ERASED TEST, YOU MAY BE INTERESTED ON Cloud+ C
COMMENTS | STATISTICS | RECORDS |
---|
TAKE THE TEST
Title of test:
Cloud+ C Description: CompTia Cloud+ Author: TheShed Other tests from this author Creation Date: 30/07/2024 Category: Computers Number of questions: 71 |
Share the Test:
New Comment
No comments about this test.
Content:
A technician is working with an American company that is using cloud services to provide video-based training for its customers. Recently, due to a surge in demand, customers in Europe are experiencing latency. Which of the following services should the technician deploy to eliminate the latency issue? Auto-scaling Cloud bursting A content delivery network A new cloud provider. A systems administrator has received an email from the virtualized environment's alarms indicating the memory was reaching full utilization. When logging in, the administrator notices that one out of a five-host cluster has a utilization of 500GB out of 512GB of RAM. The baseline utilization has been 300GB for that host. Which of the following should the administrator check NEXT? Storage array Running applications VM integrity Allocated guest resources. Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A's cloud resources while retaining its 1AM solution. Which of the following should be implemented? Multifactor authentication Single sign-on Identity federation Directory service. A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet. Which of the following should the systems administrator implement to achieve this objective? A stateful firewall DLP DNSSEC Network flows. A company had a system compromise, and the engineering team resolved the issue after 12 hours. Which of the following information will MOST likely be requested by the Chief Information Officer (CIO) to understand the issue and its resolution? A root cause analysis Application documentation Acquired evidence Application logs. A company needs to migrate the storage system and batch jobs from the local storage system to a public cloud provider. Which of the following accounts will MOST likely be created to run the batch processes? user LDAP Role-based Service. A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error. Which of the following will MOST likely solve the issue? Checking user passwords Configuring QoS rules Enforcing TLS authentication Opening TCP port 3389. A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data. Which of the following migration methods would be the BEST to use? Conduct a V2V migration. Perform a storage live migration. Rsync the data between arrays. Use a storage vendor migration appliance. A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web-based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer. The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment. Which of the following is the MOST likely reason for this issue? The license limit on the number of server deployments allowed per month was exceeded. The deployment script changes made by the first administrator were not checked in and committed. The new server images were incompatible with the application load-balancer configuration. The application load balancer exceeded the maximum number of servers it could use. A systems administrator is configuring updates on a system. Which of the following update branches should the administrator choose to ensure the system receives updates that are maintained for at least four years? LTS Canary Beta Stable. A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way? Submit the upgrade to the CAB. Perform a full backup. Take a snapshot of the system. Test the upgrade in a preproduction environment. Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps. Which of the following solutions will resolve the issue the FASTEST? Change the connection to point-to-site VPN. Order a direct link to the provider. Enable quality of service. Upgrade the link to 200Mbps. A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users? A CDN solution An MPLS connection between datacenters A DNS round robin A site-to-site VPN between datacenters. An administrator receives a ticket indicating the accounting application is not working. Which of the following should the administrator check FIRST? DHCP Service-level agreement DNS System logs. A company recently adjusted its load-balancer encryption policies to support only TLSv1.3. Soon after the change was made, several customers began reporting they could not access their website. Which of the following is the MOST likely cause of the issue? The certificate is expired. There is a mismatch between the key and the certificate. The customers are using an unsupported OS. The load balancer was misconfigured. A cloud architect is reviewing the design for a new cloud-based ERP solution. The solution consists of eight servers with a single network interface. The allocated IP range is 172.16.0.0/28. One of the requirements of the solution is that it must be able to handle the potential addition of 16 new servers to the environment. Because of the complexity of the firewall and related ACL requirements, these new servers will need to be in the same network range. Which of the following changes would allow for the potential server addition? Change the IP address range to use a 10.0.0.0 address. Change the server template to add network interfaces. Change the subnet mask to use a 255.255.255.128 range. Change the server scaling configuration to increase the maximum limit. An organization is required to set a custom registry key on the guest operating system. Which of the following should the organization implement to facilitate this requirement? A configuration management solution A log and event monitoring solution A file integrity check solution An operating system ACL. A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible. Which of the following will BEST achieve this goal? Configure CPU passthrough. Oversubscribe CPU resources. Switch from a Type 1 to a Type 2 hypervisor. Increase instructions per cycle. Enable simultaneous multithreading. A systems administrator needs to implement a security control that will prevent unknown malware from infecting a system in case the antivirus solution fails. Which of the following should the administrator implement? A software whitelist File integrity monitoring A host-based IDS Hardened baselines. A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal. Which of the following should the administrator do to fix this issue? Change the database application IP. Create a database cluster between the primary site and the DR site. Update the connection string. Edit the DNS record at the DR site for the application servers. A company recently subscribed to a SaaS collaboration service for its business users. The company also has an on-premises collaboration solution and would like users to have a seamless experience regardless of the collaboration solution being used. Which of the following should the administrator implement? LDAP WAF YDI SSO. A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues. Which of the following is the MOST likely cause of this issue? Change management failure Service overload Patching failure Job validation issues Deprecated features. A systems administrator notices several VMs are constantly ballooning, while the memory usage of several other VMs is significantly lower than their resource allocation. Which of the following will MOST likely solve the issue? Right-sizing Bandwidth increase Cluster placement Storage tiers. The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other's work. Which of the following did the team MOST likely forget to implement? Incident type categories A calling tree Change management Roles and responsibilities. A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments. Which of the following network topology solutions should the cloud engineer implement to reduce longterm maintenance? chain Star Mesh Hub and spoke. A systems administrator is using VMs to deploy a new solution that contains a number of application VMs. Which of the following would provide high availability to the application environment in case of hypervisor failure? Anti-affinity rules Cold migration Live migration Affinity rules. A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection? HTTPS IPSec TLS SSH. A company still has several dedicated servers and wants to migrate them to its private cloud. Which of the following migration methods would be BEST to accomplish this goal? Virtual-to-virtual Storage Cloud-to-cloud Physical-to-virtual. A systems administrator is securing a new email system for a large corporation. The administrator wants to ensure private corporate information is not emailed to external users. Which of the following would be MOST useful to accomplish this task? DLP EDR DNSSEC SPF. A cloud administrator is looking at the company's cloud services bill for the previous month. The administrator notices on the billing dashboard that certain resources are not being billed to any particular department. Which of the following actions will help correct this billing issue? Check the utilization of the resources. Modify the chargeback details of the consumer Add the resources to the consumer monitoring group Modify the tags for all the unmapped resources. A cloud architect is deploying a web application that contains many large images and will be accessed on two containers. Which of the following will MOST improve the user experience while keeping costs low? Implement web servers in both continents and set up a VPN between the VPCs. Implement web servers on both continents and peer the VPCs. Implement a CDN and offload the images to an object storage. Implement a replica of the entire solution on every continent. Once a year, a company's private cloud experiences increased activity. The company has a disaster recovery site that is hosted in a public cloud. To avoid investment in additional hardware, which of the following actions would BEST address this issue? Configure cloud bursting to spin up new VMs automatically and terminate them when usage is back to normal. Activate the disaster recovery site, and deactivate it when usage is back to normal. Create a new backup site and decommission it when usage is back to normal. Manually add memory and CPU to existing VMs, and remove them when usage is back to normal. A systems administrator is troubleshooting issues with network slowness. Traffic analysis shows that uplink bandwidth on the core switch is often sustained at 125Mbps due to a combination of production traffic from other sources. Which of the following would BEST resolve the issue? Turn off the servers that use the most bandwidth. Enable QoS to prioritize production traffic. Increase the buffer size on the core switch. Reboot the core switch. An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason? Insufficient memory on the hypervisor Operating system memory limit Memory mismatch error Dynamic memory allocation. A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring? Compute Storage Licensing Scripts. A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement? Create /25 subnets in two regions and run 80 instances on each one. Create /26 subnets in two regions and run 40 instances on each one. Create /26 subnets in three regions and run 40 instances on each one. Create /26 subnets in three regions and run 80 instances on each one. A web application has been configured to use auto-scaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new Cl/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now, the auto-scaling configuration is creating a new VM every five minutes. Which of the following actions will MOST likely resolve the issue? Reducing the maximum threshold in the auto-scaling configuration Debugging the script and redeploying it Changing the automation tool because it is incompatible Modifying the script to shut down the VM after five minutes. A systems administrator is troubleshooting an application that is configured to auto-scale with a minimum of two nodes and a maximum of four. The application will scale out if the CPU utilization of one of the nodes exceeds 80% for more than five minutes and will scale in if the CPU utilization of one of the nodes drops under 20% for more than ten minutes. There is a reverse proxy in front of the application. The systems administrator notices two of the nodes are often running over 80% for a long period of time, which is triggering the creation of the other two nodes; however, they are being created and terminated while the load in the first two remains over 50% all the time. Which of the following should the administrator configure to fix this issue? Disable DNS caching in the reverse proxy. Reduce the minimum node count to one. Disable TLS tickets. Reduce the scale-out rule to 50%. Increase the scale-in rule to 50%. Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management? IPAM DoH VLAN SDN. A financial industry services firm was the victim of an internal data breach, and the perpetrator was a member of the company's development team. During the investigation. one of the security administrators accidentally deleted the perpetrator’s user data. Even though the data is recoverable, which of the following has been violated? Chain of custody Evidence acquisition Containment Root cause analysis. After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime? One 32 vCPU node with CDN caching Two 8 vCPU nodes with load balancing Three to six 8 vCPU nodes autoscaling group Four 8 vCPU nodes with DNS round robin. A company has hired a security firm to perform a vulnerability assessment of its environment. In the first phase, an engineer needs to scan the network services exposed by the hosts. Which of the following will help achieve this with the LEAST privileges? An agent-based scan A credentialed scan A network-based scan An application scan. A local bank has all of its infrastructure in the cloud. An update was applied to the main database server at 5:00 a.m. on Monday morning, and the database was then corrupted and unusable. It had to be restored from backup. The last backup was taken the night before at 10:00 p.m. The database was then restored successfully, but seven hours' worth of data was lost, which is deemed unacceptable. Which of the following needs to be updated in the DR plan? Recovery point objective Statement of work Service-level agreement Recovery time objective. A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select? DBaaS SaaS laaS PaaS. While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality? Hardening IAM Encryption IPSec. A cloud administrator is monitoring a database system and notices an unusual increase in the read operations, which is causing a heavy load in the system. The system is using a relational database and is running in a VM. Which of the following should the administrator do to resolve the issue with minimal architectural changes? Migrate the relational database to a NoSQL database Use a cache system to store reading operations Create a secondary standby database instance Implement the database system using a DBaaS. A financial services company is considering its options for moving its infrastructure to the cloud. The company runs its critical database on a proprietary legacy mainframe, which cannot be hosted anywhere but in the data center. However, the company would like to migrate portions of the infrastructure to an external provider. Which of the following cloud deployment models would be the BEST option? Private Public Community Hybrid. A storage administrator is reviewing the storage consumption of a SAN appliance that is running a VDI environment. Which of the following features should the administrator implement to BEST reduce the storage consumption of the SAN? Deduplication Thick provisioning Compression SDS. A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Choose two.) A load balancer SDN A firewall SR-IOV Storage replication VPN. A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured? Regions Anti-affinity Oversubscription Container. A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way? Store the credentials in a variable on every worker node Store the credentials on a shared volume using whole-disk encryption Store the credentials in a configuration file using SHA-256 inside the container image Store the credentials using the orchestrator secret manager. An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection? WAF EDR IDS HIPS SSL. A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause? Insufficient guest bandwidth Overwhelmed vCPU A storage error on the guest Incorrect VLAN assignment Inadequate memory allocation. A cloud engineer is performing updates to an application and needs to gracefully stop any new transactions from processing before the updates can be applied. Which of the following steps should the engineer take? Enable maintenance mode from the application dashboard Wait until after business hours to conduct the change when the system is not in use Run a kill command on the system to stop the application services Use a load balancer to redirect traffic to other systems serving the application. A company wants to move to a multicloud environment and utilize the technology that provides the most portability. Which of the following technology solutions would BEST meet the company's needs? Bootstrap Virtual machines Clusters Containers. A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality? NAC IDS DLP EDR. An administrator needs to back up all the data from each VM daily while also saving space. Which of the following backup types will BEST fit this scenario? Differential Incremental Cynthetic full Full. A systems administrator is setting up a backup solution to follow the 3-2-1 policy. Currently, the solution is set to back up from the servers to an on-site storage server. Which of the following should the administrator configure to comply with the 3-2-1 policy? Weekly lull backups, with daily incremental backups A second on-site storage server for backups Storage snapshots An off-site storage server for backups. A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service? Reboot all the servers in the green stack Failback to the blue stack Restore from backups Troubleshoot and resolve the application issues. A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows: • Three public cloud hosts with four cores • 120GB of RAM • 100GB of storage • 1Gbps • Three public cloud hosts with six cores • 80GB of RAM • 180GB of storage • 150Mbps • Three public cloud hosts with six cores • 80GB of RAM • 1TB of storage • 200Mbps • Four public cloud hosts with four cores • 140GB of RAM • 200GB of storage. A technician is trying to delete six decommissioned VMs. Four VMs were deleted without issue. However, two of the VMs cannot be deleted due to an error. Which of the following would MOST likely enable the technician to delete the VMs? Remove the snapshots Remove the VMs' IP addresses Remove the VMs from the resource group Remove the lock from the two VMs. A cloud administrator is assigned to establish a connection between the on-premises data center and the new CSP infrastructure. The connection between the two locations must be secure at all times and provide service for all users inside the organization. Low latency is also required to improve performance during data transfer operations. Which of the following would BEST meet these requirements? A VPC peering configuration An IPSec tunnel An MPLS connection A point-to-site VPN. Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL https://www.comptiasite.com. Which of the following would MOST likely resolve the issue? Renewing the expired certificate Updating the web-server software Changing the crypto settings on the web server Upgrading the users' browser to the latest version. A company is considering consolidating a number of physical machines into a virtual infrastructure that will be located at its main office. The company has the following requirements • High-performance VMs • More secure • Has system independence Which of the following is the BEST platform for the company to use? Type 1 hypervisor Type 2 hypervisor Software application virtualization Remote dedicated hosting. A cloud architect is reviewing four deployment options for a new application that will be hosted by a public cloud provider. The application must meet an SLA that allows for no more than five hours of downtime annually. The cloud architect is reviewing the SLAs for the services each option will use: Option A Option B Option C Option D. A systems administrator is deploying a new cloud application and needs to provision cloud services with minimal effort. The administrator wants to reduce the tasks required for maintenance, such as OS patching, VM and volume provisioning, and autoscaling configurations. Which of the following would be the BEST option to deploy the new application? A VM cluster Containers OS templates Serverless. A company wants to move its environment from on premises to the cloud without vendor lock-in. Which of the following would BEST meet this requirement? DBaaS SaaS laaS PaaS. A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.) Disk I/O limits Affinity rule CPU oversubscription RAM usage Insufficient GPU resources License issues. An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used? Thick provisioning Software-defined storage User quotas Network file system. After announcing a big sales promotion, an e-commerce company starts to experience a slow response on its platform that is hosted in a public cloud. When checking the resources involved, the systems administrator sees the following consumption:Considering all VMs were built from the same templates, which of the following actions should the administrator perform FIRST to speed up the response of the e-commerce platform? Spin up a new web server Spin up a new application server Add more memory to the web server Spin up a new database server. A disaster situation has occurred, and the entire team needs to be informed about the situation. Which of the following documents will help the administrator find the details of the relevant team members for escalation? Chain of custody Root cause analysis Playbook Call tree. |
Report abuse