CV0-001 CompTIA Cloud+ Certification Practice Exam Set 4

An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration? 

Options are :

  • Contact the vendor for compatibility requirements
  • Establish a performance baseline
  • Migrate the server in a development environment
  • Harden the operating system

Answer : Establish a performance baseline

Which of the following networking components would be used to connect two sub nets in a virtual environment?

Options are :

  • Virtual router
  • Virtual switch
  • Virtual disks
  • Virtual HBA

Answer : Virtual router

A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met. Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards?

Options are :

  • Replication consistency
  • Application delivery
  • Penetration test
  • Bandwidth assessment

Answer : Penetration test

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 11

Which of the following will allow the network administrator to verify that one IP is assigned to one VM? 

Options are :

  • Virtual Local Area Network
  • Resource Pooling
  • Storage allocation
  • Reservations

Answer : Reservations

A system administrator currently has two web server VMs on one host. Users are reporting that query searches within the site are slow. The system administrator notices that the host CPU is above the threshold. Which of the following should be completed?

Options are :

  • Rebuild the two web server VMs
  • Defragment the hard drives on the server.
  • Migrate one web server to another host.
  • Install another NIC for the creation of a network bridge.

Answer : Migrate one web server to another host.

A data center migration is taking place and the administrator has been tasked with reducing the footprint of the new data center by virtualizing  as many servers as possible. A physical server has been flagged as a candidate for relocation to the new data center. Which of the following methods would be the FIRST method for relocating the server to the new data center? 

Options are :

  • V2V
  • P2V
  • V2P
  • P2V

Answer : P2V

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 10

Which of the following reduces the risk of known attacks from being successful?

Options are :

  • Mandatory access controls
  • DLP techniques
  • Patching frequency
  • Encryption methods

Answer : Patching frequency

A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?

Options are :

  • Redundancy
  • Latency
  • Replication
  • Failback

Answer : Redundancy

A user is notified that they will be terminated at the end of the day. As they start cleaning up their workstation, they try to FTP information from their workstation to a cloud-based, personal backup solution. Which of the following hardening techniques would be used to restrict their ability to transfer this information via FTP?

Options are :

  • Host-based firewall
  • Antivirus
  • NIPS
  • NIDS

Answer : Host-based firewall

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 5

Users on a network report that they are unable to access any external websites, however, they are able to access resources by IP address. Which of the following command line utilities would be used FIRST in troubleshooting this problem? 

Options are :

  • telnet
  • nslookup
  • ipconfig
  • netstat

Answer : nslookup

An administrator creates a new virtual desktop for a user. The user is unable to log in with their domain credentials. However, the administrator is able to log in with a local administrator account and ping other VDIs on the same subnet. Which of the following does the administrator need to correct?

Options are :

  • Gateway on the network adapter
  • Virtual router
  • Flow control settings of TCP/IP
  • VLAN on the virtual switch

Answer : Gateway on the network adapter

BR0-002 CompTIA Network + Bridge Practice Exam Set 3

The Chief Information Officer (CIO) of a company is tasked to save costs by reducing data center space. The administrator explains that virtualization of servers will support this task as a benefit of migrating to a cloud environment known as: 

Options are :

  • Increased server efficiency.
  • Total cost of ownership reduction
  • Infrastructure consolidation.
  • Increased availability.

Answer : Infrastructure consolidation.

Which of the following would mitigate a "ping of death" attack?

Options are :

  • Firewall appliance
  • IDS appliance
  • Load balancing appliance
  • Proxy appliance

Answer : Firewall appliance

An administrator has implemented a self-service provisioning portal in the company and has
associated a cost to CPU, memory, storage, and OS type. Which of the following cloud computing
options has been configured?

Options are :

  • Multi-tenancy
  • Cloud bursting
  • Charge back
  • Reservations

Answer : Charge back

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 2

When conducting penetration testing on production systems during business hours, such testing will MOST likely cause disruption to operations when doing which of the following? 

Options are :

  • When checking file system ACLs
  • When testing account lockout policies
  • When foot printing the network
  • When discovering service versions

Answer : When testing account lockout policies

Which of the following would assist in preventing malware from spreading in a cloud environment?

Options are :

  • Implement a honeypot
  • Deploy DMZ
  • Antivirus software
  • Software-based firewall

Answer : Antivirus software

An administrator deployed a VM from a template which has the firewall disabled. The server IP address is manually assigned. The administrator cannot ping the server by IP address or DNS host name and has logged in from the hyper visor management console to verify the TCP/IP settings are correct. Which of the following is MOST likely the cause of the issue?

Options are :

  • The virtual NIC is not bridged.
  • The guest tools are not installed.
  • The routing table is incorrect.
  • The VLAN tag is incorrect.

Answer : The virtual NIC is not bridged.

CT0-101 Convergence+ Certification Practice Exam Set 12

Which of the following is an example of vertical scaling?

Options are :

  • Adding memory to the VM guest
  • Adding CPU to a VM guest
  • Migrating all VM guests from one host to another in a cluster
  • Adding memory to a host

Answer : Adding memory to a host

An administrator creates a new VM, but after powering on the VM, the administrator receives the message "no boot device detected". Which of the following needs to be done to resolve this problem?

Options are :

  • Mount an ISO containing an operating system
  • Connect the host to working VM storage
  • Migrate the VM to a new host
  • Mount a NIC that is connected to the virtual switch

Answer : Mount an ISO containing an operating system

A new self-service provisioning system has been deployed to serve the company's rapid VM provisioning needs. Since the website is in the DMZ, HTTPS is required, but company policy states that SSL certificates can not terminate at the server. The company also has a requirement
that the web portal be redundant while providing session state. Which of the following availability technologies can be used to meet the company's requirements?

Options are :

  • Fail over
  • Multipathing
  • Fail back
  • Load balancing

Answer : Load balancing

NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 7

Which of the following can limit VM mobility in a host cluster based on architectural differences?

Options are :

  • Switch
  • HBA
  • CPU
  • NIC

Answer : CPU

An IPS is used to: 

Options are :

  • Authenticate users
  • Establish SSL access
  • Block unauthorized access
  • Detect unauthorized access

Answer : Block unauthorized access

An administrator receives an automated text that indicates a server hosting a critical app is unavailable. Upon further review, the server needs to be restored from backup. Which of the following defines the amount of time a restore cannot exceed? 

Options are :

  • Failback
  • RPO
  • Failover
  • RTO

Answer : RTO

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 2

Which of the following is the BEST means of ensuring resource utilization remains even across the hosts?

Options are :

  • Resource pooling
  • VM affinity
  • Dynamic VM placement
  • VM high availability

Answer : Dynamic VM placement

A company just received a shipment of brand new blade servers and an administrator has been tasked with virtualizing the blade fabric switches. Which of the following would be used to accomplish this?

Options are :

  • P2V
  • NPIV
  • iSNS
  • V2P

Answer : NPIV

The administrator is required to accommodate 200 GB of online (near-line) storage for the monthly backups while minimizing cost. Which of the following disk types should be purchased? 

Options are :

  • SAS
  • SSD
  • FC
  • SATA

Answer : SATA

220-701 A+ Essentials Certification Practice Exam Set 4

Which of the following describes the combination of a disk, computer, and a network into a pool of resources to efficiently allocate resources?

Options are :

  • Load balancing
  • Zoning
  • Virtual resource reservation
  • Converged infrastructure

Answer : Converged infrastructure

Which of the following BEST describes the need for LUN Masking?

Options are :

  • A storage administrator needs to establish storage recovery points.
  • A storage administrator needs to control which servers are able to access specific LUNs.
  • A storage administrator needs to isolate storage networks.
  • A storage administrator needs to establish storage replication points.

Answer : A storage administrator needs to control which servers are able to access specific LUNs.

A company has purchased a new self-service provisioning system and has brought in a consultant to deploy the system. During the installation the application attempts to connect to the database server but fails. Which of the following could cause the connection issue?

Options are :

  • The consultant has not been granted sa rights to the database instance
  • The database has not been configured for data de-duplication
  • Necessary firewall ports have not been opened
  • The consultant has not been granted log in rights to the database server

Answer : Necessary firewall ports have not been opened

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

Which of the following offers 128, 192, and 256 bit encryption? 

Options are :

  • DES
  • RC5
  • AES
  • RC4

Answer : AES

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions