-
web.groovymark@gmail.com
- December 26, 2024
Question 21
What is not considered a common disk failure?
- a) Corruption
- b) Swap file issues
- c) Speed mismatches
- d) Controller card failures
Correct Answer: b) Swap file issues
Explanation: Swap file issues are typically not related to physical disk failures but to
system memory management.
Question 22
What metric can help test the performance of a hard disk?
- a) CPU usage
- b) Disk latency
- c) Memory usage
- d) Network throughput
Correct Answer: b) Disk latency
Explanation: Disk latency measures the time it takes for a system to retrieve data from
the hard disk.
Question 23
What is a baseline in capacity management?
- a) A network configuration tool
- b) A comparison point for current demand and future needs
- c) A storage metric
- d) A CPU benchmark
Correct Answer: b) A comparison point for current demand and future needs
Explanation: A baseline helps assess capacity management by comparing current and
future resource demands.
Question 24
What allows automatic resource provisioning in the cloud?
- a) Elasticity
- b) Resource pooling
- c) Scalability
- d) Virtualization
Correct Answer: a) Elasticity
Explanation: Elasticity refers to the ability to provision and de-provision resources based
on demand automatically.
Question 25
What components are involved in configuration testing? (Choose three)
- a) Storage
- b) Server configuration
- c) Applications
- d) Memory allocation
Correct Answer: a) Storage, b) Server configuration, c) Applications
Explanation: Configuration testing ensures that storage, server settings, and applications
meet expected performance.
Question 26
Which protocol is used to send an email when an alert is triggered?
- a) FTP
- b) HTTP
- c) SMTP
- d) SNMP
Correct Answer: c) SMTP
Explanation: Simple Mail Transfer Protocol (SMTP) is used for sending email
notifications when alerts are triggered.
Question 27
What defines the rule sets that users and administrators must follow?
- a) Procedures
- b) Guidelines
- c) Policies
- d) Regulations
Correct Answer: c) Policies
Explanation: Policies define the specific rules and guidelines that users and
administrators must adhere to.
Question 28
What ensures normal system functionality despite component failure?
- a) Load balancing
- b) Disaster recovery
- c) Fault tolerance
- d) Redundancy
Correct Answer: c) Fault tolerance
Explanation: Fault tolerance allows a system to continue operating even if a component
fails.
Question 29
Which IP address cannot be routed on the public Internet?
- a) 2.0.0.1/8
- b) 128.1.0.1/16
- c) 172.16.0.1/16
- d) 193.168.1.1/24
Correct Answer: c) 172.16.0.1/16
Explanation: IP addresses in the 172.16.0.0/12 range are reserved for private use and
cannot be routed publicly.
Question 30
What software or hardware allows multiple operating systems to run on a single
physical machine?
- a) Virtualization engine
- b) Hypervisor
- c) Load balancer
- d) Containerization
Correct Answer: b) Hypervisor
Explanation: A hypervisor enables multiple operating systems to run on a single physical
machine by virtualizing resources.
Question 31
What should you do to ensure the best performance when using iSCSI as a transport
mechanism for NAS? (Choose two)
- a) Increase Ethernet network speed
- b) Isolate the storage network
- c) Reduce network traffic
- d) Limit storage size
Correct Answer: a) Increase Ethernet network speed, b) Isolate the storage network
Explanation: Increasing network speed and isolating the storage network ensures optimal
performance when using iSCSI.
Question 32
What should be considered to ensure information security when using a public cloud?
- a) Data integrity
- b) Application size
- c) Cloud provider's policies
- d) Encryption type
Correct Answer: a) Data integrity
Explanation: Ensuring data integrity is critical to maintaining security when using public
cloud services.
Question 33
What allows a cloud provider to distribute resources on an as-needed basis?
- a) Dedicated hosting
- b) Shared resources
- c) Vertical scaling
- d) Dynamic storage
Correct Answer: b) Shared resources
Explanation: Cloud providers use shared resources to distribute computing power
dynamically based on demand.
Question 34
What remote administration method provides a remote display and input capabilities
over the network?
- a) FTP
- b) Telnet
- c) SSH
- d) RDP
Correct Answer: d) RDP
Explanation: Remote Desktop Protocol (RDP) allows users to access and control a
system remotely over the network.
Question 35
What access control method restricts access based on the identity of subjects or groups?
- a) Mandatory access control
- b) Role-based access control
- c) Discretionary access control
- d) Token-based access
Correct Answer: c) Discretionary access control
Explanation: Discretionary access control allows access based on the identity of users or
groups and their associated permissions.
Question 36
What protocol uses TCP port 22 by default?
- a) FTP
- b) Telnet
- c) SFTP
- d) HTTP
Correct Answer: c) SFTP
Explanation: Secure File Transfer Protocol (SFTP) uses TCP port 22 for secure file
transfers over the network.
Question 37
Which protocol uses port 25?
- a) Telnet
- b) FTP
- c) SMTP
- d) HTTP
Correct Answer: c) SMTP
Explanation: Simple Mail Transfer Protocol (SMTP) uses port 25 for sending emails over
the Internet.
Question 38
Which protocol uses port 23?
- a) FTP
- b) Telnet
- c) HTTP
- d) SMTP
Correct Answer: b) Telnet
Explanation: Telnet, a remote access protocol, uses port 23 for unencrypted
communication over the Internet.
Question 39
What consolidates multiple network storage devices into a single storage unit managed
from a central console?
- a) SAN
- b) NAS
- c) Cloud storage
- d) Virtualization
Correct Answer: a) SAN
Explanation: A Storage Area Network (SAN) centralizes storage devices for easier
management and allocation.
Question 40
What is the primary difference between an intranet and an extranet?
- a) Access from outside the organization
- b) Data encryption methods
- c) Network speed
- d) Cloud compatibility
Correct Answer: a) Access from outside the organization
Explanation: An extranet allows access from external users, while an intranet is restricted
to internal users.