Developers use programming languages and the languages have to be ________ and scripting languages do not have to be _______.
What is compiled?
Daily QUAD
Name the four common connectivity CLI tools from Chapter 14.
What are ping, traceroute, nslookup and dig?
10xer
What are the cloud elements?
What is hypervisor, virtual resources, virtual machine, virtual appliance, applications, storage, logs, workflow, cluster.
What is the Microsoft name for the disk space that is allocated to service memory requests?
What is paging file space?
10xer
Name eight network resources that control network performance?
What is bandwidth, throughput (speed), jumbo frames, network latency, hop counts, QoS, multipathing, load balancing?
Which protocol and port controls the news on the network?
What is NNTP Network News Transport Protocol 119?
10xer
What are the seven cipher names we learned, what are the two types of cipher, and what are the two types of encryption?
What is AES, DES, 3DES, DSA, RC4, RC5, RSA, Stream, Block, Asymmetric, Symmetric?
DAILY HEX
Name the six types of backups
What are:
Full, Differential, Incremental, snapshot, Bit-for-bit, Imaging
This protocol offers a standard set of signaling methods that allow for communications between the storage initiator and the storage target over short distances.
What is Small Computer Storage Interface?
What is a 16 digit hexadecimal number on a SAN fabric?
What is a WWN?
What would you use to replicate your network and analyze an attack?
What is Honeynet or Honeypot?
What is the increasing of resource nodes instead of resource capacity?
What is horizontal scaling?
You have created a virtual data center on Microsoft Azure platform. What are the three different interfaces that you could use to troubleshoot your data center?
What are the CLI, API, and GUI?
Daily Triple
What are the cloud-based storage that exists outside a company's own internal systems?
What is public cloud space, hybrid cloud space, and community cloud space?
DAILY TRIPLE
What helps make virtualization more efficient by utilizing hardware capabilities? Which manufacturer supports this virtualization?
What is hardware-assisted virtualization, AMD, Intel?
A collection of overall computing resources to provide to cloud customers?
What are resource pools
What is the protocol for a Microsoft remote access solution and what is the associated port?
What is RDP over 3389?
What is the standard of auditing the financial of a corporation?
What is Sarbanes and Oxley (SOX)?
When backups are available to restore immediately that means that they are ______ backups?
What are online backups?
Daily Quad
What separates collision domains and at which OSI level?What separates broadcast domains and at which OSI level?
What is switch at layer 2 and what is router at layer 3
When RAID groups are carved out into subdivisions for block level access, they are referred to in by this unique identifier.
What is LUN or Logical Unit Number?
Daily Quad
What are the four protocols for monitoring solutions?
What is SNMP, WBEM or WMI, Out-of-band management or IPMI, and Syslog
When trying to provide a good access management solution you realize that you IT department may not have the capabilities that they attest to having. What third party policy enforcement or gatekeeper can you search for?
What is Cloud Access Security Broker (CASB)?
What is the default mode on a firewall?
What is implicit deny?
DAILY Pentatastic
What are the five characteristics of a cloud solution according to the NIST?
What is on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service?
Daily TRIPLE
What are three different ways to convert a physical server to a virtual server?
What is manual, semi-automated, and fully automated?
When you assign a specific amount of resources that serves as a monitoring point and will notify the cloud administrator but will stop the use of more of the resource?
What are hard limit?
Daily Quad
What is the unsecure remote admin protocol its port and what a packet sniffer will be able to view?
What Telnet, port 23, and username and password?
DAILY QUAD
What are the four types of network monitoring systems?
What are behavior-based (human based), anomaly-based (device based), signature-based, heuristic (trend analysis)?
Daily Double
These backups reset the archive bit.
What are full and incremental?
Daily Double
What is the layer of the OSI model that ICMP operates and what is the port that it travels across?
What Network layer 3 and port 7?
There are three common interfaces that make storage solutions possible. Which of the adapters is an expansion card that can be used to connect over a SAN fabric or a NAS fabric?
What is Converged Network Adapter or CNA?
Daily Triple
What is most common way of collecting event messages and which ports are used?
What is syslog and UPD 514, TCP 514?
Daily Double
What are orchestrated workflows organized into a series of tasks called activities for a single node and what are they called for multiple nodes?
What is Single-node runbook and multiple-node runbook?
DAILY QUAD
What are two types of logical segmentations of a network and how many segments can each provide for in a virtual environment?
What are VLANs? What is 4,096 or about 4,000?
What are VXLANs? What is 16 million?
You have configured a RAID 0 storage solution for your companies private cloud specifically configured for your Accounting Department. The CFO wants to know how much failure this solution can withstand to ensure that you have provided the right solution. He is concerned because your company is located in Florida and hurricane season is on the horizon. You explain to him that a RAID 0 can lose _____ disks and that you should spend the money to configure a RAID 5 because it is fault tolerant to losing ____ drives?
What is 0 drive loss and 1 drive loss?
What is difference between overclocking and overcommitment ratios?
What is increasing CPU speed and the ratio of virtual to physical CPUs?
Daily Double
What are two common alerting methods?
What is SMS and SMTP?
DAILY QUAD
You happen to be really good at configuring the end-end solution for the MX services so you need to ensure that an external company office in Menlo Park can send email to the home office in Austin and then each employee at their respective location can access their email. Which four protocols and their respective ports must you ensure to allow on the company firewalls?
What is POP3 over port 110, POP3S over 995, SMTP over port 25, and SMTPS over port 465?
What type of authentication should all cloud spaces utilize in their security policy?
What is multifactor authentication?
Daily Double
Backups can consume a lot of _____ and network __/___.
What are disk and I/O?
You are creating a Virtual Extensible LAN built on top of a Virtual LAN infrastructure in your on-premise data center. What must you allow over your firewall to make this work properly?
What is reconfigure the firewall to allow traffic over UDP 4789.
Switching from one service node to another without an interruption in service?
What is failover?
Daily Double
Which management tool allows you to write scripts to automate admin tasks and which scripting language would you most likely use?
What is Windows Management Instrumentation and PowerShell?
What is the process the organization goes through to create procedures to deal with and manage threats?
What is Business Continuity Management?
What is the most likely problem if the servers lose connectivity frequently, fail to trust after multiple attempts, and reject data?
What is a system clock difference or time synchronization issue?
Daily Double
What are the two choice for a the location of a cloud deployment?
What are on-premise and off-premise?
Daily QUAD
Hypervisors have a ______ ______ ______ which is atype of method of mapping virtual memory?
What does the map allow the memory to achieve?
What are virtual allocation table (VAT) and Memory Ballooning?
What defines limits that can be utilized specifically for disk resources allocated to virtual machines to ensure that they are not performance constrained?
What is I/O throttling?
DAILY DOUBLE
What is type of server manufactured by CISCO must you set up to provide a reliable authentication and authorization service to your cloud and what port would you use if you are only using CISCO hardware and provide for terminal access?
What is a TACACS + over port 49?
This relatively recent trend in networking and security made it possible for the iPhone to virtualize its network and security features?
What is Software-defined Network or (SDN)
Daily Double
What are the two points in time during a failure that we must reference in a SLA?
What are RTO and RPO.
Daily Double
What are the two methods of trunking a VLAN?
What are ISL Interswitch Link and 802.1Q?
DAILY TRIPLE
In a simulation on the CompTIA exam for Cloud +, you receive an image of a SAN fabric. What are the three things that you must ensure are correct?
What are the link speed, SAN_A initiator ID, and SAN_B initiator ID?
Connecting data over multiple devices over a period of time to understand trends utilizing a software like SIEM is an example of what?
What is event correlation?
What is the service that CSPs provide to clients in order to set baselines and thresholds usually through a performance monitoring software?
What is Management as a Service (MaaS)?
DAILY DOUBLE
You are asked to perform a performance test. What is the most common test type and what is subset of that test type?
What is Load testing and stress testing?
What is the target object of orchestration?
What is workflow?
DAILY DOUBLE
What is the overcommitment ratio for vRAM to physical RAM. What is the maximum tolerable?
What is 1.25:1 and 1.5:1?
What is on method of improving the performance of a SAN and providing for more security?
What is LUN zoning?
Daily Quad
What are the four tunneling protocols and their associated ports that all cloud architects must be aware of to ensure a secure cloud solution?
What are GRE (port 47), L2TP (1701), PPTP (1723), and IPsec (UDP 500 then IP protocol 50 for ESP and IP 51 for AH)?
Daily Quad
What provides external security for applications?
What is WAF web application firewall?
As information becomes more critical, companies are backing them up more often, even continuously. Latency can be an issue in ensuring timely backup completion when backing up to the cloud. What solution should you recommend to your client and ensure that the CSP provides?
What are edge sites or edge location?
What is a technique where a router contains multiple routing tables at the same time, allowing for identical IP addresses to coexist without conflict?.
What is virtual routing and forwarding (VRF)?
Which storage solution systems typically support both the common Internet file system (CIFS)/(SMB) and the network file system (NFS). This system appears to the client as a file server, not as a disk.
What is a NAS?
Monthly trends show an increase or upsize with the storage consumption reporting 100 GB, 105BG, 109 GB, 117GB, and 121GB. What is the minimum increase to match trends?
What is a 5 GB per month increase in storage?
Daily Double
What two organizations provide standards for management policies?
What is the NIST and ISO?
What rules should be put in place to improve performance of streaming services?
What are QoS rules?
You provide a client with AWS services known as Amazon Aurora, Amazon RDS, and Amazon Redshift. Amazon Aurora was developed in conjunction with MySQL and Amazon RDS has portions that are similar to PostgreSQL What is the acronym for this type of service?
What is DBaaS or Database as a Service?
Some systems require management tools like VMware's vSphere or Microsoft's ______ _______ _______ ______ _______.
What is System Center Virtual Machine Manager?
What is a network performance metric that should be matched properly and if it isn't will result in many cyclical redundancy check (CRC) errors.
What is speed or duplex mismatch?
Daily Penta
You are configuring a firewall and you see that the following ports are denied 3389, 139, 995, 989, and 1433. What are the services that will be denied?
What are Microsoft RDP, NetBIOS Session, Secure email from the server (POP3S), secure file transfer over TLS (FTPS), and access to SQL server?
You can configure virtual machines with the database role running Microsoft SQL Server 2016 with an Analysis server. You must ensure that the script "Allows" inbound traffic for SQL Database Management over this TCP protocol port.
What is port 1433?
This type of backup provide for the most granular copy of a physical machine and are usually scheduled instead of done as a one-time operation.
What is bit-for-bit backup?
What are the two components that make a VPN possible?
What is a tunnel and a gateway router?
Where are LUN masking and LUN zoning executed?
What is at the storage controller level (masking) and switch level (zoning)?
Daily Pentatastic Question
What are the five phases of the ADLC
What is Specification, Development, Testing, Deployment, and Maintenance?