Sei sulla pagina 1di 2

7/16/2017 techbus.safaribooksonline.com/print?

xmlid=9781305097353%2Fsec209_html

Username: Aditya Mishra Book: CompTIA Cloud+ CV0-001 In Depth. No part of any chapter or book may be reproduced or transmitted in any form by any means
without the prior written permission for reprints and excerpts from the publisher of the book or chapter. Redistribution or other use that violates the fair use privilege
under U.S. copyright laws (see 17 USC107) or that otherwise violates these Terms of Service is strictly prohibited. Violators will be prosecuted to the full extent of
U.S. Federal and Massachusetts laws.

4.0 Network Management


53. Which of the following is the standard for computer message logging?
a. WMI
b. IPMI
c. Web services
d. Syslog

54. Jerry needs to manage a remote computer that may be powered off or may have a faulty network interface. What standardized computer interface can he
use to connect to this computer?
a. WMI
b. Telnet
c. IPMI
d. Web services

55. When implementing a performance monitoring system, what must be defined before alert notifications can be configured? (Choose all that apply.)
a. Baselines and thresholds
b. Monitored devices
c. Methods of transmission of alerts
d. All of the above

56. In a virtual environment in which some device or component allocations are dynamic, what allocation threshold may be exceeded by a virtual machine for a
short period?
a. Hard limit
b. Soft limit
c. Reservation
d. Share

57. When you aggregate the resources of a host or computer cluster so control over the resources can be delegated to certain users or departments, what
action have you taken?
a. Pooling
b. Aggregation
c. Clustering
d. Allocation

58. A system administrator is allocating the CPU resources on a host server in a virtualized environment. The server has a single multicore processor installed
in a single socket that has eight cores. Hyperthreading is enabled. What is the number of logical processors, the administrator can allocate?
a. 8
b. 12
c. 16
d. 32

59. When the Finance department is running its accounting period closing process, it needs to block all other access to certain volumes in the storage system.
What type of access policy is required to grant the exclusive access to this data?
a. Quota
b. Hard limit
c. Reservation
d. Entitlement

60. What allocation method can be used to bind an application process to a particular CPU or group of CPUs so that the process will only run on that particular
CPU or group of CPUs?
a. Port mapping
b. Affinity
c. Entitlement
d. Reservation

61. What encrypting network protocol can be used for secure communications to a remote command-line login that facilitates remote access to a hypervisor or
other system components?
a. RDP
b. Telnet
c. SSH
d. FTP

62. Connie needs to connect to a remote router to change its configuration. Using a secure remote connection protocol, what router port should she connect to
so she has administrative access to the routers operating system?
a. Ethernet port
b. Parallel port
c. Console port
d. Any router port

http://techbus.safaribooksonline.com/print?xmlid=9781305097353%2Fsec209_html 1/2
7/16/2017 techbus.safaribooksonline.com/print?xmlid=9781305097353%2Fsec209_html
63. What is the network protocol that can be used for network management and network monitoring of network devices for conditions or performance that
deserve an administrators attention?
a. SMTP
b. SNMP
c. ICMP
d. Netstat

64. Under what form of resource allocation are resources assigned to processes based on the priority of each process?
a. Static
b. Dynamic
c. Round-robin
d. Affinity

65. True or False? Software licensing agreements extend to virtual machines, and each instance of a software application running in a virtual machine must
have its own license.
a. True
b. False

http://techbus.safaribooksonline.com/print?xmlid=9781305097353%2Fsec209_html 2/2

Potrebbero piacerti anche