CV0-001 CompTIA Cloud+ Certification Practice Exam Set 3

Which of the following could be assigned to a virtual CPU? 


Options are :

  • Stepping
  • Cores (Correct)
  • LUNs
  • HBAs

Answer : Cores

Which of the following business continuity designs provides the highest degree of fault tolerance?


Options are :

  • Warm Site
  • Cold Site
  • Site Mirroring (Correct)
  • Hot Site

Answer : Site Mirroring

Which of the following BEST defines RAID 4?


Options are :

  • RAID 4 requires a minimum of 4 disks
  • RAID 4 is less secure than RAID 5.
  • RAID 4 has a dedicated parity drive (Correct)
  • RAID 4 allows two failed drives.

Answer : RAID 4 has a dedicated parity drive

A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses. Which of the following should be implemented?


Options are :

  • Soft limit quotas
  • Entitlement allocations
  • Resource pooling
  • Reservations (Correct)

Answer : Reservations

A web hosting company received reports of slow performance from four out of the five clients. Upon investigation, it was determined that a hosted virtual machine was using more RAM and CPU than the others. Which of the following MOST likely contributed to the issue?


Options are :

  • Soft quota limits
  • Hard quota limits
  • Storage allocation
  • Resource pooling (Correct)

Answer : Resource pooling

Which of the following attributes BEST describes elasticity in cloud computing? (Select TWO).
A.
Universal access
B.
Multi-tenancy
C.
Portability
D.
Cost effectiveness
E.
Scalable 

F.
Off premises


Options are :

  • D,E (Correct)
  • A.B
  • B.D
  • E,F

Answer : D,E

Which of the following hyper visor types runs on a host operating system that provides virtualization services, including memory management and device support?


Options are :

  • Proprietary hyper visor
  • Type I hyper visor
  • Open source hyper visor
  • Type II hyper visor (Correct)

Answer : Type II hyper visor

A storage administrator has 100 terabytes of physical storage space within the SAN. Which of the following is used to enable access to the storage space? 


Options are :

  • Drive mirroring
  • None
  • Drive striping
  • LUN creation (Correct)
  • RAID configuration

Answer : LUN creation

Which of the following storage technologies would be MOST appropriate for installations where
fast data access time is paramount?


Options are :

  • SSD (Correct)
  • HDD
  • Tape
  • USB

Answer : SSD

A technician would like to connect to a virtual server from inside the network, using a desktop computer. Which of the following tools could the technician use? 


Options are :

  • HTTP
  • IMAP
  • SSL
  • RDP (Correct)

Answer : RDP

Which of the following cloud services provides billing, payroll, contract management, and human resource management functions? 


Options are :

  • DaaS
  • CaaS
  • BPaaS (Correct)
  • SaaS

Answer : BPaaS

A company is required to provide their customers with zero downtime for its web application. Which of the following would satisfy this requirement? 


Options are :

  • Multipathing
  • Cold site
  • High availability (Correct)
  • Load balancing

Answer : High availability

Which of the following is a sub component of a virtual machine?


Options are :

  • Virtual OS
  • Virtual HBA (Correct)
  • Virtual shield
  • Virtual switch

Answer : Virtual HBA

Which of the following is a MINIMUM requirement for VM online migration?


Options are :

  • Same CPU family between source and target hosts (Correct)
  • Same hardware vendor for the data center
  • Same hyper visor versions between source and target hosts.
  • Same network equipment between source and target hosts

Answer : Same CPU family between source and target hosts

A storage administrator wants to limit an operating system from accessing all of the storage within the array. Which of the following could be enabled on the SAN? 


Options are :

  • Access control lists
  • Implement different file formats
  • LUN masking (Correct)
  • Data at rest encryption

Answer : LUN masking

How many cores are available to the resource pool with a Type I hypervisor that has 4 quad core processors installed?


Options are :

  • 16 (Correct)
  • 24
  • 64
  • 32

Answer : 16

Which of the following describes the access control method where data owners authorize who is granted access to their files?


Options are :

  • Access control list
  • Discretionary access control (Correct)
  • Mandatory access control
  • Role-based access control

Answer : Discretionary access control

Some of the VMs in an environment are experiencing network connectivity loss. The VM management network has no connectivity issues. Which of the following could cause this connectivity issue?


Options are :

  • Faulty host NIC port (Correct)
  • Slow NIC
  • Wrong NIC load balancing mode
  • NIC teaming is disabled

Answer : Faulty host NIC port

A critical hypervisor security patch has been released and needs to be rolled out as soon as possible. Which of the following steps can be taken to minimize downtime for all guest VMs currently running? 


Options are :

  • In the next scheduled maintenance window, apply patch, reboot host, and wait for all VMs to come back online.
  • In the next scheduled maintenance window, shut down all VMs, apply patch, reboot host, and wait for all VMs to come back online (Correct)
  • In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, patch host, reboot host, and place host back into availability cluster
  • In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, unplug network cables from host, patch host, reboot host, reconnect network cables, and place host back into availability cluster

Answer : In the next scheduled maintenance window, shut down all VMs, apply patch, reboot host, and wait for all VMs to come back online

A system administrator wants to create a mitigation strategy to quickly roll back a virtual image after applying the latest updates. Which of the following would the administrator utilize?


Options are :

  • Offline backup
  • File backup
  • Image backup
  • Snapshot (Correct)

Answer : Snapshot

A web server is offline. Which of the following will allow the FASTEST possible recovery of the web server?


Options are :

  • Image backups (Correct)
  • Operating system and application backups
  • File backups
  • Operating system backups only

Answer : Image backups

Which of the following protocols is MOST likely used by a switch to communicate status information to an administrator?


Options are :

  • HTTP
  • SNMP (Correct)
  • SMTP
  • NNTP

Answer : SNMP

A company has an existing internal network that hosts confidential information. However, this network also has a connection to a separate site. The separate site is managed by a third party organization that has an SLA with the company. Which of the following BEST defines this cloud delivery model?


Options are :

  • Private Cloud
  • Public Cloud
  • Hybrid Cloud (Correct)
  • Community Cloud

Answer : Hybrid Cloud

Which of the following access control methods could allow for a network user to sign onto their corporate network and their suppliers network portal without having to enter their ID and password more than once?


Options are :

  • Role-based access control
  • Federated access control (Correct)
  • Discretionary access control
  • Mandatory access control

Answer : Federated access control

Which of the following factors yields cost savings in cloud computing? (Select TWO).

A. Shared resources
B. Availability
C. Ubiquitous access
D. Multi-tenancy
E. On premises


Options are :

  • A,B
  • C,D
  • D,E
  • A,D (Correct)

Answer : A,D

Monitoring alarms should be set based on:


Options are :

  • The point of application installation.
  • A high point for every performance counter in the system.
  • Acceptable application performance criteria (Correct)
  • Support availability

Answer : Acceptable application performance criteria

Which of the following is MOST important when working in highly available virtual environments?


Options are :

  • Virtual network
  • Wide area network
  • Heartbeat VLAN (Correct)
  • Storage VLAN

Answer : Heartbeat VLAN

Which of the following is an example of two-factor authentication when accessing a virtual server?


Options are :

  • Username/password, fingerprint scanner, and key fob
  • Username/password and PIN
  • Username/password and fingerprints (Correct)
  • Multiple usernames/passwords for all websites

Answer : Username/password and fingerprints

To avoid the same LUN showing up multiple times in client hosts, an administrator should implement: 


Options are :

  • Multiple zones
  • Multiple HBAs
  • Multipathing software (Correct)
  • Multiple initiators

Answer : Multipathing software

Users have been reporting slow response times on a database server. The administrator noticed the server at any given time has between 30 to 50 users connected to various databases. Additional research shows disk metrics such as disk queuing and disk access rates are both around 10% to 15%. Which of the following can be the root cause of this slow performing server?


Options are :

  • The CPU time reservation is small
  • The swap disk space is small.
  • The server has fewer resources than required. (Correct)
  • I/O tuning is disabled

Answer : The server has fewer resources than required.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions