CompTIA Cloud+ Study Guide. Ben Piper

Чтение книги онлайн.

Читать онлайн книгу CompTIA Cloud+ Study Guide - Ben Piper страница 17

CompTIA Cloud+ Study Guide - Ben Piper

Скачать книгу

style="font-size:15px;">      68 CPU utilization on a database server has consistently been at more than 80 percent utilization. The baselines show that 57 percent utilization is normal. What is this called?DeviationVarianceTriggersBaseline imbalance

      69 Harold will modify an NACL to adjust remote access to a cloud-based HR application. He will be submitting a plan that outlines all details of the change. What process is he following?Cloud automationChange advisoryChange managementRollout

      70 To increase TipoftheHat.com 's security posture, Alice is reviewing user accounts that access the community cloud resources. Alice notices that the summer interns have left to go back to school but their accounts are still active. She knows that they will return over the winter break. What would you suggest that Alice do with these accounts?Do nothing.Delete the accounts.Disable the accounts.Change the resource access definitions.Modify the confederation settings.Change the access control.

      71 Object tracking can be helpful in identifying which of the following? (Choose three.)ResiliencyTrendsMetricsACLsPeak usageAnomalies

      72 Capacity and utilization reporting often contains data on which of the following objects? (Choose three.)CPUOS versionVolume tierRAMNetwork

      73 What does a cloud management system monitor to collect performance metrics?DatabaseServerHypervisorObjects

      74 Object tracking should be aligned with which of the following?VPCSLARDPJSON

      75 What is a visual representation of current cloud operations?Operational matrixManagement consoleDashboardTicker

      76 Hanna is monitoring performance metrics on a video server; she sees that the server is utilizing 100 percent of the available network bandwidth. What action will most likely address the problem?Implement 802.1Q tagging.Install a second network adapter.Update the network adapter's firmware.Install a network coprocessor ASIC.

      77 What type of scaling includes adding servers to a pool?HorizontalRound robinElasticityAutoscaleVertical

      78 What type of scaling involves replacing an existing server with another that has more capabilities?HorizontalRound robinElasticityAutoscaleVertical

      79 Ichika is preparing a change management plan to increase the processing abilities of one of her middleware servers. What components can she upgrade to increase server performance? (Choose three.)CPUSLARAMNetwork I/OACLDNS

      80 Niko is generating baseline reports for her quarterly review meeting. She is interested in a public cloud application server's memory utilization. Where does she generate these reports?HypervisorDatabasesLogging serversCloud management and monitoring application

      81 SaaS orchestration systems are whose responsibility in the public cloud?CustomerProviderAutomation vendorDevOps

      82 What type of application commonly uses batch processing?DNSNTPDatabasesMiddleware

      83 Giulia posted a new software update to her company's popular smartphone application. After announcing the release, she has been monitoring her dashboard information and has noticed a large spike in activity. What cloud resource should she focus on?CPUNetwork bandwidthRAMAPIStorage

      84 Cloud capacity can be measured by comparing current usage to what?OrchestrationAutomationNTPBaselineAPIs

      85 Emma is modifying a publicly accessible IP subnet on her company's e-commerce site hosted in a hybrid cloud. After performing address changes for all of her public-facing web servers, she validated the change by connecting from a bastion host located offshore. She was unable to connect to the web servers. What does she need to modify to allow the remote site to connect to the web server?NTPSTPDNSAPI

      86 Maria has noticed an increase in the response time of the NoSQL application she runs in her IaaS cloud deployment. When comparing current results against her baseline measurements that she recorded when the database was originally deployed, she verified that there has been a steady increase in the number of read requests. You have been asked to evaluate the baseline variances. Where should you focus your troubleshooting efforts?MemoryCPUStorageNetworking

      87 Derek is monitoring storage volume utilization and is preparing a company change request to add storage capacity. He has decided to automate the volume allocation size. What cloud feature can he take advantage of?SaaSAPIElasticityOpenStack

      88 What application tracks a process from start to finish?APINTPWorkflowOrchestration

      89 Common cloud resources in your deployment that may saturate over time include which of the following? (Choose three.)RAMPowerCPUStorageMonitoringIaaS

      90 Homer designed an application tier for his company's new e-commerce site. He decided on an IP subnet that uses the /28 IPv4 subnet. He is planning for a maximum of 14 servers. You are brought in as a cloud architect to validate his design. What other devices may be on this subnet other than the servers that would also require IP address assignments? (Choose two.)SLADefault gatewayDNSNTPAPISNMP

      91 Elena manages user accounts for her company's cloud presence. She has a trouble ticket open with Jill to assist her in accessing an SSD storage volume in the San Paulo region of the public cloud. What kind of user issue is she investigating?AuthenticationAuthorizationFederationSSO

      92 Emma is unable to reach her Linux-based web server hosted in the Singapore zone of the cloud. She is located in Austin, Texas. What command can she use to verify the connection path?tracerouteipconfigarpnetstatpingtcpdumproute print

      93 After deploying a new public website, your validation steps ask you to check the domain name–to–IP address mappings. What utility can you use for validation? (Choose two.)RDPdigSSHnslookupIPsecIPS

      94 Nicola is deploying a new fleet of IIS web servers on his IaaS e-commerce site. The company has elected to use a hybrid approach and wants graphical connections to the Windows bastion hosts. What traffic must he permit through the external-facing firewall to the host?SSHRDPDNSIPS

      95 Martina is troubleshooting a networking problem and needs to capture network frames being sent and received from the server's network adapter. What command would she use to collect the traces?dignetstattcpdumpnslookup

      96 The remote disaster recovery location follows the warm site model. To configure the network switches, routers, and firewalls remotely, Joyce will need serial port access from her company's operations center. She has 14 serial ports currently available but needs to be prepared for any unplanned expansion requirements during a disaster recovery cutover. What device would you recommend that she install at the warm site?RDPTelnetIPsecSSHTerminal server

      97 The cloud data center is in a large industrial park with no company signage, extensive video cameras in the parking lot, high-security fences, and biometrics at the guard shack. What type of security is the provider implementing?BuildingDeviceInfrastructureTunneling

      98 Mergie is documenting different methods that her remote operations center can use to access a fleet of servers operating in a community cloud. Which of the following are not viable methods? (Choose two.)RDPTelnetIDS/IPSTerminal serverDNSHTTP

      99 Vasile is working a support ticket that shows the connection between the Ames field office and the Kansas City cloud edge location has dropped. She confirms it's a secure Internet-based access solution. What type of connection is this?Direct peeringIDSVPNAES-256RDP

      100 Company users are complaining that they cannot log into a cloud-based collaboration system. The operations center has been investigating and has, so far, verified that the MFA applications are operational. What user system are they troubleshooting?AuthenticationAuthorizationFederationKerberos

Скачать книгу