CompTIA Cloud+ Final Assessment Flashcards
When considering identity and access management (IAM), what is the goal of authorization?
A.Proof
B.Access
C.Logs
D.Policies
B.Access
Engineers discover that a cloud service occasionally experiences a severe latency with domain name system (DNS) queries. All network tests indicate that throughput is more than sufficient to remote DNS servers. How do the engineers improve the issue without modifying the physical or logical infrastructure?
A.Implement DNS Caching
B.Reference additional DNS servers
C.Reference different DNS servers
D.Move DNS servers closer
A.Implement DNS Caching
An engineer recommends that an administrator should deploy cloud-based virtual machines (VMs) for the first time by using templates. What aspects of a VM can be set within a template for rapid deployment? (Select all that apply.)
A.Compute resources
B.Operating system
C.Storage resources
D.Container services
A.Compute resources
B.Operating system
C.Storage resources
A software development company in New York (in the Northeast United States) has some production instances already running on the Google Cloud Platform (GCP) and wants to create two separate networks for development and staging purposes. The IT team has put together a network design depicting what the final cloud networks will look like with multiple subnets but will move forward with the development network and its primary subnet first. The networks must allow Secure Shell (SSH), Remote Desktop Protocol (RDP), and Hypertext Transfer Protocol Secure (HTTPS) for secure communication to all instances in the network from all sources outside of the network. As the cloud engineer, work with your colleagues to create the first network in this initial phase. The following information is a preview of the final network design:
Virtual private cloud networks:
mainnetwork – 10.130.0.0 – 4094 IP addresses
devnetwork – 10.120.1.0 – 254 IP addresses
stagenetwork – 10.140.1.0 – 254 IP addresses
Naming convention standards:
Subnet names: “networkname-IPv4_second_octect” or mainnetwork-130.
Firewall names: “networkname-[allow or deny]”
Network name: ____
Subnet creation mode: Custom or Automatic
Subnet name: ___
Region: us-central, us-east, us-west
IP address range (using CIDR notation): _____
Firewall name: _____
Network: default, devnetwork, mainnetowrk, stagenetwork
Direction of traffic: ingress egress
Action on Match: allow deny
targets: all instants in the network, specified targets tags, specified services accepting
source filter: IP ranges, source tags, service account
source IP ranges: 0.0.0.0/0, 10.120.0.0/20, 10.130.0.0/20, 10.140.0.0/20, 10.140.1.0/24
specified TCP port: TCP Port 22 TCP Port 3389 TCP Port 443 TCP port 23
admin will deploy on: default, devnetwork, mainnetowrk, stagenetwork
if the company want to deploy in Europe: default, devnetwork, mainnetowrk, stagenetwork
Network name: devnetwork
Subnet creation mode: Custom
Subnet name: devnetwork-120
Region: us-east1
IP address range (using CIDR notation): _____
Firewall name: _____
Network: devnetwork
Direction of traffic: ingress
Action on Match: allow
targets:
all instants in the network
source filter:
IP ranges,
source IP ranges: 0.0.0.0/0, 10.120.0.0/20
specified TCP port:
TCP Port 22 yes
TCP Port 3389 yes
TCP Port 443 yes
TCP port 23 no
admin will deploy on: mainnetowrk, stagenetwork
if the company want to deploy in Europe:
mainnetowrk
Network name: mainnetwork
Subnet name: mainnetwork-130 IP address range: 10.130.0.0/20
Firewall name: mainnetwork-allow
A user mentions that a cloud-based data entry portal is not accessible. Engineers believe they have identified the problem as a client-side issue but are unsure of how prevalent it is across the system. What step should the engineers take next to solidify the problem?
A.Establish a theory
B.Question the obvious
C.Establish a plan
D.Determine the scope
D.Determine the scope
A team of administrators look for clever ways to automate cloud systems and services to streamline Windows-based cloud server maintenance activities. What options do the administrators consider for reliability and efficiency? (Select all that apply.)
A.Log file archiving
B.Shutdowns and restarts
C.Installations and upgrades
D.Deploying containers
A.Log file archiving
B.Shutdowns and restarts
C.Installations and upgrades
An engineer manages a new cloud deployment. Network devices in the cloud infrastructure are configured by using a software-defined (SDN) network approach. What plane controls packet management tasks or filters network traffic within and between segments?
A.MAC
B.IP
C.Control
D.Data
D.Data
Engineers concern themselves with user density issues before moving to a cloud-based service. What approach can the engineers utilize to address any concerns? (Select all that apply.)
A.Capacity planning
B.Business needs
C.Trend analysis
D.Solution requirements
A.Capacity planning
C.Trend analysis
Systems administrators need to configure cloud storage to handle large amounts of audio and video data that will be accessed frequently. The solution should be scalable and provide highly detailed metadata. Which storage type will provide the required capabilities?
A.Block
B.Object
C.File
D.Bucket
B.Object
An organization considers a move from on-premise infrastructure to one in the cloud. Engineers at the organization are concerned with how to implement routers and switches. Which cloud subscription model would the engineers have to manage the routers and switches?
A.XaaS
B.PaaS
C.IaaS
D.SaaS
C.IaaS
A developer troubleshoots building a cloud-based application. The application build process has run smoothly in the past, but now automation attempts continue but return a deprecation message in the process. IT staff recently upgraded the configuration management software. What is the likely cause of the problem?
A.Older configuration files contain deprecated settings.
B.Configuration management is trying to use an OS feature that no longer exists.
C.Configuration management tool version is incorrect.
D.An API does not match requirements for an associated data source.
A.Older configuration files contain deprecated settings.
An IT support technician discovers that a Windows-based cloud instance requires a new driver to resolve an issue. Installing the driver pertains to which step in the troubleshooting process?
A.Establish a Plan of Action
B.Implement the Solution
C.Verify Full System Functionality
D.Implement Preventive Measures
B.Implement the Solution
A large firm looks to move its systems to the cloud. Security responsibility is of great concern. In a shared security model, which areas are a cloud service provider (CSP) responsibility? (Select all that apply.)
A.Compute
B.Storage
C.Traffic
D.Authentication
A.Compute
B.Storage
To control costs, an administrator needs to set storage quotas for file shares on a Windows cloud-based server. What options exist to set quotas? (Select all that apply.)
A.By instance
B.By user
C.By group
D.By partition
B.By user
C.By group
D.By partition
Top level engineers compile a document to address disaster recovery management techniques. Of interest to stakeholders is the recovery time objective (RTO). How do engineers describe this metric?
A.The time needed to maintain an organization’s business continuity
B.The time between a disaster and the most recent backup
C.The time necessary to return a service to its fully operational status
D.The time between server or system failures
A.The time needed to maintain an organization’s business continuity
A cloud-based application needs to support file sharing for both Windows and non-Windows clients. Which two protocols should the administrator implement? (Select all that apply.)
A.VPC
B.NFS
C.CIFS
D.EFS
B.NFS
C.CIFS
During a cloud storage service rollout, engineers opt to use a storage system that utilizes the common internet file system (CIFS). Which storage type do engineers deploy?
A.Block
B.File
C.Object
D.Bucket
B.File
Cloud engineers microsegment a network to secure sections from each other based on workload. When considering the granularity of the segments, which aspect is critical?
A.Reduced attack surface
B.Independent governance
C.Increased compliance
D.Scaling ability
B.Independent governance
Top level engineers create a set of policies to address disaster recovery management techniques. There is a great deal of emphasis on the mean time to recovery (MTTR). How do engineers describe this metric?
A.The time needed to maintain an organization’s business continuity
B.The time between a disaster and the most recent backup
C.The time necessary to return a service to its fully operational status
D.The time between server or system failures
C.The time necessary to return a service to its fully operational status
A cloud service at an organization should only allow for logins based on a user’s specific and authorized location. Which technologies do security engineers suggest using to comply with this requirement? (Select all that apply.)
A.VLAN
B.IP
C.GPS
D.SSH
A.VLAN
B.IP
C.GPS
Engineers decide to use IPsec encapsulation to encrypt a portion of network communications between two cloud servers. As network bandwidth is a concern, how do engineers configure the encryption? (Select all that apply.)
A.The engineers use tunnel mode
B.The engineers use transport mode
C.The engineers use data encryption rules
D.The engineers implement key exchange
B.The engineers use transport mode
C.The engineers use data encryption rules
You are a cloud systems administrator for a Deep Learning and Artificial Intelligence (AI) applications research laboratory. The organization outsources cloud services from a third-party cloud service provider (CSP), in this case, Amazon Web Services (AWS) Amazon Elastic Compute Cloud (EC2). It is your responsibility to manage virtual machine (VM) instances for the laboratory.
You are a cloud systems administrator for a Deep Learning and Artificial Intelligence (AI) applications research laboratory. The organization outsources cloud services from a third-party cloud service provider (CSP), in this case, Amazon Web Services (AWS) Amazon Elastic Compute Cloud (EC2). It is your responsibility to manage virtual machine (VM) instances for the laboratory.
The types of analysis tasks and their instance requirements are as follows:
of vCPUs
task 1: 2, 8, 16, 32, 64, 96
task 2: 2, 8, 16, 32, 64, 96
task 3: 2, 8, 16, 32, 64, 96
Memort size (GiB)
task 1: 16, 32, 64, 128, 384
task 2: 16, 32, 64, 128, 384
task 3: 16, 32, 64, 128, 384
Instance storage
task 1: EBS-only, 8 x 1 TB NVMe SSD
task 2: EBS-only, 8 x 1 TB NVMe SSD
task 3: EBS-only, 8 x 1 TB NVMe SSD
network bandwith (Gbps)
task 1: 10, 100
task 2: 10, 100
task 3: 10, 100
instance type
task 1: Accelerated computing, compute optimized, memory optimized
task 2: Accelerated computing, compute optimized, memory optimized
task 3: Accelerated computing, compute optimized, memory optimized
Define numbers of NVIDIA GPUs
task 1: 0, 2, 4, 8
task 2: 0, 2, 4, 8
task 3: 0, 2, 4, 8
use GPU auto boost
task 1: yes, no
task 2: yes, no
task 3: yes, no
regarding cost task 1, task 2, task 3
based on this exercose: CPU, GPU, Memory
of vCPUs
task 1: 16, 64, 96
task 2: 32, 64, 96
task 3: 16, 64, 96
Memort size (GiB)
task 1: 64, 128
task 2: 64
task 3: 16, 384
Instance storage
task 1: EBS-only,
task 2: EBS-only,
task 3: 8 x 1 TB NVMe SSD
network bandwith (Gbps)
task 1: 10
task 2: 10
task 3: 100
instance type
task 1: memory optimized
task 2: compute optimized
task 3: Accelerated computing
Define numbers of NVIDIA GPUs
task 1: 0
task 2: 2
task 3: 8
use GPU auto boost
task 1: no
task 2: yes
task 3: yes
regarding cost task 1,
based on this exercose: GPU
An administrator new to automation and orchestration looks for help on the subject. If a colleague recommends using playbooks, which tool does the administrator use?
A.Chef
B.Puppet
C.Ansible
D.Powershell
C.Ansible
Support technicians establish a plan of action to resolve a cloud server issue. What should the technicians consider in this plan? (Select all that apply.)
A.Service interruptions
B.Likely cause
C.Problem scope
D.Data loss
A.Service interruptions
D.Data loss
A systems administrator implements a 3-2-1 backup rule. What does this storage scheme provide?
A.Three weeks retention, two sets of data, one copy offsite
B.Three media types, two backup jobs, one week retention
C.Three copies of data, two different media types, one copy offsite
D.Three verification passes, two offsite copies, one backup job
C.Three copies of data, two different media types, one copy offsite
Key stakeholders gather for a post-incident meeting after experiencing a service disruption in a crucial cloud application. Communication between the support team and management did not go well during the incident. Which topics do the stakeholders focus on during this meeting? (Select all that apply.)
A.Lessons Learned
B.Root Cause Analysis
C.Standard Operating Procedures
D.Device Documentation
A.Lessons Learned
C.Standard Operating Procedures
In following best practice, what does an engineer document throughout a service’s lifecycle as it relates to troubleshooting? (Select all that apply.)
A.Process
B.Findings
C.Actions
D.Outcomes
B.Findings
C.Actions
D.Outcomes
An organization deploys an application in a cloud-based infrastructure. The application has a one-time fee that is good for the life of the current version. Which license model does the organization purchase?
A.Volume
B.Perpetual
C.Socket
D.Subscription
B.Perpetual
One organization acquires another organization. In combining cloud infrastructures from each, a directive to rename servers to a standard format is issued. After doing so, many servers are no longer reachable by host name. What configuration should support engineers check?
A.Subnet masks
B.Static IP addresses
C.Static resource records
D.Firewall ACLs
C.Static resource records
An organization mandates that a multifactor authentication solution is in place to access a cloud-based database. Which solution uses what you know and what you have authentication methods?
A.Password, Retina scan
B.Retina scan, Smart card
C.Fingerprint reader, Hardware token
D.Password, Hardware token
D.Password, Hardware token
of virtual host: ___ (incert) (incert) (incert)
An IT services company in California (in the Western United States) has hired you as a cloud architect to determine their company’s needs prior to transitioning over to a cloud platform. The end goal is to modernize the company’s IT infrastructure and better manage IT costs.
The company uses a VMware infrastructure on-premises to host Active Directory Domain Services (AD DS), web services, file services, print services, and backup services. Your IT manager is hesitant to transition all operational services over at one time and would prefer a slower transition by extending web and file services to the cloud. However, the manager is interested in moving print services completely to the cloud. Backup services will remain as is. Taking this approach will allow time for the company’s VMware administrators to learn cloud administration using a familiar interface while still taking advantage of other cloud solutions that would auto-scale the company’s web services based on customer demand. The company would also like to find a way to integrate a cloud identity service with the company’s existing AD infrastructure. Looking at the Google Cloud Platform (GCP) as one possible solution, you must select the cloud products and services that will fulfill the company’s needs so you can discuss prices with a sales representative.
Current On-premises Infrastructures:
VMware vSphere with 15 rack servers
1000 TB capacity of storage appliances
Office PCs – Users must have their own desktop
Current On-premise Services with Redundancies:
AD DS
Print
File
Web
Backup
Google Cloud Services General Information:
Google Cloud VMware Engine (GCVE) deploys at least three virtual hosts with vSphere services and includes a VMware HCX migration tool.
Google Cloud Storage uses basic cloud storage to store user data and other data.
Google Compute Engine deploys virtual instances with available autoscaling policies.
Google Bare Metal uses isolated hardware to run specialized workloads.
Google Cloud Identity provides federating services with existing identity management system.
appropriate cloud environment to deploy: hybrid cloud, on-premises cloud, private cloud
GCP solution: google cloud VMware Engine (GCVE), google cloud storage, google compute engine, google bare metal
service region: asia-notheast, europe-west2, europe-west3, us-east4, us-west2
ad services VMware VM, bare, metal environment, google cloud identity, google compute instance, N/A; keep on-premises
backup services: VMware VM, bare, metal environment, google cloud identity, google compute instance, N/A; keep on-premises
file services: VMware VM, bare, metal environment, google cloud identity, google compute instance, N/A; keep on-premises
Web services: VMware VM, bare, metal environment, google cloud identity, google compute instance, N/A; keep on-premises
cloud solution for backup: infrastructure as a service (IaaS), N/A; keep on-premises, Platform as a service (PaaS), software as a service (SaaS), storage as a service (STaaS), Virtual desktop indrastricture (VDI)
of virtual host: ___ (incert) (incert) (incert)
for the (incert) you have backup x2 web x2 file x2 print x2
appropriate cloud environment to deploy:
hybrid cloud,
GCP solution:
google cloud VMware Engine (GCVE)
service region:
us-west2
ad services:
VMware VM, bare, metal environment, google cloud identity,
backup services:
N/A; keep on-premises
file services:
VMware VM
Web services:
google compute instance
cloud solution for backup:
N/A; keep on-premises
on premasess of virtual host: 15 Web File backup
google cloud of virtual host: 3 File web Print
A developer creates a cloud application with an infrastructure as code (IaC) approach. Engineers opt to use an automation tool to match the desired state to the device that will host the application. Which specific IaC method do the engineers utilize?
A.Declarative
B.Imperative
C.Manual
D.Scaled
A.Declarative
While practicing a patch management strategy, a systems administrator decides to follow a N -1 approach. What does the administrator document as a negative to this approach?
A.Vulnerability
B.Rollback
C.Testing
D.Automation
A.Vulnerability
A significant update for a cloud-based application is available. IT support decides to install the update on a small percentage of systems to monitor behavior before deploying the update to the entire environment. Consider the different upgrade methods and determine which one IT support implements.
A.Blue-green
B.Canary
C.Rolling
D.Automated
B.Canary
An engineer manages a new cloud deployment. Network routers in the virtual private cloud (VPC) are configured differently depending on the router’s role in the network. Which configuration type has manual route entries?
A.Static
B.Dynamic
C.Subnetted
D.Forwarded
A.Static