CompTIA Cloud+ Quiz Questions and Answers

____________is a security process that provides identity, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications.

Answer :
  • IAM

Explanation :

Identity and access management (IAM) is a security process that provides identity,authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications.

Carl is planning his cloud migration and must meet HIPPA requirements for confidential storage of cloud data at rest and in use in the cloud. What services must be addressed by Carl? (Choose two)

Answer :
  • Storage
  • Database

Explanation :

Storage systems and database applications are both examples of data at rest or being processed in the cloud. While VPNs and client encryption are valid security systems, they are not associated with your internal cloud security posture.

What technologies are used to enable on-demand computing?

Answer :
  • Automation
  • Virtualization

Explanation :

One of the prime advantages of cloud-based computing and the automation and virtualization it offers in the background is the ability to leverage the rapid provisioning of virtual resources to allow for on-demand computing.

___________ is a major component of business continuity that focuses on repairing, reconstructing, restoring, and replacing systems, personnel, and other assets after a disaster have affected the organization.

Answer :
  • Disaster recovery

Explanation :

Disaster recovery s a major component of business continuity that focuses on repairing,reconstructing, restoring, and replacing systems, personnel, and other assets after a disaster has affected the organization.

_______________s the ability to take physical data center resources such as RAM, CPU, storage, and networking and create a software representation of those resources that enables large-scale cloud offerings.

Answer :
  • Virtualization

Explanation :

Virtualization is the ability to take physical data center resources such as RAM, CPU, storage, and networking and create a software representation of those resources that enables large-scale cloud offerings

Server interfaces are grouped together or aggregated into channel groups for additional throughput and fault tolerance. The LAN interfaces in the server are connected to what device in a hypervisor?

Answer :
  • Virtual switch

Explanation :

A virtual switch is a software extraction of a physical Ethernet LAN switch that runs on a hypervisor and interconnects a VM’s virtual network interface card to the outside, physical data network.

_____________ enables organizations to reduce the amount of storage required for their data, and to reduce the amount of data required to transmit data during processes like replication.

Answer :
  • Data deduplication

Explanation :

Data deduplication enables organizations to reduce the amount of storage required for their data, and to reduce the amount of data required to transmit data during processes like replication.

What systems do cloud providers implement for rapid deployment of customer-requested services?

Answer :
  • Service catalogs

Explanation :

Orchestration platforms automate the provisioning of cloud services and often include a self-service dashboard that allows the consumer to manage and deploy cloud services with a web browser.

__________is an auto-scaling technology where an application in an on-premises environment "bursts " into a public cloud during times of peak usage when capacity thresholds are met.

Answer :
  • Cloud bursting

Explanation :

Cloud bursting is an auto-scaling technology where an application in an on-premises environment"bursts" into a public cloud during times of peak usage when capacity thresholds are met.

__________usually compares the Media Access Control (MAC) address of a device that acts as an access point to a known address, and if it doesn't find a match, it gives out an alert.

Answer :
  • WIDS

Explanation :

WIDS usually compares the Media Access Control (MAC) address of a device that acts as an access point to a known addresses, and if it doesn't find a match, it gives out an alert.