Cloud hardware catch up

This commit is contained in:
Aidan Sharpe 2025-05-05 11:41:28 -04:00
parent ae4ff9682b
commit 5fda1b8a94
14 changed files with 206 additions and 0 deletions

View File

@ -0,0 +1,16 @@
---
title: ECE09488 Assignment 10
author: Aidan Sharpe
date: May 2nd 2025
---
1. a c
2. d
3. c
4. b
5. d
6. c
7. a
8. a
9. c
10. c

View File

@ -0,0 +1,36 @@
---
title: ECE09488 Assignment 10
author: Aidan Sharpe
date: May 2nd 2025
---
### 1. Which of these tools can be installed on your computer? Choose TWO.
a. AWS CLI
c. Azure CLI
### 2. Which kind of tool relies most on disposable resources?
d. Immutable
### 3. When testing a new automation script, the deployment of a web server repeatedly fails. What characteristic of the script is most likely responsible for the problem?
c. Patching
### 4. Which technique pulls away a small number of servers at a time for updates throughout the entire deployment process?
b. Rolling
### 5. Which term refers to a resources track record of functioning error-free?
d. Reliability
### 6. Which technology requires computers to uncover hidden patterns?
c. Unsupervised learning
### 7. Which of the following tools requires detailed instructions on how you want a group of resources deployed?
a. Chef
### 8. Which environment is primarily focused on ensuring consistent quality throughout an applications design?
a. Production
### 9. Which type of machine learning will most likely result in serendipitous discoveries not anticipated by human designers?
c. Unsupervised learning
### 10. What technique will protect root system files?
c. FIM

View File

@ -0,0 +1,16 @@
---
title: ECE09488 Assignment 6
author: Aidan Sharpe
date: May 2nd 2025
---
1. b
2. d
3. d
4. b
5. a
6. a
7. b
8. c
9. c
10. a

View File

@ -0,0 +1,35 @@
---
title: ECE09488 Assignment 6
author: Aidan Sharpe
date: May 2nd 2025
---
### 1. Which type of scan provides the most in-depth view of system misconfigurations?
b. Credentialed scan
### 2. Your credentialed scan revealed a known vulnerability in a recently updated application that is widely used across the company. Where can you get information on your companys policies for how to reconfigure the application to close the vulnerability?
d. Risk register
### 3. How should you decide which security configurations to apply in a cloud deployment?
d. Use all available security tools for each layer
### 4. What security technique can you use to control traffic to a web server separately from traffic control for the website database?
b. Micro-segmentation
### 5. Which of the following security rules would allow an incoming Echo Reply on a stateful firewall?
a. Outbound rule: ICMP Allow to 0.0.0.0/0
### 6. Which security appliance can be used to secure an LMS (learning management system) application with some components deployed in a public cloud platform and some components deployed on-prem?
a. ADC
### 7. Which protocol provides the best encryption for data in transit over a Wi-Fi network?
b. AES
### 8. Which security tool can you use to find security vulnerabilities in forgoten EC2 instances?
c. EDR
### 9.
c. ADC
### 10. Suppose you are running an application secured by client-side encryption and you receive an error stating CLUSTER_NOT_FOUND. Which of the following problems is most likely the source of the issue?
a. Deleted key store

View File

@ -0,0 +1,16 @@
---
title: ECE09488 Assignment 8
author: Aidan Sharpe
date: May 2nd 2025
---
1. c
2. d
3. a
4. c
5. c
6. b
7. b
8. d
9. b c
10. c

View File

@ -0,0 +1,36 @@
---
title: ECE09488 Assignment 8
author: Aidan Sharpe
date: May 2nd 2025
---
### 1. Which RAID type performs parity calculations using two different algorithms?
c. Raid 10
### 2. Which type of cloud storage would be the best fit for storing medical X-rays?
d. Object
### 3. Which language is used to ask questions of a database?
a. SQL
### 4. What effect does enabling versioning have on your cloud storage?
c. Increases cost
### 5. Which data lifecycle state is complicated by data redundancies?
c. Destruction
### 6. What cloud technology can increase the speed of compute processes in smart cars?
b. Edge computing
### 7. What kind of data is best stored in a nonrelational database?
b. Unstructured data
### 8. What kind of storage volume only exists in connection with a VM instance?
d. Elastic
### 9. If you only need one ISP connection to support your network's regular internet communications, which one of the following redundancy levels would reflect your having two ISP connections? Choose two.
b. 2N
c. N+1
### 10. Suppose you make a full backup the first Sunday of each month, a differential backup on each of the other Sundays, and an incremental backup every Tuesday and Thursday. Today is the 12th, which is the second Wednesday of this month. Which files (using the latest version available for each) would need to be combined to create a current synthetic full backup?
c. One full backup, one differential backup, and one incremental backup

View File

@ -0,0 +1,16 @@
---
title: ECE09488 Assignment #9
author: Aidan Sharpe
date: April 17th, 2025
---
1. d
2. c
3. d
4. a
5. c
6. a
7. b
8. c
9. a
10. a

View File

@ -0,0 +1,35 @@
---
title: ECE09488 Assignment #9
author: Aidan Sharpe
date: April 17th, 2025
---
### 1. Which CPU utilization measurement most likely does NOT indicate a problem?
d. 5 percent
### 2. Which CPU utilization measurement most likely does NOT indicate a problem?
c. Showback model
### 3. When you create a tag called Project on all your EC2 instances, what kind of tagging are you using?
d. Explicit
### 4. Which visualization would be the best fit for a KPI whose status fluctuates significantly and quickly?
a. Dial
### 5. Which of the following is NOT defined by syslog?
c. Message security
### 6. How can you get deeper insight into your VM servers OS metrics?
a Configure logging
### 7. Which of the following problems is caused by CSP-side configurations?
b. Auto-scaling configuration
### 8. Which tool can monitor cloud traffic across all resources hosted in a VPC?
c. Packet broker
### 9. Which syslog severity level would be appropriate for an event that reports the catastrophic failure of a critical web server?
a. 1
### 10. What information can help you determine where to set an alarms threshold?
a. Alert severity level