Quiz-summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
Free CompTIA A+ Certification Exam 220-1101 Practice Test 17
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called:
-
Question 2 of 25
2. Question
Which cloud service model would provide the best solution for a web developer intending to create a web app?
-
Question 3 of 25
3. Question
In cloud computing, the term “Metered service” refers to the cloud provider’s ability to track the computing resources consumers are accessing as well as the amount of resources they are consuming. It provides transparency for both the provider and consumer and is used, among other applications, for the purpose of billing.
-
Question 4 of 25
4. Question
In cloud computing, the term “Measured service” refers to a situation in which gaining access to resources does not require a flat fee. This type of billing model allows consumers to be charged variable rates depending on the exact amount of utilized resources.
-
Question 5 of 25
5. Question
Which of the terms listed below refers to a cloud computing feature that allows for automatic allocation of computing resources in proportion with the demand?
-
Question 6 of 25
6. Question
Which of the following is an example of on-premises VDI solution?
-
Question 7 of 25
7. Question
In a persistent VDI: (Select 2 answers)
-
Question 8 of 25
8. Question
Which of the answers listed below describe the characteristics of a non-persistent VDI? (Select 2 answers)
-
Question 9 of 25
9. Question
Which of the following answers refers to a cloud-based VDI service?
-
Question 10 of 25
10. Question
Which of the terms listed below refers to a solution that allows multiple operating systems to work simultaneously on the same hardware?
-
Question 11 of 25
11. Question
In virtualization technology, a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system is known as:
-
Question 12 of 25
12. Question
Which of the following statements describe disadvantages of virtualization? (Select 2 answers)
-
Question 13 of 25
13. Question
In computer security, a mechanism for safe execution of untested code or untrusted applications is referred to as:
-
Question 14 of 25
14. Question
For best performance, a custom workstation designed for virtualization tasks needs: (Select 3 answers)
-
Question 15 of 25
15. Question
A set of Intel CPU HAV enhancements is called:
-
Question 16 of 25
16. Question
Which of the answers listed below refers to HAV enhancements developed by AMD for its CPUs?
-
Question 17 of 25
17. Question
The term “VM sprawl” is used to describe a situation in which large number of deployed virtual machines lack proper administrative controls.
-
Question 18 of 25
18. Question
Which of the following security measures can be used to prevent VM sprawl? (Select 2 answers)
-
Question 19 of 25
19. Question
What are the countermeasures against VM escape? (Select 2 answers)
-
Question 20 of 25
20. Question
Which of the following should be the first step in the troubleshooting process?
-
Question 21 of 25
21. Question
Which specific actions are not performed in the first step of the troubleshooting process? (Select 2 answers)
-
Question 22 of 25
22. Question
In the troubleshooting methodology, establishing a theory of probable cause should come as the:
-
Question 23 of 25
23. Question
Once the theory of probable cause of the problem has been established, the next troubleshooting step should involve:
-
Question 24 of 25
24. Question
Which step of the troubleshooting process involves re-establishing a new theory to determine probable problem cause?
-
Question 25 of 25
25. Question
The term “VM escape” refers to the process of breaking out of the boundaries of a guest operating system installation to access the primary hypervisor controlling all the virtual machines on the host machine.