Cloud+ Flashcards
1.A small startup company has just received a round of funding in order to provide the capacity that is required to deliver their smartphone app to a larger number of devices. They have decided to use a public cloud rather than build their own data center, but want to manage as much of the infrastructure as possible while realizing the savings on capital expenditures from the purchase of hardware. Which of the following service models will give them the most control over the security of the platform they want to develop? a. SaaS b. PaaS c. IaaS d. DBaaS
C
Carrie has just finished verifying that the problem she fixed on a problematic virtual machine has not caused any other issues, and the system is now running normally. Which of the following should she do while she is closing out the issue in the ticketing system?
a. Establish a plan of action to resolve the problem and implement the solution.
b. Establish a theory of probable cause.
c. Document findings, actions, and outcomes.
d. Verify full system functionality, and, if applicable, implement preventive measures.
C
3.Teddy fixed an issue with a cloud-based application a few hours ago and just received a call from a user stating that another part of the application is now broken. Which of the following steps of the troubleshooting model did he most likely omit?
a. Identify the problem.
b. Document findings, actions, and outcomes.
c. Establish a plan of action to resolve the problem and implement the solution.
d. Verify full system functionality, and, if applicable, implement preventive measures.
D
4.A user calls into the service desk stating they’re having a problem accessing a particular cloud application. The service desk technician asks them some probing questions to see if there have been any changes to their local computer and what they were doing when it stopped working. Which step of the troubleshooting model describes the step that the process is currently at?
a. Establish a theory of probable cause.
b. Establish a plan of action to resolve the problem and implement the solution.
c. Document findings, actions, and outcomes.
d. Identify the problem.
D
5.Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulations out there that pertain to storing PII that are different than other industries. Which of the following sets of laws and regulations is he specifically thinking of that do not apply to other industries? a. HIPAA b. PCI DSS c. GDPR d. SLA
A
6.Alejandro is wanting to configure a couple of new virtual machines to take advantage of DHCP services offered by their cloud service provider. The portal that the CSP provides has their offerings broken up into multiple higher level categories. Which of the following should he most likely look under to configure this service for his company’s use? a. Compute components b. Storage components c. Application components d. Network components
D
7.Danny is looking at deploying a new application that requires root-level access to the server. He is currently researching the capabilities of various cloud service providers but is only finding one type of implementation that would meet the requirements set forth by the application developer. Which of the following types of cloud offerings is he most likely going to need? a. SaaS b. PaaS c. IaaS d. DBaaS
C
8.Bonnie has been tasked with performing an analysis on her company’s firewall infrastructure. The organization has a number of office locations across the United States in addition to a number of people that work remotely from home. She finds that many of the existing firewalls are no longer supported by the manufacturer and has convinced the company to allocate some budget to find a solution to replace them. Which of the following might she recommend as a replacement? a. FWaaS b. FAT c. CRM d. FCoE
A
9.Ted has been tasked with moving the company’s physical server infrastructure to a cloud-based infrastructure. He knows that the servers the company uses in the data center are fairly new and are nowhere near ready for retirement. However, he also knows that security is a very important factor in any decisions that are made. Which of the following is unlikely to be considered as a factor in the confidentiality aspect of security planning?
a. An on-premises private cloud may be more susceptible to security vulnerabilities with a limited staff due to the volume of maintenance and patches required.
b. If the company were to deploy a private cloud, what kind of uptime requirements would the system need in order to meet the SLAs?
c. The physical security of the data center must be considered as physical access to the servers could still cause a data breach.
d. If the company were to use a public cloud provider, what kind of assurances do they have that the company’s data will be kept private as well as what types of precautions and tools do they have in place?
B
10.Timothy is responsible for monitoring the performance of the applications the company has deployed on their internal private cloud as well as on the cloud service provider. When the applications were initially developed, the IT department had agreed to ensure that the services were available to varying degrees depending on criticality. As such, he needs to reference the documents for each of those services so he knows how they should be performing. Which document is Timothy most likely referencing? a. SOC b. NDA c. SLA d. GDPR
C
11.Aaron’s boss has learned that organizations can create their own clouds in their existing data centers. He has been tasked with researching products that could make better use of the hardware in their data centers and keeping their data on-premises. Which of the following products might Aaron recommend? a. FlexStack b. OSS c. OpenStack d. OwnStack
C
12.Max has been hired as a consultant to help revamp the procedures that the IT department uses. He sees a lot of things that they are doing correctly, but sees that the information in the trouble tickets is severely lacking of detail. Which of the following systems would Max most likely recommend putting into place that could have been populated from ticket information if it had been there?
a. CMDB
b. Knowledge base
c. Content management system
d. Customer relationship management system
B
13.John has received a ticket from the service desk describing an issue that a user is having with a cloud application. The ticket describes the issue that the user is having along with the answers to the probing questions that the service desk technician had asked. Which of the following is the next step in the troubleshooting model?
a. Establish a plan of action to resolve the problem and implement the solution.
b. Identify the problem.
c. Establish a theory of probable cause.
d. Document findings, actions, and outcomes.
C
14.Which of the following steps of the troubleshooting model, if not done, could potentially cause users to experience new issues or problems with a system.
a. Test the theory to determine cause.
b. Verify full system functionality, and, if applicable, implement preventive measures.
c. Identify the problem.
d. Document findings, actions, and outcomes.
B
15.Fictional Corp’s Vice President of Sales has just returned from a conference where he learned about a great customer relationship management platform that he would like for the company to begin using. This platform doesn’t require any investment in hardware, operating systems, or any other software, and only requires administration of user accounts and configuration of the types of data that it needs to store. Users would access it through their web browser, and the administration and maintenance tasks for the IT department would be minimal. Which of the following is the VP suggesting that the company use? a. Public cloud b. Private cloud c. Hybrid cloud d. Community cloud
A
16.A social media organization has grown from its initial startup phase to being widely known within the United States. It has decided that it is time to broaden its horizons and see if it can grow the userbase globally as well. They have plans to expand into Europe within the next 12 months. Which of the following should they become familiar with before they start marketing the platform to European users. a. GDPR b. HIPAA c. PCI DSS d. SSAE 18
A
17.Sharon has just finished probing her way through a virtual machine that has been causing problems on the company’s private cloud looking for clues as to what might be causing those problems. She has a theory of what could be causing the problem. What is the next step that she should perform if she is following the CompTIA troubleshooting model?
a. Test the theory to determine cause.
b. Establish a theory of probable cause.
c. Establish a plan of action to resolve the problem and implement the solution.
d. Identify the problem.
A
18.Creative Co has just set up a private cloud. However, they have employees that work remotely in the field and want them to be able to access resources on the private cloud. Which of the following could Creative Co implement in order to allow users to create secure connections from their computers across the Internet into the private cloud? a. CMS b. WAN c. VLAN d. VPN
D
19.Fictional Corp is looking at solutions for their new CRM system for the sales department. The IT staff already has a fairly heavy workload, but they do not want to hire any additional IT staff. In order to reduce the maintenance burden of the new system, which of the following types of CRM should they choose to meet these needs? a. IaaS b. PaaS c. SaaS d. DBaaS
C
20.Janelle’s company has adopted the CompTIA troubleshooting model as part of their standard operating procedures to use when troubleshooting issues. She sees the step listed as identify the problem. Which of the following should she do as part of that step?
a. Install the available patches from the manufacturer.
b. Ask the user probing questions to determine whether any recent changes have been made.
c. Look for clues as to what could be causing a problem.
d. Document the issue and all of the pertinent details.
B
21.Jim is a technician at Fictional Corp and has been assigned a ticket from the service desk to investigate a problem into one of the cloud applications being used by the company. He has a theory as to what could be causing the problem and tested it to determine the actual cause of the problem. Which of the following should Jim do next?
a. Document findings, actions, and outcomes.
b. Verify full system functionality, and, if applicable, implement preventive measures.
c. Establish a plan of action to resolve the problem and implement the solution.
d. Identify the problem.
C
22.Zara is implementing a configuration management tool that makes use of a system that sends XML messages to endpoints on various systems in order to make changes. What kind of technology is she putting into use? a. BIA b. DaaS c. CSP d. API
D
23.Eddie has a virtual machine that is currently serving as the sole web server for the organization he works for. The amount of traffic to the website has been increasing lately, and Eddie wants to add another web server to help answer some of the requests. Which of the following technologies should Eddie look at implementing in addition to the second web server? a. firewall b. router c. switch d. load balancer
D
24.Fictional Corp has a data center that runs multiple internal applications. However, they want to migrate their email to a cloud service provider so that mail will continue to be delivered in the case of any Internet service interruptions. They also want to use a single directory service so that they don’t have to create duplicate user accounts on the internal and external systems. Which of the following types of services is best suited for Fictional Corp’s needs? a. Public cloud b. Private cloud c. Hybrid cloud d. Community cloud
C