Ben Piper

CompTIA Cloud+ Study Guide


Скачать книгу

is preparing her company's migration plan from a private to a hybrid cloud. She wants to outline firewall and DDoS requirements. What document should she create?DIACAPSecurity policyService level agreementSOC-2

      28 Perry is investigating options for interconnecting a private cloud to a new public cloud region that supports analysis of customer-streamed IoT data. He is planning on implementing a tunnel across the Internet to interconnect the two locations to avoid the high costs of a dedicated interconnection. What transport protocol would you suggest that can offer a secure connection across the unsecure Internet?AESSOC-3IPsecRC5

      29 Jarleen is a consultant tasked with migrating Health Med Records Inc. customer records to a cloud-based service offering a long-term archival system. Which U.S. compliance mandate must her company align with?SOC 3HIPAAMPAAISA 2701

      30 Fluentes is a security consultant for a day trading company that must implement strong encryption of data at rest for their cloud storage tiers. What is the best option that meets most security regulations for the encryption of stored data?3DESRSAAES-256Rivest Cipher 5

      31 Randy is developing a new application that will be deployed in an IaaS-based public cloud. He builds a test image and deploys a test VM in his private cloud's development zone. When he stops and restarts one of the Linux-based servers, he notices that his storage volume data is missing. What type of storage exhibits this behavior? (Choose two.)DurableRAIDEphemeralNondurableBlockObject

      32 Matt has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?DMABIOSCPUIPsecI/O

      33 Jill works in the operations center, and she is tasked with monitoring security operations. What cloud-based GUI can she use for a real-time overview of security operations?Puppet automationGemalto systemDashboardVendor-based security appliance

      34 Larken is reviewing the SLA and statement of responsibility with his community cloud provider PaaS. To whom does the responsibility for stored data integrity in the cloud belong?Cloud providerCompliance agencyCloud customerShared responsibility

      35 Mindy has been tasked with developing a new QA test logging application, but she is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for her to use to meet her requirements?PythonXMLAPISNMPTLS

      36 What technology was instrumental in the growth of cloud services?XMLPythonAutomationAuthenticationSecurityWorkflow servicesEncryption

      37 Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shut down the hacking attempts. What application would you suggest that Vicky deploy?DMZIDSIPSRAIDHIDS

      38 What options can you offer your user base for MFA tokens? (Choose two.)One-time passwordSmartphone appAutomation systemsKey fobCloud vendor management dashboard

      39 Linda works in the IT security group of her firm and has been tasked with investigating options that will allow customers to access their personal records securely via the web. What is the most common in-flight e-commerce security protocol on the market?MD5SSL/TLSIPsecVPN

      40 Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network micro-segmentation deployments. When reading the documentation, you notice a link to download a Java-based application to monitor and configure the IPS application. What kind of configuration program is this?CLIGIUVendor-basedAPIRESTful

      41 Name the type of software update that is designed to address a known bug and to bring a system up-to-date with previously released fixes.HotfixPatchVersion updateRollout

      42 Your employer has developed a mission-critical application for the medical industry, and there can be no downtime during maintenance. You have designed a web architecture to take this into account and that allows you to have an exact copy of your production fleet that can be brought online to replace your existing deployment for patching and maintenance. What type of model did you implement?ClusterDevOpsBlue-greenRolling

      43 Jill is performing a Tuesday night backup of a Tier 2 storage volume of which she already completed a full backup on Sunday night. She only wants to back up files based on changes of the source data since the last backup. What type of backup is she performing?FullDifferentialIncrementalOnline

      44 What virtual machine backup method creates a file-based image of the current state of a VM, including the complete operating system and all applications that are stored on it?Full backupSnapshotCloneReplicate

      45 Ronald is a Cloud+ student studying systems that abstract and hide much of the complexity of modern cloud systems. What is he learning about?RunbooksWorkflowOrchestrationREST/API

      46 What are common automation platforms? (Choose three.)ChefCloud-patchAnsibleDevOpsPuppetCloud Deploy

      47 Marlene is updating her horizontally scaled Internet-facing web servers to remediate a critical bug. Her manager has agreed to operate under reduced computing capacity during the process but stipulates that there can be no downtime. What upgrade approach should Marlene perform to meet these requirements?OrchestrationRollingHotfixBlue-green

      48 What VM backup method can be used to create a master image to be used as a template to create additional systems?Full backupSnapshotCloneReplica

      49 A new application patch is being validated prior to release to the public. The developers have a release candidate, and the DevOps manager is requesting a report that shows the pass/fail data to verify that the fix does, in fact, resolve the problem. What process is the manager verifying?RolloutOrchestrationAutomationQA

      50 Jane has found a table merge issue in her SQL database hosted in a private cloud. While reviewing the log files, the vendor requested that she install a software change designed for rapid deployment that corrects a specific and critical issue. What are they referring to?HotfixPatchVersion updateRollout

      51 To meet regulatory requirements, a medical records company is required to store customer transaction records for seven years. The records will most likely never be accessed after the second year and can be stored offline to reduce expenses. What type of storage should they implement to achieve this goal?File transferArchiveReplicationData store

      52 Mark is creating a disaster recovery plan based on directives from his company's executive management team. His company's business is an e-commerce website that sells children's apparel, with 85 percent of its revenue received during the holiday season. If there was a severe disruption in operations, the loss of business could put the company's ongoing financial viability in peril. Mark is creating a plan that will restore operations in the shortest amount of time possible if there is an outage. What DR model is he implementing?Hot siteActive/activeWarm siteActive/passiveCold siteRollover

      53 You're researching data replication options for your SQL database. You've decided to create a backup replica in a different availability zone that could become primary should the primary zone go offline. The replica is updated in near real time after the initial write operation on the primary database. What type of solution is this?SynchronousAsynchronousVolume syncRemote mirroringRAID 5

      54 Pierre is deploying a solution that allows data for his e-commerce operations hosted in a public cloud to be reached at remote locations worldwide with local points of presence. He wants to reduce the load on his web servers and reduce the network latency of geographically distant customers. What are these facilities called?RegionsEdge locationsAvailability zonesReplication

      55 Melinda is updating her firm's disaster recovery plans, and after receiving direction from her company's board of directors, she has been instructed to create a plan that restores operations within 48 hours of a disaster. What part of the plan should she update with the new requirements?RSORPORTODBO

      56 Jillian is a Cloud+ consultant for an auto parts company based in central Michigan. She is putting together a disaster recovery plan that includes a remote backup site that has a SQL server instance running at that location with a synchronously refreshed data replica. Her plan calls for activating all other services in the event of a