CompTIA Cloud Essentials+ Exam Questions

Page 5 of 25

81.

Your client-facing web portal was down for several days due to a regional power failure. You are advised to send an email to clients briefly explaining the unforeseen circumstances that caused the web portal to be down and the additional steps the organization implemented to prevent an outage in the future. This information shared in the email is dictated by what organizational policy?

  • Communications policy

  • Risk response

  • Findings

  • Incident response

Correct answer: Communications policy

The email is used to communicate events and responses to occurrences that have affected your clients; the content is determined by your communication policies. The investigation and response to the incident would be included in the power outage, but that has already occurred. The precautions taken to avoid future outages may be considered a risk response; however, this is not stated in the question.

82.

When it comes to data management in the cloud, there are three operational processes to consider. Which of the following is NOT a mechanism when it comes to data management?

  • Automation

  • Locality

  • Backup

  • Replication

Correct answer: Automation

In the cloud, data will be your most valuable asset. You'll need to safeguard it and manage risk associated with its loss. Data is available in a variety of forms, ranging from structured data, such as databases, to unstructured data, such as files and objects. Whatever the purpose, data loss can be detrimental to financial performance and client services. When it comes to cloud data management, three mechanisms are available: Replication which is the availability of data, locality which refers to location or vicinity, and lastly, backup, which refers to disaster recovery. Automation is not one of the three operational processes outlined for cloud data management.

83.

Training is a specific component of:

  • professional development.

  • evaluations.

  • cloud adoptions.

  • compliance.

Correct answer: professional development.

Professional development includes education and training. Professional development is a long-term process that is primarily concerned with the advancement of an individual's career. Training on specific job-related subjects and abilities is included in the professional development program.

84.

A virtual machine with 2 CPUs, 4 GBs of RAM, and 128 GB SSD storage will cost less than a virtual machine with 4 CPUs, 8 GBs of RAM, and 128 GB SSD storage because:

  • Compute charges are dependent on allocated CPU and memory

  • Compute charges are dependent on allocated storage and memory

  • Compute charges are dependent on allocated storage and CPU

  • Compute charges are dependent on allocated CPU and storage

Correct answer: Compute charges are dependent on allocated CPU and memory

Compute charges are determined by the amount of CPU and memory available to provided systems. CSPs classify its compute offerings into subclasses that optimize the required compute functionality. There are several types of optimizations, including CPU optimized, memory optimized, GPU accelerated, and storage optimized.

85.

Your organization is planning to adopt cloud computing and engages professional services from an IT consulting firm to assess cloud solutions. What should the consulting firm prepare for the organization?

  • RFP

  • SOW

  • PoC

  • SLA

Correct answer: RFP

An organization considering a cloud migration should first conduct an internal assessment of cloud solutions or engage the professional services of an IT consulting firm. The IT consulting firm should develop a Request For Proposal (RFP) outlining how the organization can leverage cloud computing to support your business needs.

86.

Pay for use software is sometimes referred to as:

  • COTS.

  • open-source.

  • proprietary.

  • commodity.

Correct answer: COTS.

Commercial Off-The-Shelf (COTS) software is sometimes referred to as pay-for-use software. COTS software refers to standard software solutions available to anybody.

87.

Which of the following is another name for a Type 1 hypervisor?

  • Bare metal hypervisor

  • Hosted hypervisor

  • Virtual box hypervisor 

  • Virtual PC

Correct answer: Bare metal hypervisor

A bare metal hypervisor is another name for Type 1 hypervisor. This is because the software runs directly on the hardware, or "metal", without an operating system. 

Hosted hypervisor, virtual box hypervisor, and virtual PC are incorrect. Hosted hypervisor is another name for a Type 2 hypervisor. Virtualbox hypevisor and Virtual PC are brand names for Type 2 hypervisors. 

88.

Cloud customers are spared from needing detailed network hardware configuration knowledge when configuring cloud network components due to why type of networking?

  • SDN

  • SDS

  • CDN

  • SSH

Correct answer: SDN

Software-Defined Networking (SDN) enables the creation of virtual networks that do not require any hardware, similar to how a virtual machine does not require any one-to-one hardware relation. SDNs are theoretically a software layer that sits between user interfaces and the underlying networking devices. When configuring cloud-based network resources, users are not required to have device-specific technical knowledge.

89.

Regarding customers of public cloud deployments, which of the following statements is TRUE?

  • Public cloud customers have access to only service providers' off-the-shelf offerings. 

  • Public cloud customers are accountable for maintenance of the cloud infrastructure.

  • Public cloud customers have access to a service that is controlled by only their organization.

  • Public cloud customers incur significant capital expenditures. 

Correct answer: Public cloud customers have access to only service providers' off-the-shelf offerings.

Any type of cloud environment that is available to the broader public is considered a public cloud deployment model. As a result, the customer is simply offered the CSP's services and infrastructure. In contrast, services that are controlled by only one organization are part of the private cloud. Maintenance of infrastructure is handled by the cloud provider, not the cloud customer. Cloud usage is associated with operating expenses but not typically significant capital expenses. 

90.

What type of storage media uses spinning disk platters and stores data magnetically?

  • HDD

  • SSD

  • RAM

  • Tape drive

Correct answer: HDD

A Hard Disk Drive (HDD) storage uses spinning disk platters and stores data magically. This type of storage media has moving parts. HDD are considered slower and more cost-effective than their counterparts.

91.

Allowing a cloud database and virtual machine to operate for months when they are not required for more than a single day can result in significant computing costs. What can be done to prevent this situation?

  • Apply cloud-based policies and permissions

  • Testing for quality assurance

  • Meeting compliance obligations

  • Calculate fees with a cloud pricing calculator

Correct answer: Apply cloud-based policies and permissions

The convenience of a cloud-based policy and permissions system lets users restrict which cloud resources users are allowed to deploy. Also, actions can be automated, such as shutting down a virtual machine.

92.

Which of the following is MOST commonly associated with big data analytics?

  • Clustering

  • Containers

  • Microservices

  • Federation

Correct answer: Clustering

Clustering is the most often used component of big data analytics. Sifting through massive information manually in search of patterns, trends, and relationships is impractical. Cloud-based big data analytics enables you to quickly and affordably spin up a cluster, load data sets, and analyze the results to acquire insight that would not be available otherwise. To analyze large amounts of data, big data analytics systems make use of clusters, or sets of virtual machines that work collaboratively. The data is then typically stored in a NoSQL database.

Containers, microservices, and federation are incorrect. Containers are environments to run applications. Microservices are small independent functions. Federation links an identity across many different providers. 

93.

How can cloud resources be accessed via self-service?

  • All of these

  • GUI

  • API

  • CLI

Correct answer: All of these

Most major cloud service providers offer access to cloud resources via GUI (Graphical User Interface), CLI (Command-Line Interface), and API (Application Programing Interface). 

94.

What is the MOST valuable asset in the cloud?

  • Data

  • Virtual machines

  • Software licenses

  • Compute resources

Correct answer: Data

In the cloud, data will be your most valuable resource. Safeguarding the data and mitigating the risk of its theft and/or loss will need to be taken. From structured data like databases to unstructured data like files and objects, data can take many forms. Loss of data, regardless of its form, may be devastating from both a financial and a reputational standpoint for a business.

Virtual machines, software licenses, and compute resources are all valuable assets in the cloud; however, data is the most valuable asset.

95.

Which of the following is another name for a VPC?

  • VNet

  • VCNN

  • VNVN

  • VSDN

Correct answer: VNet

VNet is another name for a virtual private cloud (VPC). The term VNet is used in Microsoft Azure. Whereas, the term VPC is used in AWS. 

VCBB, VNVN, and VSDN are incorrect. They are not standard acronyms for a cloud virtual network. 

96.

A system administrator defined a virtual network in the cloud and would like to configure it with limited or where no network traffic can enter or leave that virtual network. What would be the BEST way to configure the new virtual network?

  • Configure firewall rules and modify the route table

  • Set up a VLAN and firewall rules

  • Configure the network VMs to use multiple NICs.

  • Implement a site to site VPN

Correct answer: Configure firewall rules and modify the route table

The ideal method for setting the new virtual network is to configure incoming and outgoing firewall traffic rules, as well as to modify routing table entries to restrict traffic from being routed into or out of the network. While creating a VLAN, defining firewall rules, and deploying a site to site VPN are all possible possibilities, for the sake of simplicity and avoiding excessive resource consumption, these would not be the greatest configuration options for the virtual network. Provisioning the network's VMs with multiple NICs is not an appropriate approach.

97.

The CIO is reviewing a billing summary for July and notices that cloud costs have increased in comparison to the company's cloud budget. Which of the following approaches is the MOST effective method at allocating cloud operating costs to departments so that the CIO can determine the source of cost increases?

  • Chargebacks

  • Right sizing

  • Auto-scaling

  • Benchmarks

Correct answer: Chargebacks

Chargebacks are the process by which departments of cloud computing resources are billed for the resources they provisioned and used. Chargebacks enable cloud resource consumers to be held accountable for their activities. Chargebacks work in tandem with resource tagging, the process of assigning identifiers to cloud resources that enable them to be classified and grouped into logical units. This is an effective method of monitoring departmental utilization.

98.

Which of the following has historically resulted in concerns about the security of IoT devices?

  • All of these

  • Embedded credentials

  • Lack of encryption

  • Lack of vendor updates

Correct answer: All of these

Embedded credentials, lack of encryption, and lack of vendor updates have resulted in security concerns for IoT devices. Numerous IoT devices arrive with pre-configured default settings and passwords that cannot be modified, both of which introduce security risks. Additionally, producers of IoT devices are notorious for failing to provide IoT device updates, even when a security risk is found. When collecting cloud IoT data, you must consider the possibility that it has been tampered with due to the volume of the data and the difficulty in securing and managing it.

99.

A self-service portal in the cloud used to provision servers, storage, and databases is an example of which characteristic?

  • On-demand access

  • Pay-as-you-go

  • Scalability

  • Broad network access

Correct answer: On-demand access

A virtual environment can be created dynamically by utilizing on-demand cloud computing, allowing the consumer to continuously add and update resources via a web portal. On-demand access can also be referred to as self-service, as mentioned in the question.

Pay-as-you-go allows charges to cloud customers to be based on the time period and computing resources used by the cloud. Scalability allows the amount of computing resources being used to change in response to changing needs. Broad network access means the cloud can be accessed by a wide variety of devices. 

100.

Development, build, test and release are characteristics of:

  • DevOps pipeline

  • Infrastructure as code (IaC)

  • deployment templates

  • Quality Assurance (QA)

Correct answer: DevOps pipeline

The DevOps pipeline includes four-parts: development, build, test and release. Step 1: Development and Step 2: Build are the "Dev" part of DevOps. Step 3: Test and Step 4: Release are the "Ops" part of DevOps.