CompTIA Cloud+ Study Guide. Ben Piper
Чтение книги онлайн.

Читать онлайн книгу CompTIA Cloud+ Study Guide - Ben Piper страница 14

СКАЧАТЬ problemIf the theory is not confirmed, re-establish a new theory or escalateEstablish a plan of action to resolve the problem and implement the solutionVerify full system functionality and, if applicable, implement preventive measuresDocument the findings, actions, and outcomes throughout the process. 5.2 Given a scenario, troubleshoot security issues.PrivilegeMissingIncompleteEscalationKeysAuthenticationAuthorizationSecurity groupsNetwork security groupsDirectory security groupsKeys and certificatesExpiredRevokedTrustCompromisedMisconfiguredMisconfigured or misapplied policiesData security issuesUnencrypted dataData breachesMisclassificationLack of encryption in protocolsInsecure ciphersExposed endpointsMisconfigured or failedsecurity appliancesIPSIDSNACWAFUnsupported protocolsExternal/internal attacks 10 5.3 Given a scenario, troubleshoot deployment issues.Connectivity issuesCloud service provider (CSP) or Internet service provider (ISP) outagesPerformance degradationLatencyConfigurationsScriptsApplications in containersMisconfigured templatesMissing or incorrect tagsInsufficient capacityScaling configurationsComputeStorageBandwidth issuesOversubscriptionLicensing issuesVendor-related issuesMigrations of vendors or platformsIntegration of vendors or platformsAPI request limitsCost or billing issues 9 5.4 Given a scenario, troubleshoot connectivity issues.Network security group misconfigurationsACLInheritanceCommon networking configuration issuesPeeringIncorrect subnetIncorrect IP addressIncorrect IP spaceRoutesDefaultStaticDynamicFirewallIncorrectly administered micro-segmentationNetwork address translation (NAT)VPNSourceDestinationLoad balancersMethodsHeadersProtocolsEncryptionBack endsFront endsDNS recordsVLAN/VXLAN/GENEVEProxyMaximum transmission unit (MTU)Quality of service (QoS)Time synchronization issuesNetwork troubleshooting toolspingtracert/tracerouteflushdnsipconfig/ifconfig/ipnslookup/dignetstat/ssroutearpcurlPacket capturePacket analyzerOpenSSL client 10 5.5 Given a scenario, troubleshoot common performance issues.Resource utilizationCPUGPUMemoryStorageI/OCapacityNetwork bandwidthNetwork latencyReplicationScalingApplicationMemory managementService overloadIncorrectly configured or failed load balancing 9 5.6 Given a scenario, troubleshoot automation or orchestration issues.Account mismatchesChange management failuresServer name changesIP address changesLocation changesVersion/feature mismatchAutomation tool incompatibilityDeprecated featuresAPI version incompatibilityJob validation issuePatching failure 9

      If you believe you've found a mistake in this book, please bring it to our attention. At John Wiley & Sons, we understand how important it is to provide our customers with accurate content, but even with our best efforts an error may occur.

      To submit your possible errata, please email it to our Customer Service Team at [email protected] with the subject line “Possible Book Errata Submission.”

      1 Bob is accessing a self-service portal in the cloud to instantly create additional servers, storage, and database instances for his firm's DevOps group. Which of the following options best describes this operation?BurstingPay-as-you-growMultitenancyOn-demand

      2 Jillian is working on a project to interconnect her company's private data center to a cloud company that offers email services and another that can provide burstable compute capacity. What type of cloud delivery model is she creating?PublicHybridCommunityPrivate

      3 Carl is learning how cloud service providers allocate physical resources into a group. These resources are then dynamically associated with cloud services as demand requires. What best describes this?On-demand virtualizationDynamic scalingResource poolingElasticity

      4 Liza is a new Cloud+ architect for BigCo Inc. She is investigating cloud services that provide server hardware, but not applications. What cloud service is she using?IaaSPaaSSaaSCaaS

      5 Harold is investigating his options to migrate his company's time and attendance application to the cloud. He wants to be responsible only for maintaining the application and would prefer that the public cloud company manage all underlying infrastructure and servers that are required to support his application. Harold calls you and asks for assistance in selecting a cloud service model that would meet his requirements. What would you suggest that he implement?IaaSPaaSSaaSCaaS

      6 Jane is a Cloud+ architect working on a physical-to-virtual migration to the public cloud. She has matched VM performance levels to her established baselines. She knows that her organization may need to adjust hardware resources in the future. What cloud characteristics can she use to match cloud capacity with future growth? (Choose three.)ElasticityOn-demand computingAvailability zonesResiliency virtualizationPay-as-you growResource pooling

      7 What are two elements that together distinguish the cloud from a traditional data center operation? (Choose two.)Load balancingAutomationAutoscaling groupsVirtualization

      8 Dawn is interested in selecting a community cloud provider that offers a specialized financial reporting application. What type of cloud model would you recommend Dawn investigate to meet her requirements?IaaSPaaSSaaSCaaS

      9 Carol is a cloud customer that your consulting company is assisting with their migration. She is asking you about the demarcation point of operations for her public PaaS service. Which of the following defines what you are responsible for and the responsibility of the provider?Availability zonesCommunityShared responsibility modelBaselines

      10 Jonathan is architecting his client's global public cloud presence for an upcoming e-commerce deployment. You have been brought on to help design the network. He asks about providing local connections in Singapore and Malaysia. What would you suggest that he investigate?RegionsAuto-scaling groupsAvailability zonesGlobal DNS affinity

      11 Zale is working on a collaborative project that requires the implementation of a large-scale NoSQL database that will access three petabytes of historical data. He needs durable block storage in remote flash arrays. You have been tasked with designing the storage connectivity from the database to the stored data. What type of network connection would you recommend for NoSQL read/write access to the arrays?Block accessZoningVMFSSAN

      12 Physical resources are virtualized and presented as resources to virtual machines running on hypervisors. What common resources does the hypervisor virtualize? (Choose three.)Layer 2RAMLayer 3CPUsRAIDStorage

      13 As a new Cloud+ professional, you have been hired by a company that operates its own data center; however, the company is calling it a cloud. What delivery model are you working with?HybridPublicPrivateCommunity

      14 Tim just logged into his cloud management dashboard to check the health monitors of his server fleet. What is the process that he completed at login?AuthorizationAccountingAuthenticationFederationIdentity access

      15 Martha СКАЧАТЬ