Mock : CompTIA Cloud+ Certification

A company has hired a new Chief Security Officer (CSO). While reviewing the company's RAID levels on business critical data volumes, the CSO has decided to change the RAID level to allow for the best protection against number of disk failures. Which of the following RAID levels will accomplish this?

Options are :

  • RAID 0+1
  • RAID 1+0
  • RAID 1
  • RAID 6 (Correct)

Answer : RAID 6

A storage administrator has created five new LUNs for a company's virtual cluster. The company uses iSCSI to connect to storage. Which of the following is needed to present the newly created LUNs on the virtual cluster?

Options are :

  • WWNN
  • IQN (Correct)
  • WWPN
  • VLAN

Answer : IQN

Which of the following BEST describes the need for LUN Masking?

Options are :

  • A storage administrator needs to isolate storage networks.
  • A storage administrator needs to establish storage recovery points.
  • A storage administrator needs to control which servers are able to access specific LUNs. (Correct)
  • A storage administrator needs to establish storage replication points.

Answer : A storage administrator needs to control which servers are able to access specific LUNs.

A company has purchased a new self-service provisioning system and has brought in a consultant to deploy the system. During the installation the application attempts to connect to the database server but fails. Which of the following could cause the connection issue?

Options are :

  • The consultant has not been granted log in rights to the database server
  • The database has not been configured for data de-duplication
  • The consultant has not been granted sa rights to the database instance
  • Necessary firewall ports have not been opened (Correct)

Answer : Necessary firewall ports have not been opened

An administrator creates a new VM, but after powering on the VM, the administrator receives the message "no boot device detected". Which of the following needs to be done to resolve this problem?

Options are :

  • Mount a NIC that is connected to the virtual switch
  • Migrate the VM to a new host
  • Connect the host to working VM storage
  • Mount an ISO containing an operating system (Correct)

Answer : Mount an ISO containing an operating system

An administrator creates a new virtual desktop for a user. The user is unable to log in with their domain credentials. However, the administrator is able to log in with a local administrator account and ping other VDIs on the same subnet. Which of the following does the administrator need to correct?

Options are :

  • Flow control settings of TCP/IP
  • Gateway on the network adapter (Correct)
  • VLAN on the virtual switch
  • Virtual router

Answer : Gateway on the network adapter

Elasticity is closely related to which of the following cloud characteristics?

Options are :

  • On-demand
  • Pay-as-you-grow (Correct)
  • Chargeback
  • On-premise hosting

Answer : Pay-as-you-grow

An administrator is troubleshooting the cause of multiple VMs which are suddenly going offline. Which of the following is the FIRST step in troubleshooting the issue?

Options are :

  • Review LUN configurations for errors
  • Review Fibre Channel zoning configuration
  • Review system logs on the host (Correct)
  • Review VM OS multipathing software configuration

Answer : Review system logs on the host

An administrator is configuring access to hypervisors that will allow them to connect in the event that the management network is down. This type of access is referred to as:

Options are :

  • Secure shell.
  • NIC teaming.
  • Out-of-band. (Correct)
  • Serial port mapping.

Answer : Out-of-band.

A system administrator is testing various types of software within VMs on a local workstation while surfing the Internet on a host. Which of the following BEST describes the hypervisor architecture that the administrator is using?

Options are :

  • Type II (Correct)
  • Type I
  • Open source
  • Proprietary

Answer : Type II

A business has a virtualized environment which relies on specific file types, formats, and vendor supported tools. The business is MOST likely using which of the following?

Options are :

  • Type II
  • Type I
  • Open source
  • Proprietary (Correct)

Answer : Proprietary

Which of the following would be considered a cold site?

Options are :

  • A site that has air conditioning available, but no heat
  • A duplicate site that has replication enabled
  • A site that has telecommunications and network available (Correct)
  • A site that is completely functional and staffed

Answer : A site that has telecommunications and network available

Encryption ensures which of the following? (Select TWO).

Options are :

  • Access control
  • Data loss
  • Confidentiality (Correct)
  • Authentication
  • Data integrity (Correct)

Answer : Confidentiality Data integrity

A company has just established a new branch office that needs to connect back to centrally hosted applications for day to day operations. The branch office has noted that access to many company services are slow and causing a drop in productivity. The company IT department has investigated a plan to improve performance across the link to the branch office without having to pay for more bandwidth from the Internet Service Provider. This plan includes hardware that after installation will allow for much faster access to day to day business applications. Which of the following terms BEST describes the action taken by the IT department?

Options are :

  • LAN optimization
  • WAN optimization (Correct)
  • Load balancing
  • Bandwidth compression

Answer : WAN optimization

Which of the following deployment models BEST meets the requirement to host some of a company's applications in a third party environment while retaining control over some of their data?

Options are :

  • Hybrid (Correct)
  • Private
  • Community
  • Public

Answer : Hybrid

Management has implemented a policy which states that the OS, the swap file, and data must each reside on its own disk. The virtualization administrator has deployed a VM from a template that has one virtual disk configured. Which of the following steps MUST the administrator take to comply with policy?

Options are :

  • Add two virtual disks to the VM (Correct)
  • Create two partitions on the existing virtual disk
  • Create three partitions on the existing virtual disk
  • Add three virtual disks to the VM

Answer : Add two virtual disks to the VM

An administrator is responsible for maintenance and support of servers in the cloud environment. There are over 500 virtual servers spanning across ten physical hosts. The administrator deploys a new application server. The administrator allocated the appropriate virtual resources for the application. Users report slow response after the new server was deployed. Which of the following is the cause of this issue?

Options are :

  • Storage allocation on the guest OS
  • Resource pooling mis-configuration (Correct)
  • Application licensing expiration
  • Data segregation on the host OS

Answer : Resource pooling mis-configuration

Which of the following hypervisors will allocate resources MORE efficiently?

Options are :

  • Type I (Correct)
  • Proprietary
  • Type II
  • Open source

Answer : Type I

A system administrator identified an issue on a critical server that is hosted in the cloud. The user community is affected by this issue, but is still able to work. A reboot is needed to rectify this issue. Which of the following steps should the administrator do FIRST to resolve this issue?

Options are :

  • Contact the user community
  • Establish a back-out plan
  • Enter a change request (Correct)
  • Reboot the server

Answer : Enter a change request

An administrator is tasked with ensuring that any new virtual server deployed will meet the minimum requirements for the environment. Which of the following items would be included in a baseline for a VM template? (Select TWO).

Options are :

  • Database
  • CPU (Correct)
  • Encryption keys
  • Security patches (Correct)
  • IP address

Answer : CPU Security patches

 A new host has been bought to be a part of a new cluster. The purchase order specifies this server has four physical CPUs with eight cores each. After the administrator boots the host, there are only 24 logical processors available for VM allocation. Which of the following BEST describes this problem?

Options are :

  • The server requires a firmware upgrade to version 8.2
  • The BIOS does not have virtualization support features completely enabled
  • The virtualization license is not the enterprise edition
  • A CPU is dead on arrival or disabled on the motherboard (Correct)

Answer : A CPU is dead on arrival or disabled on the motherboard

A programmer removes OS software from a laptop during development of a new prototype for the company. After the code is promoted from development to QA, none of the QA testers can get the application to work. Which of the following is MOST likely the cause of the application not working properly in QA?

Options are :

  • QA systems require a reboot after a new application is installed
  • Programmer did not compile the code properly
  • Programmer put the source code in repository without any validations
  • QA systems are missing patches (Correct)

Answer : QA systems are missing patches

Which of the following will allow the administrator to be able to reduce Internet Service Provider costs for two sites that have replication as a preferred method for disaster recovery events?

Options are :

  • Caching on two sites
  • Redirection
  • Caching on one site
  • Compression (Correct)

Answer : Compression

 In a storage fabric, which of the following is the primary way to implement multipathing?

Options are :

  • Formatting
  • Scaling
  • Zoning (Correct)
  • Caching

Answer : Zoning

Geo-clustering protects against which of the following?

Options are :

  • Data corruptions
  • Global disasters
  • Denial of Service
  • Regional disruptions (Correct)

Answer : Regional disruptions

Which of the following virtualization implementations yields the HIGHEST performance of the same hardware configuration?

Options are :

  • CPU emulation
  • Type I (Correct)
  • Memory ballooning
  • Type II

Answer : Type I

A group of users can no longer access a number of different LUNs hosted across multiple hosts. Which of the following failures could have caused this issue?

Options are :

  • CPU failure
  • Fabric failure (Correct)
  • Memory failure
  • NIC failure

Answer : Fabric failure

 A corporate office allows employees to work remotely, using their personal computers to access network resources through a browser-based gateway. Which of the following settings should be applied to the virtualized application running on the gateway to reduce the risk of company information being transferred to employees' personal machines?

Options are :

  • Disable the ability to copy and paste (Correct)
  • Encrypt the employees' personal computer hard drives and disable the ability to paste
  • Encrypt the employees' personal computer hard drives and disable the ability to print
  • Disable the ability to paste and read

Answer : Disable the ability to copy and paste

A company has a virtualized environment. Hosts are configured to dynamically assign resources from the resource pool as required. Ann, an administrator is remotely connected to a host and is adding ten more guests. She suddenly looses connection to the host and fails to reconnect. Ann now finds that the server no longer responds when pinged. Which of the following BEST describes the issue?

Options are :

  • Over allocation of guest resources
  • Over allocation of virtual resources
  • Over allocation of storage resources
  • Over allocation of host resources (Correct)

Answer : Over allocation of host resources

A cloud based global multiplayer game is an example of which of the following?

Options are :

  • CaaS
  • SaaS (Correct)
  • PaaS
  • IaaS

Answer : SaaS

Which of the following storage technologies can leverage switches in its implementation?

Options are :

  • SAN (Correct)
  • HBA
  • SCSI
  • DAS

Answer : SAN

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?

Options are :

  • SAN Zoning
  • Multipathing
  • LUN Masking (Correct)
  • Port Zoning

Answer : LUN Masking

 A technician wants to remotely gather a list of all the software running on the client PCs throughout the organization. Which of the following should be used to gather this information?

Options are :

  • WMI (Correct)
  • SNMP
  • Syslog
  • SQL

Answer : WMI

A system administrator wants to be able to use one server to collect all of the logs on the network. Which of the following would be used to satisfy this scenario?

Options are :

  • Syslog service (Correct)
  • Firewall logging
  • SNMP
  • Change management database

Answer : Syslog service

An administrator needs to provide Internet access to all internal systems using a single IP address. Which of the following should the administrator implement?

Options are :

  • PAT
  • VLAN tagging
  • NAT (Correct)
  • Virtual switching

Answer : NAT

An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently. Which of the following is MOST likely the issue with the new servers?

Options are :

  • There are insufficient resources available on the host.
  • The server is missing security patches.
  • The VM servers were not properly configured. (Correct)
  • The dynamic resource pool is malfunctioning.

Answer : The VM servers were not properly configured.

Which of the following is MOST likely to be retrieved from an individually addressable blob?

Options are :

  • An object ID
  • An image (Correct)
  • A hash
  • A sequence number

Answer : An image

The performance logs on a virtualization server show a large number of pages being written to disk at a high rate. Which of the following should the technician do?

Options are :

  • Increase the amount of swap space on the disk
  • Allocate additional CPU power to the guests
  • Install and provision additional disk space
  • Increase the amount of physical memory (Correct)

Answer : Increase the amount of physical memory

Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?

Options are :

  • DAS
  • HBA (Correct)
  • NAS
  • LUN

Answer : HBA

 A user is notified that they will be terminated at the end of the day. As they start cleaning up their workstation, they try to FTP information from their workstation to a cloud-based, personal backup solution. Which of the following hardening techniques would be used to restrict their ability to transfer this information via FTP?

Options are :

  • NIPS
  • NIDS
  • Antivirus
  • Host-based firewall (Correct)

Answer : Host-based firewall

Which of the following access control methods could allow for a network user to sign onto their corporate network and their supplier's network portal without having to enter their ID and password more than once?

Options are :

  • Role-based access control
  • Mandatory access control
  • Discretionary access control
  • Federated access control (Correct)

Answer : Federated access control

A catastrophic disk failure occurred on a company's critical database. After a technician performs a full system restore, one of the business units realizes that the current backup does not hold fresh enough information. Which of the following should the company revise?

Options are :

  • MTBF
  • RTO
  • MTTR
  • RPO (Correct)

Answer : RPO

A company has an existing internal network that hosts confidential information. However, this network also has a connection to a separate site. The separate site is managed by a third party organization that has an SLA with the company. Which of the following BEST defines this cloud delivery model?

Options are :

  • Hybrid Cloud (Correct)
  • Public Cloud
  • Private Cloud
  • Community Cloud

Answer : Hybrid Cloud

After an administrator successfully migrated the last physical application server to a virtual environment, the help desk reported slow performance. Which of the following should the administrator have done FIRST before migrating this server?

Options are :

  • Migrate the application server in a test environment and have users test it.
  • Contact the vendor to see if the application is supported in a virtual environment. (Correct)
  • Apply operating system patches to the application server after the migration.
  • Take a backup of the application server after the migration.

Answer : Contact the vendor to see if the application is supported in a virtual environment.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions