Massive Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA CV0-001 CompTIA Cloud+ Certification Exam Exam Practice Test

Demo: 84 questions
Total 565 questions

CompTIA Cloud+ Certification Exam Questions and Answers

Question 1

Which of the following will be the BEST option for an administrator to bring VMs online at a warm site after a natural disaster has occurred at the primary site?

Options:

A.

Kick off a full backup

B.

Request offsite backup tapes

C.

Confirm enterprise tape library is functional

D.

Verify replication is enabled

Question 2

An administrator has provisioned a LUN on a SAN and wants to be able to connect a VM to the new storage using SCSI commands sent across the LAN. Which of the following should be configured on the VM?

Options:

A.

Virtual NIC

B.

Virtual HBA

C.

Virtual SAN

D.

LUN masking

Question 3

A hosting company provides 10 VM web servers for a financial institution. The financial institution recently introduced a new web application and now their web traffic has significantly increased. Which of the following could the administrator implement to assist in reducing the load on the web servers?

Options:

A.

Clustering

B.

Virtual switching

C.

Load balancing

D.

Site mirroring

Question 4

Joe, an administrator, is responsible for the maintenance and support of all virtual servers in his environment. He needs to ensure that access to files and folders is optimized. Which of the following should Joe perform to accomplish this goal?

Options:

A.

Schedule weekly defrags

B.

Archive old data annually

C.

Perform daily full backups

D.

Implement file compression

Question 5

An administrator needs to test the latency between two servers. Which of the following commands should be used?

Options:

A.

route

B.

arp

C.

ping

D.

nslookup/dig

Question 6

When working with hypervisors configured in a highly available configuration that provides fail-over capabilities to virtualized servers and applications, which of the following requirements is commonly overlooked?

Options:

A.

Correct storage allocation

B.

Correct CPU allocation

C.

Correct memory allocation

D.

Correct licensing allocation

Question 7

Which of the following BEST explains why remote access works on a Type I host but not on a Type II host, when both are deployed in a single fully functioning environment as part of a hybrid cloud implementation?

Options:

A.

Type II host has backups, replication, and heartbeat.

B.

Type II host firewall is blocking port 22.

C.

Type II host has only one 10GB interface enabled.

D.

There is only one network per host and all traffic goes through it.

Question 8

A company is testing a new software product that is intended for auto discovery of assets within a cloud environment. The testing department wants to ensure that initial testing does not allow the product to leave the boundary of the test environment. Which of the following should the network administrator implement in the department test environment?

Options:

A.

ACLs

B.

DMZ

C.

IDS

D.

SNMP

Question 9

After a recent outage going unnoticed, an administrator has been tasked to configure monitoring for the Linux-based and Windows-based host operating systems in a hybrid cloud. Which of the following services should the administrator confirm are functional prior to employing centralized monitoring to both types of operating systems? (Select two.)

Options:

A.

Syslog services

B.

Cron services

C.

Web services

D.

Task Manager services

E.

WMI services

Question 10

An administrator is attempting to troubleshoot an issue between a web server in the DMZ and an internal workstation by reviewing packet captures. Upon inspection, the payloads of the packets are unreadable. Which of the following could be the cause of this issue?

Options:

A.

The administrator has yet to authenticate to the network

B.

The sniffer is located on an incorrect subnet

C.

A vulnerability scanner has interfered with the packet capture

D.

End-to-end encryption is applied on the network

Question 11

A company is experiencing network access errors within one department that operates in a secure environment. The network administrator needs to investigate the configurations of the switches servicing that department to determine the cause of the network access errors. Which of the following tools should be used to directly access the switches in that department?

Options:

A.

AES

B.

RDP

C.

HTTP

D.

SSH

Question 12

An administrator has been asked to remotely configure a guest machine while on vacation. The administrator only has access to a hotel kiosk to make the necessary changes. Which of the following can be used to securely meet this request?

Options:

A.

SCP

B.

HTTPS

C.

FTP

D.

IPMI

Question 13

A user in the human resource (HR) department has reported slow response time to the company personnel database when trying to process new hires to the company. The administrator reviews the department VMs and resource pools to determine the cause of the slow access. The memory and CPU for the host machines in this resource pool have recently been upgraded. Other HR users that do not access the database are not reporting any problems. Which of the following is the cause of the slow response time?

Options:

A.

NIC failure

B.

Disk latency

C.

Bandwidth throttling

D.

CPU wait time

Question 14

Joe, a new administrator, is asked to enter his mobile phone number into a log management system. Which of the following alert features is MOST likely being edited?

Options:

A.

Syslog

B.

SNMP

C.

APM

D.

SMS

Question 15

The administrator wants to have central storage for all of the files to be stored for each VM. Which of the following is used to connect a host to a SAN utilizing a fiber connection?

Options:

A.

VNIC

B.

NIC

C.

HBA

D.

SCSI adapter

Question 16

An administrator has enabled monitoring for a new tenant environment. The administrator checks 24 hours after the new environment has been added and sees data for other tenants’ environments but no data for the new environment. Which of the following has NOT been properly configured?

Options:

A.

SNMP Community String

B.

SNMP Destination IP Address

C.

SNMP Manager IP Address

D.

SNMP Trap

Question 17

Which of the following is used in Object-Based Storage to reference the servers that provide services to store, retrieve, and manage data in the Object-Based Storage system?

Options:

A.

Controller

B.

Host

C.

Node

D.

Switch

Question 18

The Chief Information Officer (CIO) has established the requirement to limit data loss to within two hours of a disaster. Which of the following terms describes this requirement?

Options:

A.

RTO

B.

RPO

C.

MTTR

D.

MTBF

Question 19

Which of the following describes a community string?

Options:

A.

It is used to group devices that used SMTP.

B.

It is used to group devices that are clustered.

C.

It is used to group devices that manage SaaS.

D.

It is used to group devices that are managed by SNMP.

Question 20

Which of the following encryption types would be used to protect company information when stored on a cloud server being shared by multiple companies?

Options:

A.

Secure socket layer encryption

B.

Transport layer security encryption

C.

Whole disk encryption

D.

File and folder level encryption

Question 21

Which of the following server types would be an ideal candidate for virtualization? (Select two.)

Options:

A.

Hypervisor

B.

Terminal server

C.

Mail server

D.

Enterprise database server

E.

Domain controller

Question 22

A storage administrator has 100 terabytes of physical storage space within the SAN. Which of the following is used to enable access to the storage space?

Options:

A.

Drive mirroring

B.

LUN creation

C.

Drive striping

D.

RAID configuration

Question 23

Which of the following uses the business model of shared resources in a cloud environment?

Options:

A.

Elasticity

B.

Self-serve

C.

Cloud bursting

D.

Multi-tenancy

Question 24

Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?

Options:

A.

Blob data

B.

Object ID

C.

Replicas

D.

Metadata

Question 25

A technician wants to configure a server for storage redundancy so that if any two of the four drives fail, the server is still operational. Which of the following should the technician configure?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 26

Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?

Options:

A.

Extra processing is needed to store encryption keys used for secure transmission between the server and the network.

B.

Additional processing is used to run ports and services not turned off through the process of server hardening.

C.

Some processing is required for operational overhead on the processor and between the physical and virtualized processors.

D.

Significant processing is used to create and maintain the cache on multi-core processors.

Question 27

In which of the following cloud services will the customer be responsible for securing provisioned hosts?

Options:

A.

PaaS

B.

IaaS

C.

SaaS

D.

DaaS

Question 28

Which of the following access control types allows users to assign security attributes to objects such as files and directories?

Options:

A.

Role based

B.

Mandatory

C.

Discretionary

D.

Rule set based

Question 29

Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?

Options:

A.

USB

B.

Tape

C.

HDD

D.

SSD

Question 30

Which of the following MUST be in a zone? (Select TWO).

Options:

A.

Initiator

B.

Target

C.

CNA

D.

HBA

E.

Fibre Channel

Question 31

A small startup wins a contest giving them advertising time during a major sporting event. Which of the following cloud characteristics should be in place to handle the possible spike in demand?

Options:

A.

Shared disk space

B.

Elasticity

C.

Scalability

D.

Shared memory

Question 32

Which of the following is true about a Type II hypervisor?

Options:

A.

It requires a primary hypervisor to function properly.

B.

It implements stronger security controls than a Type I supervisor at the same patch level.

C.

It provides slower performance than a Type I hypervisor installed on the same hardware.

D.

It provides direct hardware access through the use of specialized drivers.

Question 33

Which of the following is MOST important when factoring network level security in a public cloud environment?

Options:

A.

Ensuring good user experience

B.

Ensuring confidentiality

C.

Ensuring redundancy

D.

Ensuring high availability

Question 34

Which of the following access control methods could allow for a network user to sign onto their corporate network and their supplier’s network portal without having to enter their ID and password more than once?

Options:

A.

Discretionary access control

B.

Mandatory access control

C.

Role-based access control

D.

Federated access control

Question 35

Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?

Options:

A.

Type II

B.

Type I

C.

RAID 5

D.

RAID 0

Question 36

An external USB hard drive physically attached to a server is a:

Options:

A.

SAN.

B.

DAS.

C.

VLAN.

D.

NAS.

Question 37

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?

Options:

A.

Antivirus

B.

Firewall

C.

Audit logs

D.

IDS

Question 38

Which of the following cloud delivery models is deployed over a company intranet or company-hosted datacenter?

Options:

A.

Private cloud

B.

Hybrid cloud

C.

Community cloud

D.

Public cloud

Question 39

Which of the following only uses Fibre Channel to implement a storage infrastructure?

Options:

A.

NFS

B.

SAN

C.

NAS

D.

SMB

Question 40

An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration?

Options:

A.

Harden the operating system

B.

Migrate the server in a development environment

C.

Contact the vendor for compatibility requirements

D.

Establish a performance baseline

Question 41

Which of the following should be installed on VMs to report and take action against potential threats?

Options:

A.

NIDS

B.

HIPS

C.

NIPS

D.

HIDS

Question 42

An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently. Which of the following is MOST likely the issue with the new servers?

Options:

A.

The dynamic resource pool is malfunctioning.

B.

The server is missing security patches.

C.

The VM servers were not properly configured.

D.

There are insufficient resources available on the host.

Question 43

A new host has been bought to be a part of a new cluster. The purchase order specifies this server has four physical CPUs with eight cores each. After the administrator boots the host, there are only 24 logical processors available for VM allocation. Which of the following BEST describes this problem?

Options:

A.

The server requires a firmware upgrade to version 8.2

B.

The BIOS does not have virtualization support features completely enabled

C.

The virtualization license is not the enterprise edition

D.

A CPU is dead on arrival or disabled on the motherboard

Question 44

A programmer removes OS software from a laptop during development of a new prototype for the company. After the code is promoted from development to QA, none of the QA testers can get the application to work. Which of the following is MOST likely the cause of the application not working properly in QA?

Options:

A.

QA systems require a reboot after a new application is installed

B.

Programmer did not compile the code properly

C.

Programmer put the source code in repository without any validations

D.

QA systems are missing patches

Question 45

An administrator has been reviewing a cloud provider’s website and would like to view the current information about all services available. Which of the following should the administrator analyze?

Options:

A.

Catalog

B.

CMDB

C.

Quote

D.

Service request

Question 46

Which of the following would an administrator implement between a host and a guest to allow the virtual server to connect to a third party USB drive license key?

Options:

A.

Port mapping

B.

NAT

C.

Console port

D.

PAT

Question 47

Which of the following describes the combination of a disk, computer, and a network into a pool of resources to efficiently allocate resources?

Options:

A.

Virtual resource reservation

B.

Zoning

C.

Load balancing

D.

Converged infrastructure

Question 48

Which of the following offers 128, 192, and 256 bit encryption?

Options:

A.

AES

B.

DES

C.

RC4

D.

RC5

Question 49

Which of the following tables would an administrator use to find a list of paths to network nodes?

Options:

A.

Port table

B.

VPN tagging

C.

ARP table

D.

Route table

Question 50

Which of the following goals are met by multi-port link aggregation? (Select TWO).

Options:

A.

LUN zoning

B.

Link clustering

C.

Port linking

D.

Load balancing

E.

Fault tolerance

Question 51

A client was unable to connect to the cloud provider for over an hour on Saturday. Which of the following is the FIRST thing an operations manager should check?

Options:

A.

SLA

B.

Business continuity plan

C.

OLA

D.

Contract with the cloud provider

Question 52

Which of the following backup types will enable scheduled point-in-time recovery of data and is accessible to end-users?

Options:

A.

Image backup

B.

Asynchronous replication

C.

File system snapshot

D.

Virtual machine cloning

Question 53

Which of the following protocols allows fibre channel to be transmitted over the network?

Options:

A.

HBA

B.

FCoE

C.

NFS

D.

iSCSI

Question 54

An administrator is responsible for maintenance and support of servers in the cloud environment. There are over 500 virtual servers spanning across ten physical hosts. The administrator deploys a new application server. The administrator allocated the appropriate virtual resources for the application. Users report slow response after the new server was deployed. Which of the following is the cause of this issue?

Options:

A.

Storage allocation on the guest OS

B.

Resource pooling mis-configuration

C.

Application licensing expiration

D.

Data segregation on the host OS

Question 55

A corporate office allows employees to work remotely, using their personal computers to access network resources through a browser-based gateway. Which of the following settings should be applied to the virtualized application running on the gateway to reduce the risk of company information being transferred to employees’ personal machines?

Options:

A.

Disable the ability to copy and paste

B.

Encrypt the employees’ personal computer hard drives and disable the ability to paste

C.

Encrypt the employees’ personal computer hard drives and disable the ability to print

D.

Disable the ability to paste and read

Question 56

In order for a company to transition to a cloud solution, which of the following should the company check FIRST before transitioning? (Select TWO).

Options:

A.

Service level agreements

B.

IT operations policy

C.

Business needs

D.

Company stock performance

E.

Virtual desktop environment

Question 57

Which of the following virtualization implementations yields the HIGHEST performance of the same hardware configuration?

Options:

A.

CPU emulation

B.

Type I

C.

Memory ballooning

D.

Type II

Question 58

Which of the following is an example of vertical scaling?

Options:

A.

Adding memory to a host

B.

Adding CPU to a VM guest

C.

Adding memory to the VM guest

D.

Migrating all VM guests from one host to another in a cluster

Question 59

The Chief Information Officer (CIO) of a company is tasked to save costs by reducing datacenter space. The administrator explains that virtualization of servers will support this task as a benefit of migrating to a cloud environment known as:

Options:

A.

Increased server efficiency.

B.

Infrastructure consolidation.

C.

Total cost of ownership reduction.

D.

Increased availability.

Question 60

Which of the following is the BEST answer for implementing a feature that will remove a single point of failure between a SAN and host?

Options:

A.

MPLS

B.

MTBF

C.

MTU

D.

MPIO

Question 61

A JBOD is being monitored and an administrator notices that a high number of writes occur in short timeframes in the last 24 hours. Which of the following BEST describes this issue?

Options:

A.

I/O bursting

B.

I/O throttling

C.

I/O threshold

D.

I/O saturation

Question 62

The administrator is required to accommodate 200GB of online (near-line) storage for the monthly backups while minimizing cost. Which of the following disk types should be purchased?

Options:

A.

SATA

B.

SSD

C.

SAS

D.

FC

Question 63

Which of the following is the BEST means of ensuring resource utilization remains even across the hosts?

Options:

A.

Resource pooling

B.

VM affinity

C.

Dynamic VM placement

D.

VM high availability

Question 64

Which of the following may be used to provide certificate management within an organization?

Options:

A.

SSH

B.

IPSec

C.

Kerberos

D.

PKI

Question 65

Which of the following is often used by a certificate to keep the contents of the page confidential?

Options:

A.

3DES

B.

AES

C.

RSA

D.

RC4

Question 66

A company that provides cloud-based storage services wants to ensure that if underlying hard disk drives are sent to the disposal facility, they will not contain any data in clear-text format. Which of the following should be done to accomplish this task?

Options:

A.

Implement degaussing

B.

Ensure that ACLs are configured on users’ data

C.

Implement full-disk encryption

D.

Fill disk with random data before disposal

Question 67

Which of the following protocols would allow data to be transferred securely through the cloud?

Options:

A.

HTTP

B.

SMTP

C.

DHCP

D.

SFTP

Question 68

Two independent organizations want to share authentication and other employees’ attributes to leverage a central online collaboration tool for a common project. Which of the following will allow the two companies to keep their internal authentication system while allowing visibility into the other company’s employees’ attributes?

Options:

A.

Role-based access control

B.

Federation

C.

Single sign-on

D.

Multi-factor authentication

Question 69

The BEST way to compare daily performance metrics against a “normal” operational metric is to first establish:

Options:

A.

A standard metrics process.

B.

An operational baseline.

C.

An operational goal.

D.

An analysis formula.

Question 70

An administrator is working on a guest operating system and needs access to the CD-ROM drive from the host operating system to install a driver. Which of the following describes what the administrator should use to accomplish this goal?

Options:

A.

Remote hypervisor access

B.

Resource redirection

C.

Resource pooling

D.

Dynamic resource allocation

Question 71

Which of the following is a concern when migrating from a private cloud to a public cloud?

Options:

A.

Storage

B.

Limited visibility

C.

Security

D.

Performance

Question 72

In which of the following situations would a network administrator optimize a company’s WAN?

Options:

A.

High amounts of packet loss on a switch port

B.

CPU utilization on a switch is at 95%

C.

Installed new local application on a private network

D.

Contracted with a SaaS provider to provide a new application

Question 73

Which of the following is used for keeping track of all logical and physical data?

Options:

A.

BSD

B.

Flat File Systems

C.

Non Journaling File System

D.

Journaling File System

Question 74

Users report that they are unable to access a virtual server. Which of the following commands would allow the network administrator to verify the current network settings within the virtual server?

Options:

A.

nbtstat

B.

tftp

C.

telnet

D.

arp

E.

ping

F.

ipconfig

Question 75

Which of the following BEST describes the process of mapping storage initiators to targets?

Options:

A.

Access control lists

B.

Zoning

C.

LUN masking

D.

Obfuscation

Question 76

Which of the following could an administrator perform to restore confidential data housed within a VM server in case the data becomes corrupted or overwritten?

Options:

A.

Weekly image backups

B.

Snapshots backups

C.

Daily image backups

D.

Daily file backups

Question 77

An administrator has been tasked with the collection of all errors and events on the servers. These must be centralized and emailed directly from the central server. Which of the following is the BEST solution?

Options:

A.

LDAP server

B.

RADIUS server

C.

SYSLOG server

D.

DHCP server

Question 78

An administrator is designing a VM cluster to support a new testing department in the company. This department will require high availability and the ability to migrate VMs with little impact to other network functions within the department. The infrastructure available for the department supports a 1GB internal backbone upon which virtual switches are being configured. Which of the following network designs would meet the criteria for the department?

Options:

A.

Assign the migration VLAN, management VLAN and storage VLAN on one virtual switch port and a client VLAN on a separate virtual switch port

B.

Assign the migration VLAN, management VLAN and client VLAN on one virtual switch port and assign the storage VLAN on a separate virtual switch port

C.

Assign the migration VLAN and client VLAN on one virtual switch port, and the management VLAN and storage VLAN on one virtual switch port

D.

Assign the migration VLAN, management VLAN, client VLAN and storage VLAN all on separate virtual switch ports

Question 79

The corporate security department is recommending that the administrator deploys Type I hypervisor versus Type II. Which of the following is a security concern in regards to deploying a Type II hypervisor?

Options:

A.

Human error

B.

Performance benchmarks

C.

Additional software

D.

Administration time

Question 80

Which of the following refers to the maximum amount of data that can be lost due to a system failure?

Options:

A.

MTBF

B.

RTO

C.

MTTR

D.

RPO

Question 81

Which of the following services can an administrator disable to prevent remote access to a system?

Options:

A.

SMTP

B.

DHCP

C.

SMS

D.

Telnet

Question 82

A software development team is looking for a sandbox environment to test new releases before deploying to production and has requested several virtual machines for this purpose. Which of the following virtual components could be utilized to help isolate these virtual machines from the production infrastructure?

Options:

A.

Shared storage

B.

One virtual CPU per virtual machine

C.

Shared memory

D.

Virtual NICs on a different network

Question 83

A system administrator is planning storage infrastructure to store backup copies of virtual machines that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select TWO).

Options:

A.

SMB

B.

RAW

C.

EXT

D.

FAT

E.

NTFS

Question 84

Joe, a system administrator, has noticed that a remote facility has entries in his 3-year-old slave LDAP server that has not been updated from its master in about a month. Which of the following failures is MOST likely to have occurred?

Options:

A.

Replication from the master site to the remote site has failed.

B.

Replication has not been configured.

C.

Replication to the master site from the remote site has failed.

D.

There is high latency on the replication connection.

Demo: 84 questions
Total 565 questions