Lesson 1: Understanding Cloud Concepts Flashcards

1
Q

A systems administrator responded to an important web service crashing. They analyzed logs to determine the issue, restarted the service, and were able to verify system functionality. What is the next step the administrator should take?

A.Implement preventative measures
B.Perform a root cause analysis
C.Establish a plan of action
D.Determine scope of the problem

A

A.Implement preventative measures

Implementing preventative measures comes after verifying full system functionality. It may be possible to preemptively reconfigure other services or network devices to avoid a repeat of the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network administrator is configuring a series of virtual servers. The administrator provisions resources so that additional memory is available daily during a four-hour period. Which solution would best accommodate this provision?

A.Auto-scaling
B.Horizontal scaling
C.Cloud bursting
D.VM templates

A

A.Auto-scaling

Auto-scaling adjusts the compute capabilities of instances dynamically to match the current workload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A server technician has been diligently troubleshooting a critical service that crashed. They isolated the issue and implemented a possible resolution. What next step should the technician perform?

A.Implement preventative measures
B.Perform a root cause analysis
C.Establish a plan of action
D.Verify full system functionality

A

D.Verify full system functionality

Once the potential solution has been implemented, the next phase is to test for functionality. Your goal is to ensure that the service or web application has returned to the established service levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What process controls the access to resources on a cloud platform?

A.Provisioning
B.Identity management
C.Subscription
D.Containerization

A

B.Identity management

Identity management is the process by which identities are established, and access to resources is controlled. Users are assigned an account and are assigned rights and restrictions enforced by access control systems such as permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When following troubleshooting methodology, which step takes place after establishing an action plan but before verifying that function has returned to the system?

A.Implement preventative measures
B.Test the theory
C.Perform a root cause analysis
D.Implement the solution or escalate

A

D.Implement the solution or escalate

Solution implementation describes following the plan of action. An administrator should make changes and test them, one at a time, to assist with narrowing down the solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A real estate accounting company would like to migrate its operation to the cloud but has expressed reservations regarding security. A member of the executive suite suggests a collective organization formed in conjunction with several similar companies that have collectively deployed a cloud-based environment. Each member company maintains cloud access. Which of the following is the executive describing?

A.Private
B.Community
C.Hybrid
D.Public

A

B.Community

Community clouds are owned and maintained by several organizations, with the cumulative resources available to each participating organization. This model leverages the cost savings of having several organizations support the datacenter and provides increased security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A finance company would like to implement a customer relationship management solution that provides flexible resource utilization while maintaining the best possible security for client PII. Which of the following options would protect that segment of data while remaining cost-conscious?

A.Hybrid
B.On-premise
C.Private
D.Public

A

A.Hybrid

Hybrid clouds pull varying elements of different cloud models. Organizations may store private or more sensitive data in a private cloud but deploy a public cloud for customer services, as would be the case here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An IT technician is revisiting an issue that was previously marked as resolved a week prior by a different technician. The cause and resolution of the issue were documented. Considering the issue has recurred, what could the previous technician have done additionally to ensure a more enduring resolution?

A.Take detailed notes while troubleshooting.
B.Verify full system functionality and user satisfaction.
C.Implement preventive measures to mitigate future recurrences.
D.Perform a comprehensive root cause analysis.

A

C.Implement preventive measures to mitigate future recurrences.

Implement preventive measures by, for example, preemptively reconfiguring other services or network devices to avoid a repeat of the problem. Adding new technologies may help to prevent recurrences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A single user is having trouble downloading files from the CSP’s server. The download fails with a message stating the files were blocked. Frustrated, the user claims that resolving this matter falls on the CSP. Which of the following best represents who should initiate for this incident to be resolved?

A.The CSP
B.The user
C.The ISP
D.The server

A

B.The user

The issue likely represents a problem with the local firewall, preventing the user from gaining access to the download. The user should look to internal assistance within the organization to resolve the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A tier 1 support technician has been holding a support ticket for a system problem for an hour and has only identified the problem. Company policy requires tier 1 support tickets to escalate after an hour if the technician cannot resolve the problem. After escalating the ticket, what would the tier 2 technician do next?

A.Perform a root cause analysis.
B.Verify the system is functional.
C.Establish another theory of probable cause.
D.Determine the scope of the problem.

A

D.Determine the scope of the problem.

Determine the scope of the problem after identifying it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A server technician receives multiple complaints from users with varying permissions that a critical resource is inaccessible. What troubleshooting step should the technician perform next?

A.Document the findings
B.Restart the cloud services
C.Check an account with similar permissions
D.Establish theory of probable cause

A

D.Establish theory of probable cause

The technician has determined that the scope is widespread, so the next step is to establish a probable cause theory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An IT support manager for a small company needs to provide some basic functions for their company but is running minimal staff with limited skills. Which of the following solutions would be applicable solutions? (Select all that apply.)

A.SaaS
B.PaaS
C.MSPs
D.IaaS

A

A.SaaS
C.MSPs

With Software as a Service (SaaS), responsibility for the hardware where that software runs.

Managed service providers (MSPs) are independent of the CSP. Your organization may choose to outsource cloud design, migration, deployment, and management solutions to these companies, relying on their expertise and experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A cloud administrator is troubleshooting a virtual server that has lost its connection to the network. The administrator presumes it to be a hardware failure from the virtual NIC, as the device manager is showing an error, and all reset efforts have failed. What is the next step according to the CompTIA troubleshooting methodology?

A.Test the theory
B.Establish a plan
C.Identify the problem
D.Establish a theory of probable cause

A

B.Establish a plan

The plan of action defines the steps to take, and the administrator should determine these steps ahead of time, as opposed to formulating them during the solution implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An administrator is configuring virtual servers for a help desk department. All servers will operate using virtualization and require the exact same level of compute power, memory, and applications. What would be the most efficient and consistent means of deploying the needed configurations?

A.VM templates
B.SDN
C.FaaS
D.Patches

A

A.VM templates

An administrator may deploy virtual machines using templates. VM Templates reduce the confusion, misconfiguration, and cost associated with manually created VMs by providing standardized VM configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company is migrating to a web-based file sharing application to help transition its in-office departments to a primarily remote setup. What type of solution is the company installing?

A.SaaS
B.PaaS
C.IaaS
D.STaaS

A

A.SaaS

Software as a Service (SaaS) has access to the software, but the vendor maintains the installation, maintenance, patching, and upgrade responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrator is testing the deployment of a recent software update. The administrator would like to test the update from a single workstation with a premade configuration. What is the administrator most likely utilizing for this test?

A.SDN
B.Hyperconvergence
C.Patch
D.Container

A

D.Container

Containers are very lightweight virtualization tools that share a single OS and provide a single function.

17
Q

A user has lost account access to the cloud. The CSP dispatched a technician to address the issue. The technician diagnoses that the user’s account information expired and the technician needed to reset it. Following the reset, what should the technician do next?

A.Have the user test the login
B.Determine why the incident occurred
C.Decide how to best proceed forward
D.Document findings

A

A.Have the user test the login

The user testing the new login credentials is performing a verification of the system’s functionality.

18
Q

A server administrator is architecting a cloud-based solution for a company with various development projects and application dependencies. The administrator needs to ensure that applications can be deployed quickly and reliably, with minimal dependencies on the underlying system. Which of the following solutions would be most applicable?

A.Containers
B.Templates
C.Virtual machines
D.Provisioning

A

A.Containers

Containers virtualize at the OS layer rather than the hardware layer. A container holds a single application and everything it needs to run.

19
Q

A cloud administrator just joined a new organization and is attempting to implement a common service. Which of the following would best help them implement the service?

A.SLAs
B.Cloud policies
C.SOPs
D.Playbooks

A

C.SOPs

Standard operating procedures (SOPs) govern how particular tasks are to be accomplished, and such procedures should be followed during troubleshooting.

20
Q

An organization has tasked a systems administrator with configuring a series of workstations that a technical team will operate. The administrator has concerns with availability failures due to lacking resources during high traffic windows. What can the administrator do to help preemptively address this?

A.Hyperconverged networking
B.Utilize a Type 1 hypervisor
C.Over-provision resources from idle servers
D.Configure virtual switches

A

C.Over-provision resources from idle servers

The administrator could over-provision the projected needed resources to help offset any dropoffs. Provisioning refers to the allocation of cloud resources in the overall enterprise infrastructure. The administrator should however consider the current functions of idle servers, as some may be deliberately maintained in a backup state.

21
Q

A marketing agency wants to deploy a cloud platform model that allows tenants to share computing resources owned and managed by the CSP. What cloud deployment model is associated with multitenancy?

A.Public
B.Virtual private cloud
C.Hybrid cloud
D.Community cloud

A

A.Public

Multitenancy is the concept behind public cloud deployments. Multiple consumers, known as tenants, share computing resources owned and managed by the CSP.

22
Q

When configuring a network storage system for a company-wide function, which document should serve as a primary reference to effectively manage the project while also remaining compliant with company policy?

A.Service manual
B.Workflow diagram
C.Operating procedures
D.Change management

A

C.Operating procedures

Standard Operating Procedures (SOPs) document detailed instructions for task completion

23
Q

If a CSP were to experience a significant service outage that resulted in organizational revenue losses, which document would assist the organization in determining the eligibility for a reduction in service fees?

A.SOP
B.SLA
C.MTTR
D.EOL

A

B.SLA

A Service Level Agreement (SLA) defines service requirements and expectations between a CSP and its customers

24
Q

A user submitted a support ticket stating that their team is unable to access shared folders. When troubleshooting the issue, which of the following would be examples of identifying the problem rather than its scope? (Select all that apply.)

A.The virtual host lost connection to network storage.
B.Cloud web servers also cannot load data.
C.All users are unable to access file shares.
D.The virtual machine is powered off.

A

A.The virtual host lost connection to network storage.

D.The virtual machine is powered off.

Understanding that users cannot access shared folders because a virtual host lost connectivity to a network storage is an example of identifying the problem. If the storage hosted files, but is unavailable, then users will not be able to access the share folders.

Understanding that users cannot access shared folders because a virtual machine (VM) is powered off, is an example of identifying the problem. No VM to run file services, no access to shared folders.

25
Q

A cloud technician receives a complaint that one employee cannot access certain cloud resources. The scope of the problem is limited to this particular user. Which of the following troubleshooting steps should the technician try next?

A.Record the issue and steps to remediate in a support wiki page
B.Restart the cloud services
C.Investigate and determine how the user’s access has changed
D.Have the user verify full functionality

A

C.Investigate and determine how the user’s access has changed

Establishing a theory of probable cause is a good first step. It comes after determining the scope of the problem and allows support staff to understand how the user lost access to resources.

26
Q

Concerning cloud security in the IaaS model, which of the following are the responsibility of the customer? (Select all that apply.)

A.Operating system
B.Identity management
C.Storage hardware
D.Network cabling

A

A.Operating system
B.Identity management

Operating system management responsibilities lie with the organization, as operating systems manage computer hardware, resources, and services for computer programs.

Identity management is the process on an organizational level designed to ensure individuals have the appropriate access to technology resources and assets.

27
Q

96.3% complete
Question
A software development company seeks recommendations for streamlining asset management and minimizing the operational burden of a large server infrastructure. The organization requires a solution that supports extensive data storage capabilities without expanding its physical server inventory. Which solution would be most appropriate for the company to adopt?

A.Acquire new servers
B.Upgrade SaaS package
C.Employ a FaaS solution
D.Utilize ML to manage the storage

A

C.Employ a FaaS solution

Function as a Service (FaaS) allows the company to offload the responsibility for server management to a cloud service provider

28
Q

A software development company seeks recommendations for streamlining its internal learning management system. The organization requires a solution that eliminates the management overhead of local and cloud server infrastructure, while only paying for compute resources directly associated with the LMS. Which solution would be most appropriate for the company to adopt?

A.Contract with an LMS vendor
B.Upgrade IaaS package
C.Employ a FaaS solution
D.Utilize ML to manage the content storage

A

C.Employ a FaaS solution

Function as a Service (FaaS) allows the company to offload the responsibility for compute resources to a cloud service provider. FaaS is an event-driven execution model where the cloud provider is responsible for the servers, and the company only pays for the compute time used during function execution. This aligns with the goal of reducing the number of physical servers while still enabling mass data storage.

29
Q

A cloud administrator is troubleshooting a virtual server that has lost its connection to the network. Having updated the drivers and checked for software conflicts without resolving the error, the administrator proceeds to conduct a direct diagnostic test on the virtual NIC by using network diagnostic tools and monitoring the virtual infrastructure’s performance metrics. The diagnostics conclusively show a failure in the physical network adapter that supports the virtual NIC, as indicated by consistent packet loss and physical port errors that are not present when testing other virtual servers connected to the same physical network infrastructure. What is the next step according to the CompTIA troubleshooting methodology?

A.Test the theory
B.Establish a plan
C.Identify the problem
D.Establish a theory of probable cause

A

B.Establish a plan

The plan of action defines the steps to take, and the administrator should determine these steps ahead of time, as opposed to formulating them during the solution implementation.

30
Q
A