Articles

CV0-001 Exams Study Guides

by David Milan IT Certification

Question: 1

 

Which of the following is MOST important when factoring network level security in a public cloud environment?

 

A. Ensuring good user experience

B. Ensuring confidentiality

C. Ensuring redundancy

D. Ensuring high availability

 

Answer: B   

 

Question: 2

 

Which of the following should an administrator implement when connecting the company’s existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?

 

A. A proxy server

B. A load balancing solution

C. An IPSec tunnel

D. A server clustering solution

 

Answer: C   

 

Question: 3

 

An administrator is creating a new VM template and has a requirement that the OS must be hardened. Which of the following should be performed to harden a guest OS?

 

A. Encrypt the hard drive

B. Run defrag

C. Rename administrator account

D. Change page file

 

Answer: C   

 

Question: 4

 

A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company’s servers. Which of the following should the administrator perform to accomplish this goal?

 

A. P2V

B. P2P

C. V2P

D. V2V

 

Answer: A   

 

Question: 5

 

An administrator needs to provide Internet access to all internal systems using a single IP address. Which of the following should the administrator implement?

 

A. NAT

B. Virtual switching

C. VLAN tagging

D. PAT

 

Answer: A   

 

Question: 6

 

Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?

 

A. Type II

B. Type I

C. RAID 5

D. RAID 0

 

Answer: A   

 

Question: 7

 

In which of the following cloud services will the customer be responsible for securing provisioned hosts?

 

A. PaaS

B. IaaS

C. SaaS

D. DaaS

 

Answer: B   

 

Question: 8

 

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?

 

A. Defrag system

B. Update drivers

C. Disable firewall

D. Patch system

 

Answer: D   

 

Question: 9

 

Which of the following can be used to encrypt data at rest on a VM located in the cloud?

 

A. AES

B. SSL

C. TLS

D. VPN

 

Answer: A   

 

Question: 10

 

An administrator is tasked to reduce the company’s datacenter power utilization. Currently there are 500 physical servers in the datacenter and 600 virtual servers with five additional available host servers. Which of the following should the administrator perform?

 

A. Migrate servers using V2V technology

B. Perform an offline migration of virtual servers

C. Migrate servers using V2P technology

D. Migrate servers using P2V technology

 

Answer: D   

 

Question: 11

 

An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system. Which of the following should the administrator do to accomplish this task?

 

A. Install the patch on a development server

B. Create a full backup

C. Create a snapshot

D. Install the patch on a test server

 

Answer: C   

 

Question: 12

 

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?

 

A. Hybrid

B. Community

C. Public

D. Private

 

Answer: D   

 

Question: 13

 

Which of the following uses the business model of shared resources in a cloud environment?

 

A. Elasticity

B. Self-serve

C. Cloud bursting

D. Multi-tenancy

 

Answer: D   

 

Question: 14

 

Which of the following is used to locate a specific area of storage in a cloud environment?

 

A. Object ID

B. SAN

C. Replicas

D. Metadata

 

Answer: A   

 

Question: 15

 

Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?

 

A. Bridge the vNIC

B. Set the vNIC speed to half-duplex

C. Add an addition vNIC

D. Set the vNIC speed to full-duplex

 

Answer: A   

 

Question: 16

 

After an administrator successfully migrated the last physical application server to a virtual environment, the help desk reported slow performance. Which of the following should the administrator have done FIRST before migrating this server?

 

A. Apply operating system patches to the application server after the migration.

B. Contact the vendor to see if the application is supported in a virtual environment.

C. Take a backup of the application server after the migration.

D. Migrate the application server in a test environment and have users test it.

 

Answer: B   

 

Question: 17

 

Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?

 

A. CHAP

B. AES

C. PKI

D. VPN

 

Answer: D   

 

Question: 18

 

An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography. Which of the following should the administrator implement NEXT?

 

A. Access controls

B. RC5

C. SSL

D. Zoning

 

Answer: A   

 

Question: 19

 

An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently. Which of the following is MOST likely the issue with the new servers?

 

A. The dynamic resource pool is malfunctioning.

B. The server is missing security patches.

C. The VM servers were not properly configured.

D. There are insufficient resources available on the host.

 

Answer: C   

 

Question: 20

 

Which of the following storage technologies is file-based?

 

A. WAN

B. DAS

C. SAN

D. NAS

 

Answer: D   

 

Question: 21

 

Which of the following storage technologies can leverage switches in its implementation?

 

A. HBA

B. DAS

C. SCSI

D. SAN

 

Answer: D   

 

Question: 22

 

Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?

 

A. RAID 0

B. RAID 1

C. RAID 5

D. RAID 10

 

Answer: B   

 

Question: 23

 

Which of the following only uses Fibre Channel to implement a storage infrastructure?

 

A. NFS

B. SAN

C. NAS

D. SMB

 

Answer: B   

 

Question: 24

 

Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?

 

A. Rapid deployment

B. Cloud bursting

C. Multi-tenancy

D. Pay-as-you-grow

 

Answer: B   

 

Question: 25

 

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?

 

A. Type I

B. Type II

C. Bare Metal

D. Native

 

Answer: B   

 

Question: 26

 

A small startup wins a contest giving them advertising time during a major sporting event. Which of the following cloud characteristics should be in place to handle the possible spike in demand?

 

A. Shared disk space

B. Elasticity

C. Scalability

D. Shared memory

 

Answer: B   

 

Question: 27

 

Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?

 

A. NAS

B. DAS

C. LUN

D. HBA

 

Answer: D   

 

Question: 28

 

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?

 

A. Port Zoning

B. SAN Zoning

C. LUN Masking

D. Multipathing

 

Answer: C   

 

Question: 29

 

Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized. Which of the following should be used to ensure access is controlled appropriately between devices? (Select TWO).

 

A. LUN Masking

B. Hard Zoning

C. Supernetting

D. Soft Zoning

E. Subnetting

 

Answer: A,D   

 

Question: 30

 

An administrator is called in to determine why a virtual desktop has been unable to connect to the corporate network. Which of the following should be run to determine if the adapter is enabled? (Select TWO).

 

A. ipconfig

B. netstat


Sponsor Ads


About David Milan Freshman   IT Certification

16 connections, 0 recommendations, 47 honor points.
Joined APSense since, July 28th, 2017, From Bhrmingum, United Kingdom.

Created on Sep 6th 2017 02:25. Viewed 465 times.

Comments

No comment, be the first to comment.
Please sign in before you comment.