gaqm CCCP-001 Exam Questions

Questions for the CCCP-001 were updated on : Nov 21 ,2025

Page 1 out of 30. Viewing questions 1-15 out of 450

Question 1

A bare metal hypervisor runs:

  • A. On a virtual database server.
  • B. On a virtual machine.
  • C. Directly on a physical machine.
  • D. On top of another operating system.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

A security administrator is being hired to perform a penetration test of a third-party cloud provider
as part of an annual security audit. Which of the following is the FIRST step that must be performed?

  • A. Attempt known exploits
  • B. Scan for vulnerabilities
  • C. Research publicized incidents
  • D. Get written permission
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

A company has deployed a website which is mirrored at a secondary datacenter. Which of the
following should be changed to route users to the secondary datacenter in case of a primary site
failure?

  • A. Virtual address
  • B. DNS record
  • C. ARP table
  • D. Disaster recovery plan
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following would be used to advertise a public IP address on redundant WAN circuits?

  • A. BGP
  • B. UDP
  • C. OSPF
  • D. ICMP
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

An administrator deployed a VM that is hosting an internal website. Users report they are unable to
access the new website. Which of the following should the network administrator do to test whether
web traffic is being sent and received?

  • A. Browse to any website
  • B. Ping the VM’s IP address
  • C. Ping the VM’s loopback address
  • D. Telnet to port 80
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

A recently deployed VM is running a Human Resource (HR) application on the HR network.
Workstations in the accounting department can access the Internet and other accounting servers,
but are unable to ping the new VM. Which of the following must be enabled for the accounting
department to access this HR application?

  • A. The computers must be granted read rights to the VM.
  • B. Replace the accounting workgroup switch.
  • C. VLAN routing should be enabled on the router.
  • D. Disable port security on the HR workgroup switch.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

An administrator notices that the mouse does not perform as expected within a VM. Which of the
following might improve the performance of the mouse?

  • A. Install a 64-bit OS within the guest.
  • B. Enable USB port mapping.
  • C. Replace the mouse on the host server.
  • D. Install the virtualization guest software.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following can be used to enable out-of-band management of a Windows-based host?

  • A. IPMI
  • B. WMI
  • C. SMTP
  • D. SNMP
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

A system administrator is planning storage infrastructure to store backup copies of virtual machines
that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select
TWO).

  • A. SMB
  • B. RAW
  • C. EXT
  • D. FAT
  • E. NTFS
Answer:

C,E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 10

Which of the following, in conjunction with IPSec, can be configured to provide secure access to files
on a NAS?

  • A. iSCSI
  • B. CIFS
  • C. FCoE
  • D. SSH
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

An administrator is planning to implement multipathing for IP-based storage. Which of the following
protocols can be used in this configuration?

  • A. NFS
  • B. iSCSI
  • C. FC
  • D. FCoE
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

A company that provides IaaS to small business organizations needs to allow customers to control
the power state of their virtual machines. Which of the following should be implemented to
accomplish this task?

  • A. Grant limited access to the hypervisor management interface
  • B. Grant limited access to the host power managing infrastructure
  • C. Allow Wake-on-LAN packets on the firewall
  • D. Configure customer’s VMs to be in an always-on state
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

A company that provides cloud-based storage services wants to ensure that if underlying hard disk
drives are sent to the disposal facility, they will not contain any data in clear-text format. Which of
the following should be done to accomplish this task?

  • A. Implement degaussing
  • B. Ensure that ACLs are configured on users’ data
  • C. Implement full-disk encryption
  • D. Fill disk with random data before disposal
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following refers to the maximum amount of data that can be lost due to a system
failure?

  • A. MTBF
  • B. RTO
  • C. MTTR
  • D. RPO
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which of the following would be the FIRST thing to do after determining an upgrade is required for a
production application server?

  • A. Perform the upgrade
  • B. Notify the application users of the upgrade
  • C. Submit a change request
  • D. Schedule a maintenance window
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2