Lesson 1: Understanding Cloud Concepts Flashcards
A systems administrator responded to an important web service crashing. They analyzed logs to determine the issue, restarted the service, and were able to verify system functionality. What is the next step the administrator should take?
A.Implement preventative measures
B.Perform a root cause analysis
C.Establish a plan of action
D.Determine scope of the problem
A.Implement preventative measures
Implementing preventative measures comes after verifying full system functionality. It may be possible to preemptively reconfigure other services or network devices to avoid a repeat of the problem.
A network administrator is configuring a series of virtual servers. The administrator provisions resources so that additional memory is available daily during a four-hour period. Which solution would best accommodate this provision?
A.Auto-scaling
B.Horizontal scaling
C.Cloud bursting
D.VM templates
A.Auto-scaling
Auto-scaling adjusts the compute capabilities of instances dynamically to match the current workload.
A server technician has been diligently troubleshooting a critical service that crashed. They isolated the issue and implemented a possible resolution. What next step should the technician perform?
A.Implement preventative measures
B.Perform a root cause analysis
C.Establish a plan of action
D.Verify full system functionality
D.Verify full system functionality
Once the potential solution has been implemented, the next phase is to test for functionality. Your goal is to ensure that the service or web application has returned to the established service levels.
What process controls the access to resources on a cloud platform?
A.Provisioning
B.Identity management
C.Subscription
D.Containerization
B.Identity management
Identity management is the process by which identities are established, and access to resources is controlled. Users are assigned an account and are assigned rights and restrictions enforced by access control systems such as permissions.
When following troubleshooting methodology, which step takes place after establishing an action plan but before verifying that function has returned to the system?
A.Implement preventative measures
B.Test the theory
C.Perform a root cause analysis
D.Implement the solution or escalate
D.Implement the solution or escalate
Solution implementation describes following the plan of action. An administrator should make changes and test them, one at a time, to assist with narrowing down the solution.
A real estate accounting company would like to migrate its operation to the cloud but has expressed reservations regarding security. A member of the executive suite suggests a collective organization formed in conjunction with several similar companies that have collectively deployed a cloud-based environment. Each member company maintains cloud access. Which of the following is the executive describing?
A.Private
B.Community
C.Hybrid
D.Public
B.Community
Community clouds are owned and maintained by several organizations, with the cumulative resources available to each participating organization. This model leverages the cost savings of having several organizations support the datacenter and provides increased security.
A finance company would like to implement a customer relationship management solution that provides flexible resource utilization while maintaining the best possible security for client PII. Which of the following options would protect that segment of data while remaining cost-conscious?
A.Hybrid
B.On-premise
C.Private
D.Public
A.Hybrid
Hybrid clouds pull varying elements of different cloud models. Organizations may store private or more sensitive data in a private cloud but deploy a public cloud for customer services, as would be the case here.
An IT technician is revisiting an issue that was previously marked as resolved a week prior by a different technician. The cause and resolution of the issue were documented. Considering the issue has recurred, what could the previous technician have done additionally to ensure a more enduring resolution?
A.Take detailed notes while troubleshooting.
B.Verify full system functionality and user satisfaction.
C.Implement preventive measures to mitigate future recurrences.
D.Perform a comprehensive root cause analysis.
C.Implement preventive measures to mitigate future recurrences.
Implement preventive measures by, for example, preemptively reconfiguring other services or network devices to avoid a repeat of the problem. Adding new technologies may help to prevent recurrences.
A single user is having trouble downloading files from the CSP’s server. The download fails with a message stating the files were blocked. Frustrated, the user claims that resolving this matter falls on the CSP. Which of the following best represents who should initiate for this incident to be resolved?
A.The CSP
B.The user
C.The ISP
D.The server
B.The user
The issue likely represents a problem with the local firewall, preventing the user from gaining access to the download. The user should look to internal assistance within the organization to resolve the problem.
A tier 1 support technician has been holding a support ticket for a system problem for an hour and has only identified the problem. Company policy requires tier 1 support tickets to escalate after an hour if the technician cannot resolve the problem. After escalating the ticket, what would the tier 2 technician do next?
A.Perform a root cause analysis.
B.Verify the system is functional.
C.Establish another theory of probable cause.
D.Determine the scope of the problem.
D.Determine the scope of the problem.
Determine the scope of the problem after identifying it.
A server technician receives multiple complaints from users with varying permissions that a critical resource is inaccessible. What troubleshooting step should the technician perform next?
A.Document the findings
B.Restart the cloud services
C.Check an account with similar permissions
D.Establish theory of probable cause
D.Establish theory of probable cause
The technician has determined that the scope is widespread, so the next step is to establish a probable cause theory.
An IT support manager for a small company needs to provide some basic functions for their company but is running minimal staff with limited skills. Which of the following solutions would be applicable solutions? (Select all that apply.)
A.SaaS
B.PaaS
C.MSPs
D.IaaS
A.SaaS
C.MSPs
With Software as a Service (SaaS), responsibility for the hardware where that software runs.
Managed service providers (MSPs) are independent of the CSP. Your organization may choose to outsource cloud design, migration, deployment, and management solutions to these companies, relying on their expertise and experience.
A cloud administrator is troubleshooting a virtual server that has lost its connection to the network. The administrator presumes it to be a hardware failure from the virtual NIC, as the device manager is showing an error, and all reset efforts have failed. What is the next step according to the CompTIA troubleshooting methodology?
A.Test the theory
B.Establish a plan
C.Identify the problem
D.Establish a theory of probable cause
B.Establish a plan
The plan of action defines the steps to take, and the administrator should determine these steps ahead of time, as opposed to formulating them during the solution implementation.
An administrator is configuring virtual servers for a help desk department. All servers will operate using virtualization and require the exact same level of compute power, memory, and applications. What would be the most efficient and consistent means of deploying the needed configurations?
A.VM templates
B.SDN
C.FaaS
D.Patches
A.VM templates
An administrator may deploy virtual machines using templates. VM Templates reduce the confusion, misconfiguration, and cost associated with manually created VMs by providing standardized VM configurations.
A company is migrating to a web-based file sharing application to help transition its in-office departments to a primarily remote setup. What type of solution is the company installing?
A.SaaS
B.PaaS
C.IaaS
D.STaaS
A.SaaS
Software as a Service (SaaS) has access to the software, but the vendor maintains the installation, maintenance, patching, and upgrade responsibilities.