Which of the following is a subcomponent of a virtual machine?
- A . Virtual switch
- B . Virtual HBA
- C . Virtual shield
- D . Virtual OS
A technician wants to configure a server for storage redundancy so that if any two of the four drives fail, the server is still operational .
Which of the following should the technician configure?
- A . RAID 0
- B . RAID 1
- C . RAID 5
- D . RAID 6
An administrator is creating a new VM template and has a requirement that the OS must be hardened .
Which of the following should be performed to harden a guest OS?
- A . Encrypt the hard drive
- B . Run defrag
- C . Rename administrator account
- D . Change page file
Which of the following factors yields cost savings in cloud computing? (Select TWO).
- A . Shared resources
- B . Availability
- C . Ubiquitous access
- D . Multi-tenancy
- E . On premises
A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company’s servers .
Which of the following should the administrator perform to accomplish this goal?
- A . P2V
- B . P2P
- C . V2P
- D . V2V
Which of the following is MOST important when factoring network level security in a public cloud environment?
- A . Ensuring good user experience
- B . Ensuring confidentiality
- C . Ensuring redundancy
- D . Ensuring high availability
Which of the following describes the access control method where data owners authorize who is granted access to their files?
- A . Mandatory access control
- B . Role-based access control
- C . Access control list
- D . Discretionary access control
Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?
- A . CHAP
- B . AES
- C . PKI
- D . VPN
Monitoring alarms should be set based on:
- A . A high point for every performance counter in the system.
- B . The point of application installation.
- C . Acceptable application performance criteria.
- D . Support availability.
Which of the following is used to locate a specific area of storage in a cloud environment?
- A . Object ID
- B . SAN
- C . Replicas
- D . Metadata
Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?
- A . USB
- B . Tape
- C . HDD
- D . SSD
Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?
- A . Obfuscation
- B . Authentication
- C . Log review
- D . LUN masking
A catastrophic disk failure occurred on a company’s critical database. After a technician performs a full system restore, one of the business units realizes that the current backup does not hold fresh enough information .
Which of the following should the company revise?
- A . RTO
- B . MTTR
- C . RPO
- D . MTBF
A system administrator wants to create a mitigation strategy to quickly roll back a virtual image after applying the latest updates .
Which of the following would the administrator utilize?
- A . File backup
- B . Snapshot
- C . Offline backup
- D . Image backup
Users on a network report that they are unable to access any external websites, however, they are able to access resources by IP address .
Which of the following command line utilities would be used FIRST in troubleshooting this problem?
- A . netstat
- B . telnet
- C . nslookup
- D . ipconfig
Which of the following is true about a Type II hypervisor?
- A . It requires a primary hypervisor to function properly.
- B . It implements stronger security controls than a Type I supervisor at the same patch level.
- C . It provides slower performance than a Type I hypervisor installed on the same hardware.
- D . It provides direct hardware access through the use of specialized drivers.
Users have been reporting slow response times on a database server. The administrator noticed the server at any given time has between 30 to 50 users connected to various databases. Additional research shows disk metrics such as disk queuing and disk access rates are both around 10% to 15% .
Which of the following can be the root cause of this slow performing server?
- A . The CPU time reservation is small.
- B . The swap disk space is small.
- C . The server has fewer resources than required.
- D . I/O tuning is disabled.
A web hosting company received reports of slow performance from four out of the five clients. Upon investigation, it was determined that a hosted virtual machine was using more RAM and CPU than the others .
Which of the following MOST likely contributed to the issue?
- A . Hard quota limits
- B . Soft quota limits
- C . Storage allocation
- D . Resource pooling
A critical hypervisor security patch has been released and needs to be rolled out as soon as possible .
Which of the following steps can be taken to minimize downtime for all guest VMs currently running?
- A . In the next scheduled maintenance window, apply patch, reboot host, and wait for all VMs to come back online.
- B . In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, patch host, reboot host, and place host back into availability cluster.
- C . In the next scheduled maintenance window, shut down all VMs, apply patch, reboot host, and wait for all VMs to come back online.
- D . In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, unplug network cables from host, patch host, reboot host, reconnect network cables, and place host back into availability cluster.
Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?
- A . Rapid deployment
- B . Cloud bursting
- C . Multi-tenancy
- D . Pay-as-you-grow
An external USB hard drive physically attached to a server is a:
- A . SAN.
- B . DAS.
- C . VLAN.
- D . NAS.
Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?
- A . Port Zoning
- B . SAN Zoning
- C . LUN Masking
- D . Multipathing
A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met .
Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards?
- A . Replication consistency
- B . Penetration test
- C . Bandwidth assessment
- D . Application delivery
An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system .
Which of the following should the administrator do to accomplish this task?
- A . Install the patch on a development server
- B . Create a full backup
- C . Create a snapshot
- D . Install the patch on a test server
A datacenter migration is taking place and the administrator has been tasked with reducing the footprint of the new datacenter by virtualizing as many servers as possible. A physical server has been flagged as a candidate for relocation to the new data center .
Which of the following methods would be the FIRST method for relocating the server to the new data center?
- A . V2V
- B . V2P
- C . P2V
- D . P2P
Which of the following can be used to encrypt data at rest on a VM located in the cloud?
- A . AES
- B . SSL
- C . TLS
- D . VPN
How many cores are available to the resource pool with a Type I hypervisor that has 4 quad core processors installed?
- A . 16
- B . 24
- C . 32
- D . 64
Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized .
Which of the following should be used to ensure access is controlled appropriately between devices? (Select TWO).
- A . LUN Masking
- B . Hard Zoning
- C . Supernetting
- D . Soft Zoning
- E . Subnetting
Which of the following allows a network device to process storage traffic without significant delays, even if the amount of other network traffic has saturated the link?
- A . Caching
- B . Jumbo frames
- C . Load balancing
- D . QoS
Which of the following is MOST likely to be retrieved from an individually addressable blob?
- A . An object ID
- B . A hash
- C . A sequence number
- D . An image
Which of the following protocols is MOST likely used by a switch to communicate status information to an administrator?
- A . SNMP
- B . SMTP
- C . NNTP
- D . HTTP
Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?
- A . Extra processing is needed to store encryption keys used for secure transmission between the server and the network.
- B . Additional processing is used to run ports and services not turned off through the process of server hardening.
- C . Some processing is required for operational overhead on the processor and between the physical and virtualized processors.
- D . Significant processing is used to create and maintain the cache on multi-core processors.
A company has an existing internal network that hosts confidential information. However,
this network also has a connection to a separate site. The separate site is managed by a third party organization that has an SLA with the company .
Which of the following BEST defines this cloud delivery model?
- A . Private Cloud
- B . Public Cloud
- C . Community Cloud
- D . Hybrid Cloud
Which of the following storage technologies can leverage switches in its implementation?
- A . HBA
- B . DAS
- C . SCSI
- D . SAN
Which of the following cloud delivery models presents the LEAST vulnerabilities to a company’s existing network?
- A . Hybrid
- B . Community
- C . Public
- D . Private
Which of the following will provide the MOST network address information possible for a system that belongs to a tenant in a private cloud?
- A . ipconfig
- B . telnet
- C . traceroute
- D . nslookup
Which of the following hypervisor types runs on a host operating system that provides virtualization services, including memory management and device support?
- A . Type II hypervisor
- B . Proprietary hypervisor
- C . Type I hypervisor
- D . Open source hypervisor
Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops .
Which of the following should the lab administrator implement to allow students to upload files?
- A . Resource pooling
- B . Secure FTP
- C . Storage quotas
- D . Port mapping
An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography .
Which of the following should the administrator implement NEXT?
- A . Access controls
- B . RC5
- C . SSL
- D . Zoning
Which of the following cloud services provides billing, payroll, contract management, and human resource management functions?
- A . CaaS
- B . SaaS
- C . BPaaS
- D . DaaS
A company wants to migrate its critical application to a public cloud but the security administrator is concerned with the application’s data confidentiality requirements .
Which of the following can be done to review if the appropriate management security controls are in place at the provider?
- A . Penetration testing
- B . Vulnerability assessment
- C . Performance and application testing
- D . Policy and procedure audit
Which of the following access control types allows users to assign security attributes to objects such as files and directories?
- A . Role based
- B . Mandatory
- C . Discretionary
- D . Rule set based
An employee is asked to run an instance of a Linux OS while booted up in a Windows OS .
Which of the following types of virtualization would be used to meet this requirement?
- A . Type I
- B . Type II
- C . Bare Metal
- D . Native
A technician wants to isolate storage from other network traffic .
Which of the following MUST the technician implement to ensure storage traffic is securely segregated?
- A . VLAN
- B . VMFS
- C . PAT
- D . NTFS
Which of the following RAID configuration would be used to accomplish disk mirroring with
two disks?
- A . RAID 0
- B . RAID 1
- C . RAID 5
- D . RAID 10
Which of the following uses the business model of shared resources in a cloud environment?
- A . Elasticity
- B . Self-serve
- C . Cloud bursting
- D . Multi-tenancy
Which of the following would be used to prove the existence of vulnerabilities on a network?
- A . Penetration testing
- B . Vulnerability assessment
- C . Business impact analysis
- D . Risk assessment
Which of the following is a MINIMUM requirement for VM online migration?
- A . Same CPU family between source and target hosts.
- B . Same network equipment between source and target hosts.
- C . Same hardware vendor for the datacenter.
- D . Same hypervisor versions between source and target hosts.
Although the SAN appears to be running without any problems, the technician is unable to reach the SAN’s web enabled management interface .
Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?
- A . arp
- B . traceroute
- C . ping
- D . ipconfig
A small startup wins a contest giving them advertising time during a major sporting event .
Which of the following cloud characteristics should be in place to handle the possible spike in demand?
- A . Shared disk space
- B . Elasticity
- C . Scalability
- D . Shared memory
In which of the following cloud services will the customer be responsible for securing provisioned hosts?
- A . PaaS
- B . IaaS
- C . SaaS
- D . DaaS
Which of the following storage technologies is file-based?
- A . WAN
- B . DAS
- C . SAN
- D . NAS
Network statistics show that the 1Gbps switch port used for storage traffic is fully saturated .
Which of the following switch technologies can be used to provide twice the bandwidth?
- A . NAT
- B . Multipathing
- C . Link aggregation
- D . VLAN
Ubiquitous access to cloud computing means:
- A . access by any person
- B . access by any device through any network connection
- C . access by authorized personnel only
- D . international access across country borders
A system administrator wants to be able to use one server to collect all of the logs on the network .
Which of the following would be used to satisfy this scenario?
- A . Firewall logging
- B . Change management database
- C . Syslog service
- D . SNMP
A web server is offline .
Which of the following will allow the FASTEST possible recovery of the web server?
- A . Operating system and application backups
- B . Image backups
- C . Operating system backups only
- D . File backups
Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?
- A . Antivirus
- B . Firewall
- C . Audit logs
- D . IDS
A technician wants to remotely gather a list of all the software running on the client PCs throughout the organization .
Which of the following should be used to gather this information?
- A . WMI
- B . SQL
- C . Syslog
- D . SNMP
Which of the following attributes BEST describes “elasticity” in cloud computing? (Select TWO).
- A . Universal access
- B . Multi-tenancy
- C . Portability
- D . Cost effectiveness
- E . Scalable
- F . Off premises
A company has virtualized all of their servers on one physical server located on the company’s first floor datacenter. The company also uses security software from a third-party cloud vendor as part of a SaaS contract.
The overall cloud network model for this company’s network is BEST described by which of the following?
- A . Hybrid
- B . Offsite public
- C . On-site private
- D . Community
Which of the following should an administrator implement when connecting the company’s existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?
- A . A proxy server
- B . A load balancing solution
- C . An IPSec tunnel
- D . A server clustering solution
Which of the following should be installed on VMs to report and take action against potential threats?
- A . NIDS
- B . HIPS
- C . NIPS
- D . HIDS
The network administrator creates a DNS A record .
Which of the following tools can identify which IP has been assigned to a FQDN?
- A . arp
- B . ipconfig
- C . nslookup
- D . tracert
Some of the VMs in an environment are experiencing network connectivity loss. The VM management network has no connectivity issues .
Which of the following could cause this connectivity issue?
- A . NIC teaming is disabled
- B . Faulty host NIC port
- C . Wrong NIC load balancing mode
- D . Slow NIC
A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses .
Which of the following should be implemented?
- A . Soft limit quotas
- B . Reservations
- C . Resource pooling
- D . Entitlement allocations
A storage administrator has 100 terabytes of physical storage space within the SAN .
Which of the following is used to enable access to the storage space?
- A . Drive mirroring
- B . LUN creation
- C . Drive striping
- D . RAID configuration
An administrator is called in to determine why a virtual desktop has been unable to connect to the corporate network .
Which of the following should be run to determine if the adapter is enabled? (Select TWO).
- A . ipconfig
- B . netstat
- C . ping
- D . ifconfig
- E . iwconfig
An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently .
Which of the following is MOST likely the issue with the new servers?
- A . The dynamic resource pool is malfunctioning.
- B . The server is missing security patches.
- C . The VM servers were not properly configured.
- D . There are insufficient resources available on the host.
Which of the following access control methods could allow for a network user to sign onto their corporate network and their supplier’s network portal without having to enter their ID and password more than once?
- A . Discretionary access control
- B . Mandatory access control
- C . Role-based access control
- D . Federated access control
Which of the following MUST be in a zone? (Select TWO).
- A . Initiator
- B . Target
- C . CNA
- D . HBA
- E . Fibre Channel
An administrator is tasked to reduce the company’s datacenter power utilization. Currently there are 500 physical servers in the datacenter and 600 virtual servers with five additional available host servers .
Which of the following should the administrator perform?
- A . Migrate servers using V2V technology
- B . Perform an offline migration of virtual servers
- C . Migrate servers using V2P technology
- D . Migrate servers using P2V technology
Which of the following business continuity designs provides the highest degree of fault tolerance?
- A . Cold Site
- B . Site Mirroring
- C . Warm Site
- D . Hot Site
Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?
- A . NAS
- B . DAS
- C . LUN
- D . HBA
Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?
- A . Bridge the vNIC
- B . Set the vNIC speed to half-duplex
- C . Add an addition vNIC
- D . Set the vNIC speed to full-duplex
A company has five servers and wishes to consolidate into a single physical server .
Which of the following migration methods would accomplish this?
- A . P2P
- B . V2P
- C . V2V
- D . P2V
An administrator is tasked to perform a P2V migration of a critical application .
Which of the following steps should the administrator perform FIRST before the migration?
- A . Harden the operating system
- B . Migrate the server in a development environment
- C . Contact the vendor for compatibility requirements
- D . Establish a performance baseline
Which of the following is an example of two-factor authentication when accessing a virtual server?
- A . Multiple usernames/passwords for all websites
- B . Username/password, fingerprint scanner, and key fob
- C . Username/password and PIN
- D . Username/password and fingerprints
Which of the following is MOST important when working in highly available virtual environments?
- A . Storage VLAN
- B . Virtual network
- C . Wide area network
- D . Heartbeat VLAN
Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?
- A . Type II
- B . Type I
- C . RAID 5
- D . RAID 0
A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server.
This type of setup is an example of which of the following?
- A . Latency
- B . Replication
- C . Redundancy
- D . Failback
Which of the following only uses Fibre Channel to implement a storage infrastructure?
- A . NFS
- B . SAN
- C . NAS
- D . SMB
A system administrator currently has two web server VMs on one host. Users are reporting that query searches within the site are slow. The system administrator notices that the host CPU is above the threshold .
Which of the following should be completed?
- A . Migrate one web server to another host.
- B . Defragment the hard drives on the server.
- C . Rebuild the two web server VMs.
- D . Install another NIC for the creation of a network bridge.
A small business is moving ten physical servers to the cloud .
Which of the following should the cloud provider implement to ensure that all ten servers can dynamically share memory resources with other tenants as needed while not interfering with the other tenants?
- A . Soft limits
- B . Load balancing
- C . Resource pooling
- D . Caching
Which of the following reduces the risk of known attacks from being successful?
- A . DLP techniques
- B . Patching frequency
- C . Mandatory access controls
- D . Encryption methods
Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?
- A . Blob data
- B . Object ID
- C . Replicas
- D . Metadata
Which of the following cloud delivery models is deployed over a company intranet or company-hosted datacenter?
- A . Private cloud
- B . Hybrid cloud
- C . Community cloud
- D . Public cloud
A user is notified that they will be terminated at the end of the day. As they start cleaning up their workstation, they try to FTP information from their workstation to a cloud-based, personal backup solution .
Which of the following hardening techniques would be used to restrict their ability to transfer this information via FTP?
- A . Antivirus
- B . NIPS
- C . NIDS
- D . Host-based firewall
Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?
- A . Defrag system
- B . Update drivers
- C . Disable firewall
- D . Patch system
Which of the following networking components would be used to connect two subnets in a virtual environment?
- A . Virtual switch
- B . Virtual disks
- C . Virtual router
- D . Virtual HBA
Which of the following could be assigned to a virtual CPU?
- A . Cores
- B . HBAs
- C . LUNs
- D . Stepping
Which of the following would allow the knowledge management division to maximize the ability to find documents within an online document repository?
- A . Object ID
- B . Access control
- C . Metadata
- D . Rapid deployment
An administrator needs to provide Internet access to all internal systems using a single IP address .
Which of the following should the administrator implement?
- A . NAT
- B . Virtual switching
- C . VLAN tagging
- D . PAT
The performance logs on a virtualization server show a large number of pages being written to disk at a high rate .
Which of the following should the technician do?
- A . Increase the amount of swap space on the disk
- B . Increase the amount of physical memory
- C . Install and provision additional disk space
- D . Allocate additional CPU power to the guests
A technician would like to connect to a virtual server from inside the network, using a desktop computer .
Which of the following tools could the technician use?
- A . HTTP
- B . RDP
- C . IMAP
- D . SSL
Which of the following will allow the network administrator to verify that one IP is assigned to one VM?
- A . Virtual Local Area Network
- B . Reservations
- C . Resource Pooling
- D . Storage allocation
Which of the following BEST defines RAID 4?
- A . RAID 4 allows two failed drives.
- B . RAID 4 requires a minimum of 4 disks.
- C . RAID 4 has a dedicated parity drive.
- D . RAID 4 is less secure than RAID 5.
A storage administrator wants to limit an operating system from accessing all of the storage within the array .
Which of the following could be enabled on the SAN?
- A . LUN masking
- B . Implement different file formats
- C . Access control lists
- D . Data at rest encryption
After an administrator successfully migrated the last physical application server to a virtual environment, the help desk reported slow performance .
Which of the following should the administrator have done FIRST before migrating this server?
- A . Apply operating system patches to the application server after the migration.
- B . Contact the vendor to see if the application is supported in a virtual environment.
- C . Take a backup of the application server after the migration.
- D . Migrate the application server in a test environment and have users test it.
To avoid the same LUN showing up multiple times in client hosts, an administrator should implement:
- A . Multipathing software
- B . Multiple HBAs
- C . Multiple zones
- D . Multiple initiators
A company is required to provide their customers with zero downtime for its web application .
Which of the following would satisfy this requirement?
- A . Cold site
- B . High availability
- C . Multipathing
- D . Load balancing