CompTIA Cloud Essentials+ Exam Questions

Page 3 of 25

41.

The act of increasing or decreasing CPU and RAM to improve application performance is referred to as:

  • vertical scaling.

  • horizontal scaling.

  • scaling out.

  • scaling in.

Correct answer: vertical scaling.

Vertical scaling is the act of increasing or decreasing CPU and RAM to improve application performance. Scaling up and scaling down are two concepts of vertical scaling. The act of increasing CPU and RAM to improve application performance is referred to as scaling up. The act of decreasing CPU and RAM when the application performance has returned to its normal baseline is referred to as scaling down. Horizontal scaling, scaling in, and scaling out are incorrect. Horizontal scaling is an option to add or remove a virtual machine in response to a changing application. Scaling out and scaling in are concepts of horizontal scaling.

42.

The collective knowledge, abilities, and expertise acquired by the IT team is referred to as:

  • Human capital

  • Success criteria

  • Professional development

  • Training

Correct answer: Human capital

Implementing the cloud can have a significant impact on a company's information technology workforce, because shifting to the cloud can potentially free up resources and lessen the requirement for on-premises information technology. To begin with, a corporation must assess the effectiveness of its human capital, which includes knowledge, skills, and experience possessed by members of the information technology (IT) team.

43.

A cloud administrator has a baseline reading of the company's computer resource utilization, but they need to confirm if the findings are positive or negative before meeting with the CIO. They begin by comparing the new data to a previous reference point.

What is the formal name for this reference point?

  • Benchmark

  • Gap analysis

  • Diagrams

  • Documentation

Correct answer: Benchmark

A benchmark is a standard for performance or reference point used for comparison. For instance, if you have a baseline reading of your CPU use, you may be unsure whether it is acceptable or unacceptable. A benchmark can assist you in determining this by comparing your data to a previously established standard.

A gap analysis is a study of where existing solutions meet or fail to meet organizational needs. 

44.

What process supports the goal of determining the appropriate risk response or level of protection to provide an asset?

  • Classification

  • Ownership

  • Asset inventory

  • Findings

Correct answer: Classification

The classification's purpose is to assist in determining the right risk response or suitable level of protection to apply to a given asset. The classification is divided into two parts: asset value and the likelihood of a threat arising. Both of these aspects contribute to the asset and threat risk classification. The greater the asset's worth and the more likely that a threat will materialize, the higher the risk rating, for example, Level 5. Reduced asset value and a decreased probability of occurrence of a threat result in a lower risk rating, for example, Level 1. Classifications are denoted by the letters A, B, C, D, and E or by a scale of one to five.

45.

Which is NOT a key principle of blockchain?

  • Portability

  • Decentralization

  • Autonomy

  • Immutability

Correct answer: Portability

Three fundamental concepts govern blockchain technology: decentralization, autonomy, and immutability. Blockchain is autonomous because it is not owned by any single organization or corporation, and it is decentralized due to the fact that the information is not stored in a single location. Every participant in the blockchain has access to all of the blockchain's data. Blockchain is immutable because of the way transactions are conducted and confirmed using cryptography and hashing, which ensures a high level of data integrity.

Portability is not a key principle of blockchain.

46.

WordPress is an example of a: 

  • Content management system

  • Compliance tool

  • Big data platform

  • HPC cluster

Correct answer: Content management system

WordPress is a popular content management system (CMS). CMSs are used for digital content creation. These allow for no-code website creation. 

AWS Artifact is a popular compliance tool. AWS Athena is used for big data. AWS CloudWatch is used for HPC clusters. 

47.

Which of these statements are TRUE of cloud encryption?

A. Encryption ensures only authorized users have access to sensitive data.
B. When encrypted data is intercepted without authorization it is unreadable and contextless.
C. Encryption protects data at rest, in transit and in use.
D. Encryption eliminates data security risk.

  • A, B, and C

  • A and C

  • A, B, and D

  • A, B, C, and D

Correct answer: A, B, and C

Encryption does not eliminate the danger of data security risk; rather, it isolates the risk from the data itself by relegating security to the encryption keys.

48.

Containerization is being used by the company as a sandbox option for testing apps. Currently, the sandbox environment is composed of containers distributed over numerous virtual machines connected through the same network. What can the company do to provide the BEST possible protection of the production environment?

  • Network isolation

  • Network relocation

  • VPN connectivity

  • Firewall rules

Correct answer: Network isolation

If the containers are spread among multiple virtual machines on the same network, network isolation would best protect the production environment.

49.

The following features characterize what type of cloud storage?

  • Files are stored as sectors on a drive
  • Format of virtual machine disks
  • VMs and servers use this type of storage
  • Databases will store files on this type of storage
  • Storage is in a hierarchical structure for retrieval

  • Block storage

  • Object storage

  • File storage

  • SSD storage

Correct answer: Block storage

Block storage is a type of storage in which all information is stored in equal-sized blocks on disks. It is more efficient and effective than file storage in general and is utilized in databases and virtual machines. The above-mentioned characteristics are those of block storage.

50.

Following the completion of a feasibility study, the organization established an initiative in which five users (a control group) from the operations department used cloud services to perform their jobs for a specified period of time while the remaining department users continued to use on-premises services. What is the proper term for this initiative?

  • Pilot

  • Proof of concept

  • Proof of value

  • Success criteria

Correct answer: Pilot

A pilot deploys a cloud service on a modest scale with the intent of assessing the service and determining the feasibility of moving to the cloud. The pilot program's results are subsequently communicated to stakeholders in order to establish the feasibility of using cloud services on a bigger scale.

51.

An administrator builds a user desktop within a virtual machine (VM) running on a server. When users connect to the VM, they are presented with the graphical user interface (GUI) of their operating system, exactly as they would on a local workstation.

Which technology is being used by the users?

  • VDI

  • IoT

  • SSO

  • AI

Correct answer: VDI

Virtual desktop infrastructure (VDI) is a technology that allows users to access their computing desktop environment and applications from a central server over the internet. VDI can be installed on an on-premises server or it can be used in conjunction with a cloud computing service provider's VDI cloud service. Certain cloud service providers offer solutions for VDI. These solutions deliver desktops to users via a centralized virtualization server, allowing users to login remotely and access their cloud-based desktops and applications.

IoT, SSO, and AI are incorrect. IoT devices are hardware that can share data over the internet. Single sign-on is the use of one login to access multiple applications in a domain. AI is the use of intelligent algorithms in software. 

52.

The process of tagging cloud resources with identifiers that allow them to be categorized and grouped into logical units is called:

  • Resource tagging

  • Bootstrapping

  • API

  • Maintenance

Correct answer: Resource tagging

By tagging resources, you will be able to identify which resource belongs to which department. Resource tagging applies a small amount of metadata to the resource for identification purposes.

Bootstrapping, API, and maintenance are incorrect. Bootstrapping is the use of incremental improvements. APIs are functions that can be called programmatically. 

53.

Apart from compression, what technologies can be leveraged to save businesses thousands of dollars per year in storage costs when dealing with massive data sets?

  • Deduplication

  • Capacity on demand

  • CDN

  • SDN

Correct answer: Deduplication

Deduplication conserves storage space by eliminating redundant copies of files. Deduplication ensures that only one copy of data is stored. For all other situations, a tiny pointer file pointing to the original will be produced. Additionally, compression conserves space by removing redundant data within a file but does not eliminate redundant copies.

54.

An intermediary storage queue can be utilized instead of two software components being available on a network at the same time to exchange messages, and the receiving software component can receive the message from the queue at any time. What is this an example of?

  • Loose coupling

  • Encryption

  • Media sanitization 

  • Service-level agreement 

Correct answer: Loose coupling

Loose coupling is a technique for developing software and systems that allows for the independence of two components. This is a word that is frequently used in conjunction with service-oriented architecture and microservices.

Encryption, media sanitization, and public key infrastructure are incorrect. Encryption is a method of generating ciphertext. Media sanitization is a method of removing data from storage media. A service-level agreement (SLA) is an agreement between a cloud service provider (CSP) and a cloud customer. 

55.

In regard to SaaS cloud computing, which of the following is NOT a risk?

  • Insufficient skills

  • Data security

  • Internet connection to use and save data

  • Limited web apps available

Correct answer: Insufficient skills

As the vendor manages all aspects of Software as a Service (SaaS) deployments, you do not have to worry about insufficient skill sets among administrators.

All other options are risks associated with SaaS cloud computing.

56.

Your current CSP contract will not be renewed, and you will need to move to a new provider. What type of migration would be MOST beneficial?

  • Lift and shift

  • Rip and replace

  • Phased

  • Hybrid

Correct answer: Lift and Shift

It is possible to move data and application configurations from on-premises to the cloud with little or no modification using a lift and shift migration strategy. You can also lift and shift from one cloud to another. This is also referred to as rehosting, as the application or data has been moved to a new host.

57.

Which network component would be utilized to provide direct connection between an on-premise network and cloud resources?

  • VPN

  • RDP

  • SSH

  • Load balancer

Correct answer: VPN

Virtual private networks (VPNs) provide secure tunnels between two endpoints across an untrusted network, such as the internet. VPNs allow secure data transmission. The other options are incorrect.

58.

What is the MAIN downside of the subscription-based model?

  • Increased TCO

  • Decreased TCO

  • Increased ROI

  • Decreased ROI

Correct answer: Increased TCO

The primary disadvantage of the subscription-based approach is that it has typically increased the software's Total Cost of Ownership (TCO). For instance, suppose you paid a one-time fee of $50 for a permanent license for security software. As long as the software continues to satisfy your needs, you can keep it for years. However, with a subscription-based model, this option is not available. You pay $50 for a one-year subscription, and once those 365 days have passed, the software becomes invalid unless you renew. While the subscription-based approach has numerous benefits, the overall expenses may be greater.

59.

A cloud systems administrator configured autoscaling for an application. The configuration keeps a baseline minimum of three virtual machines running but can grow to seven virtual machines if a CPU threshold is met. In terms of scalability, what is it called when you add additional virtual machines to support a busy application?

  • Scaling out

  • Scaling in

  • Scaling up

  • Scaling down

Correct answer: Scaling out

Horizontal scaling is the act of adding or removing a virtual machine in response to a changing application. Scaling out and scaling in are two concepts of horizontal scaling. The act of adding a virtual machine in response to a busy application is referred to as scaling out. Scaling in, up, and down are incorrect. Scaling up and scaling down are concepts of vertical scaling. Scaling in is the opposite of scaling out.

60.

After a complete interruption of mission-critical business functions, the data recovery team must restore normal company operations. Which policy or procedure should be followed by the team?

  • Disaster recovery plan

  • Department specific policy

  • Incident Response policy

  • Access and control policy

Correct answer: Disaster recovery plan

The disaster recovery plan is the procedure utilized to resume normal business operations in the event that mission-critical business services are completely disrupted. When mission-critical business functions are fully lost as a result of an occurrence, the disaster recovery plan is activated.

All other options are policies and procedures that do not apply to this scenario.