• Home
  • Ask a Question
  • About
  • Contact
  • Advertise
  • Sitemap
MENU

Cloud Computing

Cloud Computing | Google & AWS | Multiple Choice | Questions and Answers

  • Home
  • Translate
Archive for March 2018

The concept of creating groups of storage requirements in a hierarchy to match optimum storage offerings from the cloud service provider is known as

The concept of creating groups of storage requirements in a hierarchy to match optimum storage offerings from the cloud service provider is known as



Answer: Tiering

The time it takes to find data on a disk is determined by the RPM of the spinning disks, read-write head seek time, bus performance, and RAID type, all determining the disk ______.

The time it takes to find data on a disk is determined by the RPM of the spinning disks, read-write head seek time, bus performance, and RAID type, all determining the disk ______.



Answer: Access Speed

Common HDD types are ______ and ____________________ .

Common HDD types are ______ and ____________________ .



Answer: Spinning, SSD

The SCSI protocol is encapsulated into Fibre Channel and then into ______ to create FCoE.

The SCSI protocol is encapsulated into Fibre Channel and then into ______ to create FCoE.



Answer: Ethernet Frames

_____ arrays write a block of data to be stored on two or more disks and then mirrors the striped arrays with a second array.

_____ arrays write a block of data to be stored on two or more disks and then mirrors the striped arrays with a second array.



Answer: RAID 0+1

Filesystems are implemented in operating systems to standardize the data structures on the HDD; Microsoft offers ______ and ____________________ in their operating systems.

Filesystems are implemented in operating systems to standardize the data structures on the HDD; Microsoft offers ______ and ____________________ in their operating systems.



Answer: FAT, NTFS

______ creates an array of hard drives that allows for any single hard drive to fail and all data can be recovered.

______ creates an array of hard drives that allows for any single hard drive to fail and all data can be recovered.



Answer: RAID 5

A ______ is a dedicated fabric that allows multiple servers to access a centralized storage resource.

A ______ is a dedicated fabric that allows multiple servers to access a centralized storage resource.



Answer: SAN (Storage Area Network)

The process of restricting LUN access can be configured on the HBAs as ______ or on the SAN switch as ______.

The process of restricting LUN access can be configured on the HBAs as ______ or on the SAN switch as ______.



Answer: Masking, Zoning

With both direct- and network-attached storage, ______ -level and ______ -level storage techniques are implemented.

With both direct- and network-attached storage, ______ -level and ______ -level storage techniques are implemented.



Answer: File, Block

Which of the following are important factors when maintaining a storage network in the cloud?

Which of the following are important factors when maintaining a storage network in the cloud?



A. Change management
B. Downtime
C. Best practices
D. Project management



Answer: Change Management, Best Practices, and Project Management

Which of the following is a process of making a SAN highly available and fault resistant?

Which of the following is a process of making a SAN highly available and fault resistant?



Answer: Multipathing

For SAN LUN mappings and restrictions, what process can be implemented at the HBA or storage controller level?

For SAN LUN mappings and restrictions, what process can be implemented at the HBA or storage controller level?



Answer: Masking

Which of the following is a SAN technique that restricts storage to a specific server or a small group of servers that is implemented in SAN switches?

Which of the following is a SAN technique that restricts storage to a specific server or a small group of servers that is implemented in SAN switches?



Answer: Zoning

What is a type of filesystem that is found in Unix operating systems and is now seen in Linux distributions?

What is a type of filesystem that is found in Unix operating systems and is now seen in Linux distributions?



Answer: UFS (Unix File System)

Which storage type stripes file data and performs a parity checking data over multiple disks that can recover from a hard disk failure?

Which storage type stripes file data and performs a parity checking data over multiple disks that can recover from a hard disk failure?



Answer: RAID 5

What is the name for a grouping of hard drives for redundancy and performance?

What is the name for a grouping of hard drives for redundancy and performance?



Answer: RAID (Redundant Array of Inexpensive Disks)

What system was developed to address the different types of storage needs a cloud consumer may require for availability, response times, backups, and economics?

What system was developed to address the different types of storage needs a cloud consumer may require for availability, response times, backups, and economics?



Answer: Tiering

Which of the following are standardized hardware systems for storage interconnections? (Choose three.)

Which of the following are standardized hardware systems for storage interconnections? (Choose three.)




A. ATA
B. SATA
C. SCSI
D. Block
E. File



Answer: ATA, SATA, SCSI

Which of the following are HDD architectures? (Choose two.)

Which of the following are HDD architectures? (Choose two.)




A. WWN
B. Spinning
C. SSD
D. EXT


Answer: Spinning, SSD

This storage technology can be encapsulated inside a TCP/IP frame and sent across as converged switch fabric; when encapsulated, what is it known as?

This storage technology can be encapsulated inside a TCP/IP frame and sent across as converged switch fabric; when encapsulated, what is it known as?



Answer: iSCSI

What is a predominant storage protocol in a cloud provider's datacenter?

What is a predominant storage protocol in a cloud provider's datacenter?



Answer: Fibre Channel

What is the technology of using Fibre Channel on a converged network fabric?

What is the technology of using Fibre Channel on a converged network fabric?


Answer: FCoE (Fibre Channel over Ethernet)

Each Fibre Channel device has a unique identifier known as what?

Each Fibre Channel device has a unique identifier known as what?


Answer: WWN (Worldwide Name)

What is a SAN technique used to restrict LUNs to specific storage devices?

What is a SAN technique used to restrict LUNs to specific storage devices?



Answer: Zoning

What is a process of making storage resources available to some servers on a SAN and restricting the storage to other systems?

What is a process of making storage resources available to some servers on a SAN and restricting the storage to other systems?



Answer: Masking

What interface hardware installed in a server is used to connect to a Fibre Channel network?

What interface hardware installed in a server is used to connect to a Fibre Channel network?



Answer: HBA (Host Bus Adapter)

Which of the following is the name of a high-speed network storage solution?

Which of the following is the name of a high-speed network storage solution?



A. Block access
B. Zoning
C. VMFS
D. SAN



Answer: SAN (Storage Area Network)

What type of storage interconnections are seen in standalone servers, laptops, and desktops?

What type of storage interconnections are seen in standalone servers, laptops, and desktops?



Answer: Direct-connection

What types of storage are available on a network?

What types of storage are available on a network?



Answer: Shared and SAN

On an Ethernet switch, a ______ port has the ability to transfer multiple VLANs out a single port.


A ______ is a network appliance that scales a cloud application by sharing the load across many servers.

A ______ is a network appliance that scales a cloud application by sharing the load across many servers.



Answer: Load Balancer

TCP/IP ports that are permanently assigned for an application are referred to as ______.

TCP/IP ports that are permanently assigned for an application are referred to as ______.



Answer: Well-Known Port Numbers

The process of converting private IP addresses to public addresses to access the Internet is called ______.

The process of converting private IP addresses to public addresses to access the Internet is called ______.



Answer: NAT (Network Address Translation)

A(n) ______ is a private network that is used both internally and allows access from business partners.

A(n) ______ is a private network that is used both internally and allows access from business partners.



Answer: Extranet

What is the IP application that allows for automatic assignments of IP interface configuration information?

What is the IP application that allows for automatic assignments of IP interface configuration information?



Answer: DHCP

What protocol is used for encrypted file transfer and uses TCP ports 989 and 900?

What protocol is used for encrypted file transfer and uses TCP ports 989 and 900?



Answer: FTP (File Transfer Protocol)

What well-known port number is used by secure web servers?

What well-known port number is used by secure web servers?



Answer: Port 443 (HTTPS)

What well-known port number is used by email servers?

What well-known port number is used by email servers?



Answer: Port 25 (Simple Mail Transfer Protocol)

What utility is used to verify the network interface configuration on a Windows server?

What utility is used to verify the network interface configuration on a Windows server?



Answer: Ipconfig

What Linux command is used to resolve hostnames to IP addresses?

What Linux command is used to resolve hostnames to IP addresses?



Answer: Dig

What is the command-line utility that shows open network connections, protocol information, and addresses used?

What is the command-line utility that shows open network connections, protocol information, and addresses used?



Answer: Netstat

What is the name of the Windows tool used to show the routed path from source to destination in a network?

What is the name of the Windows tool used to show the routed path from source to destination in a network?



Answer: Tracert

What IP utility is used to verify that an IP address is available on the network and also to show the response time at that moment in time?

What IP utility is used to verify that an IP address is available on the network and also to show the response time at that moment in time?



Answer: Ping

What device is placed in front of servers and used to increase the performance of a heavily used cloud computing site?

What device is placed in front of servers and used to increase the performance of a heavily used cloud computing site?



Answer: Load Balancer

What is it called when data is stored locally in the network where it is often requested?

What is it called when data is stored locally in the network where it is often requested?



Answer: Caching

Video and voice data is affected by what in a network?

Video and voice data is affected by what in a network?



Answer: Latency

The measurement of time data takes to pass through a network is referred to as?

The measurement of time data takes to pass through a network is referred to as?



Answer: Latency

What is a network in a campus or community environment called?

What is a network in a campus or community environment called?



Answer: MAN (Metropolitan Area Network)

A centralized controller used to automate networking control and forwarding is part of what technology?

A centralized controller used to automate networking control and forwarding is part of what technology?



Answer: SDN (Software-Defined Network)

A Layer 3 router port configuration may contain which of the following? (Choose two.)

A Layer 3 router port configuration may contain which of the following? (Choose two.)




A. IP address
B. Duplex
C. Subnet mask
D. VLAN



Answer: IP Address, Subnet Mask

Ethernet port configurations can contain which of the following? (Choose two.)

Ethernet port configurations can contain which of the following? (Choose two.)




A. Speed
B. VLAN
C. Cloud tag
D. Cache settings



Answer: Speed, VLAN

What does a header inserted into an Ethernet frame to segment a network contain?

What does a header inserted into an Ethernet frame to segment a network contain?



Answer: VLAN Tag

What is the ability to take an IP address block and to consolidate several networks ranges into a single larger block called?

What is the ability to take an IP address block and to consolidate several networks ranges into a single larger block called?



Answer: Supernetting

What is the process of changing the IP address in a packet header? (Choose two.)

What is the process of changing the IP address in a packet header? (Choose two.)



A. QoS
B. PAT
C. NAT
D. ARP


Answer: PAT, NAT
Subscribe to: Posts (Atom)

Search your questions here...

Trending Questions

  • Your company experiences fluctuations in traffic patterns to their e-commerce website based on flash sales. What service can help your company dynamically match the required compute capacity to the spike in traffic during flash sales?
    Your company experiences fluctuations in traffic patterns to their e-commerce website based on flash sales. What service can help your com...
  • Which of the following must be specified when launching a new Amazon Elastic Compute Cloud (Amazon EC2) Windows instance? (Choose 2 answers)
    Which of the following must be specified when launching a new Amazon Elastic Compute Cloud (Amazon EC2) Windows instance? (Choose 2 answer...
  • Your web application needs four instances to support steady traffic nearly all of the time. On the last day of each month, the traffic triples. What is a cost-effective way to handle this traffic pattern?
    Your web application needs four instances to support steady traffic nearly all of the time. On the last day of each month, the traffic tri...

Blog Archive

  • October 2020 (151)
  • December 2018 (88)
  • October 2018 (148)
  • March 2018 (55)
  • February 2018 (95)

Label

Amazon EC2 and EBS Amazon S3 and Glacier Storage Amazon Virtual Private Cloud (VPC) Applications in the Cloud Big Data Business Continuity and Disaster Recovery Cloud Computing Cloud Infrastructure Cloud Infrastructure Chapter 1 Cloud Infrastructure Chapter 4 Cloud Infrastructure Chapter 7 Cloud Infrastructure Chapter 9 Cloud Networking Concepts and Implementation Cloud Operations and Performance Tuning Cloud Storage and Provisioning Cloud Virtualization Introduction to AWS Privacy and Compliance Secure Application Design Understanding and Maintaining Cloud Security
Powered by Blogger.
Copyright © 2015 Cloud Computing | Term Of Service | Disclaimer | Privacy Policy | DMCA