Search Header Logo

Cloud+ - Chapter 2 Review

Authored by Abbey Boan

Computers

Professional Development

Used 2+ times

Cloud+ - Chapter 2 Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Carl is documenting his employer's cloud deployments and needs to label the cloud delivery model used by his single organization. As a Cloud+ consultant, what would you suggest he name his internal cloud?

Hybrid

Public

Private

Community

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A national tax preparation firm is accessing industry-specific productivity applications in the cloud; many other tax preparation companies are also subscribing to the same service. What model of cloud are they accessing?

Hybrid

Public

Private

Community

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mary is a Cloud+ certified security consultant for her company. She is researching enhanced security access systems. What could she suggest that requires something you have and something you know?

Single sign-on

Confederation

Active Directory/LDAP

Multifactor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pete is concerned about stored data that is replicated to a standby zone but not immediately. The delay means that there is going to be a short period of time where the data is not consistent. What storage replication service ensures eventual consistency?

Synchronous

Asynchronous

Blcok

Tier 1

File-based

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Scott is planning his company's upload of stored data to the cloud. What are two common storage migration types? (Choose two)

Physical to virtual

Block to object

Online

Offline

Synchronous

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Judy is migrating a Linux OS from running on a dual-slot, eight-core server in a private cloud to a VM in the public cloud. What type of migration would she perform?

vMotion

P2V

Private to public

V2V

Synchronous replication

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent network analyzers from being able to read data in flight. Which of the following are considered secure network protocols that she recommends using? (Choose three)

SHHTP

DHCP

HTTPS

SSH

FTPS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?