Practice : CompTIA Cloud+ Certification

An administrator is creating a new VM template and has a requirement that the OS must be hardened. Which of the following should be performed to harden a guest OS?

Options are :

  • Encrypt the hard drive
  • Change page file
  • Rename administrator account (Correct)
  • Run defrag

Answer : Rename administrator account

Which of the following is MOST important when working in highly available virtual environments?

Options are :

  • Wide area network
  • Storage VLAN
  • Heartbeat VLAN (Correct)
  • Virtual network

Answer : Heartbeat VLAN

Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?

Options are :

  • Pay-as-you-grow
  • Rapid deployment
  • Multi-tenancy
  • Cloud bursting (Correct)

Answer : Cloud bursting

A company has five servers and wishes to consolidate into a single physical server. Which of the following migration methods would accomplish this?

Options are :

  • V2V
  • P2V (Correct)
  • P2P
  • V2P

Answer : P2V

An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system. Which of the following should the administrator do to accomplish this task?

Options are :

  • Install the patch on a development server
  • Create a full backup
  • Install the patch on a test server
  • Create a snapshot (Correct)

Answer : Create a snapshot

A system administrator currently has two web server VMs on one host. Users are reporting that query searches within the site are slow. The system administrator notices that the host CPU is above the threshold. Which of the following should be completed?

Options are :

  • Defragment the hard drives on the server.
  • Install another NIC for the creation of a network bridge.
  • Migrate one web server to another host. (Correct)
  • Rebuild the two web server VMs.

Answer : Migrate one web server to another host.

Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops. Which of the following should the lab administrator implement to allow students to upload files?

Options are :

  • Port mapping (Correct)
  • Secure FTP
  • Storage quotas
  • Resource pooling

Answer : Port mapping

Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?

Options are :

  • RAID 5
  • RAID 0
  • RAID 10
  • RAID 1 (Correct)

Answer : RAID 1

The network administrator creates a DNS A record. Which of the following tools can identify which IP has been assigned to a FQDN?

Options are :

  • tracert
  • nslookup (Correct)
  • ipconfig
  • arp

Answer : nslookup

A technician would like to connect to a virtual server from inside the network, using a desktop computer. Which of the following tools could the technician use?

Options are :

  • HTTP
  • SSL
  • IMAP
  • RDP (Correct)

Answer : RDP

Which of the following would allow the knowledge management division to maximize the ability to find documents within an online document repository?

Options are :

  • Metadata (Correct)
  • Object ID
  • Access control
  • Rapid deployment

Answer : Metadata

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?

Options are :

  • Type I
  • Type II (Correct)
  • Bare Metal
  • Native

Answer : Type II

Which of the following is MOST important when factoring network level security in a public cloud environment?

Options are :

  • Ensuring high availability
  • Ensuring good user experience
  • Ensuring confidentiality (Correct)
  • Ensuring redundancy

Answer : Ensuring confidentiality

Which of the following is true about a Type II hypervisor?

Options are :

  • It requires a primary hypervisor to function properly.
  • It provides direct hardware access through the use of specialized drivers.
  • It implements stronger security controls than a Type I supervisor at the same patch level.
  • It provides slower performance than a Type I hypervisor installed on the same hardware. (Correct)

Answer : It provides slower performance than a Type I hypervisor installed on the same hardware.

Which of the following network terms describes the process of grouping similar traffic on a network?

Options are :

  • VLAN tagging (Correct)
  • Virtual switches
  • Route tables
  • Supernetting

Answer : VLAN tagging

Which of the following disk drive types would be the BEST for a mission critical application with low latency requirements?

Options are :

  • FC
  • SSD (Correct)
  • SAS
  • SATA

Answer : SSD

Which of the following would an administrator implement between a host and a guest to allow the virtual server to connect to a third party USB drive license key?

Options are :

  • NAT
  • PAT
  • Console port
  • Port mapping (Correct)

Answer : Port mapping

A company has virtualized all of their servers on one physical server located on the company's first floor datacenter. The company also uses security software from a third-party cloud vendor as part of a SaaS contract. The overall cloud network model for this company's network is BEST described by which of the following?

Options are :

  • Offsite public
  • On-site private
  • Hybrid (Correct)
  • Community

Answer : Hybrid

A technician wants to isolate storage from other network traffic. Which of the following MUST the technician implement to ensure storage traffic is securely segregated?

Options are :

  • VLAN (Correct)
  • PAT
  • VMFS
  • NTFS

Answer : VLAN

 Which of the following attributes BEST describes "elasticity" in cloud computing? (Select TWO).

Options are :

  • Cost effectiveness (Correct)
  • Multi-tenancy
  • Portability
  • Off premises
  • Universal access
  • Scalable (Correct)

Answer : Cost effectiveness Scalable

Which of the following factors yields cost savings in cloud computing? (Select TWO).

Options are :

  • Availability
  • On premises
  • Multi-tenancy (Correct)
  • Ubiquitous access
  • Shared resources (Correct)

Answer : Multi-tenancy Shared resources

Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?

Options are :

  • Authentication
  • Obfuscation
  • LUN masking
  • Log review (Correct)

Answer : Log review

Monitoring alarms should be set based on:

Options are :

  • The point of application installation.
  • Support availability.
  • Acceptable application performance criteria. (Correct)
  • A high point for every performance counter in the system.

Answer : Acceptable application performance criteria.

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?

Options are :

  • Public
  • Private (Correct)
  • Community
  • Hybrid

Answer : Private

Which of the following is used to locate a specific area of storage in a cloud environment?

Options are :

  • Metadata
  • Object ID
  • Replicas
  • SAN (Correct)

Answer : SAN

Which of the following would be used to prove the existence of vulnerabilities on a network?

Options are :

  • Vulnerability assessment
  • Risk assessment
  • Business impact analysis
  • Penetration testing (Correct)

Answer : Penetration testing

Although the SAN appears to be running without any problems, the technician is unable to reach the SAN's web enabled management interface. Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?

Options are :

  • ping
  • traceroute (Correct)
  • ipconfig
  • arp

Answer : traceroute

Which of the following only uses Fibre Channel to implement a storage infrastructure?

Options are :

  • SAN (Correct)
  • NAS
  • NFS
  • SMB

Answer : SAN

An administrator is tasked to reduce the company's datacenter power utilization. Currently there are 500 physical servers in the datacenter and 600 virtual servers with five additional available host servers. Which of the following should the administrator perform?

Options are :

  • Migrate servers using V2V technology
  • Perform an offline migration of virtual servers
  • Migrate servers using P2V technology (Correct)
  • Migrate servers using V2P technology

Answer : Migrate servers using P2V technology

An external USB hard drive physically attached to a server is a:

Options are :

  • VLAN
  • DAS (Correct)
  • SAN
  • NAS

Answer : DAS

Network statistics show that the 1Gbps switch port used for storage traffic is fully saturated. Which of the following switch technologies can be used to provide twice the bandwidth?

Options are :

  • VLAN
  • Link aggregation (Correct)
  • NAT
  • Multipathing

Answer : Link aggregation

A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company's servers. Which of the following should the administrator perform to accomplish this goal?

Options are :

  • V2P
  • P2V (Correct)
  • V2V
  • P2P

Answer : P2V

Which of the following business continuity designs provides the highest degree of fault tolerance?

Options are :

  • Site Mirroring (Correct)
  • Cold Site
  • Hot Site
  • Warm Site

Answer : Site Mirroring

Which of the following will allow the network administrator to verify that one IP is assigned to one VM?

Options are :

  • Reservations (Correct)
  • Virtual Local Area Network
  • Storage allocation
  • Resource Pooling

Answer : Reservations

Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?

Options are :

  • RAID 0
  • RAID 5
  • Type I
  • Type II (Correct)

Answer : Type II

A datacenter migration is taking place and the administrator has been tasked with reducing the footprint of the new datacenter by virtualizing as many servers as possible. A physical server has been flagged as a candidate for relocation to the new data center. Which of the following methods would be the FIRST method for relocating the server to the new data center?

Options are :

  • V2V
  • P2P
  • P2V (Correct)
  • V2P

Answer : P2V

Which of the following is an example of two-factor authentication when accessing a virtual server?

Options are :

  • Username/password and PIN
  • Username/password and fingerprints (Correct)
  • Multiple usernames/passwords for all websites
  • Username/password, fingerprint scanner, and key fob

Answer : Username/password and fingerprints

A storage administrator has 100 terabytes of physical storage space within the SAN. Which of the following is used to enable access to the storage space?

Options are :

  • RAID configuration
  • LUN creation (Correct)
  • Drive striping
  • Drive mirroring

Answer : LUN creation

An administrator is called in to determine why a virtual desktop has been unable to connect to the corporate network. Which of the following should be run to determine if the adapter is enabled? (Select TWO).

Options are :

  • netstat
  • iwconfig
  • ipconfig (Correct)
  • ifconfig (Correct)
  • ping

Answer : ipconfig ifconfig

 An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography. Which of the following should the administrator implement NEXT?

Options are :

  • SSL
  • Zoning
  • Access controls (Correct)
  • RC5

Answer : Access controls

A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses. Which of the following should be implemented?

Options are :

  • Entitlement allocations
  • Soft limit quotas
  • Reservations (Correct)
  • Resource pooling

Answer : Reservations

Which of the following should be installed on VMs to report and take action against potential threats?

Options are :

  • NIPS
  • HIDS
  • NIDS
  • HIPS (Correct)

Answer : HIPS

 A small startup wins a contest giving them advertising time during a major sporting event. Which of the following cloud characteristics should be in place to handle the possible spike in demand?

Options are :

  • Scalability
  • Shared disk space
  • Elasticity (Correct)
  • Shared memory

Answer : Elasticity

Which of the following uses the business model of shared resources in a cloud environment?

Options are :

  • Self-serve
  • Cloud bursting
  • Multi-tenancy (Correct)
  • Elasticity

Answer : Multi-tenancy

A system administrator wants to create a mitigation strategy to quickly roll back a virtual image after applying the latest updates. Which of the following would the administrator utilize?

Options are :

  • Image backup
  • Offline backup
  • File backup
  • Snapshot (Correct)

Answer : Snapshot

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions