Deck 1 Flashcards

(71 cards)

1
Q

What process controls the access to resources on a cloud platform?

Provisioning
Identity management
Subscription
Containerization

A

Identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A feature used in most virtualization platforms which allows a host system to artificially enlarge its pool of memory by reclaiming unused memory previously allocated to various virtual machines.

Resource Allocation
Memory Ballooning
Memory Swapping

A

Memory Ballooning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A service model that allows information technology customers to obtain computing resources over the internet

A model for enabling ubiquitous convenient on demand network access to a shared pool of configurable computing resources (applications, servers, storage, networks and services) that can rapidly be provisioned and released with minimal management effort or service provider intervention.

Hypervisor
Resource allocation
Cloud Computing

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Storage management or storage provisioning approach where storage space is completely allocated permanently

Thick
Thin
Compression

A

Thick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Storage management or storage provisioning approach where is it more like quotas, acquire the space as you need it dynamically

Thick
Thin
Compression

A

Thin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud service model where User Manages: Application, data, runtime, middleware, operating system, virtualization, networking and storage

On Prem
IaaS
PaaS
SaaS

A

On Prem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud service model where
User Manages: Application, data, runtime, middleware, operating system
Provider manages virtualization, networking and storage

On Prem
IaaS
PaaS
SaaS

A

IaaS ( Infrastructure as a service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud service model where
User Manages: Application and data
Provider manages runtime, middleware, operating system, virtualization, networking and storage

On Prem
IaaS
PaaS
SaaS

A

PaaS (Platform as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud service model where

Provider manages: Application, data, runtime, middleware, operating system, virtualization, networking and storage

On Prem
IaaS
PaaS
SaaS

A

SaaS (Software as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The consumer is being provided with the direct
use of the software. Responsibility for the hardware where that software runs,
the operating system upon which it runs, and the installation and patching of the
software itself are all offloaded to the CSP.

SaaS
IaaS
PaaS

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The service structure is provided by the CSP. It is
up to the consumer to populate that structure, manage it on a day-to-day basis,
and assume responsibility for the content. Support for the hardware, as well as
the service platform that hosts the content, is offloaded to the CSP.

SaaS
IaaS
PaaS

A

PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The hardware infrastructure is provided
to the consumer. The consumer assumes responsibility for all layers above
that hardware. The CSP manages hardware failures, firmware updates, device
drivers, and hardware compatibility. The consumer installs and manages the
operating system on top of the hardware as well as any services and applications
that run above that operating system

SaaS
IaaS
PaaS

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A server administrator is architecting a cloud based solution for a company with various development projects and application dependencies. Which of the following solutions would be most applicable?

Containers
Templates
Virtual machines
Provisioning

A

Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A server administrator is architecting a cloud based solution for a company with various development projects and application dependencies. Which of the following solutions would be most applicable?

Containers
Templates
Virtual machines
Provisioning

A

Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When configuring a network storage system for a company-wide function, which document should serve as a primary reference to effectively manage the project while also remaining compliant with company policy?

Service manual
Workflow diagram
Operating procedures
Change management

A

Operating procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Concerning cloud security in the IaaS model, which of the following are the responsibility of the customer?

Operating system
Identity management
Storage
Networking

A

Operating system

Identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company has an in-house-developed application. The administrator wants to utilize cloud services
for additional peak usage workloads. The application has a very unique stack of dependencies.
Which of the following cloud service subscription types would BEST meet these requirements?

PaaS
SaaS
DBaaS
IaaS

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A network virtualization method that uses encapsulation and tunneling to provide subnets with large numbers of Virtual LANS.

NVGRE
GENEVE
XVLAN

A

NVGRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

4 phases of cloud migration

rehost replatform implementation assessment

Retire Hybrid implementation optimization

Assessment, Planning, Implementation, Optimization

A

Assessment, Planning, Implementation, Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Seven types of cloud migration

Rehost, Replatform, Refactor, Repurchase, Retire, Retain, Hybrid

Rehost, implementation, Retain, optimization, assessment, Hybrid

Optimization, assessment, Hybrid, Retire, Rehost

A

Rehost, Replatform, Refactor, Repurchase, Retire, Retain, Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does VPC stand for?

Vending Private Cloud
Virtual Private Cloud
Virtual Primary Cloud

A

Virtual Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of cloud migration is: No modification application is cloud ready?

Replatform
Hybrid
Refactor
Rehost

A

Rehost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The following are cloud services:

PaaS & SaaS
PaaS & IaaS
On Prem and IaaS

A

PaaS & SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which Migration Phase are you in if you’re attempting to manage the cost effectiveness of an existing cloud deployment?

Optimization
Drop and shop
Refactor

A

Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What type of cloud migration: Application requires some modification? Rehost Replatform Repurchase Retire
Replatform
26
What type of cloud migration? Application is retired and replaced by modern cloud ready application? Refactor Retain Retire Repurchase
Repurchase
27
What type of cloud migration: Application is retired and not replaced? Retire Retain Refactor
Retire
28
What type of cloud migration: Application will be kept on premises in traditional deployment. Rehost Retain Replatform
Retain
29
What type of cloud migration: Mix of any other six types Replatform Refactor Hybrid
Hybrid
30
What type of cloud migration: Application will be entirely rearchitected to be cloud ready Retain Hybrid Refactor
Refactor
31
What type of IP address do you get when a DHCP server doesn’t answer and what is it called? 127 Traceroute 169 APIPA 53 DNS
169 APIPA
32
What type of load balancer does not consider size of task assigned or current workload on the target source? Round Robin Static Algorithm Dynamic Algorithm
Round Robin
33
Load balancer where the work load is even distributed among servers Round Robin Static Algorithm Dynamic Algorithm
Static Algorithm
34
Load Balancer where the least busy server is given the next work cycle Round Robin Static algorithm Dynamic algorithm
Dynamic Algorithm
35
What are the five characteristics of the cloud? On demand self service, broad network access, resource pooling, rapid elasticity, measured service On demand self service, memory ballooning, network access, resources, scalability, support services Monitoring, provisioning, services, resources, metering, controlled instances
On demand self service, broad network access, resource pooling, rapid elasticity, measured service
36
The consumer is being provided with the direct use of the software. Responsibility for the hardware where that software runs, the operating system upon which it runs and the installation and patching of the software itself are all offloaded to the CSP is an example of what cloud service model? SaaS PaaS IaaS
SaaS
37
The service structure is provided by the CSP. It is up to the consumer to populate that structure, manage it on a day to day basis and assume responsibility for the content. Support for the hardware, as well as the service platform that hosts the content, is offloaded to the CSP is an example of what cloud service model SaaS IaaS PaaS
PaaS
38
The hardware infrastructure is provided to the consumer. The consumer assumes responsibility for all layers above that hardware. The CSP manages the hardware failures, firmware updates, device drivers, and the hardware compatibility. The consumer installs and manages the operating system on top of the hardware as well as any services and applications that run above that operating system is an example of what cloud service model SaaS PaaS IaaS
IaaS
39
An IaaS application has a two-hour RTO and a four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy. Back up to long-term storage every night Back up to object storage every three hours Back up to long-term storage every four hours Back up to object storage every hour
Back up to object storage every hour
40
A systems administrator needs to convert ten physical servers to virtual. Which of the following would be the MOST efficient conversion method for the administrator to use? Rebuild the servers from scratch Use the vendor's conversion tool Clone the hard drive Restore from backup
Clone the hard drive
41
The AWS formula is for this calculation is
vCPU=number of cores x number of threads
42
What is the severity level of sys log level value 0? Critical Error Warning
Critical
43
Involves transferring or porting a virtual machine (VM) onto a physical machine V2P P2V V2V
V2P
44
Refers to the migration of an operating system, application program and data from a virtual machine or disk partition to another virtual machine or disk partition V2V V2P P2P
V2V
45
Called hardware virtualization, refers to the migration of physical machines to virtual machines. Approach to transfer their physical environment into a digital one. P2V V2V V2P
P2V
46
An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective? Deploy web servers into an laaS provider. Implement a cloud-based VDI solution. Provision web servers in a container environment. Use PaaS components in the cloud to implement the product.
Provision web servers in a container environment.
47
A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution? Internet of Things Digital transformation Artificial intelligence DNS over TLS
Artificial intelligence
48
A company needs to access the cloud administration console using its corporate identity. Which of the following actions would MOST likely meet the requirements? Implement SSH key-based authentication. Implement cloud authentication with local LDAP. Implement multifactor authentication Implement client-based certificate authentication.
Implement client-based certificate authentication.
49
A company is currently running a website on site. However, because of a business requirement to reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the company is considering operating in a hybrid environment. The website uses mostly static files and a small relational database. Which of the following should the cloud architect implement to achieve the objective at the LOWEST cost possible? -Implement a load-balanced environment in the cloud that is equivalent to the current on-premises setup and use DNS to shift the load from on premises to cloud. -Implement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is down. Restore the data from the backups. -Implement a website replica in the cloud with auto-scaling using the smallest possible footprint. Use DNS to shift the load from on premises to the cloud. -Implement a CDN that caches all requests with a higher TTL and deploy the laaS instances manually in case of disaster. Upload the backup on demand to the cloud to restore on the new instances.
Implement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is down. Restore the data from the backups.
50
Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue? A. • Perform a memory dump of the OS. • Analyze the memory dump. • Upgrade the host CPU to a higher clock speed CPU. B. • Perform a packet capture during authentication. • Validate the load-balancing configuration. Questions & Answers PDF P-59 https://www.pass4success.com • Analyze the network throughput of the load balancer. C. • Analyze the storage system IOPS. • Increase the storage system capacity. • Replace the storage system disks to SSD. D. • Evaluate the OS ACLs. • Upgrade the router firmware. • Increase the memory of the router
C• Analyze the storage system IOPS. • Increase the storage system capacity. • Replace the storage system disks to SSD.
51
Which of the following will provide a systems administrator with the MOST information about potential attacks on a cloud IaaS instance? Network flows FIM Software firewall HIDS
Network flows
52
A cloud administrator would like to deploy a cloud solution to its provider using automation ``` Auto-scaling Tagging Playbook Templates Containers Serverless ```
Tagging | Templates
53
helps in operating cloud services by having a common identifier for a solution or parts of a solution. So being able to find all the VMs and Databases configured for a service would be an example. Tagging Playbook Auto-Scaling
Tagging
54
A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit? An SLA report Tagging Quotas Showback
Quotas
55
______ uses scripting tools to create individual server builds that can become standards for cloud applications. Templates Containers Snapshots
Templates
56
To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public DBaaS solution. Which of the following would be the BEST technique? Live migration Physical-to-virtual Storage-level mirroring Database replication
Physical-to-virtual
57
Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization? Auto-scaling of compute Oversubscription Dynamic memory allocations on guests Affinity rules in the hypervisor
Dynamic memory allocations on guests
58
A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue? API version incompatibility Misconfigured script account Wrong template selection Incorrect provisioning script indentation
Wrong template selection
59
A systems administrator is analyzing a report of slow performance in a cloud application. This application is working behind a network load balancer with two VMs, and each VM has its own digital certificate configured. Currently, each VM is consuming 85% CPU on average. Due to cost restrictions, the administrator cannot scale vertically or horizontally in the environment. Which of the following actions should the administrator take to decrease the CPU utilization? (Choose two.) A. Configure the communication between the load balancer and the VMs to use a VPN. B. Move the digital certificate to the load balancer. C. Configure the communication between the load balancer and the VMs to use HTTP. D. Reissue digital certificates on the VMs. E. Configure the communication between the load balancer and the VMs to use HTTPS. F. Keep the digital certificates on the VMs.
B. Move the digital certificate to the load balancer. | E. Configure the communication between the load balancer and the VMs to use HTTPS.
60
A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST? A. Server power B. Rack power C. Switch power D. SAN power
C. Switch power
61
A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements. Which of the following solutions will be BEST to help the administrator achieve the requirements? A. Containers B. Infrastructure as code C. Desktop virtualization D. Virtual machines
A. Containers
62
A systems administrator is configuring a storage array. Which of the following should the administrator configure to set up mirroring on this array? A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 6
B. RAID 1
63
After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message. Which of the following should the administrator verify NEXT? A. The TLS certificate B. The firewall rules C. The concurrent connection limit D. The folder permissions
A. The TLS certificate
64
An administrator is performing an in-place upgrade on a quest VM operating system. Which of the following can be performed as a quick method to roll back to an earlier state, if necessary? A. A configuration file backup B. A full backup of the database C. A differential backup D. A VM-level snapshot
D. A VM-level snapshot
65
A systems administrator would like to reduce the network delay between two servers. Which of the following will reduce the network delay without taxing other system resources? A. Decrease the MTU size on both servers B. Adjust the CPU resources on both servers C. Enable compression between the servers D. Configure a VPN tunnel between the servers
A. Decrease the MTU size on both servers
66
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company. Which of the following BEST describes this attack? A. VM escape B. Directory traversal C. Buffer overflow D. Heap spraying
A. VM escape
67
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement? A. Performance testing B. Penetration testing C. Vulnerability testing D. Regression testing
C. Vulnerability testing
68
A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections. Which of the following MOST likely needs to be analyzed before rehosting the ERP? A. Software B. Licensing C. Right-sizing D. The network
B. Licensing
69
A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet. Which of the following should the systems administrator implement to achieve this objective? A. A stateful firewall B. DLP C. DNSSEC D. Network flows
D. Network flows
70
A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations. Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment? A. Integrity B. Versioning C. Classification D. Segmentation
A. Integrity
71
An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources. Which of the following GPU configurations will be the MOST optimal for virtualizing this environment? A. Dedicated B. Shared C. Passthrough D. vGPU
D. vGPU