CompTIA Cloud+ Final Assessment Flashcards
(88 cards)
When considering identity and access management (IAM), what is the goal of authorization?
A.Proof
B.Access
C.Logs
D.Policies
B.Access
Engineers discover that a cloud service occasionally experiences a severe latency with domain name system (DNS) queries. All network tests indicate that throughput is more than sufficient to remote DNS servers. How do the engineers improve the issue without modifying the physical or logical infrastructure?
A.Implement DNS Caching
B.Reference additional DNS servers
C.Reference different DNS servers
D.Move DNS servers closer
A.Implement DNS Caching
An engineer recommends that an administrator should deploy cloud-based virtual machines (VMs) for the first time by using templates. What aspects of a VM can be set within a template for rapid deployment? (Select all that apply.)
A.Compute resources
B.Operating system
C.Storage resources
D.Container services
A.Compute resources
B.Operating system
C.Storage resources
A software development company in New York (in the Northeast United States) has some production instances already running on the Google Cloud Platform (GCP) and wants to create two separate networks for development and staging purposes. The IT team has put together a network design depicting what the final cloud networks will look like with multiple subnets but will move forward with the development network and its primary subnet first. The networks must allow Secure Shell (SSH), Remote Desktop Protocol (RDP), and Hypertext Transfer Protocol Secure (HTTPS) for secure communication to all instances in the network from all sources outside of the network. As the cloud engineer, work with your colleagues to create the first network in this initial phase. The following information is a preview of the final network design:
Virtual private cloud networks:
mainnetwork – 10.130.0.0 – 4094 IP addresses
devnetwork – 10.120.1.0 – 254 IP addresses
stagenetwork – 10.140.1.0 – 254 IP addresses
Naming convention standards:
Subnet names: “networkname-IPv4_second_octect” or mainnetwork-130.
Firewall names: “networkname-[allow or deny]”
Network name: ____
Subnet creation mode: Custom or Automatic
Subnet name: ___
Region: us-central, us-east, us-west
IP address range (using CIDR notation): _____
Firewall name: _____
Network: default, devnetwork, mainnetowrk, stagenetwork
Direction of traffic: ingress egress
Action on Match: allow deny
targets: all instants in the network, specified targets tags, specified services accepting
source filter: IP ranges, source tags, service account
source IP ranges: 0.0.0.0/0, 10.120.0.0/20, 10.130.0.0/20, 10.140.0.0/20, 10.140.1.0/24
specified TCP port: TCP Port 22 TCP Port 3389 TCP Port 443 TCP port 23
admin will deploy on: default, devnetwork, mainnetowrk, stagenetwork
if the company want to deploy in Europe: default, devnetwork, mainnetowrk, stagenetwork
Network name: devnetwork
Subnet creation mode: Custom
Subnet name: devnetwork-120
Region: us-east1
IP address range (using CIDR notation): _____
Firewall name: _____
Network: devnetwork
Direction of traffic: ingress
Action on Match: allow
targets:
all instants in the network
source filter:
IP ranges,
source IP ranges: 0.0.0.0/0, 10.120.0.0/20
specified TCP port:
TCP Port 22 yes
TCP Port 3389 yes
TCP Port 443 yes
TCP port 23 no
admin will deploy on: mainnetowrk, stagenetwork
if the company want to deploy in Europe:
mainnetowrk
Network name: mainnetwork
Subnet name: mainnetwork-130 IP address range: 10.130.0.0/20
Firewall name: mainnetwork-allow
A user mentions that a cloud-based data entry portal is not accessible. Engineers believe they have identified the problem as a client-side issue but are unsure of how prevalent it is across the system. What step should the engineers take next to solidify the problem?
A.Establish a theory
B.Question the obvious
C.Establish a plan
D.Determine the scope
D.Determine the scope
A team of administrators look for clever ways to automate cloud systems and services to streamline Windows-based cloud server maintenance activities. What options do the administrators consider for reliability and efficiency? (Select all that apply.)
A.Log file archiving
B.Shutdowns and restarts
C.Installations and upgrades
D.Deploying containers
A.Log file archiving
B.Shutdowns and restarts
C.Installations and upgrades
An engineer manages a new cloud deployment. Network devices in the cloud infrastructure are configured by using a software-defined (SDN) network approach. What plane controls packet management tasks or filters network traffic within and between segments?
A.MAC
B.IP
C.Control
D.Data
D.Data
Engineers concern themselves with user density issues before moving to a cloud-based service. What approach can the engineers utilize to address any concerns? (Select all that apply.)
A.Capacity planning
B.Business needs
C.Trend analysis
D.Solution requirements
A.Capacity planning
C.Trend analysis
Systems administrators need to configure cloud storage to handle large amounts of audio and video data that will be accessed frequently. The solution should be scalable and provide highly detailed metadata. Which storage type will provide the required capabilities?
A.Block
B.Object
C.File
D.Bucket
B.Object
An organization considers a move from on-premise infrastructure to one in the cloud. Engineers at the organization are concerned with how to implement routers and switches. Which cloud subscription model would the engineers have to manage the routers and switches?
A.XaaS
B.PaaS
C.IaaS
D.SaaS
C.IaaS
A developer troubleshoots building a cloud-based application. The application build process has run smoothly in the past, but now automation attempts continue but return a deprecation message in the process. IT staff recently upgraded the configuration management software. What is the likely cause of the problem?
A.Older configuration files contain deprecated settings.
B.Configuration management is trying to use an OS feature that no longer exists.
C.Configuration management tool version is incorrect.
D.An API does not match requirements for an associated data source.
A.Older configuration files contain deprecated settings.
An IT support technician discovers that a Windows-based cloud instance requires a new driver to resolve an issue. Installing the driver pertains to which step in the troubleshooting process?
A.Establish a Plan of Action
B.Implement the Solution
C.Verify Full System Functionality
D.Implement Preventive Measures
B.Implement the Solution
A large firm looks to move its systems to the cloud. Security responsibility is of great concern. In a shared security model, which areas are a cloud service provider (CSP) responsibility? (Select all that apply.)
A.Compute
B.Storage
C.Traffic
D.Authentication
A.Compute
B.Storage
To control costs, an administrator needs to set storage quotas for file shares on a Windows cloud-based server. What options exist to set quotas? (Select all that apply.)
A.By instance
B.By user
C.By group
D.By partition
B.By user
C.By group
D.By partition
Top level engineers compile a document to address disaster recovery management techniques. Of interest to stakeholders is the recovery time objective (RTO). How do engineers describe this metric?
A.The time needed to maintain an organization’s business continuity
B.The time between a disaster and the most recent backup
C.The time necessary to return a service to its fully operational status
D.The time between server or system failures
A.The time needed to maintain an organization’s business continuity
A cloud-based application needs to support file sharing for both Windows and non-Windows clients. Which two protocols should the administrator implement? (Select all that apply.)
A.VPC
B.NFS
C.CIFS
D.EFS
B.NFS
C.CIFS
During a cloud storage service rollout, engineers opt to use a storage system that utilizes the common internet file system (CIFS). Which storage type do engineers deploy?
A.Block
B.File
C.Object
D.Bucket
B.File
Cloud engineers microsegment a network to secure sections from each other based on workload. When considering the granularity of the segments, which aspect is critical?
A.Reduced attack surface
B.Independent governance
C.Increased compliance
D.Scaling ability
B.Independent governance
Top level engineers create a set of policies to address disaster recovery management techniques. There is a great deal of emphasis on the mean time to recovery (MTTR). How do engineers describe this metric?
A.The time needed to maintain an organization’s business continuity
B.The time between a disaster and the most recent backup
C.The time necessary to return a service to its fully operational status
D.The time between server or system failures
C.The time necessary to return a service to its fully operational status
A cloud service at an organization should only allow for logins based on a user’s specific and authorized location. Which technologies do security engineers suggest using to comply with this requirement? (Select all that apply.)
A.VLAN
B.IP
C.GPS
D.SSH
A.VLAN
B.IP
C.GPS
Engineers decide to use IPsec encapsulation to encrypt a portion of network communications between two cloud servers. As network bandwidth is a concern, how do engineers configure the encryption? (Select all that apply.)
A.The engineers use tunnel mode
B.The engineers use transport mode
C.The engineers use data encryption rules
D.The engineers implement key exchange
B.The engineers use transport mode
C.The engineers use data encryption rules
You are a cloud systems administrator for a Deep Learning and Artificial Intelligence (AI) applications research laboratory. The organization outsources cloud services from a third-party cloud service provider (CSP), in this case, Amazon Web Services (AWS) Amazon Elastic Compute Cloud (EC2). It is your responsibility to manage virtual machine (VM) instances for the laboratory.
You are a cloud systems administrator for a Deep Learning and Artificial Intelligence (AI) applications research laboratory. The organization outsources cloud services from a third-party cloud service provider (CSP), in this case, Amazon Web Services (AWS) Amazon Elastic Compute Cloud (EC2). It is your responsibility to manage virtual machine (VM) instances for the laboratory.
The types of analysis tasks and their instance requirements are as follows:
of vCPUs
task 1: 2, 8, 16, 32, 64, 96
task 2: 2, 8, 16, 32, 64, 96
task 3: 2, 8, 16, 32, 64, 96
Memort size (GiB)
task 1: 16, 32, 64, 128, 384
task 2: 16, 32, 64, 128, 384
task 3: 16, 32, 64, 128, 384
Instance storage
task 1: EBS-only, 8 x 1 TB NVMe SSD
task 2: EBS-only, 8 x 1 TB NVMe SSD
task 3: EBS-only, 8 x 1 TB NVMe SSD
network bandwith (Gbps)
task 1: 10, 100
task 2: 10, 100
task 3: 10, 100
instance type
task 1: Accelerated computing, compute optimized, memory optimized
task 2: Accelerated computing, compute optimized, memory optimized
task 3: Accelerated computing, compute optimized, memory optimized
Define numbers of NVIDIA GPUs
task 1: 0, 2, 4, 8
task 2: 0, 2, 4, 8
task 3: 0, 2, 4, 8
use GPU auto boost
task 1: yes, no
task 2: yes, no
task 3: yes, no
regarding cost task 1, task 2, task 3
based on this exercose: CPU, GPU, Memory
of vCPUs
task 1: 16, 64, 96
task 2: 32, 64, 96
task 3: 16, 64, 96
Memort size (GiB)
task 1: 64, 128
task 2: 64
task 3: 16, 384
Instance storage
task 1: EBS-only,
task 2: EBS-only,
task 3: 8 x 1 TB NVMe SSD
network bandwith (Gbps)
task 1: 10
task 2: 10
task 3: 100
instance type
task 1: memory optimized
task 2: compute optimized
task 3: Accelerated computing
Define numbers of NVIDIA GPUs
task 1: 0
task 2: 2
task 3: 8
use GPU auto boost
task 1: no
task 2: yes
task 3: yes
regarding cost task 1,
based on this exercose: GPU
An administrator new to automation and orchestration looks for help on the subject. If a colleague recommends using playbooks, which tool does the administrator use?
A.Chef
B.Puppet
C.Ansible
D.Powershell
C.Ansible
Support technicians establish a plan of action to resolve a cloud server issue. What should the technicians consider in this plan? (Select all that apply.)
A.Service interruptions
B.Likely cause
C.Problem scope
D.Data loss
A.Service interruptions
D.Data loss