C
L
O
U
D1
T1
E1
S
T
E
D
100

Developers use programming languages and the languages have to be ________ and scripting languages do not have to be _______.

What is compiled?

100

Daily QUAD

Name the four common connectivity CLI tools from Chapter 14.

What are ping, traceroute, nslookup and dig?

100

10xer

What are the cloud elements?

What is hypervisor, virtual resources, virtual machine, virtual appliance, applications, storage, logs, workflow, cluster.

100

What is the Microsoft name for the disk space that is allocated to service memory requests?

What is paging file space?

100

10xer

Name eight network resources that control network performance?

What is bandwidth, throughput (speed), jumbo frames, network latency, hop counts, QoS, multipathing, load balancing?

100

Which protocol and port controls the news on the network?

What is NNTP Network News Transport Protocol 119?

100

10xer

What are the seven cipher names we learned, what are the two types of cipher, and what are the two types of encryption?

What is AES, DES, 3DES, DSA, RC4, RC5, RSA, Stream, Block, Asymmetric, Symmetric?

100

DAILY HEX

Name the six types of backups

What are:

Full, Differential, Incremental, snapshot, Bit-for-bit, Imaging

100

This protocol offers a standard set of signaling methods that allow for communications between the storage initiator and the storage target over short distances.

What is Small Computer Storage Interface?

100

What is a 16 digit hexadecimal number on a SAN fabric?

What is a WWN?

100

What would you use to replicate your network and analyze an attack?

What is Honeynet or Honeypot?

200

What is the increasing of resource nodes instead of resource capacity?

What is horizontal scaling?

200

You have created a virtual data center on Microsoft Azure platform.  What are the three different interfaces that you could use to troubleshoot your data center?

What are the CLI, API, and GUI?

200

Daily Triple

What are the cloud-based storage that exists outside a company's own internal systems?

What is public cloud space, hybrid cloud space, and community cloud space?

200

DAILY TRIPLE

What helps make virtualization more efficient by utilizing hardware capabilities? Which manufacturer supports this virtualization?

What is hardware-assisted virtualization, AMD, Intel?

200

A collection of overall computing resources to provide to cloud customers?

What are resource pools

200

What is the protocol for a Microsoft remote access solution and what is the associated port?

What is RDP over 3389?

200

What is the standard of auditing the financial of a corporation?

What is Sarbanes and Oxley (SOX)?

200

When backups are available to restore immediately that means that they are ______ backups?

What are online backups?

200

Daily Quad

What separates collision domains and at which OSI level?


What separates broadcast domains and at which OSI level?


What is switch at layer 2 and what is router at layer 3

200

When RAID groups are carved out into subdivisions for block level access, they are referred to in by this unique identifier.

What is LUN or Logical Unit Number?

200

Daily Quad

What are the four protocols for monitoring solutions?

What is SNMP, WBEM or WMI, Out-of-band management or IPMI, and Syslog

300

When trying to provide a good access management solution you realize that you IT department may not have the capabilities that they attest to having. What third party policy enforcement or gatekeeper can you search for?

What is Cloud Access Security Broker (CASB)?

300

What is the default mode on a firewall?

What is implicit deny?

300

DAILY Pentatastic

What are the five characteristics of a cloud solution according to the NIST?


What is on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service?

300

Daily TRIPLE

What are three different ways to convert a physical server to a virtual server?

What is manual, semi-automated, and fully automated?

300

When you assign a specific amount of resources that serves as a monitoring point and will notify the cloud administrator but will stop the use of more of the resource?

What are hard limit?

300

Daily Quad

What is the unsecure remote admin protocol its port and what a packet sniffer will be able to view?

What Telnet, port 23, and username and password?

300

DAILY QUAD

What are the four types of network monitoring systems?

What are behavior-based (human based), anomaly-based (device based), signature-based, heuristic (trend analysis)?

300

Daily Double

These backups reset the archive bit.

What are full and incremental?

300

Daily Double

What is the layer of the OSI model that ICMP operates and what is the port that it travels across?

What Network layer 3 and port 7?

300

There are three common interfaces that make storage solutions possible. Which of the adapters is an expansion card that can be used to connect over a SAN fabric or a NAS fabric?

What is Converged Network Adapter or CNA?

300

Daily Triple

What is most common way of collecting event messages and which ports are used?

What is syslog and UPD 514, TCP 514?

400

Daily Double

What are orchestrated workflows organized into a series of tasks called activities for a single node and what are they called for multiple nodes?

What is Single-node runbook and multiple-node runbook?

400

DAILY QUAD

What are two types of logical segmentations of a network and how many segments can each provide for in a virtual environment?

What are VLANs? What is 4,096 or about 4,000?

What are VXLANs? What is 16 million?

400

You have configured a RAID 0 storage solution for your companies private cloud specifically configured for your Accounting Department.  The CFO wants to know how much failure this solution can withstand to ensure that you have provided the right solution. He is concerned because your company is located in Florida and hurricane season is on the horizon.  You explain to him that a RAID 0 can lose _____ disks and that you should spend the money to configure a RAID 5 because it is fault tolerant to losing ____ drives?

What is 0 drive loss and 1 drive loss?

400

What is difference between overclocking and overcommitment ratios?

What is increasing CPU speed and the ratio of virtual to physical CPUs?

400

Daily Double

What are two common alerting methods?

What is SMS and SMTP?

400

DAILY QUAD

You happen to be really good at configuring the end-end solution for the MX services so you need to ensure that an external company office in Menlo Park can send email to the home office in Austin and then each employee at their respective location can access their email.  Which four protocols and their respective ports must you ensure to allow on the company firewalls?

What is POP3 over port 110, POP3S over 995, SMTP over port 25, and SMTPS over port 465?

400

What type of authentication should all cloud spaces utilize in their security policy?

What is multifactor authentication?

400

Daily Double

Backups can consume a lot of _____ and network __/___. 

What are disk and I/O?

400

You are creating a Virtual Extensible LAN built on top of a Virtual LAN infrastructure in your on-premise data center.  What must you allow over your firewall to make this work properly?

What is reconfigure the firewall to allow traffic over UDP 4789.

400

Switching from one service node to another without an interruption in service?

What is failover?

400

Daily Double

Which management tool allows you to write scripts to automate admin tasks and which scripting language would you most likely use?

What is Windows Management Instrumentation and PowerShell?

500

What is the process the organization goes through to create procedures to deal with and manage threats?

What is Business Continuity Management?

500

What is the most likely problem if the servers lose connectivity frequently, fail to trust after multiple attempts, and reject data?

What is a system clock difference or time synchronization issue?

500

Daily Double

What are the two choice for a the location of a cloud deployment?

What are on-premise and off-premise?

500

Daily QUAD

Hypervisors have a ______ ______ ______ which is atype of method of mapping virtual memory?  

What does the map allow the memory to achieve? 

What are virtual allocation table (VAT) and Memory Ballooning?

500

What defines limits that can be utilized specifically for disk resources allocated to virtual machines to ensure that they are not performance constrained?

What is I/O throttling?

500

DAILY DOUBLE

What is type of server manufactured by CISCO must you set up to provide a reliable authentication and authorization service to your cloud and what port would you use if you are only using CISCO hardware and provide for terminal access?

What is a TACACS + over port 49?

500

This relatively recent trend in networking and security made it possible for the iPhone to virtualize its network and security features?

What is Software-defined Network or (SDN)

500

Daily Double 

What are the two points in time during a failure that we must reference in a SLA?

What are RTO and RPO.

500

Daily Double

What are the two methods of trunking a VLAN?

What are ISL Interswitch Link and 802.1Q?

500

DAILY TRIPLE

In a simulation on the CompTIA exam for Cloud +, you receive an image of a SAN fabric.  What are the three things that you must ensure are correct?

What are the link speed, SAN_A initiator ID, and SAN_B initiator ID?

500

Connecting data over multiple devices over a period of time to understand trends utilizing a software like SIEM is an example of what?

What is event correlation?

600

What is the service that CSPs provide to clients in order to set baselines and thresholds usually through a performance monitoring software?

What is Management as a Service (MaaS)?

600

DAILY DOUBLE

You are asked to perform a performance test.  What is the most common test type and what is subset of that test type?

What is Load testing and stress testing?

600

What is the target object of orchestration?

What is workflow?

600

DAILY DOUBLE

What is the overcommitment ratio for vRAM to physical RAM.  What is the maximum tolerable?

What is 1.25:1 and 1.5:1?

600

What is on method of improving the performance of a SAN and providing for more security?

What is LUN zoning?

600

Daily Quad

What are the four tunneling protocols and their associated ports that all cloud architects must be aware of to ensure a secure cloud solution?

What are GRE (port 47), L2TP (1701), PPTP (1723), and IPsec (UDP 500 then IP protocol 50 for ESP and IP 51 for AH)?

600

Daily Quad

What provides external security for applications?

What is WAF web application firewall?

600

As information becomes more critical, companies are backing them up more often, even continuously. Latency can be an issue in ensuring timely backup completion when backing up to the cloud. What solution should you recommend to your client and ensure that the CSP provides?

What are edge sites or edge location?

600

What is a technique where a router contains multiple routing tables at the same time, allowing for identical IP addresses to coexist without conflict?.

What is virtual routing and forwarding (VRF)?

600

Which storage solution systems typically support both the common Internet file system (CIFS)/(SMB) and the network file system (NFS). This system appears to the client as a file server, not as a disk.

What is a NAS?

600

Monthly trends show an increase or upsize with the storage consumption reporting 100 GB, 105BG, 109 GB, 117GB, and 121GB.  What is the minimum increase to match trends?

What is a 5 GB per month increase in storage?

700

Daily Double

What two organizations provide standards for management policies?

What is the NIST and ISO?

700

What rules should be put in place to improve performance of streaming services?

What are QoS rules?

700

You provide a client with AWS services known as Amazon Aurora, Amazon RDS, and Amazon Redshift.  Amazon Aurora was developed in conjunction with MySQL and Amazon RDS has portions that are similar to PostgreSQL What is the acronym for this type of service?

What is DBaaS or Database as a Service?

700

Some systems require management tools like VMware's vSphere or Microsoft's ______ _______ _______ ______ _______.

What is System Center Virtual Machine Manager?

700

What is a network performance metric that should be matched properly and if it isn't will result in many cyclical redundancy check (CRC) errors.

What is speed or duplex mismatch?

700

Daily Penta

You are configuring a firewall and you see that the following ports are denied 3389, 139, 995, 989, and 1433.  What are the services that will be denied?

What are Microsoft RDP, NetBIOS Session, Secure email from the server (POP3S), secure file transfer over TLS (FTPS), and access to SQL server?

700

You can configure virtual machines with the database role running Microsoft SQL Server 2016 with an Analysis server.  You must ensure that the script "Allows" inbound traffic for SQL Database Management over this TCP protocol port.

What is port 1433?

700

This type of backup provide for the most granular copy of a physical machine and are usually scheduled instead of done as a one-time operation.

What is bit-for-bit backup?

700

What are the two components that make a VPN possible?

What is a tunnel and a gateway router?

700

Where are LUN masking and LUN zoning executed?

What is at the storage controller level (masking) and switch level (zoning)?

700

Daily Pentatastic Question

What are the five phases of the ADLC

What is Specification, Development, Testing, Deployment, and Maintenance?

M
e
n
u