CompTIA has got started numerous instructive courses that will bonus IT ALL pros, teachers together with entrepreneurs. There does exist terrific equipment regarding online world with places to get hold of terrific recommendations together with material the fact that what amount of vast array there is given during instructive path. It all don’t just magnifies some sort of IT ALL experts’ experience together with competencies however , enables you to cultivate the work as a consequence of those IT ALL certifications. CompTIA JK0-020 vce has got given 12 months well known instructive courses to display some form of experience together with competencies today individuals in the field of IT ALL.
An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system. Which of the following should the administrator do to accomplish this task?
A. Install the patch on a development server
B. Create a full backup
C. Create a snapshot
D. Install the patch on a test server
Which of the following cloud delivery models presents the LEAST vulnerabilities to a company’s existing network?
Which of the following uses the business model of shared resources in a cloud environment?
C. Cloud bursting
Which of the following is used to locate a specific area of storage in a cloud environment?
A. Object ID
Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?
A. Bridge the vNIC
B. Set the vNIC speed to half-duplex
C. Add an addition vNIC
D. Set the vNIC speed to full-duplex
After an administrator successfully migrated the last physical application server to a virtual environment, the help desk reported slow performance. Which of the following should the administrator have done FIRST before migrating this server?
A. Apply operating system patches to the application server after the migration.
B. Contact the vendor to see if the application is supported in a virtual environment.
C. Take a backup of the application server after the migration.
D. Migrate the application server in a test environment and have users test it.
Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?
An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography. Which of the following should the administrator implement NEXT?
A. Access controls
An administrator deployed ten application servers from a single VM template. A senior administrator notices that these ten VMs are not using their resources efficiently. Which of the following is MOST likely the issue with the new servers?
A. The dynamic resource pool is malfunctioning.
B. The server is missing security patches.
C. The VM servers were not properly configured.
D. There are insufficient resources available on the host.
Which of the following storage technologies is file-based?
Which of the following storage technologies can leverage switches in its implementation?
Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Which of the following only uses Fibre Channel to implement a storage infrastructure?
Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?
A. Rapid deployment
B. Cloud bursting
An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?
A. Type I
B. Type II
C. Bare Metal
An administrator is planning to implement multipathing for IP-based storage. Which of the following protocols can be used in this configuration?
Which of the following, in conjunction with IPSec, can be configured to provide secure access to files on a NAS?
A system administrator is planning storage infrastructure to store backup copies of virtual machines that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select TWO).
D. FAT E. NTFS
Which of the following can be used to enable out-of-band management of a Windows-based host?
An administrator notices that the mouse does not perform as expected within a VM. Which of the following might improve the performance of the mouse?
A. Install a 64-bit OS within the guest.
B. Enable USB port mapping.
C. Replace the mouse on the host server.
D. Install the virtualization guest software.
A recently deployed VM is running a Human Resource (HR) application on the HR network. Workstations in the accounting department can access the Internet and other accounting servers, but are unable to ping the new VM. Which of the following must be enabled for the accounting department to access this HR application?
A. The computers must be granted read rights to the VM.
B. Replace the accounting workgroup switch.
C. VLAN routing should be enabled on the router.
D. Disable port security on the HR workgroup switch.
An administrator deployed a VM that is hosting an internal website. Users report they are unable to access the new website. Which of the following should the network administrator do to test whether web traffic is being sent and received?
A. Browse to any website
B. Ping the VM’s IP address
C. Ping the VM’s loopback address
D. Telnet to port 80
Which of the following would be used to advertise a public IP address on redundant WAN circuits?
A company has deployed a website which is mirrored at a secondary datacenter. Which of the following should be changed to route users to the secondary datacenter in case of a primary site failure?
A. Virtual address
B. DNS record
C. ARP table
D. Disaster recovery plan
A security administrator is being hired to perform a penetration test of a third-party cloud provider as part of an annual security audit. Which of the following is the FIRST step that must be performed?
A. Attempt known exploits
B. Scan for vulnerabilities
C. Research publicized incidents
D. Get written permission