Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
xmlid=9781305097353%2Fsec209_html
Username: Aditya Mishra Book: CompTIA Cloud+ CV0-001 In Depth. No part of any chapter or book may be reproduced or transmitted in any form by any means
without the prior written permission for reprints and excerpts from the publisher of the book or chapter. Redistribution or other use that violates the fair use privilege
under U.S. copyright laws (see 17 USC107) or that otherwise violates these Terms of Service is strictly prohibited. Violators will be prosecuted to the full extent of
U.S. Federal and Massachusetts laws.
54. Jerry needs to manage a remote computer that may be powered off or may have a faulty network interface. What standardized computer interface can he
use to connect to this computer?
a. WMI
b. Telnet
c. IPMI
d. Web services
55. When implementing a performance monitoring system, what must be defined before alert notifications can be configured? (Choose all that apply.)
a. Baselines and thresholds
b. Monitored devices
c. Methods of transmission of alerts
d. All of the above
56. In a virtual environment in which some device or component allocations are dynamic, what allocation threshold may be exceeded by a virtual machine for a
short period?
a. Hard limit
b. Soft limit
c. Reservation
d. Share
57. When you aggregate the resources of a host or computer cluster so control over the resources can be delegated to certain users or departments, what
action have you taken?
a. Pooling
b. Aggregation
c. Clustering
d. Allocation
58. A system administrator is allocating the CPU resources on a host server in a virtualized environment. The server has a single multicore processor installed
in a single socket that has eight cores. Hyperthreading is enabled. What is the number of logical processors, the administrator can allocate?
a. 8
b. 12
c. 16
d. 32
59. When the Finance department is running its accounting period closing process, it needs to block all other access to certain volumes in the storage system.
What type of access policy is required to grant the exclusive access to this data?
a. Quota
b. Hard limit
c. Reservation
d. Entitlement
60. What allocation method can be used to bind an application process to a particular CPU or group of CPUs so that the process will only run on that particular
CPU or group of CPUs?
a. Port mapping
b. Affinity
c. Entitlement
d. Reservation
61. What encrypting network protocol can be used for secure communications to a remote command-line login that facilitates remote access to a hypervisor or
other system components?
a. RDP
b. Telnet
c. SSH
d. FTP
62. Connie needs to connect to a remote router to change its configuration. Using a secure remote connection protocol, what router port should she connect to
so she has administrative access to the routers operating system?
a. Ethernet port
b. Parallel port
c. Console port
d. Any router port
http://techbus.safaribooksonline.com/print?xmlid=9781305097353%2Fsec209_html 1/2
7/16/2017 techbus.safaribooksonline.com/print?xmlid=9781305097353%2Fsec209_html
63. What is the network protocol that can be used for network management and network monitoring of network devices for conditions or performance that
deserve an administrators attention?
a. SMTP
b. SNMP
c. ICMP
d. Netstat
64. Under what form of resource allocation are resources assigned to processes based on the priority of each process?
a. Static
b. Dynamic
c. Round-robin
d. Affinity
65. True or False? Software licensing agreements extend to virtual machines, and each instance of a software application running in a virtual machine must
have its own license.
a. True
b. False
http://techbus.safaribooksonline.com/print?xmlid=9781305097353%2Fsec209_html 2/2