Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CV0-004 CompTIA Cloud+ (V4) Questions and Answers

Questions 4

A banking firm's cloud server will be decommissioned after a successful proof of concept using mirrored data. Which of the following is the best action to take regarding the storage used on the decommissioned server?

Options:

A.

Keep it temporarily.

B.

Archive it.

C.

Delete it.

D.

Retain it permanently

Buy Now
Questions 5

A company's VMs that are created using the noncritical application tag are automatically shut down at 5:00 p.m. using a cronjob. Which of the following actions would allow a cloud engineer to stop all unresponsive instances with the least effort in case the automation fails?

Options:

A.

Using the cloud audit logs for tagging and stopping events

B.

Using the cloud provider web console to check and stop the instances

C.

Using the cloud provider command line to stop the Instances based on tags

D.

Using a Bash script to shut down all instances

Buy Now
Questions 6

A cloud engineer is troubleshooting a connectivity issue. The application server with IP 192.168.1.10 in one subnet is not connecting to the MySQL database server with IP 192.168.2 20 in a different subnet. The cloud engineer reviews the following information:

Application Server Stateful Firewall

Which of the following should the cloud engineer address lo fix the communication issue?

Options:

A.

The Application Server Stateful Firewall

B.

The Application Server Subnet Routing Table

C.

The MySQL Server Stateful Firewall

D.

The MySQL Server Subnet Routing Table

Buy Now
Questions 7

A cloud solutions architect is designing a VM-based solution that requires reducing the cost as much as possible. Which of the following solutions will best satisfy this requirement?

Options:

A.

Using ephemeral storage on replicated VMs

B.

Creating Spot VMs in one availability zone

C.

Spreading the VMs across different regions

D.

Using provisioned IOPS storage

Buy Now
Questions 8

A write-intensive workload is having frequent performance issues. The workload is running on pay-as-you-go VMs. These VMs use SSDs and have appropriate CPU and RAM sizes. The workload writes millions of small files and has a one-year retention requirement. Which of the following actions should be taken?

Options:

A.

Use provisioned IOPS volumes.

B.

Increase the VM size.

C.

Switch to reserved VMs.

D.

Change to ephemeral storage.

Buy Now
Questions 9

A cloud engineer is in charge of deploying a platform in an laaS public cloud. The application tracks the state using session cookies, and there are no affinity restrictions. Which of

the following will help the engineer reduce monthly expenses and allow the application to provide the service?

Options:

A.

Resource metering

B.

Reserved resources

C.

Dedicated host

D.

Pay-as-you-go model

Buy Now
Questions 10

Servers in the hot site are clustered with the main site.

Options:

A.

Network traffic is balanced between the main site and hot site servers.

B.

Offline server backups are replicated hourly from the main site.

C.

All servers are replicated from the main site in an online status.

D.

Which of the following best describes a characteristic of a hot site?

Buy Now
Questions 11

Which of the following describes the main difference between public and private container repositories?

Options:

A.

Private container repository access requires authorization, while public repository access does not require authorization.

B.

Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.

C.

Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.

D.

Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.

Buy Now
Questions 12

For compliance purposes, a cloud developer at an insurance company needs to save all customer policies for more than ten years. Which of the following options is the most cost-

efficient tier to save the data in the cloud?

Options:

A.

Archive

B.

Hot

C.

Cold

D.

Warm

Buy Now
Questions 13

An engineer wants lo scale several cloud workloads on demand. Which of the following approaches is the most suitable?

Options:

A.

Load

B.

Scheduled

C.

Manual

D.

Trending

Buy Now
Questions 14

A software engineer is integrating an application lo The cloud that is web socket based. Which of the following applications is the engineer most likely deploying?

Options:

A.

Image-sharing

B.

Data visualization

C.

Chat

D.

File transfer

Buy Now
Questions 15

Two CVEs are discovered on servers in the company's public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which

of the following actions would be the best way to mitigate the vulnerabilities?

Options:

A.

Patching the operating systems

B.

Upgrading the operating systems to the latest beta

C.

Encrypting the operating system disks

D.

Disabling unnecessary open ports

Buy Now
Questions 16

An organization's web application experiences penodic bursts of traffic when a new video is launched. Users are reporting poor performance in the middle of the month. Which of the following scaling approaches should the organization use to scale based on forecasted traffic?

Options:

A.

Scheduled

B.

Manual

C.

Event

D.

Load

Buy Now
Questions 17

Which of the following is the correct order of the steps to take when a system is suspected of being vulnerable?

Options:

A.

Scanning scope, identification, assessment, and remediation

B.

Assessment, identification, scanning scope, and remediation

C.

Identification, scanning scope, assessment, and remediation

D.

Assessment, scanning scope, identification, and remediation

Buy Now
Questions 18

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

INSTRUCTIONS

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

Web app 1

Web app 2

Web app 3

Web app 4

Client app

Options:

Buy Now
Questions 19

A cloud engineer is concerned about command-and-control (C2) communication leaving a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify this type of communication?

Options:

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron jobs listing connections

D.

Traffic mirroring

Buy Now
Questions 20

Once a change has been made to templates, which of the following commands should a cloud architect use next to deploy an laaS platform?

Options:

A.

git pull

B.

git fetch

C.

git commit

D.

git push

Buy Now
Questions 21

A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:

secure connectivity that minimizes user login

tracks user activity and monitors for anomalous activity

requires secondary authentication

INSTRUCTIONS

Select controls and servers for the proper control points.

Options:

Buy Now
Questions 22

A cloud engineer hardened the WAF for a company that operates exclusively in North America. The engineer did not make changes to any ports, and all protected applications have

continued to function as expected. Which of the following configuration changes did the engineer most likely apply?

Options:

A.

The engineer implemented MFA to access the WAF configurations.

B.

The engineer blocked all traffic originating outside the region.

C.

The engineer installed the latest security patches on the WAF.

D.

The engineer completed an upgrade from TLS version 1.1 to version 1.3.

Buy Now
Questions 23

An administrator received a report that company data has been compromised. The compromise occurred on a holiday, and no one in the organization was working. While reviewing

the logs from the holiday, the administrator noted the following details:

The most appropriate action for the cloud security analyst to recommend is using CIS-hardened images. These images are pre-configured by the Center for Internet Security to provide security benchmark standards that help in mitigating vulnerabilities in publicly available container images. References: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Security Posture

Which of the following accounts should the administrator disable to prevent a further breach?

Options:

A.

Cloud administrator

B.

Human resources manager

C.

Security engineer

D.

Software developer

Buy Now
Questions 24

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

Options:

A.

VPC

B.

Application load balancer

C.

CDN

D.

API gateway

Buy Now
Questions 25

Which of the following interfaces is most commonly used for SSDs but not for HDDs?

Options:

A.

NVMe

B.

Serial Attached SCSI (SAS)

C.

SATA

D.

iSCSI

Buy Now
Questions 26

Which of the following provides secure, private communication between cloud environments without provisioning additional hardware or appliances?

Options:

A.

VPN

B.

VPC peering

C.

BGP

D.

Transit gateway

Buy Now
Questions 27

A cloud service provider requires users to migrate to a new type of VM within three months. Which of the following is the best justification for this requirement?

Options:

A.

Security flaws need to be patched.

B.

Updates could affect the current state of the VMs.

C.

The cloud provider will be performing maintenance of the infrastructure.

D.

The equipment is reaching end of life and end of support.

Buy Now
Questions 28

A cloud administrator is working on the deployment of an e-commerce website. The administrator evaluates the scaling methods to be implemented when seasonal or flash sales are launched. Which of the following scaling approaches should the administrator use to best manage this scenario?

Options:

A.

Manually

B.

Load

C.

Event

D.

Trending

Buy Now
Questions 29

A company's engineering department is conducting a month-long test on the scalability of an in-house-developed software that requires a cluster of 100 or more servers. Which of

the following models is the best to use?

Options:

A.

PaaS

B.

SaaS

C.

DBaaS

D.

laaS

Buy Now
Questions 30

Which of the following should be used on containers to process data and keep the output in files for later review?

Options:

A.

Standard output

B.

Optical disk mount

C.

Ephemeral storage

D.

Persistent volumes

Buy Now
Questions 31

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

Options:

A.

Splicing

B.

Rotation

C.

Sampling

D.

Inspection

Buy Now
Questions 32

An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?

Options:

A.

Warm

B.

Hot

C.

Archive

D.

Cold

Buy Now
Questions 33

A cloud engineer is exploring options to reduce the management overhead of the servers and network. Which of the following cloud service models should the engineer implement?

Options:

A.

SaaS

B.

XaaS

C.

PaaS

D.

laaS

Buy Now
Questions 34

A healthcare organization must follow strict compliance requirements to ensure that Pll is not leaked. The cloud administrator needs to ensure the cloud email system can support this requirement Which of the following should the organization enable?

Options:

A.

IPS

B.

OLP

C.

ACL

D.

WAF

Buy Now
Questions 35

A company migrated its CRM system to a SaaS solution. The security team is updating the RAG matrix for the newly migrated CRM. Given the following table:

Which of the following responsibility assignments best aligns with the shared responsibility model for the new CRM?

Options:

A.

Data-center security

B.

CRM software security

C.

CRM server patching

D.

CRM development life cycle

Buy Now
Questions 36

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to

calculate the severity of the risk from using this component?

Options:

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

Buy Now
Questions 37

Which of the following do developers use to keep track of changes made during software development projects?

Options:

A.

Code drifting

B.

Code control

C.

Code testing

D.

Code versioning

Buy Now
Questions 38

Given the following command:

Sdocker pull images.comptia.org/user1/myimage:latest

Which of the following correctly identifies images.comptia.org?

Options:

A.

Image registry

B.

Image creator

C.

Image version

D.

Image name

Buy Now
Questions 39

A systems engineer tries to mount an iSCSI LUN to a VM host in a data center, but the host does not discover any iSCSI targets. A sample of the switch configuration is shown in the following image:

Which of the following configuration changes would most likely resolve the discovery issues?

Options:

A.

Disabling GigabitEthernet 1/0/7

B.

Changing the MTU on GigabitEthernet 1/0/2

C.

Changing the access VLAN for GigabitEthernet 1/0/2 to 25

D.

Enabling jumbo frames on GigabitEthernet 1/0/6 and GigabitEthernet 1/0/7

Buy Now
Questions 40

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

Options:

A.

Resource tagging

B.

Discretionary access control

C.

Multifactor authentication

D.

Role-based access control

E.

Token-based authentication

F.

Bastion host

Buy Now
Questions 41

A manager wants information about which users signed in to a certain VM during the past month. Which of the following can the cloud administrator use to obtain this information?

Options:

A.

Retention

B.

Alerting

C.

Aggregation

D.

Collection

Buy Now
Questions 42

A cloud engineer is reviewing the following Dockerfile to deploy a Python web application:

Which of the following changes should the engineer make lo the file to improve container security?

Options:

A.

Add the instruction "JSER nonroot.

B.

Change the version from latest to 3.11.

C.

Remove the EHTRYPOIKT instruction.

D.

Ensure myapp/main.pyls owned by root.

Buy Now
Questions 43

A government agency in the public sector is considering a migration from on premises to the cloud. Which of the following are the most important considerations for this cloud migration? (Select two).

Options:

A.

Compliance

B.

laaS vs. SaaS

C.

Firewall capabilities

D.

Regulatory

E.

Implementation timeline

F.

Service availability

Buy Now
Questions 44

A company wants to implement a work environment that will have low operational overhead and highly accessible enterprise resource planning, email, and data resources. Which of

the following cloud service models should the company implement?

Options:

A.

laaS

B.

PaaS

C.

DBaaS

D.

SaaS

Buy Now
Questions 45

Which of the following industry standards mentions that credit card data must not be exchanged or stored in cleartext?

Options:

A.

CSA

B.

GDPR

C.

SOC2

D.

PCI-DSS

Buy Now
Questions 46

Which of the transfer when comparing a multiregional to a single-region cloud platform design?

Options:

A.

Storage

B.

Power and cooling

C.

Network

D.

Compliance and regulation

Buy Now
Questions 47

An e-commerce store is preparing for an annual holiday sale. Previously, this sale has increased the number of transactions between two and ten times the normal level of

transactions. A cloud administrator wants to implement a process to scale the web server seamlessly. The goal is to automate changes only when necessary and with minimal cost.

Which of the following scaling approaches should the administrator use?

Options:

A.

Scale horizontally with additional web servers to provide redundancy.

B.

Allow the load to trigger adjustments to the resources.

C.

When traffic increases, adjust the resources using the cloud portal.

D.

Schedule the environment to scale resources before the sale begins.

Buy Now
Questions 48

A cloud engineer is concerned about command-and-control (C2) communication out of a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify the type of communication?

Options:

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron listing connections

D.

Traffic mirroring

Buy Now
Questions 49

An administrator configures three subnets to the corporate network. All servers should communicate with the main corporate network and access the internet. The administrator creates the following configurations:

After configuring the networks, the administrator recognizes an issue with the configuration. Which of the following can the administrator change in one step to accomplish the goal?

Options:

A.

Remove source 192.168.12.0/24 and destination 192.168.1.0/24 from the routing table.

B.

Replace destination 192.168.1.0/24 with destination 192.168.0.0/24.

C.

Add source 192.168.12.0/24 and destination 192.168.0.0/24 to the routing table.

D.

Reconfigure Network 4 to 192.168.13.0/24.

Buy Now
Questions 50

A company operates a website that allows customers to upload, share, and retain full ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

Options:

A.

Sovereignty

B.

Data classification

C.

Litigation holds

D.

Retention

Buy Now
Questions 51

A cloud engineer creates an IaC repository to deploy an application to a specific region. The cloud engineer receives a new request to deploy the same application to ten different regions. Which of the following options best fulfills this new request?

Options:

A.

Create a branch for each new region in the current repository and configure the CI/CD pipeline to deploy them.

B.

Create a new Git repository for each new region and configure the CI/CD pipeline to deploy them.

C.

Create a branch for each new region in the current repository as configuration-as-code (CaC), and use IaC to deploy the application.

D.

Create variable files for each new region in the current repository as configuration-as-code (CaC), and use IaC to deploy the application.

Buy Now
Questions 52

A cloud engineer is developing an operating expense report that will be used to purchase various cloud billing models for virtual machine instances. The cloud billing model must meet the following requirements:

• The instance cannot be ephemeral.

• The minimum life cycle of the instance is expected to be five years.

• The software license is charged per physical CPU count.

Which of the following models would best meet these requirements?

Options:

A.

Dedicated host

B.

Spot instance

C.

Pay-as-you-go

D.

Reserved resources

Buy Now
Questions 53

Which of the following describes what CRUD is typically used for?

Options:

A.

Relational databases

B.

Time series databases

C.

Graph databases

D.

NoSQL databases

Buy Now
Questions 54

A security team recently hired multiple interns who all need the same level of access. Which of the following controls should the security team implement to provide access to the

cloud environment with the least amount of overhead?

Options:

A.

MFA

B.

Discretionary access

C.

Local user access

D.

Group-based access control

Buy Now
Questions 55

A company has ten cloud engineers working on different manual cloud deployments. In the past, engineers have had difficulty keeping deployments consistent. Which of the following is the best method to address this issue?

Options:

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Buy Now
Questions 56

A cloud administrator needs to collect process-level, memory-usage tracking for the virtual machines that are part of an autoscaling group. Which of the following is the best way to

accomplish the goal by using cloud-native monitoring services?

Options:

A.

Configuring page file/swap metrics

B.

Deploying the cloud-monitoring agent software

C.

Scheduling a script to collect the data

D.

Enabling memory monitoring in the VM configuration

Buy Now
Questions 57

Which of the following refers to the idea that data should stay within certain borders or territories?

Options:

A.

Data classification

B.

Data retention

C.

Data sovereignty

D.

Data ownership

Buy Now
Questions 58

Which of the following cloud deployment strategies is best for an organization that wants to run open-source workloads with other organizations that are sharing the cost?

Options:

A.

Community

B.

Public

C.

Hybrid

D.

Private

Buy Now
Questions 59

A cloud developer resigned from an organization and gave a two-week notice. Within the first week since the developer resigned, a security analyst identifies large volumes of file downloads to the developer’s laptop from the source code repository. Which of the following security controls is the best way to mitigate the organization’s risk of data loss?

Options:

A.

Implementing a policy to stop cloud developers from sharing passwords

B.

Preventing cloud developers from accessing the source code repository

C.

Updating outbound firewall rules to block the cloud developer’s IP address

D.

Blocking internet access for employees who resign from the organization

E.

Prohibiting files on the local drive from being transferred to USB drives

Buy Now
Questions 60

Which of the following is the most cost-effective way to store data that is infrequently accessed?

Options:

A.

Cold site

B.

Hot site

C.

Off-site

D.

Warm site

Buy Now
Questions 61

A cloud administrator deploys new VMs in a cluster and discovers they are getting IP addresses in the range of 169.254.0.0/16. Which of the following is the most likely cause?

Options:

A.

The scope has been exhausted.

B.

The network is overlapping.

C.

The VLAN is missing.

D.

The NAT is Improperly configured.

Buy Now
Questions 62

A customer's facility is located in an area where natural disasters happen frequently. The customer requires the following:

• Data resiliency due to exposure to frequent natural disasters

• Data localization because of privacy regulations in the country

• High availability

Which of the following cloud resources should be provisioned to meet these requirements?

Options:

A.

Storage in a separate data center located in same region

B.

An on-premises private cloud carrying duplicate data

C.

Storage in an availability zone outside the region

D.

Storage in the same availability zone as the primary data

Buy Now
Questions 63

Which of the following requirements are core considerations when migrating a small business's on-premises applications to the cloud? (Select two).

Options:

A.

Availability

B.

Hybrid

C.

Testing

D.

Networking

E.

Compute

F.

Logs

Buy Now
Questions 64

A cloud architect attempts to modify a protected branch but is unable to do so. The architect receives an error indicating the action cannot be completed. Which of the following should the architect try instead''

Options:

A.

Adding a new remote

B.

Creating a pull request

C.

Merging the branch

D.

Rebasing the branch

Buy Now
Questions 65

A cloud server needs to automatically allocate more resources during sudden peak times. This allocation does not need to occur in regular intervals. Which of the following scaling

approaches should be used?

Options:

A.

Event

B.

Manual

C.

Trending

D.

Scheduled

Buy Now
Questions 66

Which of the following is the most cost-effective and efficient strategy when migrating to the cloud?

Options:

A.

Retire

B.

Replatform

C.

Retain

D.

Refactor

Buy Now
Questions 67

A cloud administrator is working on the deployment of an e-commerce website. The administrator evaluates the scaling methods to be implemented when seasonal or flash sales are launched. Which of the following scaling approaches should the administrator use to best manage this scenario?

Options:

A.

Scheduled

B.

Load

C.

Event

D.

Trending

Buy Now
Questions 68

Which of the following can reduce the risk of CI/CD pipelines leaking secrets?

Options:

A.

Protected Git branches

B.

Use of a VM instead of containers

C.

Private image repositories

D.

Canary tests

Buy Now
Questions 69

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

Options:

A.

Rehost

B.

Rearchitect

C.

Refactor

D.

Retain

Buy Now
Questions 70

A cloud engineer wants to implement a disaster recovery strategy that:

. Is cost-effective.

. Reduces the amount of data loss in case of a disaster.

. Enables recovery with the least amount of downtime.

Which of the following disaster recovery strategies best describes what the cloud engineer wants to achieve?

Options:

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Buy Now
Questions 71

A social networking company operates globally. Some users from Brazil and Argentina are reporting the following error: website address was not found. Which of the following is the most likely cause of this outage?

Options:

A.

Client DNS misconfigutation

B.

Regional DNS provider outage

C.

DNS server misconfiguration

D.

DNS propagation issues

Buy Now
Questions 72

Five thousand employees always access the company's public cloud-hosted web application on a daily basis during the same time frame. Some users have been reporting performance issues while attempting to connect to the web application Which of the following is the best configuration approach to resolve this issue?

Options:

A.

Scale vertically based on a trend.

B.

Scale horizontally based on a schedule

C.

Scale vertically based on a load.

D.

Scale horizontally based on an event

Buy Now
Questions 73

A developer is building an application that has multiple microservices that need to communicate with each other. The developer currently manually updates the IP address of each service. Which of the following best resolves the communication issue and automates the process?

Options:

A.

Service discovery

B.

Fan-out

C.

Managed container services

D.

DNS

Buy Now
Questions 74

Which of the following is a field of computer science that enables computers to identify and understand objects and people in images and videos?

Options:

A.

Image reconstruction

B.

Facial recognition

C.

Natural language processing

D.

Computer vision

Buy Now
Questions 75

A developer at a small startup company deployed some code for a new feature to its public repository. A few days later, a data breach occurred. A security team investigated the

incident and found that the database was hacked. Which of the following is the most likely cause of this breach?

Options:

A.

Database core dump

B.

Hard-coded credentials

C.

Compromised deployment agent

D.

Unpatched web servers

Buy Now
Questions 76

A cloud engineer must update the company’s code repository, which is running on a VM, to the latest version. The engineer downloads and runs the latest update, which appears to be successful. Which of the following steps should the engineer take next?

Options:

A.

Back up the repository.

B.

Decommission the repository.

C.

Restore the repository.

D.

Test the repository functionality.

Buy Now
Exam Code: CV0-004
Exam Name: CompTIA Cloud+ (V4)
Last Update: Mar 30, 2026
Questions: 254
CV0-004 pdf

CV0-004 PDF

$25.5  $84.99
CV0-004 Engine

CV0-004 Testing Engine

$30  $99.99
CV0-004 PDF + Engine

CV0-004 PDF + Testing Engine

$40.5  $134.99