Asked by GrandArt277
question 51 (1 point) What is the purpose of automation and...
question 51 (1 point)
What is the purpose of automation and orchestration?
Question 51 options:
to allow for the recording and auditing of all events
to transmit data more securely
to provide a means for data backup
to allow you to apply patches to a VM
Which of the following protocols has the capability of retransferring lost packets?
Question 52 options:
IP
UDP
TCP
ARP
Which of the following are examples of advanced data storage solutions? (choose two)
Question 53 options:
NAS
SAD
SAN
DAN
SAS
Question 54 (1 point)
Why is vertical scaling executed only as a long-term solution when there is no other option?
Question 54 options:
It can have a disruptive effect.
It needs to be implemented with automatic dynamic scaling.
Users need to plan for downtime.
The scaling down needs to be done within a maintenance window.
Question 55 (1 point)
Which of the following is not a key field of cloud management referred to by FCAPS?
Question 55 options:
accounting
security
performance
feedback
Question 56 (1 point)
Which of the following is true of SSH?
Question 56 options:
It must be installed on both the server and client side, at the endpoints.
It must be used with iOS environments.
It is another network protocol like TCP/IP.
It can only be used to encrypt files.
Question 57 (1 point)
Saved
What is the purpose of a firewall?
Question 57 options:
scan for anomalies on the network
check for and deny malicious data packets from entering
predict future threats
protect the server
Question 58 (1 point)
Which of the following correctly describes an external attack?
Question 58 options:
when a hacker penetrates the cloud from the outside environment
when an employee intentionally deletes files
when somebody from inside the company tries to launch an attack
when the ACL is maliciously misconfigured
Question 59 (1 point)
What are the modes of IPsec?
Question 59 options:
SSH and Telnet
transport and tunnel
scrambling and descrambling
authentication and encapsulation
Question 60 (1 point)
What factor can contribute to a network bottleneck in a cloud deployment?
Question 60 options:
malformed data packets
the maximum transmission unit (MTU) has been exceeded
errors in the routing tables of the firewall
not enough security between the endpoints
Question 61 (1 point)
Saved
What is resource contention?
Question 61 options:
It occurs when the SaaS, the PaaS, and the IaaS are all sharing the same applications.
It can happen when a virtual server is being flooded with access requests.
It means that too many shared resources are being accessed all at once.
It is when multiple services try to access the same cloud resource.
Question 62 (1 point)
Which of the following storage types usually connects with the motherboard via SATA/ATA connection?
Question 62 options:
NAS
SAN
DAS
object storage
What is the purpose of cloud elasticity?
Question 63 options:
to add additional resources as necessary
to provide you with extra tools
to scale resources up and down as needed
to create additional virtual servers on demand
Question 64 (1 point)
What is cloud segmentation?
Question 64 options:
dividing server storage into different areas
keeping the IaaS, SaaS, and PaaS layers separate from one another
separating the cloud deployment so that security features can be enabled
creating separate RAID levels
What is the role of the DNS Server?
It breaks down the domain name into its corresponding IP address.
It sends emails from the sender to the receiver.
It stores data and information.
It contains resources that can be accessed by employees.
Question 66
Which of the following is used for storage security on SANs?
Question 66 options:
obfuscation
ACL
zoning
host authentication
Question 67 (1 point)
Which of the following are types of cloud backup? (choose two)
Question 67 options:
incremental
mirror
onsite
differential
remote
Question 68 (1 point)
______ is a process of transferring data that is no longer in use to another storage system for storing over the long term.
Question 68 options:
Replication
Business continuity
Site mirroring
Archiving
Question 69 (1 point)
What is a template?
Question 69 options:
It is a representation of your fingerprint for an SSO.
It is part of a public key infrastructure.
It is used in hashing algorithms.
It is a prototype of a cloud system.
Question 70 (1 point)
Saved
What is a hotfix?
Question 70 options:
It is a tool used for rollbacks.
It is a patch that provides an instant snapshot of the system.
It is used to check for backdoors in source code.
It is a patch that can be deployed almost instantaneously.
Question 71 (1 point)
Saved
Which type of compression is used to transfer audio or video files?
Question 71 options:
lossless
lossy
file-level compression
block-level compression
Question 72 (1 point)
What is a cluster?
Question 72 options:
It is a series of computers networked together in tandem.
It interlinks the LAN to the WAN.
It is a series of servers connected to one another in a LAN.
It is a mesh-based network topology.
Question 73 (1 point)
Which of the following terms best describes "the time it takes for a data packet to move from source to destination"?
Question 73 options:
congestion
packet loss
jitter
latency
Question 74 (1 point)
What is a subnet?
Question 74 options:
It joins two LANS.
It joins a LAN and a WAN.
It is a component of a VPN.
It is one part of an overall IP network.
Question 75 (1 point)
What is the length of time a system can be taken offline in the event of a disaster called?
Question 75 options:
RPO
ARO
RTO
ALE
Question 76 (1 point)
What does a version update do?
Question 76 options:
It keeps software code locked from accidental modification.
It replaces the existing version of a software application.
It creates an iteration of document revisions from beginning to end.
It enables the blockchain process.
Question 77 (1 point)
Saved
What are two types of cloud backup methods?
Question 77 options:
snapshot and clone
tape and hard drive
USB and Flash
Azure and AWS
When does the server resort to a swap file?
Question 78 options:
when RAM usage is full
when CPU usage is full
when storage usage is full
when network usage is full
Question 79 (1 point)
What is thick provisioning?
Question 79 options:
operating at full capacity in an SaaS
using all of the storage allocated in an account
creating more VMs
using cloud storage only as needed
Question 80 (1 point)
What are the goals of resource pooling? (choose two)
Question 80 options:
overcoming the limitations of physical servers
allowing for scalability (ramping up and ramping down as needed
eliminating redundancies
emulation
Question 81 (1 point)
During failure, which of the following sites provides the shortest RTO (recovery time objective)?
Question 81 options:
cold site
hot site
warm site
hybrid site
Question 82 (1 point)
Saved
What are the different levels of RAID?
Question 82 options:
RAID 1, RAID 2, RAID 3, RAID 4, RAID 5
RAID 3, RAID 5, RAID 7, RAID 9
RAID 0, RAID 1, RAID 5, RAID 6
RAID 0, RAID 1, RAID 5, RAID 7
Question 83 (1 point)
Saved
How can a VPN be made more secure?
Question 83 options:
implementing a firewall at the endpoints
further encapsulating the data packet into more data packets
layering it in IPsec
using two-factor authentication (2FA)
Question 83 (1 point)
How can a VPN be made more secure?
Question 83 options:
implementing a firewall at the endpoints
further encapsulating the data packet into more data packets
layering it in IPsec
using two-factor authentication (2FA)
Question 84 (1 point)
Saved
When does privilege escalation occur?
Question 84 options:
when a user is granted higher privileges than their manager
when more users come to a cloud deployment
when increasing levels of scalability are added
when a user is granted higher privileges when not supposed to
Previous PageNext Page
Question 85 (1 point)
Saved
Which groups should be involved in a cloud change management process?
Question 85 options:
IT, HR, marketing, finance
IT, finance, and production
IT, HR, finance, and production
IT, finance, and production
Question 86 (1 point)
What is cloud orchestration?
Question 86 options:
creating new user accounts
creating new permissions
granting access to certain resources
using APIs to automate routine processes
Question 87 (1 point)
Saved
Which of the following are cloud migration techniques? (choose two)
Question 87 options:
on-premises to cloud
P2V
V2P
F2F
VMC
V2C
Question 88 (1 point)
What can cause a cloud capacity issue?
Question 88 options:
processing capabilities have reached their maximum limits
too many shared resources
too many users being granted access
overloading the RAM
Question 88 (1 point)
What can cause a cloud capacity issue?
Question 88 options:
processing capabilities have reached their maximum limits
too many shared resources
too many users being granted access
overloading the RAM
Question 90 (1 point)
Which kind of application makes use of a PKI?
Question 90 options:
gaining access to shared resources
endpoint security
transferring data to a server
video and audio conferencing
Question 91 (1 point)
Which is an example of an automation tool?
Question 91 options:
scripting
routers
endpoint detection technologies
APIs
Question 92 (1 point)
What is the purpose of a hypervisor?
Question 92 options:
It establishes the connection from the client to the server.
It encapsulates a data packet inside another one.
It provides authentication.
It allows for the creation of VMs.
Question 93 (1 point)
What is the purpose of a tcpdump?
Question 93 options:
to release data packets in a TCP/IP protocol
to monitor network traffic and is also called "sniffing"
to stores log files onto the virtual machine
to discard malicious data packets
Question 94 (1 point)
Saved
What is the purpose of federation?
Question 94 options:
to allow a user to log into multiple systems with just one credential
to grant access to network services to the user
to assign access as defined by user roles
to give the user access to the same resources among different cloud providers
Question 95 (1 point)
Saved
When should patches be applied to a VM?
Question 95 options:
daily
when a vulnerability is detected
as soon as they are available
one to two per week, as needed
Question 96 (1 point)
Which of the following is a disadvantage of RAID 0?
Question 96 options:
It is slow.
It has a complex configuration.
It doesn't detect errors.
It has a high cost.
Question 97 (1 point)
What is the cloud application life cycle?
Question 97 options:
the establishment of software functionalities
the period of utility of the cloud resource
the time when software patches and other upgrades are applied
the time when a cloud application is deleted after its useful life
Question 98 (1 point)
Which of the following is a component of the PKI?
Question 98 options:
the RSA algorithm
ciphertexts
the certificate store
the payload
Question 99 (1 point)
Saved
What is multifactor authentication?
Question 99 options:
when only one layer of security is used
when two or more layers of security are used
when passwords are used
when PINs are used
What is the purpose of a security policy?
Question 100 options:
to allow for authorization and authentication
to establish an awareness training program for employees
to mandate when to rehearse a disaster recovery (DR) drill
to know how to choose an alternate site when hit by a security breach
Answered by ChiefBoulder2910
onec alique
icitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, daUnlock full access to Course Hero
Explore over 16 million step-by-step answers from our library
Subscribe to view answers a molestie consequat, ultrices ac magna
icitur
at, ultrices ac ma
risus ante, dapibus a molestie consequat, ultrices ac magna.
m ipsum dolor
m ipsum dolor sit amet, consectetur adipiscing
iscing elit. Nam lacinia pulvinar tortor nec facilisis. Pe
Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec
nec facilisis. Pellente
onec aliquet. Lorem ipsum dolor sit amet, consec
consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis
sus ant
acinia pulvinar tortor nec facilisis. Pelle
et, consectetur adipiscing elit. Nam lacinia pul
a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec
Donec al
molestie consequat, ultrices ac
Donec aliqu
tesque dapibus efficitur laoreet. Nam risus ante, dapibus
consectetur adipiscing elit. Nam lacinia pulvinar tortor nec f
llentesque
congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem
nec facili
ec facilisis. Pellentesque dapibus efficitur
trices
rem ipsum dolor sit amet, consectetur adipiscing elit. Nam laci
ur laoreet. Nam
, ultrices ac magna. Fusce
Donec aliquet. Lorem ipsum dolor sit
ipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesq
itur laoree
molestie consequat, ultrices ac m
Donec aliquet. Lorem ip
, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet,
ultrices ac magna. Fusce dui lectus
ec facilisis. Pellentesque dapibus efficitur
rem ipsum dolo
ia pulvinar tortor nec facilisis. Pelle
or nec facilisis. Pellentesque dapibus
, dictum vitae odio. Donec aliquet. Lo
ur laore
ac, dictum vitae odio. Donec aliquet.
Donec aliquet. Lorem ipsum dolor sit amet, consectetur adip
ce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet.
icitur laoreet. Nam risus ante, d
s a molestie consequat, ultr
s a molestie consequat, ultrices ac magna. Fusc
itur laoreet. Nam risus
, dictum vitae odio. Donec aliquet. Lorem ipsum
ce dui lectus, congue vel laoreet ac, dictum vitae odio. Don