Architecture & Design
Security
Deployment
Operations & Support
Troubleshooting
100

___ is essential to ensure an e-commerce application can receive orders without any downtime?

What is availability?
100

With PKI, the type of key that is used to validate a digital signature.

What is a public key?

100

The type of licensing model in which an administrator chooses to pay for database software on a monthly basis.

What is subscription?
100

Quotas are a mechanism for enforcing ___

Limits.

100

Hardware-assisted virtualization can be enabled in the BIOS. You notice the option is missing in the BIOS settings; consider the most likely reason it may not appear.

Does the BIOS need a firmware update?

200

When compared to type II hypervisors, type 1 hypervisors general have lower ___

Host overhead requirements.
200

A SaaS application requires users to log in using the same password as their local network password. This is an example of:

What is a single sign-on.

200

The migration process required to migrate a VM to a new host computer.

What is V2V (Virtual to Virtual)

200
A form of network technology that automatically directs traffic to the host using the least amount of resources.

What is load balancing?

200

This is the protocol that will allow an administrator to configure a trap to collect system data.

What is SNMP? (Simple Network Management Protocol)

300

The number of required read operations to function in a RAID 6 environment. 

What is three?

300

The type of risk response strategy in which a risk is identified, impact is considered, and then the risk is assumed.

What is acceptance?

300

The name of the service that translates IP addresses into hostnames.

DNS (Domain Name System)

300

The type of model that allows an organization to track private cloud usage.

What is chargeback?

300

Data loss could occur while using this Hyper-V feature.

What is TURN-OFF?
400
A data structure that actively maintains and is re-filled by the Virtual Machine Manager (VMM), and mirrors the guest's own page tables.
What are shadow page tables?
400

A term that best describes the process a cloud provider needs to follow in order to locate a document that defines the appropriate action to take in the case of a breach

What is an incident response?

400

Two of the following are factors in a gap analysis when considering a CSP (Cloud Solution Provider)

a) Technical

b) Pilot

c) Support

d) Benchmarks

e) Reporting

f) Business

a) What is technical?

f) What is business?

400

Select one of the following that is a data management aspect of operations in a cloud environment.

a) Object Storage

b) Self-Service

c) Locality

d) Collaboration

What is locality? (c)

400

This must be configured in order to view log data from multiple Linux servers from a central location. 

What is syslog forwarding? 

500

___ allow a cloud provider the ability to distribute resources as-needed to the cloud consumer to improve efficiency and reduce costs.

What are shared resources?
500

The best method of securing data in transit that is readable using third-party scanning tools.

What is encryption? 

500

The most likely reason for subscribing to PaaS.

What is application development?

500

A webmail service hosted by an MSP that is considered a private cloud.

What is a single company?

500

To ensure a successful cloud adoption, this is a critical agreement when it comes to performance. 

What is SLA?