Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: takeit60

CV0-004 CompTIA Cloud+ Questions and Answers

Questions 4

A cloud administrator deploys new VMs in a cluster and discovers they are getting IP addresses in the range of 169.254.0.0/16. Which of the following is the most likely cause?

Options:

A.

The scope has been exhausted.

B.

The network is overlapping.

C.

The VLAN is missing.

D.

The NAT is Improperly configured.

Buy Now
Questions 5

A social networking company operates globally. Some users from Brazil and Argentina are reporting the following error: website address was not found. Which of the following is the most likely cause of this outage?

Options:

A.

Client DNS misconfigutation

B.

Regional DNS provider outage

C.

DNS server misconfiguration

D.

DNS propagation issues

Buy Now
Questions 6

A company requests that its cloud administrator provision virtual desktops for every user. Given the following information:

• One hundred users are at the company.

• A maximum of 30 users work at the same time.

• Users cannot be interrupted while working on the desktop.

Which of the following strategies will reduce costs the most?

Options:

A.

Provisioning VMs of varying sizes to match user needs

B.

Configuring a group of VMs to share with multiple users

C.

Using VMs that have spot availability

D.

Setting up the VMs to turn off outside of business hours at night

Buy Now
Questions 7

A manager wants information about which users signed in to a certain VM during the past month. Which of the following can the cloud administrator use to obtain this information?

Options:

A.

Retention

B.

Alerting

C.

Aggregation

D.

Collection

Buy Now
Questions 8

An administrator is setting up a cloud backup solution that requires the following features:

• Cost effective

• Granular recovery

• Multilocation

Which of the following backup types best meets these requirements?

Options:

A.

Off-site, full, incremental, and differential

B.

Cloud site, full, and differential

C.

On-site. full, and incremental

D.

On-site. full, and differential

Buy Now
Questions 9

Which of the following compute resources is the most optimal for running a single scripted task on a schedule?

Options:

A.

Bare-metal server

B.

Managed container

C.

Virtual machine

D.

Serverless function

Buy Now
Questions 10

A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned. Which of the following

scripts should the systems administrator use to achieve this goal?

Options:

A.

RESPONSE_CODE }

string APP_URL

bool RESPONSE_CODE

string VM

health checker (APP_URL, VM) {

if [ http_probe (APP_URL) == 200] {

echo RESPONSE_CODE }

else{

stop (VM)

echo

B.

else{

echo

string APP_URL

float RESPONSE_CODE

string VM

health_checker (APP_URL, VM) {

if [ http_probe (APP_URL) == 200] {

stop (RESPONSE_CODE)

echo VM }

stop (VM)

RESPONSE CODE }

C.

else{

echo

string APP_URL

int RESPONSE CODE

string VM

health checker (APP_URL, VM) {

if [ http_probe (APP_URL) == 200] {

echo RESPONSE_CODE }

stop (VM)

RESPONSE_CODE }

D.

else{

echo

string APP_URL

int RESPONSE_CODE

string VM

health_checker (APP_URL, VM) {

if [ http_probe (VM) == 200] {

stop (VM)

echo RESPONSE_CODE }

RESPONSE CODE }

Buy Now
Questions 11

A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following

delivery mechanisms would best support this integration?

Options:

A.

Enterprise service bus

B.

Socket

C.

RPC

D.

Queue

Buy Now
Questions 12

A video surveillance system records road incidents and stores the videos locally before uploading them to the cloud and deleting them from local storage. Which of the following

best describes the nature of the local storage?

Options:

A.

Persistent

B.

Ephemeral

C.

Differential

D.

Incremental

Buy Now
Questions 13

An organization's internal security team mandated that public cloud resources must be accessible only by a corporate VPN and not by direct public internet access. Which of the

following would achieve this objective?

Options:

A.

WAF

B.

ACL

C.

VPC

D.

SSH

Buy Now
Questions 14

A systems administrator notices a surge of network traffic is coming from the monitoring server. The administrator discovers that large amounts of data are being downloaded to an external source. While investigating, the administrator reviews the following logs:

Which of the following ports has been compromised?

Options:

A.

Port 20

B.

Port 22

C.

Port 443

D.

Port 4443

E.

Port 8048

Buy Now
Questions 15

A developer is testing code that will be used to deploy a web farm in a public cloud. The main code block is a function to create a load balancer and a loop to create 1.000 web servers, as shown below:

The developer runs the code against the company's cloud account and observes that the load balancer is successfully created, but only 100 web servers have been created. Which of the following should the developer do to fix this issue?

Options:

A.

Request an increase of Instance quota.

B.

Run the code multiple times until all servers are created.

C.

Check the my_web_server () function to ensure it is using the right credentials.

D.

Place the my_load_balancer () function after the loop.

Buy Now
Questions 16

A cloud security analyst is investigating the impact of a recent cyberattack. The analyst is reviewing the following information:

Web server access log:

104.210.233.225 - - [21/10/2022:11:17: 40] "POST /uploadfile.html?f=myfile.php" 200 1638674

45.32.10.66 - - [21/10/2022:11:19:12] "GET /welcome.html" 200 5812

104.210.233.225 - - [21/10/2022:11:21:19] "GET / .. / .. / .. / .. /conf/server.xml HTTP/1.1" 200 74458

45.32.10.66 - - [21/10/22:11:22:32] "GET /admin.html HTTP/1.1" 200 9518

Web application firewall log:

"2022/10/21 11:17:33" "10.25.2.35" "104. 210.233.225" "userl" "File transfer completed successfully."

"2022/10/21 11:21:05" "10. 25.2. 35" "104. 210.233.225" "userl" "Accessed application page."

"2022/10/21 11:22:13" "10.25.2.35" "45. 32. 10. 66" "user2" "Accessing admin page. "

Which of the following has occurred?

Options:

A.

The corporate administration page was defaced by the attacker.

B.

A denial-of-service attack was successfully performed on the web server.

C.

A new user was created on the web server by the attacker.

D.

Sensitive information from the corporate web server was leaked.

Buy Now
Questions 17

A DevOps engineer is performing maintenance on the mail servers for a company's web application. Part of this maintenance includes checking core operating system updates. The servers are currently running version 3.2 of the operating system. The engineer has two update options—one to version 4.1 and the other to version 3.7. Both versions are fully supported by the operating system manufacturer. Which of the following best describes the action the engineer should take?

Options:

A.

Upgrade to 3.7 in the development environment.

B.

Upgrade to 4.1 on one production server at a time.

C.

Read the release notes on version 4.1.

D.

Schedule a maintenance window and upgrade to 3.7 in the production environment.

Buy Now
Questions 18

An administrator used a script that worked in the past to create and tag five virtual machines. All of the virtual machines have been created: however, the administrator sees the following results:

{ tags: [ ] }

Which of the following is the most likely reason for this result?

Options:

A.

API throttling

B.

Service quotas

C.

Command deprecation

D.

Compatibility issues

Buy Now
Questions 19

Which of the following best explains the concept of migrating from on premises to the cloud?

Options:

A.

The configuration of a dedicated pipeline to transfer content to a remote location

B.

The creation of virtual instances in an external provider to transfer operations of selected servers into a new. remotely managed environment

C.

The physical transportation, installation, and configuration of company IT equipment in a cloud services provider's facility

D.

The extension of company IT infrastructure to a managed service provider

Buy Now
Questions 20

A cloud administrator needs to distribute workloads across remote data centers for redundancy reasons. Which of the following deployment strategies would eliminate downtime, accelerate deployment, and remain cost efficient?

Options:

A.

In-place

B.

Rolling

C.

Blue-green

D.

Canary

Buy Now
Questions 21

Which of the following storage resources provides higher availability and speed for currently used files?

Options:

A.

Warm/HDD

B.

Cold/SSD

C.

Hot/SSD

D.

Archive/HDD

Buy Now
Questions 22

An administrator is creating a cron job that shuts down the virtual machines at night to save on costs. Which of the following is the best way to achieve this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 23

A cloud solution needs to be replaced without interruptions. The replacement process can be completed in phases, but the cost should be kept as low as possible. Which of the

following is the best strategy to implement?

Options:

A.

Blue-green

B.

Rolling

C.

In-place

D.

Canary

Buy Now
Questions 24

A cloud administrator is building a company-standard VM image, which will be based on a public image. Which of the following should the administrator implement to secure the image?

Options:

A.

ACLs

B.

Least privilege

C.

Hardening

D.

Vulnerability scanning

Buy Now
Questions 25

An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements:

• Is simple and fast

• Can be performed on two Identical platforms

Which of the following strategies should the engineer use?

Options:

A.

Blue-green

B.

Canary

C.

Rolling

D.

in-place

Buy Now
Questions 26

A banking firm's cloud server will be decommissioned after a successful proof of concept using mirrored data. Which of the following is the best action to take regarding the storage used on the decommissioned server?

Options:

A.

Keep it temporarily.

B.

Archive it.

C.

Delete it.

D.

Retain it permanently

Buy Now
Questions 27

A company recently set up a CDN for its photography and image-sharing website. Which of the following is the most likely reason for the company's action?

Options:

A.

To eliminate storage costs

B.

To improve site speed

C.

To enhance security of static assets

D.

To prevent unauthorized access

Buy Now
Questions 28

Which of the following communication methods between on-premises and cloud environments would ensure minimal-to-low latency and overhead?

Options:

A.

Site-to-site VPN

B.

Peer-to-peer VPN

C.

Direct connection

D.

peering

Buy Now
Questions 29

A company has developed an online trading platform. The engineering team selected event-based scaling for the platform's underlying resources. The platform resources scale up

with every 2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains

why this is the case?

Options:

A.

Event-based scaling does not scale down resources.

B.

Event-based scaling should not be triggered at the 2,000-user frequency.

C.

Event-based scaling should not track user subscriptions.

D.

Event-based scaling does not take resource load into account.

Buy Now
Questions 30

Which of the following is a field of computer science that enables computers to identify and understand objects and people in images and videos?

Options:

A.

Image reconstruction

B.

Facial recognition

C.

Natural language processing

D.

Computer vision

Buy Now
Questions 31

An administrator needs to provide a backup solution for a cloud infrastructure that enables the resources to run from another data center in case of a outage. Connectivity to the

backup data center is via a third-party, untrusted network. Which of the following is the most important feature required for this solution?

Options:

A.

Deduplication

B.

Replication

C.

Compression

D.

Encryption

E.

Labeling

Buy Now
Questions 32

A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?

Options:

A.

The company should have switched from object storage to file storage.

B.

The company should have hashed the data.

C.

The company should have changed the file access permissions.

D.

The company should have encrypted the data at rest.

Buy Now
Questions 33

A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?

Options:

A.

Analyze

B.

Report

C.

Remediation

D.

identification

Buy Now
Questions 34

Which of the following is used to deliver code quickly and efficiently across the development, test, and production environments?

Options:

A.

Snapshot

B.

Container image

C.

Serverless function

D.

VM template

Buy Now
Questions 35

Which of the following types of storage provides the greatest performance advantage for a traditional relational database?

Options:

A.

File

B.

Object

C.

Block

D.

Ephemeral

Buy Now
Questions 36

A cloud engineer is designing a cloud-native, three-tier application. The engineer must adhere to the following security best practices:

• Minimal services should run on all layers of the stack.

• The solution should be vendor agnostic.

• Virealization could be used over physical hardware.

Which of the following concepts should the engineer use to design the system to best meet these requirements?

Options:

A.

Virtual machine

B.

Micro services

C.

Fan-out

D.

Cloud-provided managed services

Buy Now
Questions 37

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

Options:

A.

VPC

B.

Application load balancer

C.

CDN

D.

API gateway

Buy Now
Questions 38

A company has one cloud-based web server that is prone to downtime during maintenance. Which ot the following should the cloud engineer add to ensure high availability?

Options:

A.

A redundant web server behind a load balancer

B.

A backup cloud web server

C.

A secondary network link to the web server

D.

An autoscaling feature on the web server

Buy Now
Questions 39

Which of the following is the best type of database for storing different types of unstructured data that may change frequently?

Options:

A.

Vector

B.

Relational

C.

Non-relational

D.

Graph

Buy Now
Questions 40

A group of cloud administrators frequently uses the same deployment template to recreate a cloud-based development environment. The administrators are unable to go back and

review the history of changes they have made to the template. Which of the following cloud resource deployment concepts should the administrator start using?

Options:

A.

Drift detection

B.

Repeatability

C.

Documentation

D.

Versioning

Buy Now
Questions 41

A cloud engineer needs to determine a scaling approach for a payroll-processing solution that runs on a biweekly basis. Given the complexity of the process, the deployment to each

new VM takes about 25 minutes to get ready. Which of the following would be the best strategy?

Options:

A.

Horizontal

B.

Scheduled

C.

Trending

D.

Event

Buy Now
Questions 42

A cloud server needs to automatically allocate more resources during sudden peak times. This allocation does not need to occur in regular intervals. Which of the following scaling

approaches should be used?

Options:

A.

Event

B.

Manual

C.

Trending

D.

Scheduled

Buy Now
Questions 43

Which of the following are best practices when working with a source control system? (Select two).

Options:

A.

Merging code often

B.

Pushing code directly to production

C.

Performing code deployment

D.

Maintaining one branch for all features

E.

Committing code often

F.

Initiating a pull request

Buy Now
Questions 44

Department supervisors have requested a report that will help them understand the utilization of cloud resources, make decisions about budgeting for the following year, and reduce

costs. Which of the following are the most important requisite steps to create the report? (Select two).

Options:

A.

Set the desired retention of resource logs.

B.

Configure application tracing.

C.

Integrate email alerts with ticketing software.

D.

Enable resource tagging.

E.

Configure the collection of performance/utilization logs.

F.

Configure metric threshold alerts.

Buy Now
Questions 45

A customer relationship management application, which is hosted in a public cloud laaS network, is vulnerable to a remote command execution vulnerability. Which of the following is

the best solution for the security engineer to implement to prevent the application from being exploited by basic attacks?

Options:

A.

IPS

B.

ACL

C.

DLP

D.

WAF

Buy Now
Questions 46

The performance of an e-commerce website decreases dramatically during random periods. The IT team is evaluating available resources to mitigate the situation. Which of the following is the best approach to effectively manage this scenario'?

Options:

A.

Migrating to a dedicated host

B.

Purchasing additional servers

C.

Scheduling resource allocation

D.

Configuring automatic elasticity

Buy Now
Questions 47

Which of the following cloud deployment strategies is best for an organization that wants to run open-source workloads with other organizations that are sharing the cost?

Options:

A.

Community

B.

Public

C.

Hybrid

D.

Private

Buy Now
Questions 48

Users have been reporting that a remotely hosted application is not accessible following a recent migration. However, the cloud administrator is able to access the application from

the same site as the users. Which of the following should the administrator update?

Options:

A.

Cipher suite

B.

Network ACL

C.

Routing table

D.

Permissions

Buy Now
Questions 49

A cloud solutions architect is designing a VM-based solution that requires reducing the cost as much as possible. Which of the following solutions will best satisfy this requirement?

Options:

A.

Using ephemeral storage on replicated VMs

B.

Creating Spot VMs in one availability zone

C.

Spreading the VMs across different regions

D.

Using provisioned IOPS storage

Buy Now
Questions 50

An organization's web application experiences penodic bursts of traffic when a new video is launched. Users are reporting poor performance in the middle of the month. Which of the following scaling approaches should the organization use to scale based on forecasted traffic?

Options:

A.

Scheduled

B.

Manual

C.

Event

D.

Load

Buy Now
Questions 51

Which of the following is a difference between a SAN and a NAS?

Options:

A.

A SAN works only with fiber-based networks.

B.

A SAN works with any Ethernet-based network.

C.

A NAS uses a faster protocol than a SAN

D.

A NAS uses a slower protocol than a SAN.

Buy Now
Questions 52

A CI/CD pipeline is used to deploy VMs to an laaS environment. Which of the following can be used to harden the operating system once the VM is running?

Options:

A.

Docker

B.

Kubernetes

C.

Git

D.

Ansible

Buy Now
Questions 53

An IT security team wants to ensure that the correct parties are informed when a specific user account is signed in. Which of the following would most likely allow an administrator to address this concern?

Options:

A.

Creating an alert based on user sign-in criteria

B.

Aggregating user sign-in logs from all systems

C.

Enabling the collection of user sign-in logs

D.

Configuring the retention of all sign-in logs

Buy Now
Questions 54

A company's content management system (CMS) service runs on an laaS cluster on a public cloud. The CMS service is frequently targeted by a malicious threat actor using DDoS.

Which of the following should a cloud engineer monitor to identify attacks?

Options:

A.

Network flow logs

B.

Endpoint detection and response logs

C.

Cloud provider event logs

D.

Instance syslog

Buy Now
Questions 55

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

Options:

A.

Resource tagging

B.

Discretionary access control

C.

Multifactor authentication

D.

Role-based access control

E.

Token-based authentication

F.

Bastion host

Buy Now
Questions 56

A company experienced a data leak through its website. A security engineer, who is investigating the issue, runs a vulnerability scan against the website and receives the following output:

Which of the following is the most likely cause of this leak?

Options:

A.

RTMP port open

B.

SQL injection

C.

Privilege escalation

D.

Insecure protocol

Buy Now
Questions 57

Which of the following migration types is best to use when migrating a highly available application, which is normally hosted on a local VM cluster, for usage with an external user population?

Options:

A.

Cloud to on-premises

B.

Cloud to cloud

C.

On-premises to cloud

D.

On-premises to on-premises

Buy Now
Questions 58

Which of the following describes the main difference between public and private container repositories?

Options:

A.

Private container repository access requires authorization, while public repository access does not require authorization.

B.

Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.

C.

Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.

D.

Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.

Buy Now
Questions 59

A critical security patch is required on a network load balancer in a public cloud. The organization has a major sales conference next week, and the Chief Executive Officer does not want any interruptions during the demonstration of an application behind the load balancer. Which of the following approaches should the cloud security engineer take?

Options:

A.

Ask the management team to delay the conference.

B.

Apply the security patch after the event.

C.

Ask the upper management team to approve an emergency patch window.

D.

Apply the security patch immediately before the conference.

Buy Now
Questions 60

Which of the following technologies should be used by a person who is visually impaired to access data from the cloud?

Options:

A.

Object character recognition

B.

Text-to-voice

C.

Sentiment analysis

D.

Visual recognition

Buy Now
Questions 61

A company wants to implement a work environment that will have low operational overhead and highly accessible enterprise resource planning, email, and data resources. Which of

the following cloud service models should the company implement?

Options:

A.

laaS

B.

PaaS

C.

DBaaS

D.

SaaS

Buy Now
Questions 62

A cloud engineer is reviewing the following Dockerfile to deploy a Python web application:

Which of the following changes should the engineer make lo the file to improve container security?

Options:

A.

Add the instruction "JSER nonroot.

B.

Change the version from latest to 3.11.

C.

Remove the EHTRYPOIKT instruction.

D.

Ensure myapp/main.pyls owned by root.

Buy Now
Questions 63

An DevOps engineer is receiving reports that users can no longer access the company's web application after hardening of a web server. The users are receiving the following error:

ERR_SSLJ/ERSION_OR_CIPHER_MISMATCH.

Which of the following actions should the engineer take to resolve the issue?

Options:

A.

Restart the web server.

B.

Configure TLS 1.2 or newer.

C.

Update the web server.

D.

Review logs on the WAF

Buy Now
Exam Code: CV0-004
Exam Name: CompTIA Cloud+
Last Update: Apr 11, 2024
Questions: 213
CV0-004 pdf

CV0-004 PDF

$32  $80
CV0-004 Engine

CV0-004 Testing Engine

$38  $95
CV0-004 PDF + Engine

CV0-004 PDF + Testing Engine

$52  $130