CV0-001 CompTIA Cloud+ Certification Practice Exam Set 9

Which of the following mitigates newly found vulnerabilities within software for an environment? 


Options are :

  • Elasticity
  • Scaling
  • Patching (Correct)
  • Clustering

Answer : Patching

A system administrator has a pool of employees using VMs that have a low business value. Which of the following would MOST likely be an appropriate allocation of host resources for this pool?


Options are :

  • Reserving the amount of virtual drive space, CPU use, and memory allocation the pool can use.
  • Reserving the number of virtual NICs, VHBAs, and licenses the pool can use.
  • Limiting the number of virtual NICs, VHBAs, and licenses the pool can use.
  • Limiting the amount of virtual drive space, CPU use, and memory allocation the pool can use. (Correct)

Answer : Limiting the amount of virtual drive space, CPU use, and memory allocation the pool can use.

An administrator has three VMs and each has been allocated two virtual CPUs. VM1 and VM2 have CPU shares set to normal priority. VM3 has CPU shares set to high priority. All three VMs are running CPU intensive workloads and begin to contend for CPU resources. If VM1 and VM2 are effectively given 1600 MHz each, which when combined represents 50% of the available processing power, VM3 will be given:


Options are :

  • 1800 MHz
  • 3200 MHz (Correct)
  • 2400 MHz.
  • 1600 MHz

Answer : 3200 MHz

A financial storage system will be required by law to retain copies of checks for up to two years. Which of the following would be suited to meet this requirement?


Options are :

  • FCIP
  • USB drive
  • SSD
  • CAS (Correct)

Answer : CAS

A network administrator needs to manage a virtual switch remotely in a secure manner. Which of the following tools would MOST likely be used? 


Options are :

  • SSH (Correct)
  • RDP
  • Telnet
  • SNMP

Answer : SSH

Users report that they are unable to access a virtual server. Which of the following commands would allow the network administrator to verify the current network settings within the virtual server?


Options are :

  • ipconfig (Correct)
  • tftp
  • telnet
  • nbtstat

Answer : ipconfig

Which of the following would be the FIRST thing to do after determining an upgrade is required for a production application server?


Options are :

  • Perform the upgrade
  • Schedule a maintenance window
  • Notify the application users of the upgrade
  • Submit a change request (Correct)

Answer : Submit a change request

Which of the following is an access control type that requires a username and password along with a hardware token?


Options are :

  • Single-factor
  • RBAC
  • Multifactor (Correct)
  • SSO

Answer : Multifactor

A company that provides IaaS to small business organizations needs to allow customers to control the power state of their virtual machines. Which of the following should be implemented to accomplish this task? 


Options are :

  • Configure customerís VMs to be in an always-on state
  • Allow Wake-on-LAN packets on the firewall
  • Grant limited access to the host power managing infrastructure
  • Grant limited access to the hyper visor management interface (Correct)

Answer : Grant limited access to the hyper visor management interface

ARP is used to resolve IP addresses to: 


Options are :

  • FQDN addresses
  • WWPN addresses
  • IQN addresses.
  • MAC addresses (Correct)

Answer : MAC addresses

An administrator deployed a VM that is hosting an internal website. Users report they are unable to access the new website. Which of the following should the network administrator do to test whether web traffic is being sent and received?


Options are :

  • Ping the VMís loop back address (Correct)
  • Telnet to port 80
  • Ping the VMís IP address
  • Browse to any website

Answer : Ping the VMís loop back address

Which of the following should a network administrator implement to logically segregate network traffic?


Options are :

  • Virtual switching
  • VLAN (Correct)
  • Supernetting
  • NAT

Answer : VLAN

A company decided to go with a cloud-based hosted email solution across all offices and wishes
to make the transition as seamless as possible. Which of the following methods would provide the
MOST seamless transition for end users?


Options are :

  • Non-SSL federation
  • Single sign-on (Correct)
  • Access controls
  • Multi-factor authentication

Answer : Single sign-on

Which of the following is a file transfer protocol that would be MOST appropriate for transferring sensitive data?


Options are :

  • TFTP
  • SFTP (Correct)
  • Telnet
  • HTTPS

Answer : SFTP

An administrator has access to the following tools: ping, tracert, ipconfig/ifconfig, and route. All of  these can be used to troubleshoot which of the following?


Options are :

  • iSCSI connections (Correct)
  • Fibre channel connections
  • FCoE
  • Zoning connections

Answer : iSCSI connections

Which of the following services can an administrator disable to prevent remote access to a system? 


Options are :

  • SMS
  • SMTP
  • Telnet (Correct)
  • DHCP

Answer : Telnet

An administrator is tasked with encrypting all Personally Identifiable Information (PII) within a cloud based database. Which of the following types of encryption will ensure that ONLY this type of information is encrypted while the rest of the database remains un encrypted? 


Options are :

  • Transport encryption
  • Hard drive encryption
  • Table encryption (Correct)
  • File and folder encryption

Answer : Table encryption

Which of the following would be a deciding factor when choosing a multi-tenant cloud environment over a locally hosted virtual environment? 


Options are :

  • Security
  • Standardization
  • Cost of ownership (Correct)
  • Litigation hold

Answer : Cost of ownership

After a sudden spike in traffic Anne, an administrator, notices many internal IP addresses are sending traffic to an external web server belonging to another company. Which of the following attacks may she be witnessing from her network? 


Options are :

  • Vishing
  • Denial of service (Correct)
  • Man-in-the-middle
  • Phishing

Answer : Denial of service

Which of the following RAID levels spreads blocks of a file across multiple disks without parity?


Options are :

  • 5
  • 3
  • 1
  • 0 (Correct)

Answer : 0

A technician has recently virtualized an older business critical fax server. The fax application relies on a proprietary fax modem and it is not working anymore. Which of the following has the technician failed to do?


Options are :

  • Performance baseline
  • Establish requirements (Correct)
  • Virtual storage migration
  • Proper P2V migration

Answer : Establish requirements

A company has a contract with a cloud vendor in which their monthly bill changes based on how much data is stored in the cloud. Which of the following is a benefit of this contract?


Options are :

  • Portability
  • Application isolation
  • Scalability (Correct)
  • Availability

Answer : Scalability

During deployment, which of the following should a technician install to be used in the future to shut down a virtual server?


Options are :

  • Third-party backup software
  • Guest management tools (Correct)
  • VLAN
  • Server snapshot

Answer : Guest management tools

Which of the following are SAN protocols? (Select TWO).
A. Fibre Channel
B. iSNS
C. NFS
D. iSCSI
E. TCP/IP
F. CIFS 


Options are :

  • B,D
  • C,E
  • A,B
  • A,D (Correct)

Answer : A,D

An administrator notices that the mouse does not perform as expected within a VM. Which of the following might improve the performance of the mouse?


Options are :

  • Install a 64-bit OS within the guest.
  • Install the virtualization guest software (Correct)
  • Replace the mouse on the host server
  • Enable USB port mapping.

Answer : Install the virtualization guest software

A system administrator is creating images of the physical servers on the network to create multiple VMs. Which of the following is this process called?


Options are :

  • V2V
  • P2V (Correct)
  • P2P
  • V2P

Answer : P2V

A software development team is looking for a sandbox environment to test new releases before deploying to production and has requested several virtual machines for this purpose. Which of the following virtual components could be utilized to help isolate these virtual machines from the production infrastructure?


Options are :

  • Virtual NICs on a different network (Correct)
  • Shared storage
  • Shared memory
  • One virtual CPU per virtual machine

Answer : Virtual NICs on a different network

An administrator is working on a guest operating system and needs access to the CD-ROM drive from the host operating system to install a driver. Which of the following describes what the administrator should use to accomplish this goal?


Options are :

  • Remote hyper visor access
  • Resource pooling
  • Dynamic resource allocation
  • Resource redirection (Correct)

Answer : Resource redirection

A recently deployed VM is running a Human Resource (HR) application on the HR network. Workstations in the accounting department can access the Internet and other accounting servers, but are unable to ping the new VM. Which of the following must be enabled for the accounting department to access this HR application? 


Options are :

  • VLAN routing should be enabled on the router (Correct)
  • Replace the accounting work group switch.
  • Disable port security on the HR work group switch.
  • The computers must be granted read rights to the VM.

Answer : VLAN routing should be enabled on the router

An administrator is planning to implement multipathing for IP-based storage. Which of the following protocols can be used in this configuration?


Options are :

  • iSCSI (Correct)
  • FC
  • FCoE
  • NFS

Answer : iSCSI

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions