No products in the cart.
CompTIA Cloud Essentials+ Exam Questions
Page 4 of 25
61.
A business hires temporary personnel. After they complete a job, they will bring in fresh contractors. The business needs a scalable software licensing model. What would the organization benefit from?
-
BYOL
-
Open-source software
-
On-demand pricing
-
Pay-as-you-go pricing
Correct answer: BYOL
Bring Your Own Licensing (BYOL) refers to the ability of software to be transferred between users or systems. Businesses can redeploy licenses from one device or user to another as needed under BYOL terms. Because the organization uses temporary personnel, BYOL enables the company to easily transfer licenses to new users.
62.
An organization follows a risk response strategy that involves rearranging a business task around a certain event or activity in order to prevent a compromise. What is this strategy referred to as?
-
Risk avoidance
-
Risk transfer
-
Risk mitigation
-
Risk acceptance
Correct answer: Risk Avoidance
Risk avoidance is the process of eliminating or drastically reducing the likelihood of meeting a threat. The threat has been essentially eradicated, as has the chance of it occurring. Risk avoidance is the most challenging response. All of the remaining choices are risk responses, but they are incorrect since they include a wide variety of risk-related outcomes.
63.
Apart from public IP addresses, what other network capabilities may entail additional expenses depending on the Cloud Service Provider (CSP)?
-
Load balancer
-
DNS
-
HTTPS
-
Remote access
Correct answer: Load balancer
There are two network characteristics that, depending on the CSP, may impose additional costs: public IP addresses and load balancers. While the first public IP address assigned to a VM is typically free, there is a fee for additional public IP addresses assigned to a VM. When a load balancer is used to distribute traffic between two networks, a fee is often charged per hour or per data transfer for data delivered through the load balancer.
64.
Which of the following RAID levels would provide fault tolerance for more then 3 disks while consuming the SAME amount of disk space as a single disk?
-
RAID 5
-
RAID 1
-
RAID 0
-
RAID 1+0
Correct answer: RAID 5
RAID 5 makes use of distributed parity and striping. Parity is the information used to recover from errors, which means that even if one drive fails, the data remains intact. As a result, the parity information is used to reconstruct data that was lost when a disk in the array failed.
All other RAID options are incorrect because they do not provide disk striping with distributed parity.
65.
Your organization may need to increase or decrease resources in response to a workload. You need to add resources to support a workload or improve the capability of an existing resource to manage an increase in demand. Additional resources do not have to be provided automatically. Which cloud functionality does this particular situation require?
-
Scalability
-
Elasticity
-
High availability
-
Fault tolerance
Correct answer: Scalability
In these circumstances, scalability is required. This feature allows for the expansion (scaling-up) or retraction (scaling-down) of the resources assigned to a workload. As demand grows, you can augment existing resources or skills to manage the increase (known as scaling up). Automatic scalability is not required. Elasticity, high availability, and fault tolerance are other cloud computing characteristics and advantages; however, they are incorrect.
66.
Which of the following platforms is used for smart contracts?
-
Ethereum
-
Bitcoin
-
RC4
-
Blowfish
Correct answer: Ethereum
Ethereum is a platform for smart contracts. Smart contracts are blockchain-based automated contracts.
Bitcoin, RC4, and Blowfish are incorrect. Bitcoin is a digital cryptocurrency that has no intrinsic value and is not regulated by any financial institution or country but can be used to compute internet-based transactions between two parties. RC4 and Blowfish are used for symmetric encryption.
67.
Which of the following best describes the defining features of a smart contract?
-
A contract added to the blockchain
-
A contract on an IoT device
-
A contract among multiple IoT devices
-
A contract on a cloud computing platform
Correct answer: A contract added to the blockchain
Smart contracts are contracts on the blockchain that are automatically fulfilled by blockchain miners. Blockchain is a decentralized ledger. No single entity owns the blockchain, and all nodes contribute to the data. The data is difficult to tamper with, so it remains immutable.
68.
How is a user's identity verified?
-
Authentication
-
Authorization
-
Federation
-
Access control
Correct answer: Authentication
Authentication is the process of authenticating an entity's identification against a trusted identity source using one or more factors.
Authorization is a process that is similar to access control in that it determines if a user has permission to access a resource.
69.
Which is NOT a valid sandboxing solution?
-
Web servers
-
Isolation
-
Virtual machines
-
Containers
Correct answer: Web servers
Sandboxing keeps testing environments separated from production environments while mimicking the production environment as closely as possible. There are various sandboxing solutions, such as network isolation, VMs with limited network connectivity, and application containers.
Web servers would not be a valid sandboxing solution due to their usual public accessibility.
70.
By using cloud-based services such as centralized code repositories, databases, and pipelines, developers automate the building, testing and deploying of code. What category would these cloud services fall under?
-
PaaS
-
SaaS
-
IaaS
-
XaaS
Correct answer: PaaS
These types of cloud services fall under Platform as a Service (PaaS) and are usually supported by underlying virtual machines; it is also considered a managed service since the developer does not need to manage the virtual machines that support the service, the CSPs do.
IaaS, SaaS, XaaS are cloud service models; however, they do not focus on software development in the cloud.
71.
Which cloud deployment strategy is deemed to be the MOST appropriate for compliance?
-
Private
-
Public
-
Hybrid
-
All the above
Correct answer: Private
Among the options listed, a private cloud deployment plan is the best for an enterprise that must adhere to compliance and regulatory standards. A private cloud is a collection of computing resources that are used only by one organization. Additionally, a private cloud is more secure than a public cloud, as cloud resources are not shared with others.
72.
Which of the following is true of container images?
-
A Windows container image can only run on a Windows machine.
-
A Linux container image can only run on a Linux host.
-
A container image is a run-time instance of a container.
-
A container image contains only OS files and an application.
Correct answer: A Windows container image can only run on a Windows machine.
A Windows container would only be able to run on a Windows machine. A container does not have an operating system, so it would need to use a machine with the same operating system. Tools like Docker can install lightweight virtual machines that allow a Linux container to run on a Windows host.
73.
What is a network of devices that are able to communicate with each other and exchange data?
-
IoT
-
Blockchain
-
Autonomous environment
-
Big data
Correct answer: IoT
The Internet of Things (IoT) is a term that refers to objects that communicate via the internet, such as home environmental controls or data from smart cars, such as GPS location or car speed statistics. The majority of cloud service providers include an IoT repository into which registered IoT devices can transmit their data for processing. Some other examples of IoT devices are baby monitors, medical devices to monitor patients, and video surveillance equipment.
74.
An application development team requires extra compute capacity that can be used every so often for workload testing needs. What cloud service would the business benefit from?
-
Spot instances
-
Reserved instances
-
BYOL
-
Pay-as-you-go
Correct answer: Spot instances
Spot instances are extra compute capacity that can be rented when needed but uptime is not guaranteed, so for the developers testing workloads, this would be an acceptable cloud service they could benefit from.
75.
When you create a new Azure VNet, virtual machines are automatically deployed into subnets inside that VNet and are capable of resolving names of other subnet resources as well as internet names.
Which network protocol enables this?
-
DNS
-
SSH
-
HTTPS
-
RDP
Correct answer: DNS
The network protocol that enables the resolving of names of other subnet resources as well as internet names is Domain Name System (DNS).
Secure Shell (SSH) is a protocol for managing Linux hosts. HTTPS is a protocol for connecting clients to web servers. RDP is a protocol for the management of Windows hosts.
76.
When an on-premise network is being linked to the cloud, what sort of VPN is used?
-
Site-to-site
-
Client-to-site
-
Branch-to-branch
-
Point-to-site
Correct answer: Site-to-site
Virtual private networks (VPNs) provide an encrypted tunnel between two endpoints to enable the secure transmission of data. A site-to-site VPN enables the connection of multiple networks via the internet. Site-to-site VPNs necessitate the installation of a VPN appliance on-premises with a public IP address.
Client-to-site, also known as point-to-site, is used to connect one remote device to a cloud network. Branch-to-branch is not a standard term in VPNs.
77.
Cloud vendors are increasingly offering specialized hardware like GPU for what types of workloads?
-
ML & AI
-
API & ML
-
Microservices & Containerization
-
Cloud-native applications
Correct answer: ML & AI
Cloud vendors are increasingly offering specialized hardware for workloads. For example, Graphics Processing Units (GPUs) are often used to efficiently execute Machine Learning (ML) and Artificial Intelligence (AI) workloads.
78.
An international security hardware and software solution provider needs to ensure all of its partners and resellers can access product offerings and technical documentation quickly and on-demand. What should the security solution provider implement to enable this?
-
CDN
-
SDN
-
SDS
-
VPN
Correct answer: CDN
The security solution provider should deploy a Content Delivery Network (CDN) to guarantee that all of its partners and resellers have immediate and on-demand access to product offerings and technical documentation from anywhere in the world. A CDN is similar to online content load balancing. It utilizes edge servers to duplicate data stored on the web server, delivering it to users located closer to the edge server than the web server.
79.
What principle of the CIA triad is responsible for keeping data private or secret?
-
Confidentiality
-
Integrity
-
Availability
-
Authorization
Correct answer: Confidentiality
Confidentiality is the first principle of the CIA triad. Confidentiality refers to the sensitivity of data. Confidential data needs to be protected from unauthorized access, use, or disclosure. When securing data that needs to be private, there are two mechanisms: encryption and sanitization.
All other options are incorrect. Integrity and availability are the other principles in the CIA triad. Authorization is the process of determining whether an entity is allowed to access a resource and with what permissions.
80.
Geo-redundancy is the process of replicating data and services between:
-
Regions
-
Zones
-
Infrastructures
-
Networks
Correct answer: Regions
Geo-redundancy refers to the process of replication of data and services across geographical boundaries (regions). The purpose of geo-redundancy is to sustain data and services functioning in the event that a region becomes unavailable, while also providing closer proximity to end consumers through the use of a content delivery network (CDN).