Course Hero Logo
Question
Answered step-by-step

question 51  (1 point)   What is the purpose of automation and...

question 51 (1 point)

 

What is the purpose of automation and orchestration?

Question 51 options:

to allow for the recording and auditing of all events

to transmit data more securely

to provide a means for data backup

to allow you to apply patches to a VM


Which of the following protocols has the capability of retransferring lost packets?


Question 52 options:

IP

UDP

TCP

ARP


Which of the following are examples of advanced data storage solutions? (choose two)

Question 53 options:

NAS

SAD

SAN

DAN

SAS

Question 54 (1 point)

 

Why is vertical scaling executed only as a long-term solution when there is no other option?

Question 54 options:

It can have a disruptive effect.

It needs to be implemented with automatic dynamic scaling.

Users need to plan for downtime.

The scaling down needs to be done within a maintenance window.


Question 55 (1 point)

 

Which of the following is not a key field of cloud management referred to by FCAPS?

Question 55 options:

accounting

security

performance

feedback

Question 56 (1 point)

 

Which of the following is true of SSH?

Question 56 options:

It must be installed on both the server and client side, at the endpoints.

It must be used with iOS environments.

It is another network protocol like TCP/IP.

It can only be used to encrypt files.

Question 57 (1 point)

 

Saved

What is the purpose of a firewall?

Question 57 options:

scan for anomalies on the network

check for and deny malicious data packets from entering

predict future threats

protect the server


Question 58 (1 point)

 

Which of the following correctly describes an external attack?

Question 58 options:

when a hacker penetrates the cloud from the outside environment

when an employee intentionally deletes files

when somebody from inside the company tries to launch an attack

when the ACL is maliciously misconfigured

Question 59 (1 point)

 

What are the modes of IPsec?

Question 59 options:

SSH and Telnet

transport and tunnel

scrambling and descrambling

authentication and encapsulation

 

Question 60 (1 point)

 

What factor can contribute to a network bottleneck in a cloud deployment?

Question 60 options:

malformed data packets

the maximum transmission unit (MTU) has been exceeded

errors in the routing tables of the firewall

not enough security between the endpoints

Question 61 (1 point)

 

Saved

What is resource contention?

Question 61 options:

It occurs when the SaaS, the PaaS, and the IaaS are all sharing the same applications.

It can happen when a virtual server is being flooded with access requests.

It means that too many shared resources are being accessed all at once.

It is when multiple services try to access the same cloud resource.

Question 62 (1 point)

 

Which of the following storage types usually connects with the motherboard via SATA/ATA connection?

Question 62 options:

NAS

SAN

DAS

object storage

 

What is the purpose of cloud elasticity?

Question 63 options:

to add additional resources as necessary

to provide you with extra tools

to scale resources up and down as needed

to create additional virtual servers on demand


Question 64 (1 point)

 

What is cloud segmentation?

Question 64 options:

dividing server storage into different areas

keeping the IaaS, SaaS, and PaaS layers separate from one another

separating the cloud deployment so that security features can be enabled

creating separate RAID levels

 


What is the role of the DNS Server?


It breaks down the domain name into its corresponding IP address.

It sends emails from the sender to the receiver.

It stores data and information.

It contains resources that can be accessed by employees.

Question 66 

Which of the following is used for storage security on SANs?

Question 66 options:

obfuscation

ACL

zoning

host authentication

 

Question 67 (1 point)

 

Which of the following are types of cloud backup? (choose two)

Question 67 options:

incremental

mirror

onsite

differential

remote

 

Question 68 (1 point)

 

______ is a process of transferring data that is no longer in use to another storage system for storing over the long term.

Question 68 options:

Replication

Business continuity

Site mirroring

Archiving

Question 69 (1 point)

 

What is a template?

Question 69 options:

It is a representation of your fingerprint for an SSO.

It is part of a public key infrastructure.

It is used in hashing algorithms.

It is a prototype of a cloud system.

Question 70 (1 point)

 

Saved

What is a hotfix?

Question 70 options:

It is a tool used for rollbacks.

It is a patch that provides an instant snapshot of the system.

It is used to check for backdoors in source code.

It is a patch that can be deployed almost instantaneously.

 

Question 71 (1 point)

 

Saved

Which type of compression is used to transfer audio or video files?

Question 71 options:

lossless

lossy

file-level compression

block-level compression

Question 72 (1 point)

 

What is a cluster?

Question 72 options:

It is a series of computers networked together in tandem.

It interlinks the LAN to the WAN.

It is a series of servers connected to one another in a LAN.

It is a mesh-based network topology.

Question 73 (1 point)

 

Which of the following terms best describes "the time it takes for a data packet to move from source to destination"?

Question 73 options:

congestion

packet loss

jitter

latency

Question 74 (1 point)

 

What is a subnet?

Question 74 options:

It joins two LANS.

It joins a LAN and a WAN.

It is a component of a VPN.

It is one part of an overall IP network.

Question 75 (1 point)

 

What is the length of time a system can be taken offline in the event of a disaster called?

Question 75 options:

RPO

ARO

RTO

ALE

Question 76 (1 point)

 

What does a version update do?

Question 76 options:

It keeps software code locked from accidental modification.

It replaces the existing version of a software application.

It creates an iteration of document revisions from beginning to end.

It enables the blockchain process.

Question 77 (1 point)

 

Saved

What are two types of cloud backup methods?

Question 77 options:

snapshot and clone

tape and hard drive

USB and Flash

Azure and AWS

When does the server resort to a swap file?

Question 78 options:

when RAM usage is full

when CPU usage is full

when storage usage is full

when network usage is full

Question 79 (1 point)

 

What is thick provisioning?

Question 79 options:

operating at full capacity in an SaaS

using all of the storage allocated in an account

creating more VMs

using cloud storage only as needed

Question 80 (1 point)

 

What are the goals of resource pooling? (choose two)

Question 80 options:

overcoming the limitations of physical servers

allowing for scalability (ramping up and ramping down as needed

eliminating redundancies

emulation

Question 81 (1 point)

 

During failure, which of the following sites provides the shortest RTO (recovery time objective)?

Question 81 options:

cold site

hot site

warm site

hybrid site

Question 82 (1 point)

 

Saved

What are the different levels of RAID?

Question 82 options:

RAID 1, RAID 2, RAID 3, RAID 4, RAID 5

RAID 3, RAID 5, RAID 7, RAID 9

RAID 0, RAID 1, RAID 5, RAID 6

RAID 0, RAID 1, RAID 5, RAID 7

Question 83 (1 point)

 

Saved

How can a VPN be made more secure?

Question 83 options:

implementing a firewall at the endpoints

further encapsulating the data packet into more data packets

layering it in IPsec

using two-factor authentication (2FA)

 

Question 83 (1 point)

 

How can a VPN be made more secure?

Question 83 options:

implementing a firewall at the endpoints

further encapsulating the data packet into more data packets

layering it in IPsec

using two-factor authentication (2FA)

 

Question 84 (1 point)

 

Saved

When does privilege escalation occur?

Question 84 options:

when a user is granted higher privileges than their manager

when more users come to a cloud deployment

when increasing levels of scalability are added

when a user is granted higher privileges when not supposed to

Previous PageNext Page

 

Question 85 (1 point)

 

Saved

Which groups should be involved in a cloud change management process?

Question 85 options:

IT, HR, marketing, finance

IT, finance, and production

IT, HR, finance, and production

IT, finance, and production

 

Question 86 (1 point)

 

What is cloud orchestration?

Question 86 options:

creating new user accounts

creating new permissions

granting access to certain resources

using APIs to automate routine processes

 

Question 87 (1 point)

 

Saved

Which of the following are cloud migration techniques? (choose two)

Question 87 options:

on-premises to cloud

P2V

V2P

F2F

VMC

V2C

Question 88 (1 point)

 

What can cause a cloud capacity issue?

Question 88 options:

processing capabilities have reached their maximum limits

too many shared resources

too many users being granted access

overloading the RAM

Question 88 (1 point)

 

What can cause a cloud capacity issue?

Question 88 options:

processing capabilities have reached their maximum limits

too many shared resources

too many users being granted access

overloading the RAM

Question 90 (1 point)

 

Which kind of application makes use of a PKI?

Question 90 options:

gaining access to shared resources

endpoint security

transferring data to a server

video and audio conferencing

Question 91 (1 point)

 

Which is an example of an automation tool?

Question 91 options:

scripting

routers

endpoint detection technologies

APIs

Question 92 (1 point)

 

What is the purpose of a hypervisor?

Question 92 options:

It establishes the connection from the client to the server.

It encapsulates a data packet inside another one.

It provides authentication.

It allows for the creation of VMs.

Question 93 (1 point)

 

What is the purpose of a tcpdump?

Question 93 options:

to release data packets in a TCP/IP protocol

to monitor network traffic and is also called "sniffing"

to stores log files onto the virtual machine

to discard malicious data packets

Question 94 (1 point)

 

Saved

What is the purpose of federation?

Question 94 options:

to allow a user to log into multiple systems with just one credential

to grant access to network services to the user

to assign access as defined by user roles

to give the user access to the same resources among different cloud providers

Question 95 (1 point)

 

Saved

When should patches be applied to a VM?

Question 95 options:

daily

when a vulnerability is detected

as soon as they are available

one to two per week, as needed

Question 96 (1 point)

 

Which of the following is a disadvantage of RAID 0?

Question 96 options:

It is slow.

It has a complex configuration.

It doesn't detect errors.

It has a high cost.

Question 97 (1 point)

 

What is the cloud application life cycle?

Question 97 options:

the establishment of software functionalities

the period of utility of the cloud resource

the time when software patches and other upgrades are applied

the time when a cloud application is deleted after its useful life

Question 98 (1 point)

 

Which of the following is a component of the PKI?

Question 98 options:

the RSA algorithm

ciphertexts

the certificate store

the payload

Question 99 (1 point)

 

Saved

What is multifactor authentication?

Question 99 options:

when only one layer of security is used

when two or more layers of security are used

when passwords are used

when PINs are used

What is the purpose of a security policy?

Question 100 options:

to allow for authorization and authentication

to establish an awareness training program for employees

to mandate when to rehearse a disaster recovery (DR) drill

to know how to choose an alternate site when hit by a security breach

 

 

Answer & Explanation
Verified Solved by verified expert

onec alique

icitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, da

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer
Step-by-step explanation

s a molestie consequat, ultrices ac magna

icitur

at, ultrices ac ma

risus ante, dapibus a molestie consequat, ultrices ac magna.

m ipsum dolor

m ipsum dolor sit amet, consectetur adipiscing

iscing elit. Nam lacinia pulvinar tortor nec facilisis. Pe

Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec

nec facilisis. Pellente

onec aliquet. Lorem ipsum dolor sit amet, consec

consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis

sus ant

acinia pulvinar tortor nec facilisis. Pelle

et, consectetur adipiscing elit. Nam lacinia pul

a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec

Donec al

molestie consequat, ultrices ac

Donec aliqu

tesque dapibus efficitur laoreet. Nam risus ante, dapibus

consectetur adipiscing elit. Nam lacinia pulvinar tortor nec f

llentesque

congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem

nec facili

ec facilisis. Pellentesque dapibus efficitur

trices

rem ipsum dolor sit amet, consectetur adipiscing elit. Nam laci

ur laoreet. Nam

, ultrices ac magna. Fusce

Donec aliquet. Lorem ipsum dolor sit

ipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesq

itur laoree

molestie consequat, ultrices ac m

Donec aliquet. Lorem ip

, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet,

ultrices ac magna. Fusce dui lectus

ec facilisis. Pellentesque dapibus efficitur

rem ipsum dolo

ia pulvinar tortor nec facilisis. Pelle

or nec facilisis. Pellentesque dapibus

, dictum vitae odio. Donec aliquet. Lo

ur laore

ac, dictum vitae odio. Donec aliquet.

Donec aliquet. Lorem ipsum dolor sit amet, consectetur adip

ce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet.

icitur laoreet. Nam risus ante, d

s a molestie consequat, ultr

s a molestie consequat, ultrices ac magna. Fusc

itur laoreet. Nam risus

, dictum vitae odio. Donec aliquet. Lorem ipsum

ce dui lectus, congue vel laoreet ac, dictum vitae odio. Don

Student reviews
92% (12 ratings)