CompTIA Cloud+ Certification

Which of the following would BEST ensure uninterrupted communication from the storage controller to the SAN?

Options are :

  • QoS
  • Multipathing (Correct)
  • Zoning
  • Flow control

Answer : Multipathing

 An administrator is unable to communicate with the physical server via RDP. When using an IP KVM a successful connection was established with the server. Which of the following is being used?

Options are :

  • SSO
  • Console (Correct)
  • Guest tools
  • SSH

Answer : Console

 Which of the following backup types will enable scheduled point-in-time recovery of data and is accessible to end-users?

Options are :

  • Image backup
  • Asynchronous replication
  • File system snapshot (Correct)
  • Virtual machine cloning

Answer : File system snapshot

 Several clients hosted on a cluster, is BEST referred to as:

Options are :

  • IaaS.
  • PaaS
  • multi-tenancy. (Correct)
  • on-premise hosting.

Answer : multi-tenancy.

 Which of the following provides insight information when investigating potential security breaches but does not make changes to the environment? (Select TWO).

Options are :

  • IPS
  • IDS (Correct)
  • Log reviews (Correct)
  • Firewalls
  • ACLs

Answer : IDS Log reviews

 When conducting penetration testing on production systems during business hours, such testing will MOST likely cause disruption to operations when doing which of the following?

Options are :

  • When testing account lockout policies (Correct)
  • When checking file system ACLs
  • When footprinting the network
  • When discovering service versions

Answer : When testing account lockout policies

Which of the following ports is generally associated with a UDP based service?

Options are :

  • 22
  • 25
  • 53 (Correct)
  • 80

Answer : 53

Which of the following encryption technologies would MOST likely be used to protect in-transit user data on a publicly accessible service?

Options are :

  • SSL (Correct)
  • RSA
  • IPSEC
  • AES

Answer : SSL

High CPU wait times can often be attributed to:

Options are :

  • I/O throttling.
  • Old processors on hypervisors.
  • Too many virtual machines on a single host. (Correct)
  • Too few virtual CPUs on the guests.

Answer : Too many virtual machines on a single host.

 A government agency wants to create a common environment that would allow them to share documents with other agencies using a cloud model. Which of the following would be the BEST approach?

Options are :

  • Hybrid cloud
  • Community cloud (Correct)
  • Private cloud
  • Public cloud

Answer : Community cloud

 Which of the following terms would describe a cloud characteristic that hosts separate customers on shared infrastructure?

Options are :

  • Flexible
  • Fractured
  • Diversified
  • Multi-tenancy (Correct)

Answer : Multi-tenancy

 The Chief Information Officer (CIO) of a company is tasked to save costs by reducing datacenter space. The administrator explains that virtualization of servers will support this task as a benefit of migrating to a cloud environment known as:

Options are :

  • Increased server efficiency.
  • Infrastructure consolidation. (Correct)
  • Total cost of ownership reduction.
  • Increased availability.

Answer : Infrastructure consolidation.

A critical hypervisor security patch has been released and needs to be rolled out as soon as possible. Which of the following steps can be taken to minimize downtime for all guest VMs currently running?

Options are :

  • In the next scheduled maintenance window, apply patch, reboot host, and wait for all VMs to come back online.
  • In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, patch host, reboot host, and place host back into availability cluster. (Correct)
  • In the next scheduled maintenance window, shut down all VMs, apply patch, reboot host, and wait for all VMs to come back online.
  • In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, unplug network cables from host, patch host, reboot host, reconnect network cables, and place host back into availability cluster.

Answer : In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, patch host, reboot host, and place host back into availability cluster.

 Which of the following cloud models would be used when implementing a company's email system in the cloud?

Options are :

  • PaaS
  • IaaS
  • SaaS (Correct)
  • XaaS

Answer : SaaS

Which of the following describes federated access control?

Options are :

  • Secure Sockets Layer
  • Trusted (Correct)
  • Digital Identity
  • Federated Communication

Answer : Trusted

Which of the following is the BEST means of ensuring resource utilization remains even across the hosts?

Options are :

  • Resource pooling
  • VM affinity
  • Dynamic VM placement (Correct)
  • VM high availability

Answer : Dynamic VM placement

Which of the following can an administrator implement to achieve boot on SAN?

Options are :

  • Thin provisioning
  • vNIC
  • NPIV (Correct)
  • NAT

Answer : NPIV

An administrator has configured a cluster but one of the VMs returns an error when attempting to automatically fail-over to another host in the cluster. Which of the following should be verified?

Options are :

  • All VLANs have been tagged
  • Datacenter bridging has been configured
  • All hosts are in the same virtual network (Correct)
  • Multipathing has been configured on the virtual network

Answer : All hosts are in the same virtual network

 Which of the following describes the combination of a disk, computer, and a network into a pool of resources to efficiently allocate resources?

Options are :

  • Virtual resource reservation
  • Zoning
  • Load balancing
  • Converged infrastructure (Correct)

Answer : Converged infrastructure

 An administrator has implemented a self-service provisioning portal in the company and has associated a cost to CPU, memory, storage, and OS type. Which of the following cloud computing options has been configured?

Options are :

  • Cloud bursting
  • Chargeback (Correct)
  • Multi-tenancy
  • Reservations

Answer : Chargeback

 The Chief Information Officer (CIO) of a company would like to close one of the company's four datacenters. The CIO has asked the administrator to perform tests to determine if the servers can be migrated to a public cloud located in another region. Which of the following tests should the administrator perform specific to the location change, to determine if user experience will be impacted?

Options are :

  • Network latency (Correct)
  • CPU wait time
  • I/O throttling
  • File read/write

Answer : Network latency

Which of the following can be used by the cloud consumer and provides a visualization of key service metrics?

Options are :

  • Dashboard (Correct)
  • API
  • Home Page
  • Interface

Answer : Dashboard

 A company just received a shipment of brand new blade servers and an administrator has been tasked with virtualizing the blade fabric switches. Which of the following would be used to accomplish this?

Options are :

  • iSNS
  • V2P
  • P2V
  • NPIV (Correct)

Answer : NPIV

 The administrator is required to accommodate 200GB of online (near-line) storage for the monthly backups while minimizing cost. Which of the following disk types should be purchased?

Options are :

  • SATA (Correct)
  • SSD
  • SAS
  • FC

Answer : SATA

A company needs to have a system that allows for high availability access to data for users. Which of the following terms BEST describes how a storage engineer would design the system to allow for that level of redundancy?

Options are :

  • Dual homing
  • Traffic shaping
  • Network binding
  • Multipathing (Correct)

Answer : Multipathing

 A company wants to build a cloud environment where individual departments can host applications and data on shared resources, but users cannot access data that is outside of their department without specific permissions. To deploy an architecture that meets this requirement, the network administrator will need to employ which of the following configurations on the switches?

Options are :

  • Port security
  • Packet shaping
  • Routing tables
  • VLANs (Correct)

Answer : VLANs

Which of the following protocols allows fibre channel to be transmitted over the network?

Options are :

  • HBA
  • FCoE (Correct)
  • NFS
  • iSCSI

Answer : FCoE

 Which of the following is an example of vertical scaling?

Options are :

  • Adding memory to a host (Correct)
  • Adding CPU to a VM guest
  • Adding memory to the VM guest
  • Migrating all VM guests from one host to another in a cluster

Answer : Adding memory to a host

After deploying VM guests from a VM template on an NFS datastore, the administrator has discovered misaligned VM guest partition offsets in multiple VM guests. Which of the following represents a complete solution for improving I/O performance?

Options are :

  • Correct the VM guest partition offset in the deployed VMs
  • Correct the VM guest partition offset in the deployed VMs and use the correct LUN alignment offset for the VM guest OS
  • Correct the VM guest partition offset in the VM template
  • Correct the VM guest partition offset in the VM template and the deployed VMs (Correct)

Answer : Correct the VM guest partition offset in the VM template and the deployed VMs

The Chief Technology Officer (CTO) has recently implemented a policy requiring all critical systems, including the virtualized environment to be highly available in the primary datacenter. The organization also maintains a cold site for disaster recovery. Which of the following BEST satisfies this requirement?

Options are :

  • Implement two hosts in a local cluster in the primary datacenter. (Correct)
  • Implement two hosts in the primary datacenter.
  • Implement two hosts in a geo-cluster, one in the primary datacenter and one in the cold site.
  • Implement data mirroring between the primary datacenter to the cold site.

Answer : Implement two hosts in a local cluster in the primary datacenter.

Which of the following would mitigate a "ping of death" attack?

Options are :

  • IDS appliance
  • Proxy appliance
  • Load balancing appliance
  • Firewall appliance (Correct)

Answer : Firewall appliance

An IPS is used to:

Options are :

  • Authenticate users
  • Detect unauthorizedaccess
  • Block unauthorized access (Correct)
  • Establish SSL access

Answer : Block unauthorized access

An administrator deployed a VM from a template which has the firewall disabled. The server IP address is manually assigned. The administrator cannot ping the server by IP address or DNS hostname and has logged in from the hypervisor management console to verify the TCP/IP settings are correct. Which of the following is MOST likely the cause of the issue?

Options are :

  • The routing table is incorrect.
  • The virtual NIC is not bridged. (Correct)
  • The VLAN tag is incorrect.
  • The guest tools are not installed.

Answer : The virtual NIC is not bridged.

Which of the following protocols could be used to identify the OS version installed on a server?

Options are :

  • WMI (Correct)
  • IMAP
  • TLS
  • SMTP

Answer : WMI

Which of the following goals are met by multi-port link aggregation? (Select TWO).

Options are :

  • LUN zoning
  • Link clustering
  • Port linking
  • Load balancing (Correct)
  • Fault tolerance (Correct)

Answer : Load balancing Fault tolerance

 Hardware compatibility among multiple hosts guarantees which of the following?

Options are :

  • Host migrations
  • Supportability
  • Online VM migrations (Correct)
  • Storage migrations

Answer : Online VM migrations

Which of the following actions should be taken when a VM reports high swap file utilization?

Options are :

  • Move the swap file to faster storage
  • Online migration of the VM to a less congested host
  • Disable memory ballooning on the VM
  • Increase its RAM setting (Correct)

Answer : Increase its RAM setting

A developer is storing a large number of images in binary format to call for a website. Which of the following BEST describes this type of storage object?

Options are :

  • Object ID
  • Extended metadata
  • Metadata
  • Data blob (Correct)

Answer : Data blob

Which of the following would assist in preventing malware from spreading in a cloud environment?

Options are :

  • Software-based firewall
  • Deploy DMZ
  • Implement a honeypot
  • Antivirus software (Correct)

Answer : Antivirus software

Which of the following are components of an Object-Based Storage system? (Select TWO).

Options are :

  • HBAs
  • Public Network
  • Nodes (Correct)
  • Private Network (Correct)
  • Mainframes

Answer : Nodes Private Network

The Chief Information Officer (CIO) tells the IT department that all non business critical production applications can be down for no more than 48 hours. Which of the following has the CIO defined?

Options are :

  • Failback
  • RPO
  • RTO (Correct)
  • Failover

Answer : RTO

An administrator receives an automated text that indicates a server hosting a critical app is unavailable. Upon further review, the server needs to be restored from backup. Which of the following defines the amount of time a restore cannot exceed?

Options are :

  • Failback
  • Failover
  • RTO (Correct)
  • RPO

Answer : RTO

A new self-service provisioning system has been deployed to serve the company's rapid VM provisioning needs. Since the website is in the DMZ, HTTPS is required, but company policy states that SSL certificates can not terminate at the server. The company also has a requirement that the web portal be redundant while providing session state. Which of the following availability technologies can be used to meet the company's requirements?

Options are :

  • Failover
  • Multipathing
  • Load balancing (Correct)
  • Failback

Answer : Load balancing

Which of the following offers 128, 192, and 256 bit encryption?

Options are :

  • AES (Correct)
  • DES
  • RC4
  • RC5

Answer : AES

Which of the following can limit VM mobility in a host cluster based on architectural differences?

Options are :

  • HBA
  • Switch
  • CPU (Correct)
  • NIC

Answer : CPU

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions