No products in the cart.
CompTIA Cloud Essentials+ Exam Questions
Page 6 of 25
101.
Which of the following would Amazon Athena be used for?
-
Data analytics
-
Application programing
-
Virtual private networking
-
Cybersecurity
Correct answer: Data analytics
Amazon Athena is a big data platform. Numerous businesses have recognized that they are sitting on mountains of data about their customers and marketplaces. The subject of data analytics is gaining popularity as firms struggle to make the greatest use of their data. Analysts are in high demand as firms look for whatever advantage they can with the data they possess.
102.
Which cloud cost management solutions are most effective in optimizing and increasing return on investment (ROI)?
-
Auto-scaling & right-sizing
-
Alerts & logging
-
Replication & locality
-
Replication & Geo-redundancy
Correct answer: Auto-scaling & Right-sizing
Auto-scaling is used to execute dynamic right-sizing by adjusting the vertical and horizontal scaling in response to the monitoring alert threshold.
103.
A cloud administrator must make immediate modifications to the cloud infrastructure. The cloud administrator immediately gains access to an online administration interface via which new features can be purchased.
What measures has the cloud service provider taken to enable the cloud administrator to make instantaneous adjustments without the intervention of the cloud service provider?
-
Self-service
-
Subscription service
-
Identity access management
-
Containerization
Correct answer: Self-service
Cloud service providers (CSPs) provide an online management interface through which cloud administrators can acquire and use new services without requiring the CSP's engagement. This is known as self-service. Self-service simply means that customers can automatically access additional resources or services 24-hours-a-day, seven-days-a-week. Self-service is closely related to the cloud characteristic on-demand self-service.
104.
Which of the following is another name for serverless computing?
-
Managed services
-
Private clouds
-
Public clouds
-
Hybrid clouds
-
Load balancing
Correct answer: Managed services
Managed services are also known as serverless computing. This is because these managed services allow the developer to focus on their software and not the set up of the underlying virtual machines.
105.
What kind of triggers can CI/CD use to automate code building, testing, packaging, and deployment?
-
Code check-ins
-
Code check-outs
-
Push notifications
-
Deletion of data
Correct answer: Code check-ins
Developers write code or edit existing code, and then check it into a code repository to keep track of their work. Changing existing code involves checking it out, which prevents other software engineers from changing it. Checking in code initiates a new build of the code. A range of automated testing is triggered by the new code build. Changes are applied and packages are deployed after the solution has been successfully tested.
106.
What data analytics technology enables the ability to learn from previous experiences, draw meaning from massive amounts of data in order to detect future trends, and recognize voice patterns?
-
Machine learning
-
Artificial intelligence
-
Big data
-
IoT
Correct answer: Machine learning
Machine learning enables specialists to train software in how to make decisions and forecasts based on large amounts of data. Machine learning technologies enable the development of training models that teach technology applications how to make decisions that are human-centric.
107.
Incident response is the set of actions or steps taken once a risk event has occurred. Which of the following steps is NOT included in the three-step incident response procedure most organizations use?
-
Risk assessment and Evaluation
-
Detection and Identification
-
Response and Reporting
-
Recovery and Remediation
Correct answer: Risk assessment and Evaluation
Risk assessment and Evaluation is not a defined step of the incident response phases. The three steps included in the incident response procedure are:
- Detection and Identification: A detection recognizes an event has occurred outside of normal operating parameters. Identification is the recognition of events that are in violation of a security policy.
- Response and Reporting: Once appropriate parties have been notified, someone or something needs to form a response to the security event. The incident response policy and procedure dictates the next actions performed.
- Recovery and Remediation: Your organization needs to return its affected systems to its normal operating state, which depends on the security event. Sometimes this is not immediately possible due to corruption or breach of data.
108.
The cloud administrator must devise a method for repeatedly copying and rebuilding an infrastructure in order to create test environments. These test environments will be representative of the production environment.
What solution might a cloud administrator consider implementing?
-
Cloud automation
-
Encryption
-
Blockchain
-
VPNs
Correct answer: Cloud automation
Cloud automation can efficiently modify cloud resources in response to changing demands. This might include setting up multiple test environments and ensuring that the test environments are similar to the production environment.
Encryption, blockchain, and VPNs are incorrect. Encryption is the creation of ciphertext. Blockchain is a distributed ledger. VPNs are used to establish a secure virtual network.
109.
In the cloud, logging can occur at two levels. What type of logging usually requires an agent?
-
Virtual machine
-
Hypervisor
-
Operating System
-
Application
Correct answer: Virtual machine
Logging can take place at two different levels: hypervisor and virtual machine (VM). Virtual machines (VMs) run on a hypervisor, which creates a separation between the host and the VM. Typically, logging at the virtual machine level is contingent upon the installation of an agent on the VM. This agent is a software program or service that operates within the VM and forwards events to a rudimentary cloud logging system provided by or purchased from the CSP.
The second type of logging is at the hypervisor level. You can think of the ordinary physical aspects of a computer as being visible to the hypervisor: CPU, RAM, storage, networking, power, etc. These logs are hypervisor level logs.
Operating systems and applications are other types of logs; however, they do not represent logging levels in relation to the hypervisor.
110.
In terms of object storage pricing, any access to an object that goes over the public internet or is accessed by infrastructure outside the CSP's infrastructure is referred to as?
-
Object access/transfer out of the CSP infrastructure
-
Object access/transfer within the CSP infrastructure
-
Storage pricing
-
On-demand pricing
Correct answer: Object access/transfer out of the CSP infrastructure
Object access/transfer out of the CSP's infrastructure refers to any access to an object that takes place over the public internet or is accessed by infrastructure that is not part of the CSP's infrastructure, such as a third-party network. This is billed per gigabyte of data transferred, and the cost per gigabyte decreases as the amount of data transferred increases.
111.
What is the INITIAL stage of cloud adoption in which tests are performed to see if the cloud adoption might be feasible?
-
PoC
-
PoV
-
TCO
-
ROI
Correct answer: PoC
Cloud adoption begins with a mapping of available cloud services to computing requirements, followed by the implementation of a proof of concept (PoC) pilot to ensure that the cloud services selected perform as anticipated. A proof of concept provides confidence that a plan will work as intended in all circumstances. A proof of concept is a short effort that establishes the viability of a solution or a component of a solution. The goal is to demonstrate that the vendor's technology is capable of meeting business requirements.
PoV, TCO, and POI are incorrect. Proof of Value (PoV) is the business value of the cloud. Total cost of ownership (TCO) is the overall cost of the cloud. Return on investment (ROI) is profit gained from an investment in the cloud.
112.
The primary objective of disaster recovery is ensuring that data is available following the restoration of mission-critical services. Which of the following defines the maximum amount of acceptable data loss following disaster recovery?
-
RPO
-
RTO
-
MTTR
-
DRP
Correct answer: RPO
During disaster recovery, data loss is handled by comprehending the Recovery Point Objective (RPO). The maximum amount of data loss that can be suffered before the loss becomes too significant for an organization to endure is referred to as RPO. RPO is calculated on the basis of time. Whatever the RPO of the organization, a backup and recovery strategy should be developed and implemented to ensure that recovery attempts can restore data to a point that is less than the RPO of the organization.
RTO or Recovery Time Objective measures the maximum amount of acceptable downtime. MTTR or Mean Time to Repair measures the average time it takes to repair a service or component. DRP or Disaster Recovery Plan is a document that outlines processes in place during disaster recovery.
113.
What was blockchain initially developed to support?
-
Bitcoin
-
Bid data
-
Machine learning
-
Artificial intelligence
Correct answer: Bitcoin
Blockchain, an open distributed ledger that secures and permanently records transactions between two parties, was initially developed to support Bitcoin, a digital cryptocurrency that has no intrinsic value and is not regulated by any financial institution or country but can be used to compute internet-based transactions between two parties.
114.
Which of the following ways is NOT how a business can reduce expenses using the cloud?
-
Proprietary software
-
Reserved instances
-
Spot instances
-
BYOL
Correct answer: Proprietary software
Proprietary software is software that is owned by an organization and is not freely available. This is contrasted with open-source software, i.e., freely available software.
Reserved instances reduce costs because they are offered by cloud providers at a steep discount in exchange for preplanning on the part of a cloud customer. Spot instances reduce costs because they are offered by cloud providers at a steep discount in exchange for time flexibility on the part of a cloud customer. Bring Your Own License (BYOL) reduces costs by eliminating the need to repay licensing fees.
115.
Which type of storage media uses flash memory?
-
SSD
-
HDD
-
DRAM
-
Volatile
Correct answer: SSD
Solid state drives (SSDs) use flash memory. Flash memory is quieter and faster than disk platters but is generally more expensive.
HDD, DRAM, and volatile are incorrect. Hard drive disk (HDD) relies on disk platters. DRAM and volatile memory are used for processing instructions and not long-term storage.
116.
An organization that uses its own hardware, software, and licenses to deliver IT services on-premises pays the same price whether they get the maximum performance out of their equipment or end up underutilizing it. What kind of cost is this an illustration of?
-
Fixed
-
Variable
-
Operating
-
CSP
Correct answer: Fixed
A fixed cost does not change regardless of how much is produced or used. Therefore, since you already own the resources, this is a fixed cost also referred to as a capital expense (CAPEX).
Variable, operating, and CSP are incorrect. Variable costs change over time. Operating costs are incurred during periods of operation. A cloud service provider (CSP) likely charges an operating cost instead of a fixed cost.
117.
A collection of resources that are similar in either their resources or their management of resources is called:
-
Resource groups
-
Availability zones
-
Regions
-
Procedures
Correct answer: Resource groups
All significant CSPs incorporate the concept of resource groups. Resource groups are collections of resources (computing, storage, and networking) that share characteristics in terms of either their resources or their management (departments, teams). Each resource group can have its own set of security and access control regulations. Resource groups are used to structure the management of cloud resources and assets.
Availability zones, regions, and procedures are incorrect. Availability zones are separate areas of data center regions. Procedures are used to ensure data center uptimes.
118.
If multiple clouds perform the same or specific tasks, this is known as a:
-
multi-cloud.
-
public cloud.
-
hybrid cloud.
-
community cloud.
Correct answer: multi-cloud.
Occasionally, cloud computing will refer to a multi-cloud environment. As the name implies, it refers to the deployment of many clouds within a single business. This is not synonymous with hybrid cloud, which refers to the use of several deployment models within a single cloud. Multi-cloud entails utilizing different clouds for distinct services.
119.
A team has used automation to deploy resources in the cloud. They are aware of the deployment automation risk of not knowing what is deployed and in what state it's in. What can mitigate this visibility issue?
-
Alerts & Logging
-
API & DevOps
-
Backups & Redundancy
-
Auto-scaling & Right-sizing
Correct answer: Alerts & Logging
Using automation may lead to the risk of not knowing when a server or resource is deployed. This visibility risk can be mitigated by using alerts and logging. All major CSPs offer alerts and logging within their respective platforms. Alerts can be triggered by thresholds and notifications and logging can be used to monitor deployment events.
120.
Which of the following would be most likely to involve chargeback?
-
Private clouds
-
Public clouds
-
SSD
-
Win32 APIs
Correct answer: Private clouds
Private clouds are often priced under a chargeback structure. Chargeback involves departments in an organization being charged for their usage of the cloud. This can be accomplished with resource tagging.