- (Topic 4)
A cloud administrator is reviewing the current private cloud and public laaS environment, and is building an optimization plan. Portability is of great concern for the administrator so resources can be easily moved from one environment to another.
Which of the following should the administrator implement?
Correct Answer:
C
Containers are packages of software that contain all of the necessary elements to run in any environment. Containers virtualize the operating system and run anywhere, from a private data center to the public cloud or even on a developer’s personal laptop. Containers provide an isolated environment for running applications, sharing the host OS kernel but isolating processes, file systems, and network resources. Containers package applications and their dependencies together, ensuring they run consistently across different environments, from development to production. Containers are lightweight, resource-efficient, fast, and immutable, making them ideal for portability and scalability. By using containers, a cloud administrator can easily move resources from one environment to another without changing the code or configuration of the applications. References: CompTIA Cloud+ CV0-003 Study Guide, Chapter 2: Deploying a Cloud Environment, page 75-76; What are containers?; Portability in the Cloud: Cloud Native and Containers.
- (Topic 1)
A systems administrator needs to convert ten physical servers to virtual.
Which of the following would be the MOST efficient conversion method for the administrator to use?
Correct Answer:
B
A vendor’s conversion tool is a type of software or utility that automates and simplifies the process of converting physical servers to virtual machines by capturing the configuration and data of the physical servers and creating virtual disks and files for the virtual machines. Using the vendor’s conversion tool can be the most efficient conversion method for a systems administrator to use to convert ten physical servers to virtual, as it can save time and effort by avoiding manual steps or errors involved in rebuilding, cloning, or restoring the physical servers to virtual machines. Using the vendor’s conversion tool can also ensure compatibility and consistency, as it can match the hardware and software requirements and settings of the physical servers to the virtual machines.
References: CompTIA Cloud+ Certification Exam Objectives, page 10, section 1.5
- (Topic 4)
A corporation is evaluating an offer from a CSP to take advantage of volume discounts on a shared platform. The finance department is concerned about cost allocation transparency, as the current structure splits projects into dedicated billing accounts. Which of the following can be used to address this concern?
Correct Answer:
A
Resource tagging is a process of adding descriptive metadata (tags) to cloud resources, such as virtual machines, storage accounts, databases, etc. Tags can be used to track and allocate costs, identify resources by project, owner, environment, or any other criteria. Resource tagging can help the finance department to have cost allocation transparency across different projects on a shared platform. References: CompTIA Cloud+ Certification Exam Objectives, Domain 4.0: Operations and Support, Objective 4.3: Given a scenario, apply the appropriate methods for cost control in a cloud environment. Cloud Resource Tagging | Cloud Foundation Community, Define your tagging strategy - Cloud Adoption Framework
- (Topic 4)
A systems administrator has a redundant backup system in place. Which of the following should the systems administrator perform to maintain efficient operation and comply with the global standard in the corporate backup policies?
Correct Answer:
C
- (Topic 2)
A Chief Information Security Officer (CISO) is evaluating the company’s security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?
Correct Answer:
D
A risk register is a document that records all the identified risks, their causes, impacts, probabilities, mitigation measures, and status for a project or an organization. A risk register helps to manage and monitor risks throughout their lifecycle and ensure they are addressed appropriately. A risk register would help the CISO to locate all the assets with identified deviations and mitigation measures.