRST step that must be performed?


Options are :

  • Scan for vulnerabilities
  • Research publicized incidents
  • Attempt known exploits
  • Get written permission

Answer : Get written permission

A round robin is an example of which of the following methods of network optimization?


Options are :

  • Multipathing
  • Subnetting
  • LUN masking
  • Load balancing

Answer : Load balancing

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 8

Which of the following is true about physical and virtual CPUs?


Options are :

  • There can only be one virtual system for each core CPU
  • A system can allocate more virtual CPUs than core CPUs.
  • A system can only have as many virtual CPUs as core CPUs.
  • The number of virtual CPUs is independent from the virtual system.

Answer : A system can allocate more virtual CPUs than core CPUs.

Which of the following provides a company with the BEST equipment to minimize downtime in the event of catastrophic damage to their main data center?


Options are :

  • Warm site
  • Cold site
  • Hot site
  • Offsite storage

Answer : Hot site

Which of the following cloud delivery models consists of private internal resources and external provider resources?


Options are :

  • Hybrid
  • Community
  • Private
  • Public

Answer : Hybrid

CompTIA SY0-401 Security Certification Practice Exam Set 1

Which of the following tests would be MOST appropriate when determining the need for patches and updates to servers in the data center?


Options are :

  • Latency testing
  • Penetration testing
  • Bandwidth determination
  • Risk assessment

Answer : Risk assessment

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions