CompTIA Cloud+ Study Guide. Ben Piper
Чтение книги онлайн.
Читать онлайн книгу CompTIA Cloud+ Study Guide - Ben Piper страница 17
69 Harold will modify an NACL to adjust remote access to a cloud-based HR application. He will be submitting a plan that outlines all details of the change. What process is he following?Cloud automationChange advisoryChange managementRollout
70 To increase TipoftheHat.com 's security posture, Alice is reviewing user accounts that access the community cloud resources. Alice notices that the summer interns have left to go back to school but their accounts are still active. She knows that they will return over the winter break. What would you suggest that Alice do with these accounts?Do nothing.Delete the accounts.Disable the accounts.Change the resource access definitions.Modify the confederation settings.Change the access control.
71 Object tracking can be helpful in identifying which of the following? (Choose three.)ResiliencyTrendsMetricsACLsPeak usageAnomalies
72 Capacity and utilization reporting often contains data on which of the following objects? (Choose three.)CPUOS versionVolume tierRAMNetwork
73 What does a cloud management system monitor to collect performance metrics?DatabaseServerHypervisorObjects
74 Object tracking should be aligned with which of the following?VPCSLARDPJSON
75 What is a visual representation of current cloud operations?Operational matrixManagement consoleDashboardTicker
76 Hanna is monitoring performance metrics on a video server; she sees that the server is utilizing 100 percent of the available network bandwidth. What action will most likely address the problem?Implement 802.1Q tagging.Install a second network adapter.Update the network adapter's firmware.Install a network coprocessor ASIC.
77 What type of scaling includes adding servers to a pool?HorizontalRound robinElasticityAutoscaleVertical
78 What type of scaling involves replacing an existing server with another that has more capabilities?HorizontalRound robinElasticityAutoscaleVertical
79 Ichika is preparing a change management plan to increase the processing abilities of one of her middleware servers. What components can she upgrade to increase server performance? (Choose three.)CPUSLARAMNetwork I/OACLDNS
80 Niko is generating baseline reports for her quarterly review meeting. She is interested in a public cloud application server's memory utilization. Where does she generate these reports?HypervisorDatabasesLogging serversCloud management and monitoring application
81 SaaS orchestration systems are whose responsibility in the public cloud?CustomerProviderAutomation vendorDevOps
82 What type of application commonly uses batch processing?DNSNTPDatabasesMiddleware
83 Giulia posted a new software update to her company's popular smartphone application. After announcing the release, she has been monitoring her dashboard information and has noticed a large spike in activity. What cloud resource should she focus on?CPUNetwork bandwidthRAMAPIStorage
84 Cloud capacity can be measured by comparing current usage to what?OrchestrationAutomationNTPBaselineAPIs
85 Emma is modifying a publicly accessible IP subnet on her company's e-commerce site hosted in a hybrid cloud. After performing address changes for all of her public-facing web servers, she validated the change by connecting from a bastion host located offshore. She was unable to connect to the web servers. What does she need to modify to allow the remote site to connect to the web server?NTPSTPDNSAPI
86 Maria has noticed an increase in the response time of the NoSQL application she runs in her IaaS cloud deployment. When comparing current results against her baseline measurements that she recorded when the database was originally deployed, she verified that there has been a steady increase in the number of read requests. You have been asked to evaluate the baseline variances. Where should you focus your troubleshooting efforts?MemoryCPUStorageNetworking
87 Derek is monitoring storage volume utilization and is preparing a company change request to add storage capacity. He has decided to automate the volume allocation size. What cloud feature can he take advantage of?SaaSAPIElasticityOpenStack
88 What application tracks a process from start to finish?APINTPWorkflowOrchestration
89 Common cloud resources in your deployment that may saturate over time include which of the following? (Choose three.)RAMPowerCPUStorageMonitoringIaaS
90 Homer designed an application tier for his company's new e-commerce site. He decided on an IP subnet that uses the /28 IPv4 subnet. He is planning for a maximum of 14 servers. You are brought in as a cloud architect to validate his design. What other devices may be on this subnet other than the servers that would also require IP address assignments? (Choose two.)SLADefault gatewayDNSNTPAPISNMP
91 Elena manages user accounts for her company's cloud presence. She has a trouble ticket open with Jill to assist her in accessing an SSD storage volume in the San Paulo region of the public cloud. What kind of user issue is she investigating?AuthenticationAuthorizationFederationSSO
92 Emma is unable to reach her Linux-based web server hosted in the Singapore zone of the cloud. She is located in Austin, Texas. What command can she use to verify the connection path?tracerouteipconfigarpnetstatpingtcpdumproute print
93 After deploying a new public website, your validation steps ask you to check the domain name–to–IP address mappings. What utility can you use for validation? (Choose two.)RDPdigSSHnslookupIPsecIPS
94 Nicola is deploying a new fleet of IIS web servers on his IaaS e-commerce site. The company has elected to use a hybrid approach and wants graphical connections to the Windows bastion hosts. What traffic must he permit through the external-facing firewall to the host?SSHRDPDNSIPS
95 Martina is troubleshooting a networking problem and needs to capture network frames being sent and received from the server's network adapter. What command would she use to collect the traces?dignetstattcpdumpnslookup
96 The remote disaster recovery location follows the warm site model. To configure the network switches, routers, and firewalls remotely, Joyce will need serial port access from her company's operations center. She has 14 serial ports currently available but needs to be prepared for any unplanned expansion requirements during a disaster recovery cutover. What device would you recommend that she install at the warm site?RDPTelnetIPsecSSHTerminal server
97 The cloud data center is in a large industrial park with no company signage, extensive video cameras in the parking lot, high-security fences, and biometrics at the guard shack. What type of security is the provider implementing?BuildingDeviceInfrastructureTunneling
98 Mergie is documenting different methods that her remote operations center can use to access a fleet of servers operating in a community cloud. Which of the following are not viable methods? (Choose two.)RDPTelnetIDS/IPSTerminal serverDNSHTTP
99 Vasile is working a support ticket that shows the connection between the Ames field office and the Kansas City cloud edge location has dropped. She confirms it's a secure Internet-based access solution. What type of connection is this?Direct peeringIDSVPNAES-256RDP
100 Company users are complaining that they cannot log into a cloud-based collaboration system. The operations center has been investigating and has, so far, verified that the MFA applications are operational. What user system are they troubleshooting?AuthenticationAuthorizationFederationKerberos