Cloud+5 Flashcards

1
Q
1.Olivia manages a group of Windows and Linux servers. She knows there is a command that she can use to view currently open network connections that works on both platforms. Which of the following commands will she most likely use?
	a.	netstat
	b.	dig
	c.	route
	d.	arp
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2.Haley does not want to manually assign IP addresses to clients on one of the network segments that she manages. Instead, she wants clients to obtain an IP address from a server that manages a pool of IP addresses. Which of the following technologies should she implement?
	a.	DNS
	b.	DHCP
	c.	RIP
	d.	OSPF
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
3.Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?
	a.	Next server
	b.	DHCP servers
	c.	DNS servers
	d.	FQDN servers
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
4.Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection?
	a.	VPN
	b.	VLAN
	c.	VNC
	d.	DNS
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
5.Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs, but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose?
	a.	L2TP
	b.	PPTP
	c.	GRE
	d.	PPP
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
6.Quinn is currently looking to deploy a new Microsoft SharePoint server farm, a web-based application, into its own VPC. Which of the following ports would be unnecessary for her to leave open on the firewall for usage or management purposes?
	a.	22
	b.	80
	c.	443
	d.	3389
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
7.Marissa is wanting to implement a VPN at her company, but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?
	a.	L2TP
	b.	PPTP
	c.	GRE
	d.	OpenVPN
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8.Daisy is researching load balancing solutions to implement for a new application that she is tasked with designing and deploying the infrastructure for. One of the requirements is that a client should continue communicating with the same server for the duration of their web browsing session. Which of the following features should she look for in the load balancer?
	a.	Glue connectivity
	b.	Ephemeral sessions
	c.	Sticky sessions
	d.	One-time pad
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9.Greta manages the on-premises networks for her company’s Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement?
	a.	LAN
	b.	VLAN
	c.	VXLAN
	d.	CAN
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10.Victoria is trying to determine whether one of the new servers she set up on the cloud service provider is reachable and online from her current workstation. Which of the following tools is she most likely trying to use?
	a.	ping
	b.	route
	c.	display
	d.	netstat
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
11.Angela has decided upon a multi-cloud deployment so that the company can continue to operate even if one of the cloud service providers experiences an outage. Which of the following explains the factor that was important to Angela in choosing this structure?
	a.	Cost optimization
	b.	Regulatory compliance
	c.	Cloudbursting
	d.	Disaster recovery
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
12.Jenna’s cloud service provider has just started supporting IPv6. She wants her web servers there to be accessible by both IPv4 and IPv6. Which of the following records should she add to the DNS configuration to ensure that IPv6 clients can access her company’s website?
	a.	A
	b.	PTR
	c.	MX
	d.	AAAA
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
13.Uma has been analyzing the performance and baselines from her virtual machines that are on a cloud service provider’s platform. She sees that they do not appear to be performing up to the standards that her cloud service provider guarantees. Which of the following documents outlines the standards that they are guaranteeing?
	a.	DRP
	b.	SLA
	c.	VPC
	d.	GRE
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
14.Wanda is trying to determine which routes packets are traveling over when accessing the company’s chosen cloud service provider. Which of the following Windows tools can help her discover that information?
	a.	trace
	b.	traceroute
	c.	tracer
	d.	tracert
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
15.Isabel is troubleshooting a DNS issue on one of her Windows servers. Which of the following commands might let her look up the DNS records so she can track down where the problem might be?
	a.	dig
	b.	netstat
	c.	route
	d.	nslookup
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
16.Shelley wants to make sure that any protocols not using encryption are blocked at the firewall for one of her VPCs. Which of the following protocols should she ensure has a deny rule enabled for it?
	a.	HTTPS
	b.	RDP
	c.	Telnet
	d.	SSH
17
Q

17.A year ago Yvette configured two servers on separate VLANs. She still needs them to remain on separate VLANs, but now has a need for them to be able to send certain communications to each other over a certain port. Which of the following will be necessary for her to do?
a. Migrate the servers to a VPC.
b. Merge the VLANs together so that they both use two VLAN IDs.
c. Create a route between the two VLANs so they know how to contact each other.
d. Convert the 2 VLANs into a single VXLAN.

18
Q
18.Rita has decided that the servers in one of the VPCs that she manages should only be reachable by IP address and they should not be able to perform any domain name lookups from the Internet. Which of the following ports should she disable on the firewall for that VPC?
	a.	23
	b.	53
	c.	389
	d.	636
19
Q
19.Adrienne wants to be able to analyze the traffic coming into a Linux server’s network interface. Which of the following command line utilities will allow her to see this information?
	a.	tracert
	b.	arp
	c.	dig
	d.	tcpdump
20
Q
20.Nancy was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following should she read more about to find out how she can implement it?
	a.	PPTP
	b.	IPsec
	c.	GRE
	d.	L2TP
21
Q
21.Emina has three separate VPCs at the cloud service provider that her company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might she implement in order to accommodate that requirement?
	a.	VLANs
	b.	Internet connection sharing
	c.	Cloud peering
	d.	IPsec
22
Q
22.Karen’s manager knows that she is working on implementing a VPN connection between the company’s on-premises data center and the cloud service provider her company uses. The manager approached her with a concern to make sure that she wasn’t using an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following was most likely the protocol that the manager was concerned about?
	a.	L2TP
	b.	PPTP
	c.	GRE
	d.	OpenVPN
23
Q
23.Zoie is working on a Windows server that has two network interfaces. One is assigned an IP address by a DHCP server while the other is a static IP address. She wants to see what the current dynamic IP address is. Which of the following command line utilities can she use to view that information?
	a.	ifconfig
	b.	ipconfig
	c.	ip
	d.	netconfig
24
Q
24.Fredrica is installing more infrastructure in her company’s on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains?
	a.	VLAN
	b.	VPC
	c.	VNC
	d.	VLC
25
25. Patti’s company has just migrated the only Windows server in a particular VPC to a different VPC. Which of the following should she do next?   a.  Disable port 3389 on the firewall of the original VPC.   b.  Disable port 22 on the firewall of the original VPC.   c.  Disable port 53 on the firewall of the original VPC.   d.  Disable port 110 on the firewall of the original VPC.
A
26
``` 26. Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose?   a.  GRE   b.  PPTP   c.  L2TP   d.  OpenVPN ```
D
27
``` 27. Cara works for a startup company that up until now has been running on a single virtual machine. The virtual machine is starting to see capacity issues and she is unable to provision more CPU and memory resources to satisfy its needs. Which of the following would allow her to expand the capacity of her company’s web server?   a.  DHCP   b.  VPN   c.  Load balancer   d.  OSPF ```
C
28
``` 28. Tia has been analyzing the on-premises data center and determined that the data center can handle most of the traffic on a day-to-day basis. However, there are times when the bandwidth becomes saturated and she needs to find a solution to push the excess traffic out to virtual machines on a cloud service provider. Which of the following describes the technique she is looking to implement?   a.  Cloud ripping   b.  Cloudbursting   c.  Cloud tipping   d.  Cloud redirection ```
B
29
``` 29. Ursula is working on a Linux system and wants to determine which routers a packet will traverse when a packet is sent to a certain destination. Which of the following command line tools can she use to find that information?   a.  tracert   b.  tracer   c.  trace   d.  traceroute ```
D
30
``` 30. Yolanda wants to see a list of MAC addresses that one of her servers has been communicating with. Which of the following command line tools will display that information?   a.  nslookup   b.  arp   c.  dig   d.  ping ```
B
31
``` 31. Xena has noticed that traffic to her company’s website has been increasing from across the world. She has decided to start deploying copies of that server to various regions and wants to direct traffic to the site that is closest to each user. Which of the following technologies could she use to do this?   a.  GAN   b.  GSLB   c.  GCP   d.  GIMP ```
B
32
``` 32. Erma wants to look at the current IP configuration on a Linux server. Which of the following tools can she use to view this information? (Choose two)   a.  ifconfig   b.  ipconfig   c.  ip   d.  netconf ```
A
33
``` 33. Emily has just migrated the email from the company’s on-premises data center to a cloud service provider. She has modified the appropriate A records, but e-mail isn’t being delivered to the new servers. Which of the following records does she still need to modify?   a.  CNAME   b.  PTR   c.  SRV   d.  MX ```
D