No products in the cart.
CompTIA Cloud Essentials+ Exam Questions
Page 9 of 25
161.
Your organization intends to leverage the PaaS model in order to create new software applications, deploy new virtual machines, and utilize Microsoft 365. Which of the following is NOT an advantage of the PaaS model?
-
Most flexible cloud model
-
No CapEx
-
Applications run without having to configure servers
-
Customized vendor development tools
Correct answer: Most flexible cloud model
Platform as a Service (PaaS) has platform constraints. Because you do not have complete control over the hardware chosen by the vendor, there may be limitations, making this not the most flexible cloud option.
The following are advantages in a PaaS model:
- No CapEx
- Applications run without having to configure the servers
- Customizable vendor development tools
162.
What steps are REQUIERED to move workloads from an on-premises data center to the cloud?
-
Migration type and resources to migrate
-
Migration type and size of data to migrate
-
Migration type and security controls to migrate
-
Migration type and SLA terms
Correct answer: Migration type and resources to migrate
In order to migrate workloads from an on-premesis data center to the cloud, a migration type must be selected, as well as the identification of the resources to migrate from the data center to the cloud.
163.
Which two processes are REQUIRED to establish Continuous Integration and Delivery (CI/CD)?
-
Automation and Orchestration
-
User acceptance and production environments
-
Quality assurance and sandboxing
-
IaC and templates
Correct answer: Automation and Orchestration
To achieve continuous integration/continuous delivery, we require automation to finish the build and test phases, as well as orchestration to shorten the time to delivery.
164.
Which of the following would be created as a method of classifying the organization's valuable data for threat prevention?
-
Asset inventory
-
DRP
-
SIEM tools
-
Vulnerability scan
Correct answer: Asset inventory
An asset inventory is a list of the value data that an organization holds. This might include patient medical records or credit card information, for example. An asset inventory is to be created before a security procedure for threat prevention is put in place.
DRP, SIEM, and vulnerability scan are incorrect. A disaster recovery plan (DRP) is a plan of procedures for restoring a system after a system failure. Security and event management tools (SIEM tools) are tools to collect and report on security incidents in the cloud. A vulnerability scan is a scan of the cloud for weaknesses.
165.
Depending on the storage requirements, what are the optimal protection strategies if availability and confidentiality are the primary concerns?
-
Replication and encryption
-
Data access and capacity restrictions
-
Monitoring and alerting
-
Digital signing and SSO
Correct answer: Replication and encryption
Depending on your storage needs, if availability and confidentiality are important, replication and encryption can be configured and enabled in the cloud storage settings.
Data access and capacity restrictions are associated with identity and access management. Monitoring and alerting are associated with cloud security. Digital signing and SSO are associated with cloud security.
166.
A cloud systems administrator configured autoscaling for an application. The configuration keeps a minimum of three virtual machines running but can grow to seven virtual machines if a CPU threshold is met.
In terms of scalability, what is it called when you increase additional virtual machines to support a busy application?
-
Scaling out
-
Scaling in
-
Scaling up
-
Scaling down
Correct answer: Scaling out
Horizontal scaling is the act of adding or removing a virtual machine in response to a changing application. Scaling out and scaling in are two concepts of horizontal scaling. The act of increasing virtual machines when a CPU threshold is met is referred to as scaling out.
Scaling in, up, and down are incorrect. Scaling up and scaling down are concepts of vertical scaling. Scaling in is the opposite of scaling out.
167.
Which of the following processes maximizes resource efficiency and aims to make automation more manageable and efficient?
-
Orchestration
-
Upgrades
-
Subscription services
-
Provisioning
Correct answer: Orchestration
Orchestration is the means by which automation processes coordinate and complement one another. For both human and digital resources, orchestration frees up resources so they can carry out other tasks. The goal of orchestration is to make automation more efficient and manageable.
168.
An administrator creates a username and password for a Mac user to access a Windows computer via RDP. What is the first step to get the user connected?
-
Download the RDP client app from the Mac App Store
-
Sign in via the native RDP app on the Mac computer
-
Configure firewall settings on the Mac, so the user can access resources
-
Nothing, they can just connect
Correct answer: Download the RDP client app from the Mac App Store.
Prior to signing in using Remote Desktop Protocol, the Mac user must download the Microsoft Windows Remote Desktop application from the Mac App Store. All other settings are incorrect and will not enable the Mac user to connect to RDP.
169.
What is the term for the process of leveraging a new operating system, new RAM, or new storage systems when it comes to cloud migrations?
-
Re-platforming
-
Replacing
-
Re-hosting
-
Redeployement
Correct answer: Re-platforming
Certain businesses will conduct a lift and shift migration with the intention of upgrading the application later. One such method is referred to as re-platforming. "Re-platforming" involves making tiny adjustments to the software as it is migrated to the cloud to improve performance. The term "replacing" refers to a program that has served its purpose and is being phased out. "Re-hosting" is the process of transferring the application's code and possibly associated data from one location to another. The term "redeployment" refers to the process of deploying a newer version of an application or system alongside an older version.
170.
Which of the following provides the GREATEST risk to the business of a cloud customer?
-
CSP's going out of business
-
Migration of data to the cloud
-
Inability to sufficiently encrypt data at rest
-
Bandwidth and latency problems
Correct answer: CSP's going out of business
The greatest risk is that cloud providers will go out of business. Even with contingency measures in place, this could be disruptive to a company, particularly if the majority of the organization's information technology services are provided by a single vendor.
171.
Elasticity within a cloud refers to the ability of the cloud's resources to expand or shrink in response to the client's changing needs. What mechanism does the cloud use to accomplish this?
-
Resource pooling
-
Self-service
-
Rapid elasticity
-
Ubiquitous access
Correct answer: Resource Pooling
Cloud services must be elastic, which means they must be able to expand or shrink on demand. Cloud computing enables this through the use of resource pooling. The cloud provider's resources are viewed as a single large pool that can be distributed as needed across clients. Rapid elasticity, self-service, and ubiquitous access are incorrect. Rapid elasticity is a function of immediately acquiring additional resources from the resource pool. Self-service and ubiquitous access are related cloud computing characteristics.
172.
Which of the following is considered a subfield of artificial intelligence and is used for areas of computing such as identifying financial risks?
-
Machine learning
-
Compression
-
Cloud caching
-
SDN
Correct answer: Machine learning
Artificial intelligence (AI) is a term that refers to the ability of computers to do sophisticated, human-like tasks. Through the use of technology, artificial intelligence solutions can replicate human behavior. The subfield of machine learning aims to create artificial intelligence software by leveraging techniques that allow software to "learn" and improve over time. Financial credit risks are often calculated by machine learning from large sets of data generated by previous financial events.
173.
Which of the following is the target time period during which recovery should take place?
-
RTO
-
RPO
-
MTTR
-
MTD
Correct answer: RTO
The Recovery Time Objective (RTO) specifies the time period during which recovery should occur. It should be lower than the maximum tolerable downtime in order to allow for additional time. The Maximum Tolerated Downtime (MTD) is the longest period of time during which you can operate without a resource. The Recovery Point Objective (RPO) is determined by the amount of data lost, not by the amount of time. It is the greatest quantity of information you are willing to lose in an outage.
While backups are linked to the RPO, they are also linked to the RTO, which determines the maximum amount of downtime that a service or data may sustain. Bear in mind how they interact, the time required to restore data (RTO) and the frequency with which backups should be conducted (RPO).
174.
There are numerous service models available on the market. They are all variants and combinations of the three most prevalent service models: IaaS, PaaS, and SaaS. What cloud service model tracks the performance of applications, devices, or services within a cloud network?
-
MaaS
-
CaaS
-
DBaaS
-
BPaaS
-
ITaaS
Correct answer: MaaS
Monitoring as a Service (MaaS) is a cloud-based service that enables central monitoring of a broad range of devices and software solutions. DBaaS, BPaaS, ITaaS and CaaS are other cloud service models; however, they are incorrect.
Note: Candidates are encouraged to review the CompTIA Cloud Essentials+ Acronyms list and attain a working knowledge of all the listed acronyms as a part of a comprehensive exam preparation program.
175.
Which CIA triangle principle ensures that assets have timely access to other assets?
-
Availability
-
Confidentiality
-
Integrity
-
Authorization
Correct answer: Availability
The third principle of the CIA triad is availability. Availability refers to the accessibility of data. To be available, data needs to be protected against disruption of service. Authorized assets must be able to access assets in a timely and uninterrupted manner.
All other options are incorrect. Confidentiality and integrity are the other principles in the CIA triad. Authorization is the process of determining whether an entity is allowed to access a resource and with what permissions.
176.
An alert is configured to be triggered when the CPU usage on a web server reaches 80% for five minutes. This is an illustration of what kind of alert?
-
Threshold
-
Scheduled
-
Event
-
Change
Correct answer: Threshold
In the cloud, we often want to monitor four distinct categories: billing, storage, computation, and networking. These are all threshold-based alerts, which means that when a resource hits a predefined metric (for example, when a webserver's CPU reaches 80% for five minutes), an alert is created.
177.
The process of taking a virtual machine and customizing it post-deployment to the desired configuration is referred to as:
-
bootstrapping.
-
golden image.
-
sandboxing.
-
CICD.
Correct answer: bootstrapping.
When resources are launched with default configuration, bootstrapped actions are typically executed, which are basic scripts that install software or copy data to bring the resource to a desired state. This implies we can build more sophisticated settings starting with the simplest, because the script will take care of the necessary configuration for the source.
178.
Storage media is referred to as:
-
nonvolatile.
-
volatile.
-
structured.
-
unstructured.
Correct answer: nonvolatile.
Storage media is referred to as nonvolatile. In other words, its data preservation is independent of the computer's steady supply of electricity and is retained when the computer is shut off. In comparison, data stored in random access memory (RAM) is said to be volatile since its retention is contingent on the continuous supply of electricity to the computer and is wiped when the computer is turned off. Both memory and storage media are adjustable in the cloud.
179.
Which of the following statements is true of microservices?
-
Microservices can be tested independently.
-
Microservices are also known as monolithic applications.
-
Microservices are an alternative to loose coupling.
-
Microservices are difficult to scale on the cloud.
Correct answer: Microservices can be tested independently.
One advantage of microservices is that they can be tested independently of other microservices. This improves the quality assurance process and leads to fewer unexpected errors in production.
The other statements are false. Microservices are an alternative to monolithic applications, take advantage of loose coupling, and are very easy to scale in a cloud environment.
180.
Developers and operations personnel should be able to use and experience their work without having to wait for someone or a process to complete. Which concept enables this?
-
Continuous delivery
-
Continuous deployment
-
Continuous integration
-
IaC
Correct answer: Continuous delivery
It is critical to have a continuous process in place for Continuous Delivery (CD) of releasing applications to either the production or test environment. Developers and operations should be able to use and experience their work without having to wait for someone or a process to complete. Continuous delivery (CD) is the final stage in the pipeline for application deployment release.