CompTIA Cloud Essentials+ Exam Questions

Page 7 of 25

121.

The organization is expanding and establishing new departments. These departments will require the provisioning of dozens of servers and resources. You wish to automate as much as possible.

What is the BEST tool for quickly establishing instances with the least amount of manual interaction possible?

  • Cloud templates

  • Backup current configurations

  • Use APIs provided by application vendors

  • V2V existing production servers

Correct answer: Cloud templates

Templates enable pre-licensed servers with pre-installed operating systems and apps to be configured according to the organization's needs. Cloning current production servers or restoring production configuration files from backups might result in identification and replication issues, as well as misconfigurations.

122.

What is the FINAL step in deploying a newly upgraded application into production?

  • Change management

  • Configuration management

  • Resource management

  • Data management

Correct answer: Change management

Change management is a critical component of configuration management and, more broadly, business. The process of committing to a change that will influence production workload is known as change management. In the case of any change that will have an impact on production, change management is the last stage and approval process.

123.

As the cloud administrator for your organization, you are aware that engineering and accounting departments have significantly different computing requirements, but you are not an expert in either. What should be established to acquire information about departmental requirements?

  • Point of contact

  • Stakeholders

  • CEO

  • Business owner

Correct answer: Point of contact

Establishing a single point of contact in each department to collect and communicate cloud requirements for that business unit would be optimal. In this case, the cloud administrator is also a technical point of contact and will most likely serve as the vendor's technical leader and point of contact.

124.

Which of the following MUST an organization accomplish in order for a cloud implementation to be successful?

  • Organizations must complete a cloud readiness assessment.

  • Organizations must complete a penetration test.

  • Organizations must have an open budget for resources.

  • Organizations must have a trained IT department.

Correct answer: Organizations must complete a cloud readiness assessment.

An organization must complete a cloud readiness assessment in order for their cloud implementation to be successful. When performing a cloud migration, the first task to conduct is an on-premises cloud readiness assessment.

Penetration tests are only completed after the cloud has been implemented. Cloud adoption does not require an open budget or a dedicated IT staff. 

125.

How often is the blockchain updated?

  • Every 10 minutes

  • Every hour

  • Every minute

  • Every time a block is added

Correct answer: Every 10 minutes

The blockchain is a distributed ledger that keeps chronological track of transactions. The blockchain ledger is updated every 10 minutes. This updating is done by blockchain miners in exchange for some token. 

126.

What would you find if you used the Azure Container Registry service offered by Microsoft Azure?

  • Container images

  • Microsoft containers

  • Microsoft and Linux containers

  • Linux containers 

Correct answer: Container images

A container image is used to create containers. Many service providers, including Microsoft Azure, offer repositories of container images. Container images are different from virtual machines in that containers do not require operating systems, so container images should be tailored to a specific OS. 

127.

Your organization's cloud deployment is susceptible to a variety of risks which you identify during the risk assessment process. Which risk response strategy would include choosing not to have an on-premises backup even though a cloud provider could suffer catastrophic losses?

  • Risk acceptance

  • Risk avoidance

  • Risk mitigation

  • Risk transfer

Correct answer: Risk acceptance

Accepting risk entails acknowledging the possibility of a risk occurring and taking no action to mitigate the risk. This is frequently used when the risk is low and the cost of mitigating the risk exceeds the risk estimate. While this is similar to risk mitigation in that the organization will manage the risk on its own, the critical distinction is that the organization will not exhaust any resources on the risk. Not taking action for the very low probability of a cloud provider suffering catastrophic losses is an example of risk acceptance. 

All other options are risk responses, but they are incorrect because they include a variety of risk-related outcomes. Risk avoidance is not taking a certain action because of a risk. Risk mitigation is taking steps to eliminate a risk. Risk transfer is outsourcing a risk to a third party. 

128.

Your cloud has undergone several modifications over the past year. Some of these changes caused disruptions of service. You want to find a way to track these changes and have a means to rollback if required. What do you need for your cloud?

  • Configuration management

  • Resource management

  • Change management

  • Cloud management

Correct answer: Configuration management

You require configuration management. Configuration management tools assist you in managing your cloud deployment by allowing you to centrally store and archive your cloud configurations. Additionally, it permits tracking of configuration modifications as well as identifying the people who changed the setups. These provisions give you the ability to ensure that your cloud complies with regulatory requirements. It's possible that one particular configuration is causing a problem and that the cloud configuration management tools might assist you in identifying that.

129.

Containerization is being used to provide a sandbox environment in which applications can be tested. Multiple containers running on a single host comprise the sandbox environment.

Besides using virtual machines, what else would be the MOST effective way to safeguard the production environment?

  • Network isolation

  • Network relocation

  • VPN connectivity

  • Firewall rules

Correct answer: Network isolation

If sandboxed containers are running on a single host, then virtual machines and network isolation settings can prevent connectivity to the production environment.

Network relocation, VPN connectivity, and firewall rules are incorrect. Network relocation is unnecessary unless the containers are on VMs on different networks. VPN connectivity and firewall rules would be less effective. 

130.

Which of the supplied options encompasses the entire process of application modernization?

  • The journey from monolithic and service-oriented architectures to microservice architectures, from physical servers and virtual machines to cloud infrastructure, and from agile methodologies to DevOps

  • The journey from monolithic and service-oriented architecture to microservice architecture

  • The journey from waterfall and agile development methodologies to DevOps

  • The journey from physical servers and VMs to cloud infrastructure

Correct answer: The journey from monolithic and service-oriented architectures to microservice architectures, from physical servers and virtual machines to cloud infrastructure, and from agile methodologies to DevOps

Application modernization includes restructuring the architecture, infrastructure, development, and operational procedures of the application.

131.

Which of the following is a characteristic of a microservice?

  • Microservices decompose big applications into their fundamental functions, resulting in a fully working application.

  • Each new feature in a microservice must be designed from the ground up.

  • All microservices required to complete a task must be packaged together in a single container to ensure that they can complete the task.

  • When one of an application's microservices ceases to function, the entire application ceases to function.

Correct answer: Microservices decompose big applications into their fundamental functions, resulting in a fully working application.

Microservices architecture is a design philosophy that divides a single program into numerous loosely linked and independently deployable smaller components or services. Therefore, microservices decompose big applications into their fundamental functions, resulting in a fully working application.

132.

If you anticipate the need for a certain compute capacity in the cloud for three years, you can reduce cloud costs by adopting what?

  • Reserved instances

  • Spot instances

  • BYOL

  • Pay-as-you-go

Correct answer: Reserved instances

If you anticipate the need for cloud compute capacity over an extended length of time, you can reduce cloud prices by utilizing reserved instances, which are discounted by a Cloud Service Provider (CSP). Reserved instances demand a long-term commitment to obtain discounted compute services. Reserved instance consumers must keep in mind that the cost of the reserved instance will remain constant regardless of whether the Virtual Machine (VM) is powered on or off.

133.

Which statement in regard to blockchain is FALSE?

  • A blockchain is centralized, meaning it is stored in a centrally located database.

  • A smart contract added to the blockchain, allows for the automation of the execution of contract elements, such as payments to intellectual property owners.

  • A blockchain is an immutable public ledger of transactions (a collection of blocks).

  • Each block contains all the facts related to the transaction such as the date and time, the amount, and the unique hash of the current block in relation to the preceding block.

Correct answer: A blockchain is centralized, meaning it is stored in a centrally located database.

A blockchain is decentralized, meaning it is stored across many computers. Blockchain is not owned by any single organization or business. Every computer that participates in the blockchain stores a copy of the whole blockchain ledger. Because of the decentralized nature of the technology, it is more difficult to tamper with data stored on the blockchain.

All other options are true in regard to blockchain.

134.

What is the MAIN benefit of a Content Delivery Network (CDN)?

  • Speed

  • Enhanced control over network traffic

  • Distributed tasks

  • Network topology

Correct answer: Speed

Speed makes your website faster by serving files from a location closer to the user. CDNs shorten the path between the user and the content, or the server that hosts the content. End-points of the CDN are located close to each area where users congregate to minimize the time required for each user to access the website.

135.

Your client requires maximum accessibility for their online financial portal, even in the event of a regional internet service failure, while retaining the lowest possible latency. Which of the following would provide the BEST protection for your clients' mission-critical systems?

  • Setup redundancy in different zones

  • Set up network connectivity redundancy

  • Build a cluster

  • Setup geo-redundancy

  • Replicate backups onsite

Correct answer: Set up redundancy in different zones

Various techniques exist to ensure high availability. Setting up redundancy in multiple availability zones will provide the best security for your clients' mission-critical financial portal in this specific case. Cloud regions are distinct geographical centers that are independent; however, cloud availability zones are predefined failure domains within a region that provide redundancy while sustaining low levels of latency and high reliability. While regions can provide redundancy for one another, this comes at the expense of latency and consistency. Clusters ensure redundancy across VMs while maintaining close proximity. Backups do not ensure consistency during failover and must be restored manually.

136.

You've been asked to review your company's security policy in light of the company's recent cloud migration. Which of the following do you anticipate being covered in detail within the security policy?

  • Encryption type used on data rest

  • Processes implemented when an event happens

  • Steps and actions to take once a risk event has occurred

  • Employees with access to the server room

Correct answer: Encryption type used on data rest

Every business must have security policies in place. The company is ultimately responsible for the security of its data. To accomplish this, a business must have a robust security policy managing the protection of its data which includes details pertaining to the type of encryption used on data at rest. A security policy details your organization's policies, responsibilities, cloud controls, and technology with the goal of ensuring the security of your cloud deployment.

The remaining options make reference to additional policy and procedure materials. A standard operating procedure (SOP) would cover the processes that are carried out in response to a business occurrence. An incident response policy (IRP) specifies the steps and measures to be taken in the case of a risk event, and an access and control policy specifies which personnel have access control privileges to the server room.

137.

What is the phrase that is used to refer to an activity, occurrence, or situation that has the potential to bring damage or harm to a company?

  • Incident

  • Baseline

  • Benchmark

  • Disaster

Correct answer: Incident

The term "incident" refers to a course of action, occurrence, or event that has the potential to cause an organization damage or injury. An incident response policy must be developed by an organization in order for them to be prepared to respond to incidents when they occur. This policy specifies what events are considered incidents, what level of incidents necessitates a reaction, and what type of response the organization is responsible for providing in certain situations.

Baseline, benchmark, and disaster are incorrect. A baseline is the level of normal performance. A benchmark is a point of reference. A disaster involves the failure or downtime of a system. 

138.

How are dynamic allocation and re-allocation implemented in cloud computing to handle demand requirements?

  • Elasticity and resource pooling

  • Availability and scalability

  • Pay-as-you-go and broad network access

  • Metered usage and self-service

Correct answer: Elasticity and resource pooling

Elasticity and resource pooling are the mechanisms through which cloud computing implements dynamic allocation and re-allocation to meet demand requirements. In the cloud, elasticity is the dynamic provisioning and deprovisioning of resources to meet demand. The cloud providers' resources are seen as a large pool that can be divided up among clients as needed. This is called rapid elasticity.

Availability, scalability, pay-as-you-go, metered usage, self-service, and broad network access are cloud characteristics but are not the best options.

139.

To improve performance and resilience against disk failure, how do cloud service providers configure their dedicated Storage Area Networks (SANs)?

  • RAID

  • GRS

  • SDS

  • Managed disks

Correct answer: RAID

To improve performance and resilience against disk failure, cloud service providers configure their dedicated Storage Area Networks (SANs) to use RAID. Redundant Array of Independent Disks (RAID) is the grouping of multiple physical disks to enhance data redundancy and/or disk performance. RAID comes in many levels, most common being RAID 0, RAID 1, RAID 5.

140.

During a risk assessment, what is the result of identifying asset threats and their threat likelihood?

  • Threat prioritization

  • Threat avoidance

  • Threat mitigation

  • Threat transfer

Correct answer: Threat prioritization

The result of the identification of threats to assets and their probability is threat prioritization, which is activity number six below.

The following activities are included in risk assessments:

  1. Identify assets and compile an inventory of them
  2. Assign ownership of assets
  3. Classify (label) the importance or sensitivity of an asset
  4. Sort assets according to their monetary value to the organization
  5. Identify the threats to assets and their probability
  6. Prioritize threats and construct a risk register
  7. Conduct an analysis of the effectiveness of existing security mechanisms
  8. Put in place sufficient security controls
  9. Reevaluate the effectiveness of security controls on a periodic basis

Threat avoidance, transfer, and mitigation represent risk responses, or treatments, of threats.