IT CertificationsComprehensive Study Set

Comptia Cloud Essentials Practice Exam

160 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following statements regarding CompTIA Cloud Essentials is incorrect? A. The certification is a Specialty certification B. There is an exam that maps to this course C. This course prepares you for the exam D. The course is specific to Cisco systems

ANSWER

D

QUESTION 2

Which of the following is NOT a major focus in this course? A. Business impacts B. Risk mitigation C. General networking concepts D. Technology options

ANSWER

C

QUESTION 3

Which of the following cloud features increases the available IT infrastructure resources to meet the demands? A. Reliability B. Resource metering C. Scalability D. Broad network access

ANSWER

C

QUESTION 4

What aspect of cloud computing allows you to save on costs in a direct fashion? A. Read-only replicas B. On-demand C. Resource metering D. Quickly expanding storage

ANSWER

B

QUESTION 5

Which of the following is an example of a resource pooling technology? A. Hotmail B. Cisco UCS C. Gmail D. Open standards

ANSWER

B

QUESTION 6

Which of the following is a valid advantage of server virtualization? A. Fully automated elasticity B. Unlimited virtual machine usage C. No need for a software layer D. Independent hardware

ANSWER

D

QUESTION 7

The client OS is virtualized with VDI. True or false? A. True B. False

ANSWER

A

QUESTION 8

Which is not a typical step with virtual machine (server) creation in a public cloud? A. Selection of the OS B. Sizing of the hardware resources C. Securing access to the VM D. Downloading of OS software

ANSWER

D

QUESTION 9

What does Microsoft use as a virtualization product? A. vSphere B. Fusion C. Hyper-V D. ZenWorks

ANSWER

C

QUESTION 10

Which of the following provisioning types is most suitable for a virtual hard disk with 200 GB of space, and ensures that disk storage can be flexibly allocated between virtual machines? A. Thick provisioning B. Random provisioning C. Thin provisioning D. Test provisioning

ANSWER

C

QUESTION 11

When using Hyper-V's TURN OFF feature, data loss could occur within the virtual machine. True or False? A. True B. False

ANSWER

A

QUESTION 12

What took place in the 1960s that was an early example of the cloud technology we see today? A. Web-based E-mail B. Expensive computer hardware was shared C. Application Service Providers D. Service-oriented Architecture

ANSWER

B

QUESTION 13

Which of the following is an early example of cloud technology? A. Top of rack policy enforcement B. Infrastructure As A Service C. Data center interconnects D. Web-based email in the form of Hotmail

ANSWER

D

QUESTION 14

Which of the following featured applications were built using component services that could be distributed across connected systems? A. SOA B. Virtualized APIs C. Distributed middleware D. ASP

ANSWER

A

QUESTION 15

Which of the following provide incentive for a company to adopt cloud solutions? (Choose three) A. Excess resources B. Large sunk expense costs C. Predictable and fixed workloads D. Variable user base

ANSWER

ABD

QUESTION 16

Which of the following is not a negative indicator for a company moving to the cloud? A. Possessing a large data center B. Failing to meet increased demand C. Compliance issues D. The need for assured operational characteristics

ANSWER

B

QUESTION 17

Which of the following are examples of SaaS? (Choose two) A. Twitter B. Gmail C. AWS S3 D. Azure

ANSWER

AB

QUESTION 18

Which of the following is an example of PaaS? A. SalesForce B. Azure C. Gmail D. DropBox

ANSWER

B

QUESTION 19

Using AWS EC2 instances is an example of which of the following? A. BPaaS B. IaaS C. PaaS D. SaaS

ANSWER

B

QUESTION 20

Which of the following is a commonality between cloud and outsourcing? A. Tailor made solutions B. Contract length C. Both are very specific to IT D. Vendor lock-in

ANSWER

D

QUESTION 21

Cloud services tend to feature much longer contract durations compared to traditional outsourcing. True or false? A. True B. False

ANSWER

B

QUESTION 22

For software libraries, which of the following platforms play a vital role in cloud services? A. SaaS B. BPaaS C. IaaS D. PaaS

ANSWER

D

QUESTION 23

Data that's been unaltered during transmission is an example of which of the following? A. Integrity B. Authentication C. Accounting D. Logging

ANSWER

A

QUESTION 24

Load Balancing can provide which of the following? A. Availability B. Troubleshooting C. Compliance D. Auditing

ANSWER

A

QUESTION 25

AWS is a classic example of which of the following? A. Private B. Public C. Community D. Hybrid

ANSWER

B

QUESTION 26

When a company uses its own internal cloud IaaS, which of the following deployment types is this an example of? A. Private B. Community C. Hybrid D. Public

ANSWER

A

QUESTION 27

When a company participates with others to provide cloud services, which of the following is this an example of? A. Community B. Hybrid C. Public D. Private

ANSWER

A

QUESTION 28

What is the measure of delay when using cloud services? A. Latency B. SLA C. Packet loss D. Attenuation

ANSWER

A

QUESTION 29

Which of the following terms can be defined as the use of a third party to assist in authentication? A. Logging B. WAP C. Federation D. Encryption

ANSWER

C

QUESTION 30

_____ is an example of standardization with cloud adoption? A. API B. As a Service C. Patches and updates D. Private cloud

ANSWER

A

QUESTION 31

When it comes to performance, which of the following is critical when trying to ensure a successful cloud adoption? A. Replication B. SLA C. Time D. Rate per MB

ANSWER

B

QUESTION 32

Which of the following is not a major concern or risk when moving to the cloud? A. On-demand B. Integration C. Security D. Replication

ANSWER

A

QUESTION 33

Which of the following is a traditional approach to application development? A. Agile B. Iterative C. Test and Run D. Waterfall

ANSWER

D

QUESTION 34

Which of the following are often associated with cloud technologies? (Choose two) A. Web-based B. SOA C. Monolithic D. Client-only

ANSWER

AB

QUESTION 35

There is often a single level of cloud service you should recommend. True or false? A. True B. False

ANSWER

B

QUESTION 36

Which two of the following are often considered critical deployment steps for cloud? (Choose two) A. Risk assessment B. Pilot C. Scrum techniques D. Forklift upgrade

ANSWER

AB

QUESTION 37

What protocol is recommended when connecting to virtual machines in your cloud provider? A. SSH B. HTTP C. Telnet D. FTP

ANSWER

A

QUESTION 38

The maintenance of software libraries is the most critical for a cloud vendor offering what type of cloud service? A. IaaS B. SaaS C. PaaS D. NaaS

ANSWER

C

QUESTION 39

What is critical to have in place in the event your cloud provider ceases operations? A. Exit strategy B. SLA documents C. Security audit D. Compliance review

ANSWER

A

QUESTION 40

Which of the following is not a cloud deployment option? A. Public B. Open Standard C. Private D. Community

ANSWER

B

QUESTION 41

Cloud technologies often used a shared infrastructure? True or false? A. True B. False

ANSWER

A

QUESTION 42

Which of the following is not a recommended technique when migrating applications to the cloud? A. Consider a pilot B. Target non-mission critical apps first C. PaaS first D. Target easy apps to migrate first

ANSWER

C

QUESTION 43

What type of app might be an excellent first choice for migration? A. Monolithic B. Simple desktop productivity app C. Transaction-based D. Mission-critical

ANSWER

B

QUESTION 44

An IT organization tends to be more concerned about service reliability than resource availability when they move to the cloud. True or false? A. True B. False

ANSWER

A

QUESTION 45

Which of the following is not a service phase in ITIL? A. Operation B. Disposal C. Transition D. Strategy E. Design

ANSWER

B

QUESTION 46

IAM is part of what area of ITIL? A. Information Security Management B. Service Transition C. Change Management D. Incident Response

ANSWER

A

QUESTION 47

Incident management is part of what ITIL service phase? A. Service Strategy B. Service Operation C. Service Design D. Service Transition

ANSWER

B

QUESTION 48

What are two aspects of the service transition phase? (Choose two) A. Change Management B. Knowledge Management C. Information Security Management D. Service Level Management E. Financial Management

ANSWER

AB

QUESTION 49

Compliance in the context of the cloud means meeting regulatory or legal requirements. True or false? A. True B. False

ANSWER

A

QUESTION 50

If you are using AWS as your public cloud, it is your responsibility to ensure all aspects of compliance. True or false? A. True B. False

ANSWER

B

QUESTION 51

Which type of cost tends to be variable? A. CAPEX B. Initial investment costs C. OPEX D. Sunk costs

ANSWER

C

QUESTION 52

Cloud costs tend to be most comparable to what type of cost? A. A lease for a new building B. An electric utility bill C. A bill for initial server acquisitions D. None of these options are correct

ANSWER

B

QUESTION 53

When comparing cloud and outsourcing services, the cloud providers have more customers than outsourcing. True or false? A. True B. False

ANSWER

A

QUESTION 54

Which of the following is not a valid method of demonstrating strategic flexibility? A. Moving to a new application B. Avoiding vendor lock-in be ensuring migration to another cloud C. Bringing the IT infrastructure components in house D. Performing an annual independent audit of the cloud provider hardware

ANSWER

D

QUESTION 55

With cloud computing services, hardware purchases, software purchases, and IT support are the responsibility of whom? A. Internet service provider B. RraaS provider C. SaaS provider D. Application service provider

ANSWER

C

QUESTION 56

Which term best describes the ability to rapidly increase user accounts for a given cloud service? A. Volatility B. Synchronicity C. Viability D. Elasticity

ANSWER

D

QUESTION 57

Which option describes a benefit of virtualized servers? A. Shared hardware B. Individual hardware per virtual server C. Physical servers taking less room space than virtual servers D. Virtual servers taking less disk space than physical servers

ANSWER

A

QUESTION 58

Your company runs a virtualized web application server in-house. You decide to make the web applications available over the Internet through a cloud provider. Which method represents the quickest way to accomplish this? A. Create a new cloud server, install web services, and install and configure web applications. B. Create a new cloud server, install web services, and import web application data. C. Migrate your in-house web application server to the cloud. D. This cannot be done — only generic applications are available through the cloud.

ANSWER

C

QUESTION 59

Which term from the past describes the sharing of mainframe computing resources? A. Time-sharing B. Time division multiplexing C. Mainframe-sharing D. XaaS

ANSWER

A

QUESTION 60

Purchasing software and providing it to a third party that installs and manages that software is an example of which of the following? A. Virtualization B. Application service provider C. Platform as a service D. Private cloud

ANSWER

B

QUESTION 61

You are the IT director for a retail clothing outlet. Your competitors are using Internet-delivered inventory, storage, and backup solutions from a specific provider. You conclude it is best that your company use the same services from the same provider. What type of cloud will you be subscribing to? A. Community cloud B. Retail cloud C. Private cloud D. Public cloud

ANSWER

A

QUESTION 62

For which businesses would cloud computing be best suited? (Choose two.) A. Waterfront marketplace that thrives during the summer tourist season B. Rural medical practice with four employees C. Law enforcement agency D. A new company start-up that manufactures watercraft

ANSWER

AD

QUESTION 63

Which of the following are valid reasons for a firm's not adopting a cloud solution? (Choose two.) A. Local hardware is being fully utilized for unchanging IT workloads. B. The number of employees rarely changes. C. The number of employees changes often. D. The firm experiences unpredictable project spikes throughout the year.

ANSWER

AB

QUESTION 64

As a developer for a software company, you have decided to build and test your web applications in a cloud environment. Which type of cloud service best meets your needs? A. PaaS B. SaaS C. IaaS D. Xaas

ANSWER

A

QUESTION 65

How are cloud computing and outsourcing similar? A. Immediate scalability B. Vendor lock-in C. Long contract renegotiation D. Tailor-made client solutions

ANSWER

B

QUESTION 66

Which of the following is a benefit of outsourcing? A. Immediate scalability B. Vendor lock-in C. Long contract renegotiation D. Tailor-made client solutions

ANSWER

D

QUESTION 67

True or false? Cloud computing is a form of outsourcing. A. True B. False

ANSWER

A

QUESTION 68

What cloud computing characteristic ensures services and data are always reachable? A. Confidentiality B. Integrity C. Availability D. Scalability

ANSWER

C

QUESTION 69

You must ensure that your business computing resources can quickly grow as business demands change. Which of the following allows this? A. Confidentiality B. Integrity C. Availability D. Scalability

ANSWER

D

QUESTION 70

[Blank] protects data contents, while [blank] ensures that data has not been tampered with. A. Availability, scalability B. Integrity, confidentiality C. Scalability, availability D. Confidentiality, integrity

ANSWER

D

QUESTION 71

Which of the following are related to cloud computing costs? (Choose two.) A. Monthly subscription B. Server hardware costs C. Usage fees D. Software licensing costs

ANSWER

AC

QUESTION 72

How does cloud computing help an organization as new opportunities arise? (Choose two.) A. Shifting operating expenses to capital expenses B. Speedy addition of computing resources C. Less cost for new server hardware D. Speedy removal of computing resources

ANSWER

BD

QUESTION 73

[Blank] and [blank] give cloud customers a competitive advantage. A. Integrity, confidentiality B. Availability, integrity C. Time to market, collaboration D. Collaboration, confidentiality

ANSWER

C

QUESTION 74

Which of the following statements are true? (Choose two.) A. Public clouds are for the exclusive use of a single organization. B. Private clouds are for the exclusive use of a single organization C. Public clouds are offered over an intranet. D. Public clouds are offered over the Internet.

ANSWER

BD

QUESTION 75

True or false? Virtual servers are used only in public clouds. A. True B. False

ANSWER

B

QUESTION 76

When creating cloud virtual servers, which of the following must be specified? (Choose two.) A. Username and password B. Server name C. IP address D. Operating system licensing

ANSWER

AB

QUESTION 77

You are linking your company's Microsoft Active Directory user accounts to your cloud provider for federated identity management. What type of configuration must you create within your company? A. Identity trust B. XML provider C. Relying party trust D. JSON provider

ANSWER

C

QUESTION 78

Your public cloud environment is configured such that additional cloud storage is allocated to a virtual server when the used disk space on that server reaches more than 80 percent of disk capacity. Which term best describes this configuration? A. Elasticity B. Automation C. Self-service D. Disk latency

ANSWER

B

QUESTION 79

Which of the following might factor into an exit strategy for a cloud customer? A. Vendor lock-in B. Self-service C. Standardization D. Automation

ANSWER

C

QUESTION 80

Which of the following is not considered a cloud computing risk? A. Loss of network connectivity B. Data stored in the cloud C. Network latency D. Host-based firewalls

ANSWER

D

QUESTION 81

What is a benefit of PaaS? A. Rapid application development B. Replication C. High bandwidth D. Low latency

ANSWER

A

QUESTION 82

Developers build these components in the cloud. A. Federation identity providers B. Cloud load balancers C. SaaS user mailboxes D. Web services

ANSWER

D

QUESTION 83

Which of the following is NOT a recognized cloud classification model? A. IaaS B. QoS C. PaaS D. SaaS

ANSWER

B

QUESTION 84

In keeping with organizational goals of a corporation when deploying an application to a cloud services provider, which of the following is NOT a selection criteria for choosing a pilot? A. Security of application data B. Usability in a cloud environment C. Successful completion D. Low impact of failure

ANSWER

C

QUESTION 85

In using a structured approach to explore the potential impact of cloud computing in an organization undergoing the impact and changes that occur during Cloud service adoption, which of the following is an ITIL Service Lifecycle consideration? A. Service Upgrade B. Service Disconnection C. Service Operation D. Service Continuance

ANSWER

C

QUESTION 86

In using a structured approach to explore the potential impact of cloud computing in an organization undergoing the impact and changes that occur during Cloud service adoption, which of the following is an ITIL Service Lifecycle consideration? A. Service Occurrence B. Service Optimization C. Service Ownership D. Service Operation

ANSWER

D

QUESTION 87

Which of following is the MOST beneficial aspect of public cloud deployment for a startup company? A. Ease of infrastructure management B. Reduced Mean Time to Implement C. Shared company resources D. No upfront capital expenditure

ANSWER

D

QUESTION 88

A webmail service hosted by an MSP for which of the following is considered a private cloud? A. A single company B. Nonprofit companies C. Many companies D. Marketing companies

ANSWER

A

QUESTION 89

Which of the following recognized approaches for managing an organization's technology environment can be applied to cloud computing services? A. American National Standards Institute (ANSI) B. National Institute of Standards and Technology (NIST) C. Information Technology Infrastructure Library (ITIL) D. Project Management Institute (PMI)

ANSWER

C

QUESTION 90

Which of the following is the MOST likely reason for subscribing to PaaS? A. Virus protection B. Software application access C. Application development D. Infrastructure tuning

ANSWER

C

QUESTION 91

A company's email software vendor charged them $500 a month to use software, licensed for the maximum number of active email addresses. The company switched to a cloud-based email software that charged based on the number of active email addresses each month. The company was billed $100 the first month, $200 the second month, and $100 for the remaining 10 months of the year. After a year, how much money did the company save by switching to cloud computing? A. $1,300 B. $4,500 C. $4,700 D. $6,000

ANSWER

C

QUESTION 92

Which of the following is the MOST widely used example of cloud computing? A. Business ratings B. Online email C. Online education D. Geo-caching

ANSWER

B

QUESTION 93

Which of the following storage provisioning methods is implemented at the hardware level of a SAN and can be completed in either a soft or hard basis? A. LUN masking B. Network share creation C. Zoning D. Multipathing

ANSWER

C

QUESTION 94

For which of the following protocols will an administrator configure a trap to collect system state data? A. SNMP B. FTPS C. IPMI D. SMTP

ANSWER

A

QUESTION 95

Which of the following commands provides measurements of round-trip network latency? A. ping B. route C. arp D. nslookup

ANSWER

A

QUESTION 96

Compared to Type II hypervisors, Type I hypervisors generally have lower: A. numbers of VMs per host B. requirements for host overhead C. numbers of hosts installed in datacenters D. costs

ANSWER

B

QUESTION 97

Which of the following methods can an Administrator use to force an array to allow data to be distributed one node at a time in a private cloud implementation? A. Least connections B. Least used C. Best bandwidth D. Round robin

ANSWER

D

QUESTION 98

Which of the following should an administrator use when marking VLAN traffic? A. Virtual Local Area Network tagging B. Network Address Translation C. Subnetting D. Port Address Translation

ANSWER

A

QUESTION 99

Which of the following will allow an administrator to quickly revert a VM back to a previous state? A. Metadata B. Snapshots C. Extended metadata D. Cloning

ANSWER

B

QUESTION 100

Which of the following is the meaning of IaaS? A. IT as a Service B. Information as a Service C. Infrastructure as a Service D. Identity as a Service

ANSWER

C

QUESTION 101

Which of the following is the meaning of PaaS? A. Ping as a Service B. Process as a Service C. Programming as a Service D. Platform as a Service

ANSWER

D

QUESTION 102

Which of the following is the meaning of SaaS? A. Solutions as a Service B. Software as a Service C. Servers as a Service D. Security as a Service

ANSWER

B

QUESTION 103

A community name is used by: A. WMI B. SMTP C. SNMP D. SMS

ANSWER

C

QUESTION 104

Which of the following high availability solutions would a cloud service provider use when deploying Software as a Service? A. Virtual switches B. Multipathing C. Load balancing D. Clustering servers

ANSWER

D

QUESTION 105

Which of the following hypervisor types requires the least overhead? A. Type II B. open source C. Type I D. hosted

ANSWER

C

QUESTION 106

In a RAID 6 environment a technician is trying to calculate how many read operations would be made. How many read operations would be required in RAID 6? A. One B. Four C. Two D. Three

ANSWER

D

QUESTION 107

Which of the following allows authentication based on something you are? (Select TWO) A. Passwords B. Access badge C. Retina scan D. Key fobs E. Voice recognition F. PIN

ANSWER

CE

QUESTION 108

What deployment model is the most popular today and allows companies to host their own cloud services while relying on cloud vendors for other services? A. Public B. Hybrid C. Community D. Private

ANSWER

B

QUESTION 109

What is not a common cloud component categorization? A. Application B. Legacy C. Compute D. Network E. Storage F. Security

ANSWER

B

QUESTION 110

Which is not a typical area of interaction between cloud and non-cloud resources? A. Firewalling B. Authentication C. Physical security D. Internet connectivity to the cloud

ANSWER

C

QUESTION 111

Which of the following is not a typical concern for your deployment plan regarding a key internal application? A. Dynamic IP address needs B. Direct access to HW requirement C. Large file transfers D. Legacy API usage

ANSWER

A

QUESTION 112

Which cloud technique should be considered if you wanted to ease the administration required for a common, simple task? A. Elasticity B. Automation C. Load balancing D. Orchestration

ANSWER

B

QUESTION 113

Which of the following is not a typical choice you must make regarding a target host in the cloud? A. RAM B. Disk Type C. CPUs D. 64-bit vs 32-bit

ANSWER

D

QUESTION 114

Which of the following is not a typical part of a cloud deployment execution plan? A. Workflow execution B. Documentation C. Change management D. Access audits

ANSWER

D

QUESTION 115

Which of the following is false? A. Vulnerability testing seeks to find security flaws in the IT infrastructure B. Load testing can be critical to test promised service levels C. Common deployment types include Production, Development, and QA D. With public clouds, you can typically perform penetration testing whenever it's convenient for you

ANSWER

D

QUESTION 116

Which of the following head-to-head comparisons might you engage in with your deployment test data? (Choose two) A. Existing logs B. Compliance reports C. User feedback D. SLAs E. Baselines

ANSWER

DE

QUESTION 117

Match the virtual network technology with the best definition. 1. VXLAN 2. DMZ 3. Microsegmentation 4. Subnet A. Each host in it's own domain B. 16 Million IDs C. Sizing for future expansion is important D. Services secured for outside network access

ANSWER

BDAC

QUESTION 118

In Microsoft Azure, which component of networking allows for easier management of cloud components? A. Virtual Partitions B. Virtual Collections C. Resource Groups D. Virtual Private Clouds

ANSWER

C

QUESTION 119

Which CPU technology might be required by your VMware image in order for it to function properly? A. Ballooning B. VT-x C. Caching D. Bursting

ANSWER

B

QUESTION 120

Where is the most likely use of FC as the communication protocol in storage? A. DAS B. NAS C. SAN D. Object-based

ANSWER

C

QUESTION 121

S3 is an example of which type of storage technology? A. File-based B. Object-based C. Block-based D. Folder-based

ANSWER

B

QUESTION 122

Which property is associated with thin provisioning? A. Compression B. Tiering C. Strict reservations D. Dynamic expansion

ANSWER

D

QUESTION 123

What type of replication strategy copies data to a redundant storage location immediately as data is written? A. Asynchronous B. Intra-region C. Inter-region D. Synchronous

ANSWER

D

QUESTION 124

Which AWS S3 technology allows for the cloning of original files before modification to them? A. Encryption B. Versioning C. Bucket Mirroring D. Object logging

ANSWER

B

QUESTION 125

Which migration type should be performed if you discover your app did not support virtualization properly? A. V2P B. V2V C. P2V D. P2P

ANSWER

A

QUESTION 126

What does "follow the sun" mean in terms of workload migrations? A. You can safely ignore time zone concerns when provisioning resources B. Services must be available at sun up in a certain region C. Always use GMT when scheduling services D. Never have a service running for more than 24 hours

ANSWER

B

QUESTION 127

To convey the identity of a user, which of the following is passed between a federation server and a domain? A. Username and password B. SID only C. Password only D. Token

ANSWER

D

QUESTION 128

Which of the following is not a major concern you should have when thinking about cloud technologies and security? A. Consider applicable laws and regulations B. Always use the latest in security technologies C. Consider best practices for resources D. Consider your company security policy

ANSWER

B

QUESTION 129

What does GRE offer for security when it tunnels IP traffic? A. DES B. AES C. 3DES D. Nothing

ANSWER

D

QUESTION 130

If you're engaged with a Google Cloud IaaS, which of the following should not concern you? A. Disabling unneeded ports and services B. Security patching for VMs C. Installation of anti-malware on the VM D. Physical security of the host

ANSWER

D

QUESTION 131

A user account that gains the needed permissions from a group membership is known as which of the following? A. Mandatory access control B. Open access C. Non-discretionary access control D. Discretionary access control

ANSWER

D

QUESTION 132

Within AWS, which security structure should be used to control the traffic flowing between your subnets in your VPC? A. Security Group B. Network ACL C. Role D. WAF

ANSWER

B

QUESTION 133

In cloud security, what does MFA stand for?

ANSWER

Multi-Factor Authentication

QUESTION 134

The organized controlled collection, and execution of many tasks is what in the cloud? A. Scalability B. Scripting C. Automation D. Orchestration

ANSWER

D

QUESTION 135

What is the point of a Blue - Green deployment model? A. Both environments can serve requests increasing scalability B. To permit testing, one of the two deployments is not active C. Each deployment is in a different region to increase HA D. Each deployment always runs a different code version

ANSWER

B

QUESTION 136

Which of the following is a small update designed to fix a flaw and is often considered an emergency measure? A. Rollback B. Hotfix C. Update D. Patch

ANSWER

B

QUESTION 137

Which of the following backs up everything since the last full backup? A. Differential B. Daily C. Read only replica D. Incremental

ANSWER

A

QUESTION 138

Regarding your disaster recovery method, which of the following should be a key consideration? A. Hypervisor type B. Bandwidth C. API selection D. Hardware vendor

ANSWER

B

QUESTION 139

In AWS, different Availability Zones are located in which construct? A. Regions B. Data Centers C. Areas D. Continents

ANSWER

A

QUESTION 140

Regarding cloud technology, what does BCP stand for? A. Backup Colocation Procedure B. Big Compute Processing C. Business Progress Planning D. Business Continuity Plan

ANSWER

D

QUESTION 141

Which of the following is not an example of a maintenance task we would automate in a cloud environment? A. Cleanup of orphaned resources B. Clearing of log files C. Provision and deployment of a new firewall D. Removal of inactive accounts

ANSWER

C

QUESTION 142

Which of the following is related to monitoring and can be defined as an occurrence that is out of the ordinary? A. Event B. Correlation C. Baseline D. Anomaly

ANSWER

D

QUESTION 143

Within IT, what does CMDB stand for? A. Cloud Management Database B. Configuration Management Database C. Cloud Management Data Block D. Configuration Monitoring Database

ANSWER

B

QUESTION 144

Which of the following permits dynamic elasticity? A. Auto Encryption B. Auto Scaling C. Replication D. Auto Migration

ANSWER

B

QUESTION 145

Which of the following is not a typical account lifecycle event? A. Deletion B. Creation C. Move D. Deactivation

ANSWER

C

QUESTION 146

Following the deployment of your cloud resources, which of the following would you most likely not be monitoring? A. CPU utilization B. RAM utilization C. Root account access D. Storage utilization

ANSWER

C

QUESTION 147

You've decided to provide a web application and scale it by using many small Linux instances. Adding four instances and load balancing between them over the last month is an example of which of the following? A. Scaling up B. Scaling out C. Scaling down D. Scaling in

ANSWER

B

QUESTION 148

Which of the following might govern how we need to report metrics for our cloud infrastructure? (Choose two) A. Based on SLA B. Public cloud vendor requirement C. Corporate policy D. Third party mandate

ANSWER

AC

QUESTION 149

Order these troubleshooting methodology steps with the first step on top to the last step on the bottom. A. Establish a theory B. Implement preventative measures C. Establish a plan of action D. Identify the problem

ANSWER

DACB

QUESTION 150

While troubleshooting your cloud issue, you discover there are multiple problems. Which of the following should you do? A. Group the problems together and solve holistically B. Escalate C. Approach each individually D. Begin the establishment of a new theory

ANSWER

C

QUESTION 151

If a top-to-bottom troubleshooting approach is used, which layer of the OSI model should you start with? A. Physical B. Application C. Network D. Presentation

ANSWER

B

QUESTION 152

You've discovered that your theory of probable cause for a cloud issue is not correct. Which of the following are common next steps? (Choose two) A. Adopt the "divide and conquer" approach B. Escalate C. Document your results D. Establish a new theory

ANSWER

BD

QUESTION 153

When developing your plan of action, it is most important to consider which of the following? A. Speed of change B. Costs C. Potential effects D. Ease of documentation

ANSWER

C

QUESTION 154

Which of the following is the least critical to document? A. Findings B. Time per phase C. Actions D. Outcomes

ANSWER

B

QUESTION 155

Why is the phrase "noisy neighbor" often used in Cloud? A. Contention for shared resources B. SLA failures C. Lack of monitoring tools D. Global regions

ANSWER

A

QUESTION 156

Which of the following is a common measurement tool for performance statistics that provides a starting point? A. Set B. Baseline C. Group D. SLA

ANSWER

B

QUESTION 157

Regarding automation, why is the need to troubleshoot so common? (Choose two) A. Newness of the approach B. Level of complexity C. Stability of the Internet D. Lack of feedback

ANSWER

BD

QUESTION 158

Which network component might cause an issue even though its design is to improve network performance? A. NAT B. SNMP C. QoS D. Virtualization

ANSWER

C

QUESTION 159

Which of the following might you need to adjust in order to ping test your EC2 instance? A. Security Group B. S3 C. IAM D. KMS

ANSWER

A

QUESTION 160

Regarding certificates and your cloud infrastructure, which of the following are common issues ? (Choose two) A. Expiration B. Corruption C. Misconfiguration D. Public key capture

ANSWER

AC

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials