Question: Fictional Corp has a data center that runs multiple internal applications. However, they want to migrate their email to a cloud service provider so that
Fictional Corp has a data center that runs multiple internal applications. However, they want to migrate their email to a cloud service provider so that mail will continue to be delivered in the case of any Internet service interruptions. They also want to use a single directory service so that they don't have to create duplicate user accounts on the internal and external systems. Which of the following types of services is best suited for Fictional Corp's needs?
a. public cloud b.private cloud c.hybrid cloud d. community cloud
Ted has been tasked with moving the company's physical server infrastructure to a cloud-based infrastructure. He knows that the servers the company uses in the data center are fairly new and are nowhere near ready for retirement. However, he also knows that security is a very important factor in any decisions that are made. Which of the following is unlikely to be considered as a factor in the confidentiality aspect of security planning?
a. An on-premises private cloud may be more susceptible to security vulnerabilities with a limited staff due to the volume of maintenance and patches required.
b. If the company were to deploy a private cloud, what kind of uptime requirements would the system need in order to meet the SLAs?
c. The physical security of the data center must be considered as physical access to the servers could still cause a data breach.
d. If the company were to use a public cloud provider, what kind of assurances do they have that the company's data will be kept private as well as what types of precautions and tools do they have in place?
Pedro is looking for internal and external clues as to what may be causing a problem that has been reported via their ticketing system. Which of the following steps is he currently on from the troubleshooting model?
a. Identify the problem. b. Establish a plan of action to resolve the problem and implement the solution.
c. Test the theory to determine cause. d. Establish a theory of probable cause.
Janelle's company has adopted the CompTIA troubleshooting model as part of their standard operating procedures to use when troubleshooting issues. She sees the step listed as identify the problem. Which of the following should she do as part of that step?
a. Install the available patches from the manufacturer. b. Ask the user probing questions to determine whether any recent changes have been made.
c. Look for clues as to what could be causing a problem. d. Document the issue and all of the pertinent details.
Sharon has just finished probing her way through a virtual machine that has been causing problems on the company's private cloud looking for clues as to what might be causing those problems. She has a theory of what could be causing the problem. What is the next step that she should perform if she is following the CompTIA troubleshooting model?
a. Test the theory to determine cause. b. Establish a theory of probable cause.
c. Establish a plan of action to resolve the problem and implement the solution. d. Identify the problem.
Creative Co has just set up a private cloud. However, they have employees that work remotely in the field and want them to be able to access resources on the private cloud. Which of the following could Creative Co implement in order to allow users to create secure connections from their computers across the Internet into the private cloud?
a. CMS b.WAN c.VLAN d.VPN
Bonnie has been tasked with performing an analysis on her company's firewall infrastructure. The organization has a number of office locations across the United States in addition to a number of people that work remotely from home. She finds that many of the existing firewalls are no longer supported by the manufacturer and has convinced the company to allocate some budget to find a solution to replace them. Which of the following might she recommend as a replacement?
a. FWaaS b.FAT c.CRM FCoE
Zara is implementing a configuration management tool that makes use of a system that sends XML messages to endpoints on various systems in order to make changes. What kind of technology is she putting into use?
a.BIA b.DaaS c.CSP d.API
A social media organization has grown from its initial startup phase to being widely known within the United States. It has decided that it is time to broaden its horizons and see if it can grow the userbase globally as well. They have plans to expand into Europe within the next 12 months. Which of the following should they become familiar with before they start marketing the platform to European users.
a.GDPR b.HIPAA c.PCI DSS d.SSAE 18
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
