Exam4Training

CompTIA CV0-001 CompTIA Cloud+ Certification Exam Online Training

Question #1

Which of the following is a subcomponent of a virtual machine?

  • A . Virtual switch
  • B . Virtual HBA
  • C . Virtual shield
  • D . Virtual OS

Reveal Solution Hide Solution

Correct Answer: B
Question #2

A technician wants to configure a server for storage redundancy so that if any two of the four drives fail, the server is still operational .

Which of the following should the technician configure?

  • A . RAID 0
  • B . RAID 1
  • C . RAID 5
  • D . RAID 6

Reveal Solution Hide Solution

Correct Answer: D
Question #3

An administrator is creating a new VM template and has a requirement that the OS must be hardened .

Which of the following should be performed to harden a guest OS?

  • A . Encrypt the hard drive
  • B . Run defrag
  • C . Rename administrator account
  • D . Change page file

Reveal Solution Hide Solution

Correct Answer: C
Question #4

Which of the following factors yields cost savings in cloud computing? (Select TWO).

  • A . Shared resources
  • B . Availability
  • C . Ubiquitous access
  • D . Multi-tenancy
  • E . On premises

Reveal Solution Hide Solution

Correct Answer: A,D
Question #5

A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company’s servers .

Which of the following should the administrator perform to accomplish this goal?

  • A . P2V
  • B . P2P
  • C . V2P
  • D . V2V

Reveal Solution Hide Solution

Correct Answer: A
Question #6

Which of the following is MOST important when factoring network level security in a public cloud environment?

  • A . Ensuring good user experience
  • B . Ensuring confidentiality
  • C . Ensuring redundancy
  • D . Ensuring high availability

Reveal Solution Hide Solution

Correct Answer: B
Question #7

Which of the following describes the access control method where data owners authorize who is granted access to their files?

  • A . Mandatory access control
  • B . Role-based access control
  • C . Access control list
  • D . Discretionary access control

Reveal Solution Hide Solution

Correct Answer: D
Question #8

Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?

  • A . CHAP
  • B . AES
  • C . PKI
  • D . VPN

Reveal Solution Hide Solution

Correct Answer: D
Question #9

Monitoring alarms should be set based on:

  • A . A high point for every performance counter in the system.
  • B . The point of application installation.
  • C . Acceptable application performance criteria.
  • D . Support availability.

Reveal Solution Hide Solution

Correct Answer: C
Question #10

Which of the following is used to locate a specific area of storage in a cloud environment?

  • A . Object ID
  • B . SAN
  • C . Replicas
  • D . Metadata

Reveal Solution Hide Solution

Correct Answer: A

Question #11

Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?

  • A . USB
  • B . Tape
  • C . HDD
  • D . SSD

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?

  • A . Obfuscation
  • B . Authentication
  • C . Log review
  • D . LUN masking

Reveal Solution Hide Solution

Correct Answer: C
Question #13

A catastrophic disk failure occurred on a company’s critical database. After a technician performs a full system restore, one of the business units realizes that the current backup does not hold fresh enough information .

Which of the following should the company revise?

  • A . RTO
  • B . MTTR
  • C . RPO
  • D . MTBF

Reveal Solution Hide Solution

Correct Answer: C
Question #14

A system administrator wants to create a mitigation strategy to quickly roll back a virtual image after applying the latest updates .

Which of the following would the administrator utilize?

  • A . File backup
  • B . Snapshot
  • C . Offline backup
  • D . Image backup

Reveal Solution Hide Solution

Correct Answer: B
Question #15

Users on a network report that they are unable to access any external websites, however, they are able to access resources by IP address .

Which of the following command line utilities would be used FIRST in troubleshooting this problem?

  • A . netstat
  • B . telnet
  • C . nslookup
  • D . ipconfig

Reveal Solution Hide Solution

Correct Answer: C
Question #16

Which of the following is true about a Type II hypervisor?

  • A . It requires a primary hypervisor to function properly.
  • B . It implements stronger security controls than a Type I supervisor at the same patch level.
  • C . It provides slower performance than a Type I hypervisor installed on the same hardware.
  • D . It provides direct hardware access through the use of specialized drivers.

Reveal Solution Hide Solution

Correct Answer: C
Question #17

Users have been reporting slow response times on a database server. The administrator noticed the server at any given time has between 30 to 50 users connected to various databases. Additional research shows disk metrics such as disk queuing and disk access rates are both around 10% to 15% .

Which of the following can be the root cause of this slow performing server?

  • A . The CPU time reservation is small.
  • B . The swap disk space is small.
  • C . The server has fewer resources than required.
  • D . I/O tuning is disabled.

Reveal Solution Hide Solution

Correct Answer: C
Question #18

A web hosting company received reports of slow performance from four out of the five clients. Upon investigation, it was determined that a hosted virtual machine was using more RAM and CPU than the others .

Which of the following MOST likely contributed to the issue?

  • A . Hard quota limits
  • B . Soft quota limits
  • C . Storage allocation
  • D . Resource pooling

Reveal Solution Hide Solution

Correct Answer: D
Question #19

A critical hypervisor security patch has been released and needs to be rolled out as soon as possible .

Which of the following steps can be taken to minimize downtime for all guest VMs currently running?

  • A . In the next scheduled maintenance window, apply patch, reboot host, and wait for all VMs to come back online.
  • B . In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, patch host, reboot host, and place host back into availability cluster.
  • C . In the next scheduled maintenance window, shut down all VMs, apply patch, reboot host, and wait for all VMs to come back online.
  • D . In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, unplug network cables from host, patch host, reboot host, reconnect network cables, and place host back into availability cluster.

Reveal Solution Hide Solution

Correct Answer: B
Question #20

Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?

  • A . Rapid deployment
  • B . Cloud bursting
  • C . Multi-tenancy
  • D . Pay-as-you-grow

Reveal Solution Hide Solution

Correct Answer: B

Question #21

An external USB hard drive physically attached to a server is a:

  • A . SAN.
  • B . DAS.
  • C . VLAN.
  • D . NAS.

Reveal Solution Hide Solution

Correct Answer: B
Question #22

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?

  • A . Port Zoning
  • B . SAN Zoning
  • C . LUN Masking
  • D . Multipathing

Reveal Solution Hide Solution

Correct Answer: C
Question #23

A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met .

Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards?

  • A . Replication consistency
  • B . Penetration test
  • C . Bandwidth assessment
  • D . Application delivery

Reveal Solution Hide Solution

Correct Answer: B
Question #24

An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system .

Which of the following should the administrator do to accomplish this task?

  • A . Install the patch on a development server
  • B . Create a full backup
  • C . Create a snapshot
  • D . Install the patch on a test server

Reveal Solution Hide Solution

Correct Answer: C
Question #25

A datacenter migration is taking place and the administrator has been tasked with reducing the footprint of the new datacenter by virtualizing as many servers as possible. A physical server has been flagged as a candidate for relocation to the new data center .

Which of the following methods would be the FIRST method for relocating the server to the new data center?

  • A . V2V
  • B . V2P
  • C . P2V
  • D . P2P

Reveal Solution Hide Solution

Correct Answer: C
Question #26

Which of the following can be used to encrypt data at rest on a VM located in the cloud?

  • A . AES
  • B . SSL
  • C . TLS
  • D . VPN

Reveal Solution Hide Solution

Correct Answer: A
Question #27

How many cores are available to the resource pool with a Type I hypervisor that has 4 quad core processors installed?

  • A . 16
  • B . 24
  • C . 32
  • D . 64

Reveal Solution Hide Solution

Correct Answer: A
Question #28

Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized .

Which of the following should be used to ensure access is controlled appropriately between devices? (Select TWO).

  • A . LUN Masking
  • B . Hard Zoning
  • C . Supernetting
  • D . Soft Zoning
  • E . Subnetting

Reveal Solution Hide Solution

Correct Answer: A,D
Question #29

Which of the following allows a network device to process storage traffic without significant delays, even if the amount of other network traffic has saturated the link?

  • A . Caching
  • B . Jumbo frames
  • C . Load balancing
  • D . QoS

Reveal Solution Hide Solution

Correct Answer: D
Question #30

Which of the following is MOST likely to be retrieved from an individually addressable blob?

  • A . An object ID
  • B . A hash
  • C . A sequence number
  • D . An image

Reveal Solution Hide Solution

Correct Answer: D

Question #31

Which of the following protocols is MOST likely used by a switch to communicate status information to an administrator?

  • A . SNMP
  • B . SMTP
  • C . NNTP
  • D . HTTP

Reveal Solution Hide Solution

Correct Answer: A
Question #32

Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?

  • A . Extra processing is needed to store encryption keys used for secure transmission between the server and the network.
  • B . Additional processing is used to run ports and services not turned off through the process of server hardening.
  • C . Some processing is required for operational overhead on the processor and between the physical and virtualized processors.
  • D . Significant processing is used to create and maintain the cache on multi-core processors.

Reveal Solution Hide Solution

Correct Answer: C
Question #33

A company has an existing internal network that hosts confidential information. However,

this network also has a connection to a separate site. The separate site is managed by a third party organization that has an SLA with the company .

Which of the following BEST defines this cloud delivery model?

  • A . Private Cloud
  • B . Public Cloud
  • C . Community Cloud
  • D . Hybrid Cloud

Reveal Solution Hide Solution

Correct Answer: D
Question #34

Which of the following storage technologies can leverage switches in its implementation?

  • A . HBA
  • B . DAS
  • C . SCSI
  • D . SAN

Reveal Solution Hide Solution

Correct Answer: D
Question #35

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company’s existing network?

  • A . Hybrid
  • B . Community
  • C . Public
  • D . Private

Reveal Solution Hide Solution

Correct Answer: D
Question #36

Which of the following will provide the MOST network address information possible for a system that belongs to a tenant in a private cloud?

  • A . ipconfig
  • B . telnet
  • C . traceroute
  • D . nslookup

Reveal Solution Hide Solution

Correct Answer: A
Question #37

Which of the following hypervisor types runs on a host operating system that provides virtualization services, including memory management and device support?

  • A . Type II hypervisor
  • B . Proprietary hypervisor
  • C . Type I hypervisor
  • D . Open source hypervisor

Reveal Solution Hide Solution

Correct Answer: A
Question #38

Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops .

Which of the following should the lab administrator implement to allow students to upload files?

  • A . Resource pooling
  • B . Secure FTP
  • C . Storage quotas
  • D . Port mapping

Reveal Solution Hide Solution

Correct Answer: D
Question #39

An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography .

Which of the following should the administrator implement NEXT?

  • A . Access controls
  • B . RC5
  • C . SSL
  • D . Zoning

Reveal Solution Hide Solution

Correct Answer: A
Question #40

Which of the following cloud services provides billing, payroll, contract management, and human resource management functions?

  • A . CaaS
  • B . SaaS
  • C . BPaaS
  • D . DaaS

Reveal Solution Hide Solution

Correct Answer: C

Question #41

A company wants to migrate its critical application to a public cloud but the security administrator is concerned with the application’s data confidentiality requirements .

Which of the following can be done to review if the appropriate management security controls are in place at the provider?

  • A . Penetration testing
  • B . Vulnerability assessment
  • C . Performance and application testing
  • D . Policy and procedure audit

Reveal Solution Hide Solution

Correct Answer: D
Question #42

Which of the following access control types allows users to assign security attributes to objects such as files and directories?

  • A . Role based
  • B . Mandatory
  • C . Discretionary
  • D . Rule set based

Reveal Solution Hide Solution

Correct Answer: C
Question #43

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS .

Which of the following types of virtualization would be used to meet this requirement?

  • A . Type I
  • B . Type II
  • C . Bare Metal
  • D . Native

Reveal Solution Hide Solution

Correct Answer: B
Question #44

A technician wants to isolate storage from other network traffic .

Which of the following MUST the technician implement to ensure storage traffic is securely segregated?

  • A . VLAN
  • B . VMFS
  • C . PAT
  • D . NTFS

Reveal Solution Hide Solution

Correct Answer: A
Question #45

Which of the following RAID configuration would be used to accomplish disk mirroring with

two disks?

  • A . RAID 0
  • B . RAID 1
  • C . RAID 5
  • D . RAID 10

Reveal Solution Hide Solution

Correct Answer: B
Question #46

Which of the following uses the business model of shared resources in a cloud environment?

  • A . Elasticity
  • B . Self-serve
  • C . Cloud bursting
  • D . Multi-tenancy

Reveal Solution Hide Solution

Correct Answer: D
Question #47

Which of the following would be used to prove the existence of vulnerabilities on a network?

  • A . Penetration testing
  • B . Vulnerability assessment
  • C . Business impact analysis
  • D . Risk assessment

Reveal Solution Hide Solution

Correct Answer: A
Question #48

Which of the following is a MINIMUM requirement for VM online migration?

  • A . Same CPU family between source and target hosts.
  • B . Same network equipment between source and target hosts.
  • C . Same hardware vendor for the datacenter.
  • D . Same hypervisor versions between source and target hosts.

Reveal Solution Hide Solution

Correct Answer: A
Question #49

Although the SAN appears to be running without any problems, the technician is unable to reach the SAN’s web enabled management interface .

Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?

  • A . arp
  • B . traceroute
  • C . ping
  • D . ipconfig

Reveal Solution Hide Solution

Correct Answer: B
Question #50

A small startup wins a contest giving them advertising time during a major sporting event .

Which of the following cloud characteristics should be in place to handle the possible spike in demand?

  • A . Shared disk space
  • B . Elasticity
  • C . Scalability
  • D . Shared memory

Reveal Solution Hide Solution

Correct Answer: B

Question #51

In which of the following cloud services will the customer be responsible for securing provisioned hosts?

  • A . PaaS
  • B . IaaS
  • C . SaaS
  • D . DaaS

Reveal Solution Hide Solution

Correct Answer: B
Question #52

Which of the following storage technologies is file-based?

  • A . WAN
  • B . DAS
  • C . SAN
  • D . NAS

Reveal Solution Hide Solution

Correct Answer: D
Question #53

Network statistics show that the 1Gbps switch port used for storage traffic is fully saturated .

Which of the following switch technologies can be used to provide twice the bandwidth?

  • A . NAT
  • B . Multipathing
  • C . Link aggregation
  • D . VLAN

Reveal Solution Hide Solution

Correct Answer: C
Question #54

Ubiquitous access to cloud computing means:

  • A . access by any person
  • B . access by any device through any network connection
  • C . access by authorized personnel only
  • D . international access across country borders

Reveal Solution Hide Solution

Correct Answer: B
Question #55

A system administrator wants to be able to use one server to collect all of the logs on the network .

Which of the following would be used to satisfy this scenario?

  • A . Firewall logging
  • B . Change management database
  • C . Syslog service
  • D . SNMP

Reveal Solution Hide Solution

Correct Answer: C
Question #56

A web server is offline .

Which of the following will allow the FASTEST possible recovery of the web server?

  • A . Operating system and application backups
  • B . Image backups
  • C . Operating system backups only
  • D . File backups

Reveal Solution Hide Solution

Correct Answer: B
Question #57

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?

  • A . Antivirus
  • B . Firewall
  • C . Audit logs
  • D . IDS

Reveal Solution Hide Solution

Correct Answer: C
Question #58

A technician wants to remotely gather a list of all the software running on the client PCs throughout the organization .

Which of the following should be used to gather this information?

  • A . WMI
  • B . SQL
  • C . Syslog
  • D . SNMP

Reveal Solution Hide Solution

Correct Answer: A
Question #59

Which of the following attributes BEST describes “elasticity” in cloud computing? (Select TWO).

  • A . Universal access
  • B . Multi-tenancy
  • C . Portability
  • D . Cost effectiveness
  • E . Scalable
  • F . Off premises

Reveal Solution Hide Solution

Correct Answer: D,E
Question #60

A company has virtualized all of their servers on one physical server located on the company’s first floor datacenter. The company also uses security software from a third-party cloud vendor as part of a SaaS contract.

The overall cloud network model for this company’s network is BEST described by which of the following?

  • A . Hybrid
  • B . Offsite public
  • C . On-site private
  • D . Community

Reveal Solution Hide Solution

Correct Answer: A

Question #61

Which of the following should an administrator implement when connecting the company’s existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?

  • A . A proxy server
  • B . A load balancing solution
  • C . An IPSec tunnel
  • D . A server clustering solution

Reveal Solution Hide Solution

Correct Answer: C
Question #62

Which of the following should be installed on VMs to report and take action against potential threats?

  • A . NIDS
  • B . HIPS
  • C . NIPS
  • D . HIDS

Reveal Solution Hide Solution

Correct Answer: B
Question #63

The network administrator creates a DNS A record .

Which of the following tools can identify which IP has been assigned to a FQDN?

  • A . arp
  • B . ipconfig
  • C . nslookup
  • D . tracert

Reveal Solution Hide Solution

Correct Answer: C
Question #64

Some of the VMs in an environment are experiencing network connectivity loss. The VM management network has no connectivity issues .

Which of the following could cause this connectivity issue?

  • A . NIC teaming is disabled
  • B . Faulty host NIC port
  • C . Wrong NIC load balancing mode
  • D . Slow NIC

Reveal Solution Hide Solution

Correct Answer: B
Question #65

A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses .

Which of the following should be implemented?

  • A . Soft limit quotas
  • B . Reservations
  • C . Resource pooling
  • D . Entitlement allocations

Reveal Solution Hide Solution

Correct Answer: B
Question #66

A storage administrator has 100 terabytes of physical storage space within the SAN .

Which of the following is used to enable access to the storage space?

  • A . Drive mirroring
  • B . LUN creation
  • C . Drive striping
  • D . RAID configuration

Reveal Solution Hide Solution

Correct Answer: B
Question #67

An administrator is called in to determine why a virtual desktop has been unable to connect to the corporate network .

Which of the following should be run to determine if the adapter is enabled? (Select TWO).

  • A . ipconfig
  • B . netstat
  • C . ping
  • D . ifconfig
  • E . iwconfig

Reveal Solution Hide Solution

Correct Answer: A,D
Question #68

An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently .

Which of the following is MOST likely the issue with the new servers?

  • A . The dynamic resource pool is malfunctioning.
  • B . The server is missing security patches.
  • C . The VM servers were not properly configured.
  • D . There are insufficient resources available on the host.

Reveal Solution Hide Solution

Correct Answer: C
Question #69

Which of the following access control methods could allow for a network user to sign onto their corporate network and their supplier’s network portal without having to enter their ID and password more than once?

  • A . Discretionary access control
  • B . Mandatory access control
  • C . Role-based access control
  • D . Federated access control

Reveal Solution Hide Solution

Correct Answer: D
Question #70

Which of the following MUST be in a zone? (Select TWO).

  • A . Initiator
  • B . Target
  • C . CNA
  • D . HBA
  • E . Fibre Channel

Reveal Solution Hide Solution

Correct Answer: A,B

Question #71

An administrator is tasked to reduce the company’s datacenter power utilization. Currently there are 500 physical servers in the datacenter and 600 virtual servers with five additional available host servers .

Which of the following should the administrator perform?

  • A . Migrate servers using V2V technology
  • B . Perform an offline migration of virtual servers
  • C . Migrate servers using V2P technology
  • D . Migrate servers using P2V technology

Reveal Solution Hide Solution

Correct Answer: D
Question #72

Which of the following business continuity designs provides the highest degree of fault tolerance?

  • A . Cold Site
  • B . Site Mirroring
  • C . Warm Site
  • D . Hot Site

Reveal Solution Hide Solution

Correct Answer: B
Question #73

Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?

  • A . NAS
  • B . DAS
  • C . LUN
  • D . HBA

Reveal Solution Hide Solution

Correct Answer: D
Question #74

Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?

  • A . Bridge the vNIC
  • B . Set the vNIC speed to half-duplex
  • C . Add an addition vNIC
  • D . Set the vNIC speed to full-duplex

Reveal Solution Hide Solution

Correct Answer: A
Question #75

A company has five servers and wishes to consolidate into a single physical server .

Which of the following migration methods would accomplish this?

  • A . P2P
  • B . V2P
  • C . V2V
  • D . P2V

Reveal Solution Hide Solution

Correct Answer: D
Question #76

An administrator is tasked to perform a P2V migration of a critical application .

Which of the following steps should the administrator perform FIRST before the migration?

  • A . Harden the operating system
  • B . Migrate the server in a development environment
  • C . Contact the vendor for compatibility requirements
  • D . Establish a performance baseline

Reveal Solution Hide Solution

Correct Answer: C
Question #77

Which of the following is an example of two-factor authentication when accessing a virtual server?

  • A . Multiple usernames/passwords for all websites
  • B . Username/password, fingerprint scanner, and key fob
  • C . Username/password and PIN
  • D . Username/password and fingerprints

Reveal Solution Hide Solution

Correct Answer: D
Question #78

Which of the following is MOST important when working in highly available virtual environments?

  • A . Storage VLAN
  • B . Virtual network
  • C . Wide area network
  • D . Heartbeat VLAN

Reveal Solution Hide Solution

Correct Answer: D
Question #79

Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?

  • A . Type II
  • B . Type I
  • C . RAID 5
  • D . RAID 0

Reveal Solution Hide Solution

Correct Answer: A
Question #80

A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server.

This type of setup is an example of which of the following?

  • A . Latency
  • B . Replication
  • C . Redundancy
  • D . Failback

Reveal Solution Hide Solution

Correct Answer: C

Question #81

Which of the following only uses Fibre Channel to implement a storage infrastructure?

  • A . NFS
  • B . SAN
  • C . NAS
  • D . SMB

Reveal Solution Hide Solution

Correct Answer: B
Question #82

A system administrator currently has two web server VMs on one host. Users are reporting that query searches within the site are slow. The system administrator notices that the host CPU is above the threshold .

Which of the following should be completed?

  • A . Migrate one web server to another host.
  • B . Defragment the hard drives on the server.
  • C . Rebuild the two web server VMs.
  • D . Install another NIC for the creation of a network bridge.

Reveal Solution Hide Solution

Correct Answer: A
Question #83

A small business is moving ten physical servers to the cloud .

Which of the following should the cloud provider implement to ensure that all ten servers can dynamically share memory resources with other tenants as needed while not interfering with the other tenants?

  • A . Soft limits
  • B . Load balancing
  • C . Resource pooling
  • D . Caching

Reveal Solution Hide Solution

Correct Answer: C
Question #84

Which of the following reduces the risk of known attacks from being successful?

  • A . DLP techniques
  • B . Patching frequency
  • C . Mandatory access controls
  • D . Encryption methods

Reveal Solution Hide Solution

Correct Answer: B
Question #85

Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?

  • A . Blob data
  • B . Object ID
  • C . Replicas
  • D . Metadata

Reveal Solution Hide Solution

Correct Answer: D
Question #86

Which of the following cloud delivery models is deployed over a company intranet or company-hosted datacenter?

  • A . Private cloud
  • B . Hybrid cloud
  • C . Community cloud
  • D . Public cloud

Reveal Solution Hide Solution

Correct Answer: A
Question #87

A user is notified that they will be terminated at the end of the day. As they start cleaning up their workstation, they try to FTP information from their workstation to a cloud-based, personal backup solution .

Which of the following hardening techniques would be used to restrict their ability to transfer this information via FTP?

  • A . Antivirus
  • B . NIPS
  • C . NIDS
  • D . Host-based firewall

Reveal Solution Hide Solution

Correct Answer: D
Question #88

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?

  • A . Defrag system
  • B . Update drivers
  • C . Disable firewall
  • D . Patch system

Reveal Solution Hide Solution

Correct Answer: D
Question #89

Which of the following networking components would be used to connect two subnets in a virtual environment?

  • A . Virtual switch
  • B . Virtual disks
  • C . Virtual router
  • D . Virtual HBA

Reveal Solution Hide Solution

Correct Answer: C
Question #90

Which of the following could be assigned to a virtual CPU?

  • A . Cores
  • B . HBAs
  • C . LUNs
  • D . Stepping

Reveal Solution Hide Solution

Correct Answer: A

Question #91

Which of the following would allow the knowledge management division to maximize the ability to find documents within an online document repository?

  • A . Object ID
  • B . Access control
  • C . Metadata
  • D . Rapid deployment

Reveal Solution Hide Solution

Correct Answer: C
Question #92

An administrator needs to provide Internet access to all internal systems using a single IP address .

Which of the following should the administrator implement?

  • A . NAT
  • B . Virtual switching
  • C . VLAN tagging
  • D . PAT

Reveal Solution Hide Solution

Correct Answer: A
Question #93

The performance logs on a virtualization server show a large number of pages being written to disk at a high rate .

Which of the following should the technician do?

  • A . Increase the amount of swap space on the disk
  • B . Increase the amount of physical memory
  • C . Install and provision additional disk space
  • D . Allocate additional CPU power to the guests

Reveal Solution Hide Solution

Correct Answer: B
Question #94

A technician would like to connect to a virtual server from inside the network, using a desktop computer .

Which of the following tools could the technician use?

  • A . HTTP
  • B . RDP
  • C . IMAP
  • D . SSL

Reveal Solution Hide Solution

Correct Answer: B
Question #95

Which of the following will allow the network administrator to verify that one IP is assigned to one VM?

  • A . Virtual Local Area Network
  • B . Reservations
  • C . Resource Pooling
  • D . Storage allocation

Reveal Solution Hide Solution

Correct Answer: B
Question #96

Which of the following BEST defines RAID 4?

  • A . RAID 4 allows two failed drives.
  • B . RAID 4 requires a minimum of 4 disks.
  • C . RAID 4 has a dedicated parity drive.
  • D . RAID 4 is less secure than RAID 5.

Reveal Solution Hide Solution

Correct Answer: C
Question #97

A storage administrator wants to limit an operating system from accessing all of the storage within the array .

Which of the following could be enabled on the SAN?

  • A . LUN masking
  • B . Implement different file formats
  • C . Access control lists
  • D . Data at rest encryption

Reveal Solution Hide Solution

Correct Answer: A
Question #98

After an administrator successfully migrated the last physical application server to a virtual environment, the help desk reported slow performance .

Which of the following should the administrator have done FIRST before migrating this server?

  • A . Apply operating system patches to the application server after the migration.
  • B . Contact the vendor to see if the application is supported in a virtual environment.
  • C . Take a backup of the application server after the migration.
  • D . Migrate the application server in a test environment and have users test it.

Reveal Solution Hide Solution

Correct Answer: B
Question #99

To avoid the same LUN showing up multiple times in client hosts, an administrator should implement:

  • A . Multipathing software
  • B . Multiple HBAs
  • C . Multiple zones
  • D . Multiple initiators

Reveal Solution Hide Solution

Correct Answer: A
Question #100

A company is required to provide their customers with zero downtime for its web application .

Which of the following would satisfy this requirement?

  • A . Cold site
  • B . High availability
  • C . Multipathing
  • D . Load balancing

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version