CompTIA Cloud+ Study Guide. Ben Piper

Чтение книги онлайн.

Читать онлайн книгу CompTIA Cloud+ Study Guide - Ben Piper страница 15

CompTIA Cloud+ Study Guide - Ben Piper

Скачать книгу

technologies that use the Fibre Channel protocol, and she is asking about disk configuration in the remote storage array. She asks you which type of storage she can use on her Linux servers. What storage type can she deploy? (Choose the best answer.)MetaObjectBlockFile

      16 Patesh is becoming familiar with the interfaces available for his operations team to use to access his hybrid cloud deployment. You have been asked to explain the common types of user-based interfaces available to manage cloud objects. What are the common interfaces that you would explain to Patesh? (Choose three.)Web consoleSNMPAPIPaaSCLI

      17 You work for a company that offers cloud services to the railroad industry. All railroads have a similar set of requirements and access the same applications. BigWest Rail has contacted you about becoming a customer and is asking what applications are shared with other rail operators. They also ask what type of cloud model your company offers. What type of cloud is this?HybridPublicPrivateCommunity

      18 Kevin is exploring a durable block storage option that offers high performance. It also needs to support striping that allows a parity bit to be used to reconstruct a volume if a single magnetic disk fails in his array. Which storage type stripes file data and performs a parity check of data over multiple disks that can recover from a single hard disk failure?RAID 0RAID 1RAID 3RAID 5

      19 You are involved in a large-scale migration project that requires moving a Windows OS running on a dual-slot, eight-core server with no hypervisor in a data center to a virtual server in the public cloud. What type of migration is this?vMotionP2VPrivate to publicV2VSynchronous replication

      20 You have been asked by a new customer what type of authentication systems require something that you have and something that you know. What type of authentication technology would you recommend?Single sign-onConfederationsActive Directory/LDAPMultifactor

      21 Beatriz stops at her bank's ATM on her way home from work. She inserts her card into the ATM and then enters her PIN on the keypad. What type of authentication is she using?SSOTwo-factorLDAPUser-based

      22 Roman is the cloud administrator for a company that stores object-based data in a hybrid cloud. Because of the sensitivity of the data and various regulatory restrictions on allowing users access to sensitive security data, what type of access control would meet his security policies?Mandatory access controlNondiscretionaryRolesMultifactor

      23 William is implementing an access control rollout for a cluster of Windows SQL database servers in a hybrid cloud environment. Developers will need full read/write access to the database servers, whereas other business units will need read-only access to particular databases. What type of access control should William deploy?Mandatory access controlNondiscretionaryRole-basedMultifactor

      24 Quentin is a defense contractor investigating server compliance requirements needed to be certified to meet the U.S. Department of Defense security requirements for contractors. What requirement would you recommend that he focus on?FedRAMPDIACAPFISMASection 405.13 for DoD rule A286

      25 Leanna wants to deploy a public cloud service that allows her to retain responsibility only for her applications and requires the cloud provider to maintain the underlying operating system and virtualized hardware. Which service model would you recommend that she implement?IaaSPaaSSaaSCaaS

      26 Robert is configuring a new cloud interconnect to access his locally hosted Active Directory services. He wants to prevent his user base from having fragmented rights and no unified authorization services. You are brought in as a service consultant to assist in optimizing and controlling user access by implementing a technology that will give access to all allowed systems at the time of user authentication. What type of system are you deploying?Token-based 2FASSORSANondiscretionary

      27 Cathy is preparing her company's migration plan from a private to a hybrid cloud. She wants to outline firewall and DDoS requirements. What document should she create?DIACAPSecurity policyService level agreementSOC-2

      28 Perry is investigating options for interconnecting a private cloud to a new public cloud region that supports analysis of customer-streamed IoT data. He is planning on implementing a tunnel across the Internet to interconnect the two locations to avoid the high costs of a dedicated interconnection. What transport protocol would you suggest that can offer a secure connection across the unsecure Internet?AESSOC-3IPsecRC5

      29 Jarleen is a consultant tasked with migrating Health Med Records Inc. customer records to a cloud-based service offering a long-term archival system. Which U.S. compliance mandate must her company align with?SOC 3HIPAAMPAAISA 2701

      30 Fluentes is a security consultant for a day trading company that must implement strong encryption of data at rest for their cloud storage tiers. What is the best option that meets most security regulations for the encryption of stored data?3DESRSAAES-256Rivest Cipher 5

      31 Randy is developing a new application that will be deployed in an IaaS-based public cloud. He builds a test image and deploys a test VM in his private cloud's development zone. When he stops and restarts one of the Linux-based servers, he notices that his storage volume data is missing. What type of storage exhibits this behavior? (Choose two.)DurableRAIDEphemeralNondurableBlockObject

      32 Matt has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?DMABIOSCPUIPsecI/O

      33 Jill works in the operations center, and she is tasked with monitoring security operations. What cloud-based GUI can she use for a real-time overview of security operations?Puppet automationGemalto systemDashboardVendor-based security appliance

      34 Larken is reviewing the SLA and statement of responsibility with his community cloud provider PaaS. To whom does the responsibility for stored data integrity in the cloud belong?Cloud providerCompliance agencyCloud customerShared responsibility

      35 Mindy has been tasked with developing a new QA test logging application, but she is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for her to use to meet her requirements?PythonXMLAPISNMPTLS

      36 What technology was instrumental in the growth of cloud services?XMLPythonAutomationAuthenticationSecurityWorkflow servicesEncryption

      37 Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shut down the hacking attempts. What application would you suggest that Vicky deploy?DMZIDSIPSRAIDHIDS

      38 What options can you offer your user base for MFA tokens? (Choose two.)One-time passwordSmartphone appAutomation systemsKey fobCloud vendor management dashboard

      39 Linda works in the IT security group of her firm and has been tasked with investigating options that will allow customers to access their personal records securely via the web. What is the most common in-flight e-commerce security protocol on the market?MD5SSL/TLSIPsecVPN

      40 Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network micro-segmentation deployments. When reading the documentation, you notice a link to download a Java-based application to monitor and configure the IPS application. What kind of configuration program is this?CLIGIUVendor-basedAPIRESTful

      41 Name the type of software update that is designed to address a known bug and to bring a system up-to-date with previously released fixes.HotfixPatchVersion updateRollout

      42 Your employer has developed a mission-critical application for the medical industry, and there can be no downtime during maintenance. You have designed a web architecture to take this into account

Скачать книгу