CV0-001 PDF Download

Author: David Milan

Question: 1

Which of the following is MOST important when factoring network level security in a public cloud environment?

A. Ensuring good user experience

B. Ensuring confidentiality

C. Ensuring redundancy

D. Ensuring high availability

Answer: B

Question: 2

Which of the following should an administrator implement when connecting the company’s existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?

A. A proxy server

B. A load balancing solution

C. An IPSec tunnel

D. A server clustering solution

Answer: C

Question: 3

An administrator is creating a new VM template and has a requirement that the OS must be hardened. Which of the following should be performed to harden a guest OS?

A. Encrypt the hard drive

B. Run defrag

C. Rename administrator account

D. Change page file

Answer: C

Question: 4

A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company’s servers. Which of the following should the administrator perform to accomplish this goal?

A. P2V

B. P2P

C. V2P

D. V2V

Answer: A

Question: 5

An administrator needs to provide Internet access to all internal systems using a single IP address. Which of the following should the administrator implement?

A. NAT

B. Virtual switching

C. VLAN tagging

D. PAT

Answer: A

Question: 6

Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?

A. Type II

B. Type I

C. RAID 5

D. RAID 0

Answer: A

Question: 7

In which of the following cloud services will the customer be responsible for securing provisioned hosts?

A. PaaS

B. IaaS

C. SaaS

D. DaaS

Answer: B

Question: 8

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?

A. Defrag system

B. Update drivers

C. Disable firewall

D. Patch system

Answer: D

Question: 9

Which of the following can be used to encrypt data at rest on a VM located in the cloud?

A. AES

B. SSL

C. TLS

D. VPN

Answer: A

Question: 10

An administrator is tasked to reduce the company’s datacenter power utilization. Currently there are 500 physical servers in the datacenter and 600 virtual servers with five additional available host servers. Which of the following should the administrator perform?

A. Migrate servers using V2V technology

B. Perform an offline migration of virtual servers

C. Migrate servers using V2P technology

D. Migrate servers using P2V technology

Answer: D

Question: 11

An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system. Which of the following should the administrator do to accomplish this task?

A. Install the patch on a development server

B. Create a full backup

C. Create a snapshot

D. Install the patch on a test server

Answer: C

Question: 12

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?

A. Hybrid

B. Community

C. Public

D. Private

Answer: D

Question: 13

Which of the following uses the business model of shared resources in a cloud environment?

A. Elasticity

B. Self-serve

C. Cloud bursting

D. Multi-tenancy

Answer: D

Question: 14

Which of the following is used to locate a specific area of storage in a cloud environment?

A. Object ID

B. SAN

C. Replicas

D. Metadata

Answer: A

Question: 15

Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?

A. Bridge the vNIC

B. Set the vNIC speed to half-duplex

C. Add an addition vNIC

D. Set the vNIC speed to full-duplex

Answer: A

Question: 16

After an administrator successfully migrated the last physical application server to a virtual environment, the help desk reported slow performance. Which of the following should the administrator have done FIRST before migrating this server?

A. Apply operating system patches to the application server after the migration.

B. Contact the vendor to see if the application is supported in a virtual environment.

C. Take a backup of the application server after the migration.

D. Migrate the application server in a test environment and have users test it.

Answer: B

Question: 17

Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?

A. CHAP

B. AES

C. PKI

D. VPN

Answer: D

Question: 18

An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography. Which of the following should the administrator implement NEXT?

A. Access controls

B. RC5

C. SSL

D. Zoning

Answer: A

Question: 19

An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently. Which of the following is MOST likely the issue with the new servers?

A. The dynamic resource pool is malfunctioning.

B. The server is missing security patches.

C. The VM servers were not properly configured.

D. There are insufficient resources available on the host.

Answer: C

Question: 20

Which of the following storage technologies is file-based?

A. WAN

B. DAS

C. SAN

D. NAS

Answer: D

Question: 21

Which of the following storage technologies can leverage switches in its implementation?

A. HBA

B. DAS

C. SCSI

D. SAN

Answer: D

Question: 22

Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?

A. RAID 0

B. RAID 1

C. RAID 5

D. RAID 10

Answer: B

Question: 23

Which of the following only uses Fibre Channel to implement a storage infrastructure?

A. NFS

B. SAN

C. NAS

D. SMB

Answer: B

Question: 24

Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?

A. Rapid deployment

B. Cloud bursting

C. Multi-tenancy

D. Pay-as-you-grow

Answer: B

Question: 25

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?

A. Type I

B. Type II

C. Bare Metal

D. Native

Answer: B

Question: 26

A small startup wins a contest giving them advertising time during a major sporting event. Which of the following cloud characteristics should be in place to handle the possible spike in demand?

A. Shared disk space

B. Elasticity

C. Scalability

D. Shared memory

Answer: B

Question: 27

Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?

A. NAS

B. DAS

C. LUN

D. HBA

Answer: D

Question: 28

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?

A. Port Zoning

B. SAN Zoning

C. LUN Masking

D. Multipathing

Answer: C

Question: 29

Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized. Which of the following should be used to ensure access is controlled appropriately between devices? (Select TWO).

A. LUN Masking

B. Hard Zoning

C. Supernetting

D. Soft Zoning

E. Subnetting

Answer: A,D

Question: 30

An administrator is called in to determine why a virtual desktop has been unable to connect to the corporate network. Which of the following should be run to determine if the adapter is enabled? (Select TWO).

A. ipconfig

B. netstat

C. ping

D. ifconfig

E. iwconfig

Answer: A,D