CV0-001 CompTIA Cloud+ Certification Practice Exam Set 8

Which of the following cloud services provides application isolation?


Options are :

  • CaaS
  • DaaS
  • SaaS (Correct)
  • BPaaS

Answer : SaaS

Which of the following BEST describes the process of mapping storage initiators to targets? 


Options are :

  • Obfuscation
  • Access control lists
  • Zoning (Correct)
  • LUN masking

Answer : Zoning

A network engineer is investigating slow response times for queries to a cloud-hosted database. The switch configurations show that there are several traffic bottlenecks. Which of the following should the engineer implement to BEST solve the problem and prevent future issues? 


Options are :

  • Configure QoS on the virtual desktop
  • Add a router to the network to increase traffic paths
  • Configure QoS on the network switches to alleviate bottlenecks (Correct)
  • Migrate the cloud-hosted database to a type II hyper visor

Answer : Configure QoS on the network switches to alleviate bottlenecks

Which of the following would need to be consistent for a LUN to be considered healthy?


Options are :

  • inode
  • Structure
  • Super block
  • Metadata (Correct)

Answer : Metadata

The administrator of an organization needs to configure a VM to be able to communicate on the physical network connected to the host. Which of the following steps MUST the administrator perform?


Options are :

  • Bridge the virtual NIC (Correct)
  • Create a route on the virtual router
  • Assign the virtual NIC to the same virtual switch as the host
  • Assign the virtual NIC to the same VLAN as the host

Answer : Bridge the virtual NIC

Users report that they are unable to access the Internet. The network administrator notices spikes of traffic during the outage reports. Which of the following will MOST likely need to be upgraded to allow more traffic and will help avoid further outages? 


Options are :

  • Bandwidth (Correct)
  • MAN connections
  • LAN connections
  • Latency

Answer : Bandwidth

VM templates should have their default account passwords changed upon deployment to prevent: 


Options are :

  • Access by the administrator.
  • Access by former IT employees (Correct)
  • Access to the Internet.
  • Access denial

Answer : Access by former IT employees

Anne, an administrator, receives an alert indicating a disk failure on a highly available server with a local RAID 5 array. When checking the server, Anne confirms a flashing amber light on one of the disks. Which of the following is the correct procedure for replacing this drive? 


Options are :

  • Remove the old disk while the server is powered on and operational and replace with a new drive (Correct)
  • Remove the old drive, reboot the server, and access the RAID controller. Rebuild the array to RAID 6, and then add the new drive for parity.
  • Power off the server and replace with a new drive.
  • Remove the old drive, reboot the server, and access the RAID controller. Rebuild the array to RAID 1, and then add the new drive for parity.

Answer : Remove the old disk while the server is powered on and operational and replace with a new drive

An administrator is building a sandbox environment. There is one host assigned to the resource pool with eight CPU cores available. There will be two highly utilized, identical virtual application servers and three virtual desktops running in this environment. One of the virtual desktops will be running a new management application for the environment. Which of the following is the BEST recommended configuration for the sandbox environment? 


Options are :

  • Configure the application servers with two CPUs each; configure two virtual desktops with one CPU each and two CPUs for the management virtual desktop (Correct)
  • Configure the virtual desktops with two CPUs each; configure the application servers with one CPU each
  • Configure one application server with three CPUs and the other with two CPUs; configure the virtual desktops with one CPU each
  • Configure the management virtual desktop with three CPUs, and the other virtual desktops with one CPU each; configure one application with two CPUs and the other application server with one CPU

Answer : Configure the application servers with two CPUs each; configure two virtual desktops with one CPU each and two CPUs for the management virtual desktop

An administrator has enabled NPIV and has configured the SAN for SAN boot; however, SAN boot fails intermittently. Which of the following, if configured incorrectly, could cause the issue? 


Options are :

  • Zoning
  • LUN Masking
  • WWPN (Correct)
  • Storage cluster

Answer : WWPN

A Chief Information Officer (CIO) has established a budget for the IT department that allows for 30% of the companyís IT infrastructure to be upgraded on an annual basis. The engineer in the IT department must identify which equipment requires immediate attention for upgrades, which equipment can function in the near term, and which equipment can be considered in the long term for upgrades. Which of the following describes the policy the engineer must develop? 


Options are :

  • Life cycle management plan (Correct)
  • System management plan
  • Asset maintenance plan
  • Configuration management plan

Answer : Life cycle management plan

A company that provides cloud-based storage services wants to ensure that if underlying hard disk drives are sent to the disposal facility, they will not contain any data in clear-text format. Which of the following should be done to accomplish this task? 


Options are :

  • Implement degaussing
  • Fill disk with random data before disposal
  • Ensure that ACLs are configured on usersí data
  • Implement full-disk encryption (Correct)

Answer : Implement full-disk encryption

Joe, a network administrator, is working with the security team to determine who deleted files from a file share. Which of the following would the security team ask Joe to provide during the security review? 


Options are :

  • Network logs
  • Audit logs (Correct)
  • Syslogs
  • Packet logs

Answer : Audit logs

Which of the following protocols uses port 53, by default?


Options are :

  • FTP
  • NTP
  • DNS (Correct)
  • DHCP

Answer : DNS

Which of the following would be the FIRST choice to encrypt a laptop hard drive?


Options are :

  • TDE
  • AES (Correct)
  • SSL
  • DES

Answer : AES

The IT department has had problems coping with the demand of service provisioning and deprovisioning. If the IT department implements a cloud computing platform, which of the following would improve their productivity? 


Options are :

  • Scalability
  • Elasticity
  • Multi-tenancy
  • On-demand self-service (Correct)

Answer : On-demand self-service

Joe, an administrator, is searching through directories on his multi-tenant cloud environment when he notices he is able to access a directory holding another companyís data. Which of the following should be implemented to mitigate this issue? 


Options are :

  • Off-premise hosting
  • Data segregation (Correct)
  • Hashing
  • On-premise hosting

Answer : Data segregation

Which of the following is used for keeping track of all logical and physical data?


Options are :

  • BSD
  • Flat File Systems
  • Journaling File System (Correct)
  • Non Journaling File System

Answer : Journaling File System

Which of the following may be used to provide certificate management within an organization?


Options are :

  • PKI (Correct)
  • IPSec
  • Kerberos
  • SSH

Answer : PKI

An administrator has been tasked with the collection of all errors and events on the servers. These must be centralized and emailed directly from the central server. Which of the following is the BEST solution?


Options are :

  • DHCP server
  • RADIUS server
  • SYSLOG server (Correct)
  • LDAP server

Answer : SYSLOG server

A system administrator has a distribution switch with four up links to the core switch in a single aggregated link. The aggregated link requires all four connections to be up to function. Which of the following is this MOSTLY an example of? 


Options are :

  • Load balancing without high availability (Correct)
  • Load balancing with high availability
  • Fault tolerance with multipathing
  • High availability with multipathing

Answer : Load balancing without high availability

Which of the following describes a best practice for placement of VM swap files in a virtualized environment?


Options are :

  • Place them on the same data store as the OS
  • Place them on the local disk of the VM host
  • Place them on their own data store (Correct)
  • Place them on the same data store as the data

Answer : Place them on their own data store

Which of the following refers to the maximum amount of data that can be lost due to a system failure?


Options are :

  • RPO (Correct)
  • RTO
  • MTBF
  • MTTR

Answer : RPO

An administrator wants to re purpose server hardware to host hyper visors. The administrator must FIRST


Options are :

  • check the serverís configuration against the hyper visor vendorís HCL. (Correct)
  • install the hyper visor on the bare metal servers.
  • check the serverís configuration against the hardware vendorís HCL
  • install the OS and then enable the hyper visor function.

Answer : check the serverís configuration against the hyper visor vendorís HCL.

An administrator allocates 50 GB on a SAN for use by a server. Which of the following describes what the administrator has just created? 


Options are :

  • Storage array
  • Virtual SAN
  • LUN (Correct)
  • VMFS

Answer : LUN

An administrator is designing a VM cluster to support a new testing department in the company. This department will require high availability and the ability to migrate VMs with little impact to other network functions within the department. The infrastructure available for the department supports a 1GB internal backbone upon which virtual switches are being configured. Which of the following network designs would meet the criteria for the department?


Options are :

  • Assign the migration VLAN and client VLAN on one virtual switch port, and the management VLAN and storage VLAN on one virtual switch port
  • Assign the migration VLAN, management VLAN, client VLAN and storage VLAN all on separate virtual switch ports (Correct)
  • Assign the migration VLAN, management VLAN and client VLAN on one virtual switch port and assign the storage VLAN on a separate virtual switch port
  • Assign the migration VLAN, management VLAN and storage VLAN on one virtual switch port and a client VLAN on a separate virtual switch port

Answer : Assign the migration VLAN, management VLAN, client VLAN and storage VLAN all on separate virtual switch ports

A new WAN connection was recently installed between the primary data center and secondary data center for disaster recovery purposes. The network technician performed testing of the circuit and observed poor throughput performance. Which of the following is MOST likely the cause?


Options are :

  • Caching
  • NIC failure
  • Compression
  • Latency (Correct)

Answer : Latency

An administrator is tasked with writing the company disaster recovery plan in the event the hosting company experiences a catastrophe. Which of the following should be included? (Select TWO).

A. Fire safety signage
B. Fire exits
C. Door closures and time-delay door alarm
D. Risk assessments
E. Contingency plan and test protocols


Options are :

  • C,D
  • A,D
  • D,E (Correct)
  • A,B

Answer : D,E

Which of the following types of storage technologies uses fiber channel protocols?


Options are :

  • iSCSI
  • SAN (Correct)
  • NAS
  • DAS

Answer : SAN

Which of the following types of virtual components performs Layer 3 functions between networks in a virtualized environment? 


Options are :

  • Virtual switch
  • Virtual HBA
  • Virtual router (Correct)
  • Virtual NIC

Answer : Virtual router

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions