CompTIA Cloud+ Certification Practice Exams (Exam CV0-002) by Daniel Lachance
Author:Daniel Lachance [Lachance, Daniel]
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2018-04-26T22:00:00+00:00
C. DNS round-robin uses multiple DNS A or AAAA records with the same name but different IP addresses.
A, B, and D are incorrect. Duplicity is not a valid term when discussing load balancing. DNS aliasing uses CNAME records that point to A or AAAA records.
27. To optimize costs, you need to ensure minimal virtual machine instances are used except during peak requests. Which option should you configure?
A. Scaling up
B. Scaling down
C. Scaling out
D. Scaling in
D. Scaling in reduces the number of virtual machine instances.
A, B, and C are incorrect. Scaling up, or vertically, means adding more compute power to existing virtual machines. Scaling down decreases compute power, and scaling out adds virtual machines.
28. Which type of quota, when reached, prevents additional resource use?
A. Soft
B. Hard
C. Outer
D. Inner
B. Hard quotas prevent additional resource allocation when the quota limit is reached.
A, C, and D are incorrect. Soft quotas do not prevent additional resource allocation but instead log the event information. Outer and inner are not valid quota types.
29. You plan to use a Linux virtual machine guest to conduct wireless network penetration tests. The virtual NICs will not support this functionality. The hypervisor has a supported USB adapter plugged in. What should you do?
A. Install and configure a physical Linux computer.
B. Install an updated virtual NIC driver.
C. Install an updated virtual USB driver.
D. Enable USB pass-through.
D. USB pass-through allows a virtual machine to access physical USB devices plugged into the host.
A, B, and C are incorrect. A physical server requires much more effort than simply enabling USB pass-through. Updated drivers will not solve the problem.
30. Which configuration separates physical compute resources into groups for higher-level management?
A. ACL
B. Emulation
C. USB pass-through
D. Resource pools
D. Resource pools are groups of underlying resources managed as a single unit.
A, B, and C are incorrect. Access control lists (ACLs) control resource access. Emulation and USB pass-through allow virtual machines to access hardware resources but they do not organize resources into groups.
31. Which of the following items normally have a large influence on cloud-based web application performance? Choose two.
A. Data backups
B. SSO
C. Virtual machine settings
D. Load balancing
C and D. Virtual machine settings, such as the amount of memory, and using multiple virtual machines in a load balancing configuration can drastically improve application performance.
A and B are incorrect. Data backups and Single Sign-On (SSO) are not related to application performance.
32. Which of the following factors is most likely to improve the performance of a slow virtual machine?
A. Additional vCPUs
B. RAID 1
C. Additional vNICs
D. Reduced number of open firewall ports
A. Of the listed items, more vCPUs is the most likely to improve performance.
B, C, and D are incorrect. RAID 1 (disk mirroring) increases fault tolerance but not performance. Additional vNICs and reduced open firewall ports will not improve performance.
33. You need to define limits for virtual machine disk resource utilization. What should you configure?
A. RAID
B. I/O throttling
C. SSDs
D. Magnetic hard disks
B. I/O throttling prevents virtual machines from consuming all disk I/O cycles.
A, C, and D are incorrect. RAID levels either provide fault tolerance, improve disk performance, or both—they do not set disk utilization limits.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7451)
Grails in Action by Glen Smith Peter Ledbrook(7341)
Kotlin in Action by Dmitry Jemerov(4695)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4169)
The Age of Surveillance Capitalism by Shoshana Zuboff(3482)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3285)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3063)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(3032)
Mastering Python for Networking and Security by José Manuel Ortega(3019)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2974)
Blockchain Basics by Daniel Drescher(2938)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2921)
TCP IP by Todd Lammle(2682)
Combating Crime on the Dark Web by Nearchos Nearchou(2543)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2521)
Hands-On Azure for Developers by Kamil Mrzyglod(2473)
Running Windows Containers on AWS by Marcio Morales(2455)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2367)
The Social Psychology of Inequality by Unknown(2356)