0% found this document useful (0 votes)
19 views

Module 10 Cloud Automation

Module 10 focuses on cloud automation and includes multiple-choice questions related to security technologies, automation processes, and application development in cloud environments. Key topics include intrusion detection systems, orchestration techniques, and API communication. The module also emphasizes the importance of user acceptance testing and the distinction between various environments like QA and production.

Uploaded by

sjtpals0111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Module 10 Cloud Automation

Module 10 focuses on cloud automation and includes multiple-choice questions related to security technologies, automation processes, and application development in cloud environments. Key topics include intrusion detection systems, orchestration techniques, and API communication. The module also emphasizes the importance of user acceptance testing and the distinction between various environments like QA and production.

Uploaded by

sjtpals0111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

lOMoARcPSD|17669271

Module 10 Cloud Automation

Special Topics: Cloud Computing (Southern Arkansas University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by semin Seo ([email protected])
lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation


Multiple Choice

1. Sven wants to ensure that his infrastructure is protected from attacks against the applications themselves and the
automation and orchestration that helps keep everything together. In some areas he implements a technology that can only
detect attacks, while in others he implements a technology that can also stop the attack in progress. Which of the
following terms can be used to describe the technology that he has implemented?
a. ID
P
b. ID
S
c. ILS
d. IPS
ANSWER: a
FEEDBACK: a. Correct. Intrusion detection and prevention describes the combination of
intrusion detection systems and intrusion prevention systems.
b Incorrect. An intrusion detection system is one of the components
. described in the scenario, but intrusion prevention systems are also
mentioned. When combined together the term intrusion detection and
prevention, or IDP, is the best answer.
c. Incorrect. There is not an ILS term in cloud technologies.
d Incorrect. An intrusion prevention system is one of the components
. described in the scenario, but intrusion detection systems are also
mentioned. When combined together, the term intrusion detection and
prevention, or IDP, is the best answer.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:06 AM
TED:
DATE MODI 6/19/2020 2:09 AM
FIED:

2. Kylie has a number of processes that she has implemented automation for. As she was researching on the best way to
automate another process, she came across some information about a technique for optimizing automation processes into a
single workflow. Which of the following describe this technique?
a. Instrumentation
b. Coordination
c. Orchestration
d. Collaboration
ANSWER: c
FEEDBACK: a. Incorrect. Orchestration is the design, development, and optimization of
automation processes into a single workflow.
b Incorrect. Orchestration is the design, development, and optimization of
Copyright Cengage Learning. Powered by Cognero. Page 1

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

. automation processes into a single workflow.


c. Correct. Orchestration is the design, development, and optimization of
automation processes into a single workflow.
d Incorrect.Orchestration is the design, development, and optimization of
. automation processes into a single workflow.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:06 AM
TED:
DATE MODI 6/19/2020 7:20 AM
FIED:

3. Marvin runs one of the operating system utilities on a server and receives a message that several of the files appear to
have been modified or corrupted. The operating system is recommending reinstalling those files from the installation
source. Which of the following tools could have alerted Marvin or other administrators when the files were originally
changed?
a. FIM
b. IFS
c. FCoE
d. MTBF
ANSWER: a
FEEDBACK: a. Correct. File integrity monitoring is a technology tool that can monitor
sets of files and alert administrators when files are changed or modified.
b Incorrect. The integrated file system is irrelevant to file integrity
. monitoring.
c. Incorrect. Fibre channel over ethernet is irrelevant to file integrity
monitoring.
d Incorrect. The mean time between failures is the average amount of time
. between failures of a component. It is not related to file integrity
monitoring.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:06 AM
TED:
DATE MODI 6/19/2020 2:18 AM
FIED:

4. Cecil is interested in using more of the tools available from the cloud service provider his company has chosen to use,
AWS. He sees that they have various security tools available including a threat detection tool that relies on machine
Copyright Cengage Learning. Powered by Cognero. Page 2

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation


learning, anomaly detection, and threat intelligence to identify threats and trigger events or functions. Which of the
following is the tool that he may be interested in implementing?
a. ATP
b. FIM
c. GuardDuty
d. Lambda
ANSWER: c
FEEDBACK: a. Incorrect. Azure has a similar product named Advanced Threat
Protection, but the tool described is GuardDuty from AWS.
b Incorrect. File integrity monitoring is a tool that can monitor for and
. detect any changes to specified sets of files.
c. Correct. AWS has a tool named GuardDuty that relies on machine
learning, anomaly detection, and threat intelligence to identify threats
and trigger CloudWatch events or Lambda functions.
d Incorrect. Lambda is a serverless computing platform from AWS where
. customers can create functions using code to perform tasks.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:06 AM
TED:
DATE MODI 6/19/2020 2:20 AM
FIED:

5. Gary is reading one of the marketing e-mails that he receives as part of his company’s Azure subscription. This
particular e-mail highlights a tool that he’s interested in learning more about. The tool is described as a security tool that
relies on learning-based analytics to better monitor activities, identify threats, and prioritize alerts for follow-up by
security staff. Which of the following should he look up in the Azure portal to learn more about it?
a. ATP
b. FIM
c. GuardDuty
d. Lambda
ANSWER: a
FEEDBACK: a. Correct. Azure has a tool named advanced threat detection that relies on
learning-based analytics to better monitor activities, identify threats, and
prioritize alerts for follow-up by security staff.
b Incorrect. File integrity monitoring is a tool that can monitor for and
. detect any changes to specified sets of files.
c. Incorrect. AWS has a similar product named GuardDuty, but the tool
described is Azure’s ATP.
d Incorrect. Lambda is a serverless computing platform from AWS where
. customers can create functions using code to perform tasks.

Copyright Cengage Learning. Powered by Cognero. Page 3

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:07 AM
TED:
DATE MODI 6/19/2020 2:22 AM
FIED:

6. Mavis wants to develop an application that can talk to one of the cloud-based services her company uses. As part of the
design process, she needs to take into account the structure and type of messages that are sent back and forth from the
service. Which of the following describes the endpoint that her application will be communicating with for that service?
a. ANSI
b. ACPI
c. API
d. ASCI
I
ANSWER: c
FEEDBACK: a. Incorrect. ANSI is the American National Standards Institute and is
typically referenced in the technology sector as being a character set.
b Incorrect. ACPI is the Advanced Configuration and Power Interface and
. is a power management specification that is irrelevant to
communicating with services via an API.
c. Correct. An application programming interface is a method by which
applications can interact and communicate with some network-
connected services.
d Incorrect. ASCII is the American Standard Code for Information
. Interchange and is typically referenced in the technology sector as being
a character set.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:07 AM
TED:
DATE MODI 6/19/2020 2:25 AM
FIED:

7. Merlin wants to create a new script that will communicate with several of his CSP’s APIs. Which of the following
scripting languages might he use to create the script?
a. Python
b. YAML
c. JSON
Copyright Cengage Learning. Powered by Cognero. Page 4

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

d. XML
ANSWER: a
FEEDBACK: a. Correct. Python is a well-known and popular programming and
scripting language that can be used to send messages of a variety of
different types to APIs.
b Incorrect. YAML is a data serialization language. It defines the structure
. that data needs to be in when sent and received between different
systems.
c. Incorrect. JSON is a data-interchange format that defines the structure
that data needs to be in when sent and received between different
systems.
d Incorrect.XML is a markup language that defines how to encode and
. structure data to be sent and received between different systems.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:07 AM
TED:
DATE MODI 6/19/2020 2:27 AM
FIED:

8. Katy wants to make a few automated API calls from a new application that she is developing. Which of the following
might be a valid structure for the data that she needs to send to the API endpoint?
a. JavaScrip
t
b. Anaconda
c. JSON
d. PHP
ANSWER: c
FEEDBACK: a. Incorrect. JavaScript is a popular scripting language. It is not a data
format.
b Incorrect. Anaconda is a freemium version of the programming
. language Python. It is not a data format.
c. Correct. JSON is a data-interchange format that defines the structure
that data needs to be in when sent and received between different
systems.
d Incorrect. PHP is a popular programming language. It is not a data
. format.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
Copyright Cengage Learning. Powered by Cognero. Page 5

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

DATE CREA 6/19/2020 2:07 AM


TED:
DATE MODI 6/19/2020 2:29 AM
FIED:

9. Sigmund has created a new web application server for the psychology department at the university he works for. He
wants to install a tool on the server that will detect any security breaches, alert the administrative team, log the event, and
attempt to stop the security breach before the attacker is able to gain further access or cause any damage. Which of the
following types of tools might he install?
a. HIDS
b. HIPS
c. NIDS
d. NIPS
ANSWER: b
FEEDBACK: a. Incorrect. A host intrusion detection system will do almost everything
that a HIPS will do, except that it will not attempt to stop the security
breach. It can only detect, log, and alert.
b Correct. A host intrusion prevention system will detect the intrusion, log
. the event, alert the administrative team, and attempt to stop the breach.
c. Incorrect. A network intrusion detection system will detect, log, and
alert only. It will not attempt to stop the breach. However, it performs its
magic at the network level, not at the host level as described in the
scenario.
d Incorrect. A network intrusion prevention system will detect, log, alert,
. and stop a security breach. However, it performs its magic at the
network level, not at the host level as described in the scenario.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:07 AM
TED:
DATE MODI 6/19/2020 2:31 AM
FIED:

10. Garrett has developed an application and is ready for the user acceptance team to go through and verify that
everything is functional and working as it should while reporting any bugs they may identify. Which of the following
environments should he copy the application to for them to begin their work?
a. QA
b. Production
c. Developmen
t
d. Blue-green
ANSWER: a

Copyright Cengage Learning. Powered by Cognero. Page 6

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

FEEDBACK: a. Correct. The QA environment is where UAT, or user acceptance testing,


is performed. These users should be going through the application and
verifying that everything is functional and works as it should while
reporting any bugs they may have identified.
b Incorrect. A production environment is the live environment where all
. users will interact with the active version of the application.
c. Incorrect. The development environment is where an application is
initially developed or installed. Access to this environment should be
limited to developers and administrators.
d Incorrect.A blue-green deployment is a type of patch or update
. deployment where there is an active production environment and a copy
of the production environment. The copy of the production environment
is patched and updated, and then traffic is switched over to it from the
formerly active environment, and then the formerly active environment
is patched and updated.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:07 AM
TED:
DATE MODI 6/19/2020 2:42 AM
FIED:

11. User acceptance testing has just been completed on a new application and it is ready for the rest of the userbase at
Fictional Corp to start using it. Which of the following environments should the application be copied to?
a. QA
b. Production
c. Developmen
t
d. Archive
ANSWER: b
FEEDBACK: a. Incorrect. The QA environment is where the user acceptance testing, or
UAT, was performed.
b Correct. A production environment is the live environment where all
. users will interact with the active version of the application.
c. Incorrect. The development environment is where an application is
initially developed or installed. Access to this environment should be
limited to developers and administrators.
d Incorrect. While the company should make a backup of the application,
. the scenario describes needing the rest of the company to start using it,
so the production environment would be the best answer. Users would
not be able to access it from an archived backup location.
POINTS: 1

Copyright Cengage Learning. Powered by Cognero. Page 7

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

QUESTION Multiple Choice


TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:44 AM
TED:
DATE MODI 6/19/2020 2:47 AM
FIED:

12. Regan has been asked to apply updates to one of the company’s web application server farms. He does not want to
update all of the servers at once in case there is some sort of an issue that causes a crash or failure. He decides to direct
traffic away from a few servers and update those first. Once he has tested that everything is working successfully, he’ll
allow them to handle traffic again and then do another small group of servers. He’ll continue repeating this process until
all servers have been updated. Which of the following describes the deployment method that he has chosen?
a. Blue-green deployment
b. Look-ahead
deployment
c. Canary deployment
d. Rolling deployment
ANSWER: d
FEEDBACK: a. Incorrect. A blue-green deployment is a type of patch or update
deployment where there is an active production environment and a copy
of the production environment. The copy of the production environment
is patched and updated, and then traffic is switched over to it from the
formerly active environment, and then the formerly active environment
is patched and updated.
b Incorrect. There is not a look-ahead deployment defined within cloud
. technologies.
c. Incorrect. A canary deployment is when a small number of servers are
updated, and then a small amount of traffic is directed to these servers
as a test run. If everything looks good, then the updates are deployed to
the rest of the servers.
d Correct. In a rolling deployment, traffic is directed away from a few
. servers at a time so they can be updated. As each server is updated, it
begins to handle traffic again so the next wave of servers can be
updated. This process is repeated until all servers have received the
update.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:48 AM
TED:
DATE MODI 6/19/2020 2:50 AM
FIED:
Copyright Cengage Learning. Powered by Cognero. Page 8

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

13. Ronan has just received notification of a critical update that is available for one of the operating systems that his
company uses. He downloads it from the OS developer’s website and patches a couple of the systems. He then allows a
small amount of traffic to those servers so he can verify that there are no new error messages or issues with the
deployment. Once he’s verified that they have updated successfully, he issues the patch to the rest of the servers running
that operating system. Which of the following types of deployments has he just performed?
a. Blue-green deployment
b. Look-ahead
deployment
c. Canary deployment
d. Rolling deployment
ANSWER: c
FEEDBACK: a. Incorrect. A blue-green deployment is a type of patch or update
deployment where there is an active production environment and a copy
of the production environment. The copy of the production environment
is patched and updated, and then traffic is switched over to it from the
formerly active environment, and then the formerly active environment
is patched and updated.
b Incorrect. There is not a look-ahead deployment defined within cloud
. technologies.
c. Correct. A canary deployment is when a small number of servers are
updated, and then a small amount of traffic is directed to these servers
as a test run. If everything looks good, then the updates are deployed to
the rest of the servers.
d Incorrect. In a rolling deployment, traffic is directed away from a few
. servers at a time so they can be updated. As each server is updated, it
begins to handle traffic again so the next wave of servers can be
updated. This process is repeated until all servers have received the
update.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:51 AM
TED:
DATE MODI 6/19/2020 2:56 AM
FIED:

14. Miriam is performing a quarterly review of all web-based applications that the company uses. She sees that one of the
finance department’s applications has an update available for it. After downloading the update, she applies the update to a
duplicate of the production environment that does not receive any traffic. After verifying that everything looks good, she
transfers all of the traffic over to that server and updates the formerly active server. Which of the following deployment
types has she chosen for this application update?
a. Blue-green deployment
b. Look-ahead
deployment
Copyright Cengage Learning. Powered by Cognero. Page 9

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

c. Canary deployment
d. Rolling deployment
ANSWER: a
FEEDBACK: a. Correct. A blue-green deployment is a type of patch or update
deployment where there is an active production environment and a copy
of the production environment. The copy of the production environment
is patched and updated, and then traffic is switched over to it from the
formerly active environment, and then the formerly active environment
is patched and updated.
b Incorrect. There is not a look-ahead deployment defined within cloud
. technologies.
c. Incorrect. A canary deployment is when a small number of servers are
updated, and then a small amount of traffic is directed to these servers
as a test run. If everything looks good, then the updates are deployed to
the rest of the servers.
d Incorrect. In a rolling deployment, traffic is directed away from a few
. servers at a time so they can be updated. As each server is updated, it
begins to handle traffic again so the next wave of servers can be
updated. This process is repeated until all servers have received the
update.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:52 AM
TED:
DATE MODI 6/19/2020 2:58 AM
FIED:

15. Tomas is going to be deploying a new cloud-based point-of-sale application for the organization that will be run within
web browsers on computers located in his company’s retail stores. He knows that the system must experience as little
downtime as possible. Which of the following technologies might he choose to implement?
a. Plan b infrastructure (PBI)
b. Failover cluster (FC)
c. Planned failure domain (PFD)
d. Alternate lifecycle system (ALS)
ANSWER: b
FEEDBACK: a. Incorrect. There is not a plan b infrastructure term in cloud
technologies.
b Correct. A failover cluster is a group of servers that provides failover
. protection from the loss of one or more active servers in the cluster to
one or more inactive servers.
c. Incorrect. A failure domain is an area of a network that is impacted by
the failure of a component or system. While the term may be slightly

Copyright Cengage Learning. Powered by Cognero. Page 10

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

relevant, the scenario more specifically describes a failover cluster.


d Incorrect.There is not an alternate lifecycle system term within cloud
. technologies.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:52 AM
TED:
DATE MODI 6/19/2020 3:32 AM
FIED:

16. Amari is planning on deploying a failover cluster for a new cloud-based deployment. She works for a comedy
television channel and needs to ensure that users can access their streaming services 24/7/365. Which of the following
technical terms might describe the primary benefit that she is hoping for by implementing this technology?
a. LOL
b. HE
c. HA
d. ROFL
ANSWER: c
FEEDBACK: a. Incorrect. LOL is not a technical term that would describe high
availability.
b Incorrect. HE is not a technical term that would describe high
. availability.
c. Correct. High availability is a term that describes a system whose goal
is as little downtime as possible. Uptimes are commonly expressed in
nines, such as five-nine uptime, which is 99.999% uptime.
d Incorrect. ROFL is not a technical term that would describe high
. availability.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:52 AM
TED:
DATE MODI 6/19/2020 3:34 AM
FIED:

17. Omar needs to install an update to the web servers so that the development team can use some of the new libraries and
functions for the .NET application they are modifying. However, upon trying to install the latest .NET framework, an
error is displayed stating that another update must be installed first. Which of the following technical terms describes why
the .NET framework cannot be installed yet?
a. Dependencies
Copyright Cengage Learning. Powered by Cognero. Page 11

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

b. Subordinates
c. Reliants
d. Tied-To-Update (TTU)
ANSWER: a
FEEDBACK: a. Correct. Sometimes an update will have certain dependencies that need
to be installed before that update can be installed.
b Incorrect. There is not a subordinates term within cloud technologies.
.
c. Incorrect. There is not a reliants term within cloud technologies.
d Incorrect. There is not a Tied-To-Update term within cloud
. technologies.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:52 AM
TED:
DATE MODI 6/19/2020 3:36 AM
FIED:

18. Tanesha is currently documenting all of the steps necessary to perform various functions that her team is responsible
for. Which of the following describes what she is creating?
a. Guidebook
b. Runbook
c. Walkthroughs
d. Stepping
stones
ANSWER: b
FEEDBACK: a. Incorrect. There is not a term for guidebook defined in cloud
technologies.
b Correct. A runbook is a collection of physical or digital documents that
. outline the precise steps to complete procedures or operations in a
specific IT environment.
c. Incorrect. There is not a term for walkthroughs associated with
documenting steps and procedures defined in cloud technologies.
d Incorrect.There is not a term for stepping stones defined in cloud
. technologies.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 5:10 AM
Copyright Cengage Learning. Powered by Cognero. Page 12

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

TED:
DATE MODI 6/19/2020 5:11 AM
FIED:

19. Zane’s company has chosen to use Ansible for its primary automation tool. Which of the following is the default
protocol used by this tool that he might need to ensure it is open on the firewall in order for it to work correctly?
a. SSH
b. STP
c. DSL
d. JSON
ANSWER: a
FEEDBACK: a. Correct. Ansible uses SSH by default to connect to remote nodes.
b Incorrect. STP is the spanning tree protocol that is used to prevent
. switching loops in networks. It is not used specifically by Ansible to
connect to remote nodes.
c. Incorrect. DSL as defined in cloud technologies is domain specific
language, which is used by Puppet.
d Incorrect. JSON is not a protocol, but rather a way of structuring data so
. that it can be sent between systems and services.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:53 AM
TED:
DATE MODI 6/19/2020 5:15 AM
FIED:

20. Olina is fairly new at Fictional Corp and is used to working at much smaller companies. Most of her former jobs have
all been manual work. However, she has been told that because of its size, her new company prefers to implement
technologies that can perform various processes and procedures without human intervention so that humans can spend
their time monitoring the systems for errors and fixing problems when something goes wrong. Which of the following
describes what Fictional Corp has implemented to much more of an extent than her previous company?
a. In-house developed applications
b. Proprietary system management
procedures
c. High availability
d. Automation
ANSWER: d
FEEDBACK: a. Incorrect. There is not enough information to determine whether one
company has developed and deployed more in-house developed
applications than the other.
b Incorrect. There is not enough information to determine whether these
. automation procedures are proprietary or commercial off-the-shelf
Copyright Cengage Learning. Powered by Cognero. Page 13

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

software.
c. Incorrect. There is not enough information to determine whether one
company has more high availability technologies in place over the other.
d Correct. Automation is the use of technology to perform a process or
. procedure with minimal human intervention.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:53 AM
TED:
DATE MODI 6/19/2020 5:17 AM
FIED:

21. Reina has configured an orchestration model for her company’s infrastructure that requires servers to connect to the
centralized server once an hour to determine if there should be any configuration changes made. Which of the following is
she using?
a. Send model
b. Pull model
c. Push model
d. Grab model
ANSWER: b
FEEDBACK: a. Incorrect. There is not a send model in cloud technologies.
b Correct. The pull model is a client-server model where the client checks
. in with the server every so often to determine if the client should make
configuration changes.
c. Incorrect. The push model is a client-server model where configuration
changes are pushed out from the server at the time the changes should
be made by the clients.
d Incorrect. There is not a grab model in cloud technologies.
.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 2:53 AM
TED:
DATE MODI 6/19/2020 5:19 AM
FIED:

22. Strom works on a team that manages a number of nodes to provide commercial e-mail list services for companies.
With their current infrastructure and volume, it is sometimes necessary to change the configuration of various nodes very
quickly to be able to handle other functions. Which of the following would result in the quickest configuration changes
Copyright Cengage Learning. Powered by Cognero. Page 14

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation


being applied to the nodes?
a. Send model
b. Pull model
c. Push model
d. Grab model
ANSWER: c
FEEDBACK: a. Incorrect. There is not a send model in cloud technologies.
b Incorrect. The pull model is a client-server model where the client
. checks in with the server every so often to determine if the client should
make configuration changes.
c. Correct. The push model is a client-server model where configuration
changes are pushed out from the server at the time the changes should
be made by the clients.
d Incorrect. There is not a grab model in cloud technologies.
.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 5:20 AM
TED:
DATE MODI 6/19/2020 5:25 AM
FIED:

23. Serena wants to implement as much automation in her organization as possible. One of her next tasks is to create a
process where the system can duplicate a virtual machine on the fly. Which of the following terms might describe this
automation process?
a. Replicatin
g
b. Cloning
c. Twinning
d. Doubling
ANSWER: b
FEEDBACK: a. Incorrect. Replicating, or replication, is typically a term reserved for
copying a database or other form of data from one system to another. It
does not typically cover virtual machine cloning.
b Correct. Cloning can be used to make an exact copy of a virtual
. machine.
c. Incorrect. There is not a twinning term within cloud technologies.
d Incorrect.There is not a doubling term within cloud technologies.
.
POINTS: 1
QUESTION Multiple Choice
Copyright Cengage Learning. Powered by Cognero. Page 15

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 5:21 AM
TED:
DATE MODI 6/19/2020 5:56 AM
FIED:

24. Dave manages a large network and has researched a bunch of automation tools. He decides on one that requires the
installation of an agent, called a minion, on the nodes to be automated, which are then called minions. Which of the
following automation tools did Dave choose?
a. SaltStac
k
b. Puppet
c. Chef
d. Ansible
ANSWER: a
FEEDBACK: a. Correct. SaltStack is an open-source configuration management tool
that requires the installation of an agent that is called a minion. Each of
the nodes in the infrastructure managed by SaltStack can also be
referred to as minions.
b Incorrect. Puppet does require the installation of an agent, but does not
. use the term minion.
c. Incorrect. Chef uses an agent, but does not use the term minion.
d Incorrect.Ansible does not require the installation of an agent.
.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 5:22 AM
TED:
DATE MODI 6/19/2020 5:58 AM
FIED:

25. Adele is looking at the options for automation tools and needs to choose one that does not require the installation of an
agent. Which of the following tools might she choose?
a. SaltStac
k
b. Puppet
c. Chef
d. Ansible
ANSWER: d

Copyright Cengage Learning. Powered by Cognero. Page 16

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

FEEDBACK: a. Incorrect. SaltStack requires the installation of an


agent.
b. Incorrect. Puppet requires the installation of an agent.
c. Incorrect. Chef requires the installation of an agent.
d. Correct. Ansible does not use an agent.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 6/19/2020 5:22 AM
DATE MODIFIED: 6/19/2020 6:02 AM

26. Amber has been researching automation tools and believes that Puppet is the best option for her company to use. She
is currently testing the open-source version but is considering asking for budget to be allocated so that she can implement
the enterprise version. How many nodes can she run the enterprise version on before needing to start paying for the
product?
a. 5
b. 10
c. 20
d. 25
ANSWER: b
FEEDBACK: a. Incorrect. Puppet enterprise is free for up to 10 nodes.
b. Correct. Puppet enterprise is free for up to 10 nodes.
c. Incorrect. Puppet enterprise is free for up to 10 nodes.
d. Incorrect. Puppet enterprise is free for up to 10 nodes.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 6/19/2020 5:22 AM
DATE MODIFIED: 6/19/2020 6:17 AM

27. Fictional Corp has chosen AWS as its primary cloud service provider. Which of the following automation tools could
they use to help with configuring and managing EC2 instances?
a. Automation
b. Deployment
Manager
c. SaltyChef
d. SSM
ANSWER: d
FEEDBACK: a. Incorrect. Automation is a tool on the Azure platform.
b Incorrect. Deployment Manager is GCP’s automation tool.
.
c. Incorrect. There is not a SaltyChef automation tool in cloud
technologies.
Copyright Cengage Learning. Powered by Cognero. Page 17

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

d Correct. SSM is the AWS Systems Manager tool that can be used for
. configuring and managing EC2 instances, on-premises servers and
VMs, and some other AWS resources through automated processes.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 5:22 AM
TED:
DATE MODI 6/19/2020 6:26 AM
FIED:

28. Startup Inc. has chosen the Azure platform as its cloud service provider. Which of the following tools might they use
for configuration management, update management, and process automation?
a. Automation
b. Deployment
Manager
c. SaltyChef
d. SSM
ANSWER: a
FEEDBACK: a. Correct. Automation is a tool on the Azure platform that can be used for
configuration management, update management, and process
automation.
b Incorrect. Deployment Manager is GCP’s automation tool.
.
c. Incorrect. There is not a SaltyChef automation tool in cloud
technologies.
d Incorrect. SSM is the AWS Systems Manager tool.
.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 5:23 AM
TED:
DATE MODI 6/19/2020 6:29 AM
FIED:

29. Cadence is analyzing disk space usage on one of the Linux virtual machines she manages. She noticed that log files
are taking up more space than necessary. Which of the following automation jobs could she set up to resolve this issue?
a. Archive all log files older than 30 days to cold storage.
b. Rename the log files.
c. Check to make sure that the appropriate logging level is
Copyright Cengage Learning. Powered by Cognero. Page 18

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

configured.
d. Move the log files to another directory.
ANSWER: a
FEEDBACK: a. Correct. Archiving the log files to cold storage would clear up some of
the disk space used and can be set up as an automation job.
b Incorrect. Renaming the log files will not clear up any disk space.
.
c. Incorrect. While it is a good idea to make sure the appropriate logging
level is enabled, that will not immediately clear up any disk space. It
will only make future logs smaller if less detail is captured.
d Incorrect.Moving log files to another directory will not clear up any disk
. space.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 5:23 AM
TED:
DATE MODI 6/19/2020 6:32 AM
FIED:

30. Cherice has just completed an audit of a server group that she has recently taken over. She found a number of accounts
that were still active even though the users no longer worked for the company. Which of the following should she do to
prevent this issue in the future?
a. Set up an automation task to lock accounts that have been inactive over 30 days
automatically and send the user a notification.
b.Set up an automation task to remind her to run a user audit on the first of every month.
c. Set up an automation task to disable accounts that have been inactive over 30 days
automatically and send the administrator a notification.
d.Set up an automation task to delete accounts that have been inactive over 30 days and
send the administrator a notification.
ANSWER: c
FEEDBACK: a. Incorrect. If accounts have been unused for 30 days (or whatever
timeframe is decided by the administrator or company policy), they
should be disabled, not locked. As well, it would do no good to send the
user a notification if their e-mail uses the same account that was just
locked.
b Incorrect. A simple calendar reminder could accomplish this goal. An
. automation task would be unnecessary. However, to really automate the
job she should have the task disable the account and send her a
notification.
c. Correct. Any accounts that have been inactive for 30 days (or whatever
timeframe is decided by the administrator or company policy) should be
disabled, not deleted or locked.

Copyright Cengage Learning. Powered by Cognero. Page 19

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

d Incorrect.Any accounts that have been inactive for 30 days (or whatever
. timeframe is decided by the administrator or company policy) should be
disabled, not deleted or locked.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 5:23 AM
TED:
DATE MODI 6/19/2020 6:34 AM
FIED:

31. Desiree works for a web hosting company that adds new accounts and removes others on a regular basis. Which of the
following should she automate for customers that have cancelled their service? (Choose two.)
a. Remove DNS entries for their sites.
b. Archive the customer’s sites and logs for 30 days and then delete them.
c. Delete all of the files and logs associated with the customer’s account.
d. Change the customer’s password.
ANSWER: a
FEEDBACK: a. Correct. If the sites are no longer hosted with Desiree’s web hosting
company, it is best to remove the DNS entries. They can always be
recreated again later if the customer decides to sign back up for service.
b Correct. Sometimes accounts are cancelled in error or by nonpayment
. due to a credit card error. It is best to take precautions not to needlessly
delete files for a customer too soon when they may reactivate their
account within a couple of days or so.
c. Incorrect. Sometimes accounts are cancelled in error or by nonpayment
due to a credit card error. It is best to take precautions not to needlessly
delete files for a customer too soon when they may reactivate their
account within a couple of days or so.
d Incorrect.Changing the password may mean that the customer might
. still be able to recover their password if there is an automated system in
place. Disabling the customer’s account and then deleting after a period
of time would be a much better option.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 6:34 AM
TED:
DATE MODI 6/19/2020 6:38 AM
FIED:

Copyright Cengage Learning. Powered by Cognero. Page 20

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation


32. Fictional Corp has decided that it wants to automate as much of the infrastructure as possible. As well, it has decided
to outsource some of the monitoring capabilities. Which of the following might they outsource some of these tasks to?
a. MPLS
b. CMS
c. MSP
d. DSP
ANSWER: c
FEEDBACK: a. Incorrect. Multi-protocol label switching is a networking technology
that is irrelevant to outsourcing monitoring capabilities.
b Incorrect. A content management system is irrelevant to outsourcing
. monitoring capabilities.
c. Correct. A managed service provider can provide certain management
functions for organizations who do not have the resources or do not
want to have the resources to perform these tasks themselves.
d Incorrect.There is not a DSP defined in cloud terminology.
.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 6:39 AM
TED:
DATE MODI 6/19/2020 6:47 AM
FIED:

33. Jose just returned from a security conference where he learned about a technology that he can implement on his
network that will detect security breaches on his network, log the event, and alert the administrator. He also wants it to
automatically stop the breach. Which of the following technologies could he implement?
a. HIDS
b. HIPS
c. NIDS
d. NIPS
ANSWER: d
FEEDBACK: a. Incorrect. A host intrusion detection system will detect intrusions, log
them, and alert the administrator. However, it will not automatically
stop the breach. It also is not network wide as it is configured for
individual hosts.
b Incorrect. While a host intrusion prevention system will detect
. intrusions, log them, alert the administrator, and stop them, it only
applies to the individual host. For network wide coverage, a network
intrusion prevention system should be used.
c. Incorrect. A network intrusion detection system will detect intrusions,
log them, and alert the administrator. However, it will not automatically
stop the breach.
Copyright Cengage Learning. Powered by Cognero. Page 21

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

d Correct.A network intrusion prevention system will detect intrusions,


. log them, alert the administrator, and stop the breach at the network
level.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 6:39 AM
TED:
DATE MODI 6/19/2020 6:51 AM
FIED:

34. Eleanor is trying to secure a couple of servers that she manages. After hardening the servers, she installs a piece of
software on each of them that will detect intrusions, log the event, and notify the administration team. She does not want it
to automatically stop the intrusions due to the possibility of false positives. Which of the following has she installed?
a. HIDS
b. HIPS
c. NIDS
d. NIPS
ANSWER: a
FEEDBACK: a. Correct. A host intrusion detection system will detect intrusions, log
them, and alert the administrator.
b Incorrect. A host intrusion prevention system will detect intrusions, log
. the event, notify the administrators, and attempt to stop the intrusions.
c. Incorrect. A network intrusion detection system is similar to a host
intrusion detection system, except that it is installed at the network level
instead of the host level.
d Incorrect. A network intrusion prevention system is installed at the
. network level, not at the host level. Additionally, it will attempt to stop
the intrusions.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 6:40 AM
TED:
DATE MODI 6/19/2020 6:55 AM
FIED:

35. Gisella has just returned from a security conference where she won a free year of protection and support for her
company with a device that will detect intrusions on her network, alert the administrators, and log the events.
Unfortunately, it will not try to stop the intrusion. Which of the following has she won?
a. HIDS
Copyright Cengage Learning. Powered by Cognero. Page 22

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

b. HIPS
c. NIDS
d. NIPS
ANSWER: c
FEEDBACK: a. Incorrect. A host intrusion detection system will detect intrusions, log
them, and alert the administrator, but works at the individual host level,
not at the network level.
b Incorrect. A host intrusion prevention system will detect intrusions, log
. the event, notify the administrators, and attempt to stop the intrusions. It
also works at the individual host level, not at the network level.
c. Correct. A network intrusion detection system will detect intrusions, log
the events, and notify the administrators at the network level.
d Incorrect. A network intrusion prevention system will detect intrusions,
. log the events, notify the administrators, and attempt to stop the
intrusion at the network level.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 6:40 AM
TED:
DATE MODI 6/19/2020 6:59 AM
FIED:

36. Julia uses AWS’s CloudFormation tool to manage many of her company’s resources. Which of the following may be
used as part of the template configuration? (Choose two)
a. YAML
b. XML
c. JSON
d. HCL
ANSWER: a
FEEDBACK: a. Correct. YAML and JSON are used by AWS’s built-in solution for
managing IaC, CloudFormation.
b.Incorrect. XML is not used by AWS’s CloudFormation.
c. Correct. YAML and JSON are used by AWS’s built-in solution for
managing IaC, CloudFormation.
d.Incorrect. HCL is used by Terraform, not AWS’s CloudFormation.
POINTS: 1
QUESTION T Multiple Choice
YPE:
HAS VARIAB False
LES:
DATE CREAT 6/19/2020 6:41 AM
Copyright Cengage Learning. Powered by Cognero. Page 23

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

ED:
DATE MODIFI 6/19/2020 7:01 AM
ED:

37. Jeanette just finished watching a video on a popular social media site about a technology that can provision and
manage IT infrastructure through configuration files that can be automated rather than interactive tools that require
manual configuration. Which of the following technologies was she learning about?
a. Runbook
b. IaC
c. Orchestratio
n
d. Automation
ANSWER: b
FEEDBACK: a. Incorrect. A runbook is a collection of physical or digital documents that
outline the precise steps to complete procedures or operations in a
specific IT environment.
b Correct. Infrastructure as Code is the provisioning and management of
. IT infrastructure through computer-readable configuration files that can
be automated rather than interactive tools that require manual
configuration.
c. Incorrect. Orchestration is the design, development, and optimization of
automation processes into a single workflow.
d Incorrect.Automation is the use of technology to perform a process or
. procedure with minimal human intervention.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 7:01 AM
TED:
DATE MODI 6/19/2020 7:04 AM
FIED:

38. Fictional Corp has recently changed its server naming convention. Halfway through the renaming, the automation
stops working. Which of the following should have been done as part of the process?
a. The servers should have used DHCP reservations.
b. The automation configuration should have been updated as each server name was
changed.
c. The ARP tables should have been updated first.
d. The MAC address should have been updated in the automation configuration as well.
ANSWER: b
FEEDBACK: a. Incorrect. DHCP reservations would have no impact on the name
changes through automation changes.
b Correct. The automation configuration should have been updated as
Copyright Cengage Learning. Powered by Cognero. Page 24

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

. each server name was changed.


c. Incorrect. ARP tables rarely need to be updated manually and are
irrelevant to the automation configuration.
d Incorrect.The MAC address shouldn’t be necessary in the automation
. configuration, but even if it was, the MAC address doesn’t change with
the server name.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 7:01 AM
TED:
DATE MODI 6/19/2020 7:06 AM
FIED:

39. Wyatt notices a message on the dashboard that one of the servers is no longer reachable by the automation system. He
remotes into the server by name and is able to connect just fine. He pings the server by name from his workstation and it
comes back with a different IP address than what is in the automation system. Which of the following is a possible reason
why?
a. The server somehow changed from a static IP address to DHCP and is now receiving a
different IP address and the automation system isn’t configured to detect IP address
changes automatically.
b.The DNS server is having issues.
c. There is a rule on the firewall blocking the automation traffic.
d.The DHCP server is having issues.
ANSWER: a
FEEDBACK: a. Correct. Automation systems need to be configured for the features that
you want to use. If the automation system isn’t detecting the new IP
address, it could be a simple change to tell it to reconfigure the IP
address of the servers to a static IP as part of its configuration.
b Incorrect. If the name is resolving to an IP address, the DNS server
. should be working fine.
c. Incorrect. If there is only one server experiencing issues, it most likely
is not a problem on the firewall.
d Incorrect.If the server has a different IP address than what it should
. have, either someone has changed the IP address and the DNS record
manually or the server is receiving an IP address via DHCP and that
process has automatically updated the DNS records. The latter is more
likely than the former.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:

Copyright Cengage Learning. Powered by Cognero. Page 25

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

DATE CREA 6/19/2020 7:02 AM


TED:
DATE MODI 6/19/2020 7:08 AM
FIED:

40. Luc has installed Ansible and is trying to get it working correctly, but cannot seem to make it communicate with the
various nodes that he wants to use it on. Which of the following is the most likely issue?
a. The port for YAML is not open on the firewall.
b. The nodes are all offline.
c. The agent has not been installed on the nodes
yet.
d. Port 22 is not open on the firewall.
ANSWER: d
FEEDBACK: a. Incorrect. YAML is the structure of the data, not a protocol that the data
is transmitted over.
b Incorrect. This is unlikely, but would be a very easy fix. There is not
. enough information to determine for sure that Luc has checked that
already, but if the scenario says it simply can’t communicate, we have to
assume that there’s something blocking that communication.
c. Incorrect. Ansible does not use agents for its communications.
d Correct.Since Ansible uses SSH by default to communicate with the
. nodes it is to manage, port 22 should be open on any firewalls between
the nodes and the Ansible server.
POINTS: 1
QUESTION Multiple Choice
TYPE:
HAS VARIA False
BLES:
DATE CREA 6/19/2020 7:02 AM
TED:
DATE MODI 6/19/2020 7:11 AM
FIED:

Multiple Response

41. Taj needs to install a set of updates for an application server that will restart the server three times. Which of the
following should prevent at least some of the users from calling in to report an outage? (Choose two)
a. Disable the service desk phone number temporarily.
b. Schedule a maintenance window.
c. Perform the update when the fewest number of people are using the
application.
d. Make a backup of the application server.
ANSWER: b, c
FEEDBACK: a. Incorrect. Disabling the service desk phone number may certainly
prevent users from calling in to report an outage on this one application,
Copyright Cengage Learning. Powered by Cognero. Page 26

Downloaded by semin Seo ([email protected])


lOMoARcPSD|17669271

Name Clas Dat


: s: e:

Module 10: Cloud Automation

but it would also prevent them from calling in for any number of other
reasons.
b Correct. Scheduling a maintenance window is a very good idea for
. systems that may see a service interruption due to maintenance tasks
being performed. When a maintenance window is scheduled, users
should be notified beforehand through the application itself or email or
both.
c. Correct. While performing the maintenance when the fewest number of
people are using the application is a good idea, ideally a maintenance
window should be scheduled (preferably for the least busiest timeframe)
and users notified in order to cut down on the number of calls.
Preferably, a maintenance window should be scheduled during the time
when the fewest number of people are using the application.
d
.
POINTS: 1
QUESTION Multiple Response
TYPE:
HAS VARIA False
BLES:
DATE CREA 7/20/2020 9:34 AM
TED:
DATE MODI 7/20/2020 9:36 AM
FIED:

Copyright Cengage Learning. Powered by Cognero. Page 27

Downloaded by semin Seo ([email protected])

You might also like