CompTIA Cloud Essentials+ Exam Questions

Page 10 of 25

181.

What sort of digital marketing is used when businesses send automated messages to clients that contain links to the company's website or a specific product page?

  • Email campaigns

  • Social media

  • Subscription services

  • Collaboration

Correct answer: Email campaigns

Email campaigns are when organizations send out automated emails to potential clients to solicit their business or products. This email will likely connect to an item on their website or include a direct link to the merchandise.

182.

A development team is presently utilizing a code repository to manage the development of a major application. They want to discover ways to accelerate code modifications, testing, and deployment, as well as perform concurrent code changes. The team is aware that they may need to modify their software development processes.

Which software development technique would be the MOST suitable for the team's requirements?

  • SOA

  • SMB

  • ML

  • OS

Correct answer: SOA

A service-oriented architecture (SOA) is a microservices-based software development process that would be the greatest fit for the team's requirements. Microservices-based software development enables the separation of code modules with distinct functionality from other code modules. This will result in several efficiencies when developers check code in and out for the large app they are developing. The usage of many microservices enables concurrent code updates for several microservices, therefore speeding up code changes, testing, and deployment.

SMB, ML, and OS are incorrect. Server message block (SMB) is a shared access communication protocol. Machine learning (ML) is a family of programming algorithms. Operating systems (OSs) are used to manage hardware and software resources for a computer. 

183.

Which of the following would best describe the text below?

<Student> 

        <Firstname>Linda</Firstname>

        <Lastname>Barajas</Lastname>

        <Class>History</Class>

</Student>

  • XML

  • JSON

  • SSH

  • LDAP 

Correct answer: XML

The text below is in XML. XML is a data exchange format and uses tags to describe data. 

JSON, SSH, and LDAP are incorrect. JSON uses key value pairs. SSH and LDAP are protocols and not data exchange formats. 

184.

Why is it critical to examine a threat's impact when conducting a risk assessment?

  • To ascertain the level of the response

  • To identify the security controls to be used

  • To identify the upgrade path of the operating system

  • To prioritize mitigation efforts

Correct answer: To ascertain the level of the response

When conducting risk assessment, it is critical to examine the potential consequences of a threat in order to establish the appropriate level of response. The magnitude of impact is an estimation of the amount of damage and/or downtime that would result from the realization of a threat. The greater the potential impact of a danger, the greater the risk taken by the business.

185.

What is the name of the method by which departments or creators of cloud resources held accountable for the resources they have provisioned?

  • Chargebacks

  • Monitoring

  • Right-sizing

  • Maintenance

Correct answer: Chargebacks

Chargebacks are a procedure through which departments or creators of cloud resources are billed for the resources they provision. These chargebacks are a mechanism for cloud resource consumers to be held accountable for their behavior.

186.

Which of the following does TTL represent? 

  • The time interval to check a cached CDN item

  • A network security protocol that involves PKIs

  • The conversion of virtual machines to other virtual machines

  • A command-line method of managing Linux hosts

Correct answer: The time interval to check a cached CDN item

Time To Live (TTL) represents the time interval to check a cached CDN item. When the TTL elapses, the item is checked against the source for any changes and updated if changes are detected. 

The other options are incorrect. A network security protocol that involves PKIs is TLS. The conversion of virtual machines to other virtual machines is V2V. A command-line method of managing Linux hosts is SSH. 

187.

Which of the following describes a document that would define the percentage of monthly uptime a cloud provider is expected to provide for a cloud customer if they sign a contract?

  • SLA

  • SOW

  • RFQ

  • RFI

Correct answer: SLA

The service-level agreement (SLA) focuses on the CSP's performance, availability, and technical support.

A statement of work (SOW) would show whether these SLA goals have been met. An RFI can be submitted if no SOW is received. 

188.

Which of the following is the primary method for accessing object storage?

  • HTTP via REST API

  • FTP

  • SMB

  • SFTP

Correct answer: HTTP via REST API

Object storage is typically accessed over HTTP using the REST API instead of older network file access methods like SFTP and FTP.

189.

Which of the following statements about the deployment of community clouds is TRUE?

  • Customers should share comparable needs

  • All controls belong to one organization

  • Higher costs than private cloud

  • Public users have access

Correct answer: Customers should share comparable needs

Community cloud deployments usually address organizations with the same computing needs, most often in the same industry and driven by industry regulations and compliance needs.

190.

What is used in the IT world to isolate development and testing environments from production environments?

  • Sandboxing

  • Provisioning

  • DevOps

  • CIDR

Correct answer: Sandboxing

Sandboxing is a technique used in the information technology industry to separate development and testing environments from production environments. At the network, virtual machine, and container levels, sandboxing is feasible.

Provisioning is the setup of cloud resources. DevOps is the field that focuses on faster software development. Classless Inter-Domain Routing (CIDR) is a format for IP addresses. 

191.

Which of the following is a piece of software or hardware that builds and manages virtual machines and enables the simultaneous operation of numerous operating systems on a single physical machine?

  • Hypervisor

  • Virtualization

  • Virtual computer

  • Host

Correct answer: Hypervisor

A hypervisor is the software component that generates and manages virtual computers, allowing for the coexistence of different operating systems on a single physical machine.

The host refers to the physical machine. Virtualization refers to the process of using a hypervisor. Virtual computers, also known as virtual machines, run on the hypervisor. 

192.

Due to incurred costs, a corporation decides to adopt the cloud, moving their current on-premises software program into the cloud. What is this migration strategy known as?

  • Lift and shift

  • Hybrid

  • Refactoring 

  • Rip and replace

Correct answer: Lift and shift

A lift and shift migration involves taking an on-premises software program and using it in the cloud. This approach is contrasted with migrations that involve using entirely new software. 

Hybrid, rip and replace, and refactoring are incorrect. Hybrid migrations involve leaving some data on-premises and some data in the cloud. Rip and replace migrations, also known as refactoring, involves using a new cloud-based solution instead of retrofitting the on-premises solution to the cloud. 

193.

Your business has made the decision to go to the cloud for cost reasons. Your organization has several requirements. For example, your organization's database and the sensitive data stored in the database will need to be kept on hardware your team can physically access.

What kind of migration would be MOST suitable for this scenario?

  • Hybrid

  • Phased

  • Lift and shift

  • Rip and replace

Correct answer: Hybrid

In general, a hybrid migration approach is defined in two ways. The first type is a hybrid strategy combining lift and shift and rip and replace migration tactics. The second type of migration is one in which some services remain on-premises while others migrate to the cloud. The second hybrid technique applies in this case, as the database will remain on-premises due to security concerns while the rest of the on-premises infrastructure is moved to the cloud. Moving data to the cloud entails losing physical access to the hardware. 

194.

The following features characterize what type of cloud storage?

  • Stores files individually like a normal file system
  • No hierarchy like a normal file system
  • Not designed for frequent file changes
  • Accessed via HTTP or Web call

  • Object storage

  • File storage

  • Block Storage

  • SSD Storage

Correct answer: Object storage

Object storage is a type of cloud storage in which each piece of data is kept as an object with a unique identifier and associated metadata. Object storage is utilized for unstructured data, such as images and movies, as well as for large data archives, such as computer databases. The characteristics listed above are those of object storage.

195.

Which three options are applicable to the private cloud?

A.Combinations of hybrid clouds working together
B.Are scalable and provide elasticity
C.Incorporating both a hybrid and public cloud
D.Reduced maintenance needs
E.Mitigate public cloud concerns
F.Uses virtualization

  • B, E, and F

  • A, C, and D

  • D, E, and F

  • A, D, and E

Correct answer: B, E, and F

The three options that apply to private clouds are:

  • Are scalable and provide elasticity
  • Can mitigate public cloud concerns
  • Uses virtualization

Reduced maintenance needs applies to public clouds. Combining public clouds and hybrid clouds would make a larger hybrid cloud. 

196.

A software developer wants to improve the functions within a custom-built software solution. An API can be called from within the software solution to achieve this. What does this describe?

  • API integration

  • SOAP

  • REST

  • Templates

Correct answer: API integration

A developer can build a custom Application Programing Interface (API) or use an existing API to programmatically access cloud resources. API integration allows utilization of calling existing APIs from within a custom software solution. SOAP and REST are common API communication methods.

197.

Which of the following BEST represents the proper order for carrying out cloud assessment tasks?

  • Contact key stakeholders, establish a baseline, conduct a gap analysis, and develop documentation

  • Establish a baseline, contact key stakeholders, conduct a gap analysis, and develop documentation

  • Develop documentation, contact key stakeholders, conduct a gap analysis and establish a baseline

  • Conduct a gap analysis, establish a baseline, contact key stakeholders, and develop documentation

Correct answer: Contact key stakeholders, establish a baseline, conduct a gap analysis, and develop documentation

The first step in conducting a cloud assessment is to ascertain current and future requirements, which can be accomplished by contacting key stakeholders and asking the appropriate questions. Following that, you can create a baseline to determine the present state of performance. This will allow you to do a gap analysis in order to determine where the business and technical conditions fall short of expectations. Finally, documentation and diagrams will be created in the conclusion.

198.

The CISO is required to review the CSP's SLA prior to signing up for CSP services. Which of the following statements about SLA's is NOT true?

  • SLAs never include information about conditions of cancelation of service.

  • SLAs include details such as service hours and performance, support structure and penalties and credits.

  • SLAs include average support times to respond to a support ticket.

  • SLAs include details like the goals of the parties and points of contact.

Correct answer: SLAs never include information about conditions of cancelation of service.

SLAs must outline the circumstances under which a service provider will be held accountable for persistently providing subpar performance. SLAs may include the time period or commercial effect of service cancellation. As a result, SLAs include information concerning the terms and conditions of service cancellation.

The following statements are true regarding SLAs:

  • SLAs include details such as service hours and performance, support structure and penalties and credits.
  • SLAs include average support times to respond to a support ticket.
  • SLAs include details like the goals of the parties and points of contact.

199.

What is the method of concealing or obscuring data in such a way that it can be accessed ONLY by authorized individuals?

  • Encryption

  • Sanitization

  • Validation

  • Authorization

Correct answer: Encryption

The technique of concealing or obscuring data in such a way that only authorized individuals can access it is known as encryption.

200.

How are VNets or VPCs isolated from the rest of the public cloud?

  • Subnets

  • ACLs

  • Route tables

  • Firewalls

Correct answer: Subnets

Cloud service providers designate their cloud virtual networks with their own nomenclature. Microsoft Azure refers to VNets, whereas Amazon Web Services refers to Virtual Private Clouds (VPCs). Both VNets and VPCs feature one or more subnets that are utilized for isolation, similar to an on-premises physical network switch that may be partitioned into several VLANs.