Ben Piper - CompTIA Cloud+ Study Guide

Здесь есть возможность читать онлайн «Ben Piper - CompTIA Cloud+ Study Guide» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

CompTIA Cloud+ Study Guide: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «CompTIA Cloud+ Study Guide»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

In the newly revised Third Edition of 
, expert IT Ben Piper delivers an industry leading resource for anyone preparing for the CompTIA Cloud+ certification and a career in cloud services. The book introduces candidates to the skills and the competencies critical for success in the field and on the exam.
The book breaks down challenging cloud management concepts into intuitive and manageable topics, including cloud architecture and design, cloud security, deployment, operations and support, and cloud troubleshooting. It also offers practical study features, like Exam Essentials and challenging chapter review questions.
Written in a concise and straightforward style that will be immediately familiar to the hundreds of thousands of readers who have successfully use other CompTIA study guides to further their careers in IT, the book offers:
Efficient and effective training for a powerful certification that opens new and lucrative career opportunities Fully updated coverage for the new Cloud+ CV0-003 Exam that includes the latest in cloud architecture and design Access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for everyone preparing for the
certification, this book is an ideal resource for current and aspiring cloud services professionals seeking an efficient and up-to-date resource that will dramatically improve their ability to maintain, secure, and optimize cloud environments.

CompTIA Cloud+ Study Guide — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «CompTIA Cloud+ Study Guide», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

15 Martha is studying SAN technologies that use the Fibre Channel protocol, and she is asking about disk configuration in the remote storage array. She asks you which type of storage she can use on her Linux servers. What storage type can she deploy? (Choose the best answer.)MetaObjectBlockFile

16 Patesh is becoming familiar with the interfaces available for his operations team to use to access his hybrid cloud deployment. You have been asked to explain the common types of user-based interfaces available to manage cloud objects. What are the common interfaces that you would explain to Patesh? (Choose three.)Web consoleSNMPAPIPaaSCLI

17 You work for a company that offers cloud services to the railroad industry. All railroads have a similar set of requirements and access the same applications. BigWest Rail has contacted you about becoming a customer and is asking what applications are shared with other rail operators. They also ask what type of cloud model your company offers. What type of cloud is this?HybridPublicPrivateCommunity

18 Kevin is exploring a durable block storage option that offers high performance. It also needs to support striping that allows a parity bit to be used to reconstruct a volume if a single magnetic disk fails in his array. Which storage type stripes file data and performs a parity check of data over multiple disks that can recover from a single hard disk failure?RAID 0RAID 1RAID 3RAID 5

19 You are involved in a large-scale migration project that requires moving a Windows OS running on a dual-slot, eight-core server with no hypervisor in a data center to a virtual server in the public cloud. What type of migration is this?vMotionP2VPrivate to publicV2VSynchronous replication

20 You have been asked by a new customer what type of authentication systems require something that you have and something that you know. What type of authentication technology would you recommend?Single sign-onConfederationsActive Directory/LDAPMultifactor

21 Beatriz stops at her bank's ATM on her way home from work. She inserts her card into the ATM and then enters her PIN on the keypad. What type of authentication is she using?SSOTwo-factorLDAPUser-based

22 Roman is the cloud administrator for a company that stores object-based data in a hybrid cloud. Because of the sensitivity of the data and various regulatory restrictions on allowing users access to sensitive security data, what type of access control would meet his security policies?Mandatory access controlNondiscretionaryRolesMultifactor

23 William is implementing an access control rollout for a cluster of Windows SQL database servers in a hybrid cloud environment. Developers will need full read/write access to the database servers, whereas other business units will need read-only access to particular databases. What type of access control should William deploy?Mandatory access controlNondiscretionaryRole-basedMultifactor

24 Quentin is a defense contractor investigating server compliance requirements needed to be certified to meet the U.S. Department of Defense security requirements for contractors. What requirement would you recommend that he focus on?FedRAMPDIACAPFISMASection 405.13 for DoD rule A286

25 Leanna wants to deploy a public cloud service that allows her to retain responsibility only for her applications and requires the cloud provider to maintain the underlying operating system and virtualized hardware. Which service model would you recommend that she implement?IaaSPaaSSaaSCaaS

26 Robert is configuring a new cloud interconnect to access his locally hosted Active Directory services. He wants to prevent his user base from having fragmented rights and no unified authorization services. You are brought in as a service consultant to assist in optimizing and controlling user access by implementing a technology that will give access to all allowed systems at the time of user authentication. What type of system are you deploying?Token-based 2FASSORSANondiscretionary

27 Cathy is preparing her company's migration plan from a private to a hybrid cloud. She wants to outline firewall and DDoS requirements. What document should she create?DIACAPSecurity policyService level agreementSOC-2

28 Perry is investigating options for interconnecting a private cloud to a new public cloud region that supports analysis of customer-streamed IoT data. He is planning on implementing a tunnel across the Internet to interconnect the two locations to avoid the high costs of a dedicated interconnection. What transport protocol would you suggest that can offer a secure connection across the unsecure Internet?AESSOC-3IPsecRC5

29 Jarleen is a consultant tasked with migrating Health Med Records Inc. customer records to a cloud-based service offering a long-term archival system. Which U.S. compliance mandate must her company align with?SOC 3HIPAAMPAAISA 2701

30 Fluentes is a security consultant for a day trading company that must implement strong encryption of data at rest for their cloud storage tiers. What is the best option that meets most security regulations for the encryption of stored data?3DESRSAAES-256Rivest Cipher 5

31 Randy is developing a new application that will be deployed in an IaaS-based public cloud. He builds a test image and deploys a test VM in his private cloud's development zone. When he stops and restarts one of the Linux-based servers, he notices that his storage volume data is missing. What type of storage exhibits this behavior? (Choose two.)DurableRAIDEphemeralNondurableBlockObject

32 Matt has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?DMABIOSCPUIPsecI/O

33 Jill works in the operations center, and she is tasked with monitoring security operations. What cloud-based GUI can she use for a real-time overview of security operations?Puppet automationGemalto systemDashboardVendor-based security appliance

34 Larken is reviewing the SLA and statement of responsibility with his community cloud provider PaaS. To whom does the responsibility for stored data integrity in the cloud belong?Cloud providerCompliance agencyCloud customerShared responsibility

35 Mindy has been tasked with developing a new QA test logging application, but she is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for her to use to meet her requirements?PythonXMLAPISNMPTLS

36 What technology was instrumental in the growth of cloud services?XMLPythonAutomationAuthenticationSecurityWorkflow servicesEncryption

37 Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shut down the hacking attempts. What application would you suggest that Vicky deploy?DMZIDSIPSRAIDHIDS

38 What options can you offer your user base for MFA tokens? (Choose two.)One-time passwordSmartphone appAutomation systemsKey fobCloud vendor management dashboard

39 Linda works in the IT security group of her firm and has been tasked with investigating options that will allow customers to access their personal records securely via the web. What is the most common in-flight e-commerce security protocol on the market?MD5SSL/TLSIPsecVPN

40 Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network micro-segmentation deployments. When reading the documentation, you notice a link to download a Java-based application to monitor and configure the IPS application. What kind of configuration program is this?CLIGIUVendor-basedAPIRESTful

41 Name the type of software update that is designed to address a known bug and to bring a system up-to-date with previously released fixes.HotfixPatchVersion updateRollout

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «CompTIA Cloud+ Study Guide»

Представляем Вашему вниманию похожие книги на «CompTIA Cloud+ Study Guide» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «CompTIA Cloud+ Study Guide»

Обсуждение, отзывы о книге «CompTIA Cloud+ Study Guide» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x