Deck 1 Flashcards

1
Q

What process controls the access to resources on a cloud platform?

Provisioning
Identity management
Subscription
Containerization

A

Identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A feature used in most virtualization platforms which allows a host system to artificially enlarge its pool of memory by reclaiming unused memory previously allocated to various virtual machines.

Resource Allocation
Memory Ballooning
Memory Swapping

A

Memory Ballooning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A service model that allows information technology customers to obtain computing resources over the internet

A model for enabling ubiquitous convenient on demand network access to a shared pool of configurable computing resources (applications, servers, storage, networks and services) that can rapidly be provisioned and released with minimal management effort or service provider intervention.

Hypervisor
Resource allocation
Cloud Computing

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Storage management or storage provisioning approach where storage space is completely allocated permanently

Thick
Thin
Compression

A

Thick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Storage management or storage provisioning approach where is it more like quotas, acquire the space as you need it dynamically

Thick
Thin
Compression

A

Thin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud service model where User Manages: Application, data, runtime, middleware, operating system, virtualization, networking and storage

On Prem
IaaS
PaaS
SaaS

A

On Prem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud service model where
User Manages: Application, data, runtime, middleware, operating system
Provider manages virtualization, networking and storage

On Prem
IaaS
PaaS
SaaS

A

IaaS ( Infrastructure as a service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud service model where
User Manages: Application and data
Provider manages runtime, middleware, operating system, virtualization, networking and storage

On Prem
IaaS
PaaS
SaaS

A

PaaS (Platform as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud service model where

Provider manages: Application, data, runtime, middleware, operating system, virtualization, networking and storage

On Prem
IaaS
PaaS
SaaS

A

SaaS (Software as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The consumer is being provided with the direct
use of the software. Responsibility for the hardware where that software runs,
the operating system upon which it runs, and the installation and patching of the
software itself are all offloaded to the CSP.

SaaS
IaaS
PaaS

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The service structure is provided by the CSP. It is
up to the consumer to populate that structure, manage it on a day-to-day basis,
and assume responsibility for the content. Support for the hardware, as well as
the service platform that hosts the content, is offloaded to the CSP.

SaaS
IaaS
PaaS

A

PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The hardware infrastructure is provided
to the consumer. The consumer assumes responsibility for all layers above
that hardware. The CSP manages hardware failures, firmware updates, device
drivers, and hardware compatibility. The consumer installs and manages the
operating system on top of the hardware as well as any services and applications
that run above that operating system

SaaS
IaaS
PaaS

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A server administrator is architecting a cloud based solution for a company with various development projects and application dependencies. Which of the following solutions would be most applicable?

Containers
Templates
Virtual machines
Provisioning

A

Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A server administrator is architecting a cloud based solution for a company with various development projects and application dependencies. Which of the following solutions would be most applicable?

Containers
Templates
Virtual machines
Provisioning

A

Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When configuring a network storage system for a company-wide function, which document should serve as a primary reference to effectively manage the project while also remaining compliant with company policy?

Service manual
Workflow diagram
Operating procedures
Change management

A

Operating procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Concerning cloud security in the IaaS model, which of the following are the responsibility of the customer?

Operating system
Identity management
Storage
Networking

A

Operating system

Identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company has an in-house-developed application. The administrator wants to utilize cloud services
for additional peak usage workloads. The application has a very unique stack of dependencies.
Which of the following cloud service subscription types would BEST meet these requirements?

PaaS
SaaS
DBaaS
IaaS

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A network virtualization method that uses encapsulation and tunneling to provide subnets with large numbers of Virtual LANS.

NVGRE
GENEVE
XVLAN

A

NVGRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

4 phases of cloud migration

rehost replatform implementation assessment

Retire Hybrid implementation optimization

Assessment, Planning, Implementation, Optimization

A

Assessment, Planning, Implementation, Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Seven types of cloud migration

Rehost, Replatform, Refactor, Repurchase, Retire, Retain, Hybrid

Rehost, implementation, Retain, optimization, assessment, Hybrid

Optimization, assessment, Hybrid, Retire, Rehost

A

Rehost, Replatform, Refactor, Repurchase, Retire, Retain, Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does VPC stand for?

Vending Private Cloud
Virtual Private Cloud
Virtual Primary Cloud

A

Virtual Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of cloud migration is: No modification application is cloud ready?

Replatform
Hybrid
Refactor
Rehost

A

Rehost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The following are cloud services:

PaaS & SaaS
PaaS & IaaS
On Prem and IaaS

A

PaaS & SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which Migration Phase are you in if you’re attempting to manage the cost effectiveness of an existing cloud deployment?

Optimization
Drop and shop
Refactor

A

Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What type of cloud migration: Application requires some modification?

Rehost
Replatform
Repurchase
Retire

A

Replatform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What type of cloud migration? Application is retired and replaced by modern cloud ready application?

Refactor
Retain
Retire
Repurchase

A

Repurchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What type of cloud migration: Application is retired and not replaced?

Retire
Retain
Refactor

A

Retire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of cloud migration: Application will be kept on premises in traditional deployment.

Rehost
Retain
Replatform

A

Retain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What type of cloud migration: Mix of any other six types

Replatform
Refactor
Hybrid

A

Hybrid

30
Q

What type of cloud migration: Application will be entirely rearchitected to be cloud ready

Retain
Hybrid
Refactor

A

Refactor

31
Q

What type of IP address do you get when a DHCP server doesn’t answer and what is it called?

127 Traceroute
169 APIPA
53 DNS

A

169 APIPA

32
Q

What type of load balancer does not consider size of task assigned or current workload on the target source?

Round Robin
Static Algorithm
Dynamic Algorithm

A

Round Robin

33
Q

Load balancer where the work load is even distributed among servers

Round Robin
Static Algorithm
Dynamic Algorithm

A

Static Algorithm

34
Q

Load Balancer where the least busy server is given the next work cycle

Round Robin
Static algorithm
Dynamic algorithm

A

Dynamic Algorithm

35
Q

What are the five characteristics of the cloud?

On demand self service, broad network access, resource pooling, rapid elasticity, measured service

On demand self service, memory ballooning, network access, resources, scalability, support services

Monitoring, provisioning, services, resources, metering, controlled instances

A

On demand self service, broad network access, resource pooling, rapid elasticity, measured service

36
Q

The consumer is being provided with the direct use of the software. Responsibility for the hardware where that software runs, the operating system upon which it runs and the installation and patching of the software itself are all offloaded to the CSP is an example of what cloud service model?

SaaS
PaaS
IaaS

A

SaaS

37
Q

The service structure is provided by the CSP. It is up to the consumer to populate that structure, manage it on a day to day basis and assume responsibility for the content. Support for the hardware, as well as the service platform that hosts the content, is offloaded to the CSP is an example of what cloud service model

SaaS
IaaS
PaaS

A

PaaS

38
Q

The hardware infrastructure is provided to the consumer. The consumer assumes responsibility for all layers above that hardware. The CSP manages the hardware failures, firmware updates, device drivers, and the hardware compatibility. The consumer installs and manages the operating system on top of the hardware as well as any services and applications that run above that operating system is an example of what cloud service model

SaaS
PaaS
IaaS

A

IaaS

39
Q

An IaaS application has a two-hour RTO and a four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy.

Back up to long-term storage every night
Back up to object storage every three hours
Back up to long-term storage every four hours
Back up to object storage every hour

A

Back up to object storage every hour

40
Q

A systems administrator needs to convert ten physical servers to virtual.

Which of the following would be the MOST efficient conversion method for the administrator to use?

Rebuild the servers from scratch
Use the vendor’s conversion tool
Clone the hard drive
Restore from backup

A

Clone the hard drive

41
Q

The AWS formula is for this calculation is

A

vCPU=number of cores x number of threads

42
Q

What is the severity level of sys log level value 0?

Critical
Error
Warning

A

Critical

43
Q

Involves transferring or porting a virtual machine (VM) onto a physical machine

V2P
P2V
V2V

A

V2P

44
Q

Refers to the migration of an operating system, application program and data from a virtual machine or disk partition to another virtual machine or disk partition

V2V
V2P
P2P

A

V2V

45
Q

Called hardware virtualization, refers to the migration of physical machines to virtual machines. Approach to transfer their physical environment into a digital one.

P2V
V2V
V2P

A

P2V

46
Q

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?

Deploy web servers into an laaS provider.
Implement a cloud-based VDI solution.
Provision web servers in a container environment.
Use PaaS components in the cloud to implement the product.

A

Provision web servers in a container environment.

47
Q

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

Internet of Things
Digital transformation
Artificial intelligence
DNS over TLS

A

Artificial intelligence

48
Q

A company needs to access the cloud administration console using its corporate identity. Which of
the following actions would MOST likely meet the requirements?

Implement SSH key-based authentication.
Implement cloud authentication with local LDAP.
Implement multifactor authentication
Implement client-based certificate authentication.

A

Implement client-based certificate authentication.

49
Q

A company is currently running a website on site. However, because of a business requirement to
reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the
company is considering operating in a hybrid environment. The website uses mostly static files and a
small relational database. Which of the following should the cloud architect implement to achieve
the objective at the LOWEST cost possible?

-Implement a load-balanced environment in the cloud that is equivalent to the current on-premises
setup and use DNS to shift the load from on premises to cloud.
-Implement backups to cloud storage and infrastructure as code to provision the environment
automatically when the on-premises site is down. Restore the data from the backups.
-Implement a website replica in the cloud with auto-scaling using the smallest possible footprint.
Use DNS to shift the load from on premises to the cloud.
-Implement a CDN that caches all requests with a higher TTL and deploy the laaS instances
manually in case of disaster. Upload the backup on demand to the cloud to restore on the new
instances.

A

Implement backups to cloud storage and infrastructure as code to provision the environment
automatically when the on-premises site is down. Restore the data from the backups.

50
Q

Users of an enterprise application, which is configured to use SSO, are experiencing slow connection
times. Which of the following should be done to troubleshoot the issue?

A. • Perform a memory dump of the OS.
• Analyze the memory dump.
• Upgrade the host CPU to a higher clock speed CPU.
B. • Perform a packet capture during authentication.
• Validate the load-balancing configuration.
Questions & Answers PDF P-59
https://www.pass4success.com
• Analyze the network throughput of the load balancer.
C. • Analyze the storage system IOPS.
• Increase the storage system capacity.
• Replace the storage system disks to SSD.
D. • Evaluate the OS ACLs.
• Upgrade the router firmware.
• Increase the memory of the router

A

C• Analyze the storage system IOPS.
• Increase the storage system capacity.
• Replace the storage system disks to SSD.

51
Q

Which of the following will provide a systems administrator with the MOST information about
potential attacks on a cloud IaaS instance?

Network flows
FIM
Software firewall
HIDS

A

Network flows

52
Q

A cloud administrator would like to deploy a cloud solution to its provider using automation

 Auto-scaling
Tagging
Playbook
Templates
Containers
Serverless
A

Tagging

Templates

53
Q

helps in operating cloud services by having a common identifier for a solution or parts of a solution. So being able to find all the VMs and Databases configured for a service would be an example.

Tagging
Playbook
Auto-Scaling

A

Tagging

54
Q

A company is planning to migrate applications to a public cloud, and the Chief Information Officer
(CIO) would like to know the cost per business unit for the applications in the cloud. Before the
migration, which of the following should the administrator implement FIRST to assist with reporting
the cost for each business unit?

An SLA report
Tagging
Quotas
Showback

A

Quotas

55
Q

______ uses scripting tools to create individual server builds that can become standards for cloud applications.

Templates
Containers
Snapshots

A

Templates

56
Q

To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public
DBaaS solution. Which of the following would be the BEST technique?

Live migration
Physical-to-virtual
Storage-level mirroring
Database replication

A

Physical-to-virtual

57
Q

Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of
memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following
should be enabled to optimize the memory utilization?

Auto-scaling of compute
Oversubscription
Dynamic memory allocations on guests
Affinity rules in the hypervisor

A

Dynamic memory allocations on guests

58
Q

A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an
earlier version of the OS than they should be. The administrator reviews the automation scripts to
troubleshoot the issue and determines the scripts ran successfully. Which of the following is the
MOST likely cause of the issue?

API version incompatibility
Misconfigured script account
Wrong template selection
Incorrect provisioning script indentation

A

Wrong template selection

59
Q

A systems administrator is analyzing a report of slow performance in a cloud application. This
application is working behind a network load balancer with two VMs, and each VM has its own
digital certificate configured. Currently, each VM is consuming 85% CPU on average. Due to cost
restrictions, the administrator cannot scale vertically or horizontally in the environment. Which of
the following actions should the administrator take to decrease the CPU utilization? (Choose two.)

A. Configure the communication between the load balancer and the VMs to use a VPN.
B. Move the digital certificate to the load balancer.
C. Configure the communication between the load balancer and the VMs to use HTTP.
D. Reissue digital certificates on the VMs.
E. Configure the communication between the load balancer and the VMs to use HTTPS.
F. Keep the digital certificates on the VMs.

A

B. Move the digital certificate to the load balancer.

E. Configure the communication between the load balancer and the VMs to use HTTPS.

60
Q

A company recently experienced a power outage that lasted 30 minutes. During this time, a whole
rack of servers was inaccessible, even though the servers did not lose power.
Which of the following should be investigated FIRST?

A. Server power
B. Rack power
C. Switch power
D. SAN power

A

C. Switch power

61
Q

A company has developed a cloud-ready application. Before deployment, an administrator needs to
select a deployment technology that provides a high level of portability and is lightweight in terms of
footprint and resource requirements.
Which of the following solutions will be BEST to help the administrator achieve the requirements?

A. Containers
B. Infrastructure as code
C. Desktop virtualization
D. Virtual machines

A

A. Containers

62
Q

A systems administrator is configuring a storage array.
Which of the following should the administrator configure to set up mirroring on this array?

A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6

A

B. RAID 1

63
Q

After analyzing a web server’s logs, a systems administrator sees that users are connecting to the
company’s application through HTTP instead of HTTPS. The administrator then configures a redirect
from HTTP to HTTPS on the web server, and the application responds with a connection time-out
message.
Which of the following should the administrator verify NEXT?

A. The TLS certificate
B. The firewall rules
C. The concurrent connection limit
D. The folder permissions

A

A. The TLS certificate

64
Q

An administrator is performing an in-place upgrade on a quest VM operating system. Which of the following can be performed as a quick method to roll back to an earlier state, if
necessary?

A. A configuration file backup
B. A full backup of the database
C. A differential backup
D. A VM-level snapshot

A

D. A VM-level snapshot

65
Q

A systems administrator would like to reduce the network delay between two servers.
Which of the following will reduce the network delay without taxing other system resources?

A. Decrease the MTU size on both servers
B. Adjust the CPU resources on both servers
C. Enable compression between the servers
D. Configure a VPN tunnel between the servers

A

A. Decrease the MTU size on both servers

66
Q

A company that utilizes an IaaS service provider has contracted with a vendor to perform a
penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain
access to other instances within the cloud provider’s environment that do not belong to the
company.
Which of the following BEST describes this attack?

A. VM escape
B. Directory traversal
C. Buffer overflow
D. Heap spraying

A

A. VM escape

67
Q

A company wants to check its infrastructure and application for security issues regularly. Which of
the following should the company implement?

A. Performance testing
B. Penetration testing
C. Vulnerability testing
D. Regression testing

A

C. Vulnerability testing

68
Q

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud.
The company has already migrated other systems and configured VPN connections.
Which of the following MOST likely needs to be analyzed before rehosting the ERP?

A. Software
B. Licensing
C. Right-sizing
D. The network

A

B. Licensing

69
Q

A systems administrator wants to have near-real-time information on the volume of data being
exchanged between an application server and its clients on the Internet.
Which of the following should the systems administrator implement to achieve this objective?

A. A stateful firewall
B. DLP
C. DNSSEC
D. Network flows

A

D. Network flows

70
Q

A systems administrator needs to configure a set of policies to protect the data to comply with
mandatory regulations.
Which of the following should the administrator implement to ensure DLP efficiently prevents the
exposure of sensitive data in a cloud environment?

A. Integrity
B. Versioning
C. Classification
D. Segmentation

A

A. Integrity

71
Q

An organization purchased new servers with GPUs for render farms. The servers have limited CPU
resources.
Which of the following GPU configurations will be the MOST optimal for virtualizing this
environment?

A. Dedicated
B. Shared
C. Passthrough
D. vGPU

A

D. vGPU