COMPLETE SOLUTION); COMPREHENSIVE FREQUENTLY
TESTED QUESTIONS AND VERIFIED ANSWERS; GET IT
100% ACCURATE
Which of the following is a part of a sector header in a storage system that is used to identify the
content of the data? - ANS-Metadata
Which of the the following could a company implement to provide authentication to multiple website
that are delivered through PaaS? - ANS-RBAC
You are preparing a presentation to your company's IT management that explains physical resources
that become virtualized and presented as resources to virtual machines running on hypervisors. What
resources do the hypervisors consume?
Each correct answer represents a complete solution. Choose two. - ANS-Virtual RAM
Virtual storage
Mary is a Cloud+ certified security consultant for her company. She is researching enhanced security
access systems. What could she suggest that requires something you have and something you know? -
ANS-Multifactor
Which of the following allows a user to log in just one time and be granted access rights to multiple
systems? - ANS-SSO
Which of the following is a hosting service that is located remotely from a company's data center? -
ANS-Off-premise
Your company has elected to use warm site model for their disaster recovery operations. The remote
devices are Linux servers, firewalls, routers, and load balancer that utilize serial ports for command-line
access. You need to access these ports from the network operations center at your private cloud
location. What device would you recommend be installed at the warm site to fulfill this requirement? -
ANS-Terminal server
,Homer designed an application tier for his company's new e-commerce site. He decided on an IP subnet
that uses the /28 IPv4 subnet. He is planning for a maximum of 14 servers. You are brought in as a cloud
architect to validate his design. What other devices may be on this subnet other than the servers that
would also require IP address assignments?
Each correct answer represents a complete solution. Choose three. - ANS-Default gateway
DNS
NTP
Jennifer is reviewing a document from her secondary community cloud provider. What is the document
that outlines specific metrics and the minimum performance that is offered by the cloud provider? -
ANS-SLA
You have been hired as a cloud architect at a large corporation that maintains their own operations in
six different data centers that are geographically diverse for high availability. What deployment model is
this? - ANS-Private
Charles is a solution architect who has been hired to assist a company in migrating to a public cloud
provider. When investigating a highly customized application server, he finds that the standard Linux
image has been modified and it not a standard distribution. What type of cloud service model could he
use to host this machine image? - ANS-IaaS
Which of the following networks is used in the creation and testing of new cloud-based services and is
primarily used by software programmers and DevOps groups in the creation of new applications p and
services? - ANS-Development network
John requires a data center full of the needed computing gear to support his company's operations
where all computing is owned and operated by a single corporate entity. Which of the following
computing types will accomplish John's requirements? - ANS-In-house computing
If the physical RAM installed on the motherboard is 64GB, and the 32 VMs running on that server are all
configured for 4GB of RAM each, then with 128GB allocated and with 64GB physically available, what
would be the overcommitment ratio? - ANS-2:1
James, a server technician, is given a job to protect a company's network from external that accesses the
Internet frequently. Which of the following will he use to accomplish the task? - ANS-Firewall
Leanna wants to deploy a public cloud service that allows her to retain responsibility only for her
applications and require the cloud provider to maintain the underlying operating system and virtualized
hardware. Which service model would you recommend she implement? - ANS-PaaS
The ability to dynamically add additional resources on demand such as storage, CPUs, memory, and
even servers is referred to as what? - ANS-Elasticity
Because of cost savings and the need to be able to dynamically scale resources, you have decided to
move a fleet of virtual machines from your corporate data center to a public cloud IaaS service.
However, the cloud provider has special hypervisor requirements that are different from your
operations. What type of migration would you need to perform the VMs to the cloud? - ANS-V2V
, What is the process of evaluating your cloud access to determine whether there is any vulnerability that
an attacker could exploit? - ANS-Penetration testing
An administrator needs to monitor server applications in the company's data center. Which of the
following tools would the administrator need to accomplish this objective? - ANS-IPMI
Martha has configured a storage infrastructure where the file server sitting on a Ethernet-based LAN
hosts shared directories, and files are sent over the network rather than blocks of data. What type of
storage configuration is this? - ANS-Network-attached storage
Which of the following is an advantage of virtualization in a cloud environment? - ANS-Decrease in the
time to implement certain services
You are a web server administrator of your company. You want to authenticate the end user for all the
applications the user has been given rights to and eliminates further prompts when the user switches
applications during the same session. Which approach of access control should you use? - ANS-Single
sign-on
A file server is being migrated from physical hardware into a private cloud. Baselining of the server
shows the disks average 90% full at all times. The contents of the file server consist mostly of
compressed audio files. Multiple copies of the same files are often saved in different locations on the
same disk. Which of the following storage technologies is MOST likely to help minimize storage
utilization when moving this server to the private cloud? - ANS-Data deduplication
Bill wants to encrypt his company's data such that the encryption provides integrity, confidentiality, and
authentication of data on the TCP/IP network. What encryption technology should he use? - ANS-IP
Security
Which of the following typically provides a faster access speed in a network storage implementation? -
ANS-DAS
Which of the following cloud components include traditional switching and routing as well as services
such as load balancing, DNS, DHCP, and virtual private networks? - ANS-Networking
Which of the following encryption systems use symmetric key algorithm?
Each correct answer represents a complete solution. Choose all that apply. - ANS-AES
RC4
3DES
Peter is creating a change management document to redeploy applications for a private to public cloud
for his employer. When moving to the public cloud, what technologies can he take advantage of to
enable cloud operations?
Each correct answer represents a complete solution. Choose two. - ANS-Automation
Virtualization
Akari is developing a cross-cloud provider migration plan as part of her company's business continuity
plan. As she assesses the feasibility of migrating applications from one public cloud provider to another,