Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > CompTIA > CompTIA Cloud+ > CV0-004

CV0-004 CompTIA Cloud+ (2025) Question and Answers

Question # 4

A cloud engineer wants to implement a disaster recovery strategy that:

. Is cost-effective.

. Reduces the amount of data loss in case of a disaster.

. Enables recovery with the least amount of downtime.

Which of the following disaster recovery strategies best describes what the cloud engineer wants to achieve?

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Full Access
Question # 5

Which of the following best describes a program in the context of project management?

A.

It is a group of unrelated projects within an organization

B.

It is used to represent the daily activities of multiple projects

C.

It is a consolidation of related projects with a common goal

D.

It provides the definition of a project workload

Full Access
Question # 6

Which of the following are best practices when working with a source control system? (Select two).

A.

Merging code often

B.

Pushing code directly to production

C.

Performing code deployment

D.

Maintaining one branch for all features

E.

Committing code often

F.

Initiating a pull request

Full Access
Question # 7

A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

A.

Modifying the subnet mask to 255 255 254.0 for IT and operations departments

B.

Configuring static routing to allow access from each subnet to 10.1.40.1

C.

Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network

D.

Configuring static routing to allow access from 10.1.30.1 to each subnet

E.

Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee

F.

Modifying the subnet mask to 255.255.255.128 for the IT and operations departments

Full Access
Question # 8

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

A.

Setting up private development, public development, and testing environments

B.

Segregating environments for internal and external teams

C.

Configuring DDoS protection to mitigate the risk of downtime

D.

Using IAM and ACL in order to bolster DLP

Full Access
Question # 9

A developer is testing code that will be used to deploy a web farm in a public cloud. The main code block is a function to create a load balancer and a loop to create 1.000 web servers, as shown below:

The developer runs the code against the company's cloud account and observes that the load balancer is successfully created, but only 100 web servers have been created. Which of the following should the developer do to fix this issue?

A.

Request an increase of Instance quota.

B.

Run the code multiple times until all servers are created.

C.

Check the my_web_server () function to ensure it is using the right credentials.

D.

Place the my_load_balancer () function after the loop.

Full Access
Question # 10

Which of the following is the best type of database for storing different types of unstructured data that may change frequently?

A.

Vector

B.

Relational

C.

Non-relational

D.

Graph

Full Access
Question # 11

A company needs to deploy its own code directly in the cloud without provisioning additional infrastructure. Which of the following is the best cloud service model for the company to use?

A.

PaaS

B.

SaaS

C.

laaS

D.

XaaS

Full Access
Question # 12

Which of the following will best reduce the cost of running workloads while maintaining the same performance? (Select two).

A.

Instance size

B.

Tagging

C.

Reserved resources model

D.

Spot instance model

E.

Pay-as-you-go model

F.

Dedicated host model

Full Access
Question # 13

A systems administrator is configuring backups on a VM and needs the process to run as quickly as possible, reducing the bandwidth on the network during all times from Monday through Saturday. In the event of data corruption, the management team expects the mean time to recovery to be as low as possible. Which of the following backup methods can the administrator use to accomplish these goals?

A.

Incremental backup daily to the cloud

B.

Full backup on Sunday and incremental backups on all other days of the week

C.

Differential backup daily to the cloud

D.

Incremental backups during off-hours on Monday, Wednesday, and Friday

Full Access
Question # 14

A developer is building a new application version using a CI/CD pipeline. The developer receives the following error message log when the build fails:

Which of the following is the most likely cause of this failure?

A.

Incorrect version

B.

Test case failure

C.

Broken build pipeline

D.

Dependency issue

Full Access
Question # 15

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to

calculate the severity of the risk from using this component?

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

Full Access
Question # 16

A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned. Which of the following

scripts should the systems administrator use to achieve this goal?

A.

RESPONSE_CODE }string APP_URLbool RESPONSE_CODEstring VMhealth checker (APP_URL, VM) {if [ http_probe (APP_URL) == 200] {echo RESPONSE_CODE }else{stop (VM)echo

B.

else{echostring APP_URLfloat RESPONSE_CODEstring VMhealth_checker (APP_URL, VM) {if [ http_probe (APP_URL) == 200] {stop (RESPONSE_CODE)echo VM }stop (VM)RESPONSE CODE }

C.

else{echostring APP_URLint RESPONSE CODEstring VMhealth checker (APP_URL, VM) {if [ http_probe (APP_URL) == 200] {echo RESPONSE_CODE }stop (VM)RESPONSE_CODE }

D.

else{echostring APP_URLint RESPONSE_CODEstring VMhealth_checker (APP_URL, VM) {if [ http_probe (VM) == 200] {stop (VM)echo RESPONSE_CODE }RESPONSE CODE }

Full Access
Question # 17

An administrator configures three subnets to the corporate network. All servers should communicate with the main corporate network and access the internet. The administrator creates the following configurations:

After configuring the networks, the administrator recognizes an issue with the configuration. Which of the following can the administrator change in one step to accomplish the goal?

A.

Remove source 192.168.12.0/24 and destination 192.168.1.0/24 from the routing table.

B.

Replace destination 192.168.1.0/24 with destination 192.168.0.0/24.

C.

Add source 192.168.12.0/24 and destination 192.168.0.0/24 to the routing table.

D.

Reconfigure Network 4 to 192.168.13.0/24.

Full Access
Question # 18

A user's assigned cloud credentials are locked, and the user is unable to access the project's application. The cloud administrator reviews the logs and notices several attempts to log in with the user's account were made to a different application after working hours. Which of the following is the best approach for the administrator to troubleshoot this issue?

A.

Create new credentials for the user and restrict access to the authorized application.

B.

Track the source of the log-in attempts and block the IP address of the source in the WAR

C.

Reset the user's account and implement a stronger lock-out policy.

D.

Install an IDS on the network to monitor suspicious activity

Full Access
Question # 19

A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?

A.

The company should have switched from object storage to file storage.

B.

The company should have hashed the data.

C.

The company should have changed the file access permissions.

D.

The company should have encrypted the data at rest.

Full Access
Question # 20

Which of the following service options would provide the best availability for critical applications in the event of a disaster?

A.

Edge computing

B.

Cloud bursting

C.

Availability zones

D.

Multicloud tenancy

Full Access
Question # 21

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these

requirements?

A.

Cloning

B.

Clustering

C.

Hardware passthrough

D.

Stand-alone container

Full Access
Question # 22

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

A.

VPC

B.

Application load balancer

C.

CDN

D.

API gateway

Full Access
Question # 23

A customer relationship management application, which is hosted in a public cloud laaS network, is vulnerable to a remote command execution vulnerability. Which of the following is

the best solution for the security engineer to implement to prevent the application from being exploited by basic attacks?

A.

IPS

B.

ACL

C.

DLP

D.

WAF

Full Access
Question # 24

A project manager is assigned to a project that has contracted with vendors. Which of the following actions should the project manager most frequently take? (Select two).

A.

Update the issue log

B.

Create a project charter

C.

Validate the status report

D.

Monitor performance

E.

Approve deliverables

F.

Baseline the project schedule

Full Access
Question # 25

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing

Full Access
Question # 26

Given the following command:

Sdocker pull images.comptia.org/user1/myimage:latest

Which of the following correctly identifies images.comptia.org?

A.

Image registry

B.

Image creator

C.

Image version

D.

Image name

Full Access
Question # 27

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

A.

Review the development network routing table.

B.

Change the ciphers on the site-to-site VPN.

C.

Restart the site-to-site VPN tunnel.

D.

Check the ACLS on the development workloads

Full Access
Question # 28

A cloud developer needs to update a REST API endpoint to resolve a defect. When too many users attempt to call the API simultaneously, the following message is displayed:

Error: Request Timeout - Please Try Again Later

Which of the following concepts should the developer consider to resolve this error?

A.

Server patch

B.

TLS encryption

C.

Rate limiting

D.

Permission issues

Full Access
Question # 29

A cloud administrator recently created three servers in the cloud. The goal was to create ACLs so the servers could not communicate with each other. The servers were configured

with the following IP addresses:

After implementing the ACLs, the administrator confirmed that some servers are still able to reach the other servers. Which of the following should the administrator change to

prevent the servers from being on the same network?

A.

The IP address of Server 1 to 172.16.12.36

B.

The IP address of Server 1 to 172.16.12.2

C.

The IP address of Server 2 to 172.16.12.18

D.

The IP address of Server 2 to 172.16.14.14

Full Access
Question # 30

Which of the following is an auditing procedure that ensures service providers securely manage the data to protect the interests of the organization and the privacy of its clients?

A.

CIS

B.

ITIL

C.

SOC2

D.

ISO 27001

Full Access
Question # 31

Which of the following best explains the concept of migrating from on premises to the cloud?

A.

The configuration of a dedicated pipeline to transfer content to a remote location

B.

The creation of virtual instances in an external provider to transfer operations of selected servers into a new. remotely managed environment

C.

The physical transportation, installation, and configuration of company IT equipment in a cloud services provider's facility

D.

The extension of company IT infrastructure to a managed service provider

Full Access
Question # 32

Users have been reporting that a remotely hosted application is not accessible following a recent migration. However, the cloud administrator is able to access the application from

the same site as the users. Which of the following should the administrator update?

A.

Cipher suite

B.

Network ACL

C.

Routing table

D.

Permissions

Full Access
Question # 33

A company has been using a CRM application that was developed in-house and is hosted on local servers. Due to internal changes, the company wants to migrate the application to the cloud without having to manage the infrastructure. Which of the following services should the company consider?

A.

SaaS

B.

PaaS

C.

XaaS

D.

laaS

Full Access
Question # 34

A company wants to create a few additional VDIs so support vendors and contractors have a secure method to access the company's cloud environment. When a cloud

administrator attempts to create the additional instances in the new locations, the operation is successful in some locations but fails in others. Which of the following is the

most likely reason for this failure?

A.

Partial service outages

B.

Regional service availability

C.

Service quotas

D.

Deprecation of functionality

Full Access
Question # 35

Which of the following would allow a cloud engineer to flatten a deeply nested JSON log to improve readability for analysts?

A.

Grafana

B.

Kibana

C.

Elasticsearch

D.

Logstash

Full Access
Question # 36

A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following

delivery mechanisms would best support this integration?

A.

Enterprise service bus

B.

Socket

C.

RPC

D.

Queue

Full Access
Question # 37

The company's IDS has reported an anomaly. The cloud engineer remotely accesses the cloud instance, runs a command, and receives the following information:

Which of the following is the most likely root cause of this anomaly?

A.

Privilege escalation

B.

Leaked credentials

C.

Cryptojacking

D.

Defaced website

Full Access
Question # 38

A cloud engineer wants containers to run the latest version of a container base image to reduce the number of vulnerabilities. The applications in use requite Python 3.10 and ate not compatible with any other version. The containers' images are created every time a new version is released from the source image. Given the container Dockerfile below:

Which of the following actions will achieve the objectives with the least effort?

A.

Perform docker pull before executing docker run.

B.

Execute docker update using a local cron to get the latest container version.

C.

Change the image to use python:latest on the image build process.

D.

Update the Dockerfile to pin the source image version.

Full Access
Question # 39

A cloud engineer is in charge of deploying a platform in an laaS public cloud. The application tracks the state using session cookies, and there are no affinity restrictions. Which of

the following will help the engineer reduce monthly expenses and allow the application to provide the service?

A.

Resource metering

B.

Reserved resources

C.

Dedicated host

D.

Pay-as-you-go model

Full Access
Question # 40

The project manager must create a project charter. Which of the following should be included in the charter?

A.

Project schedule

B.

Resource allocation

C.

Risk plan

D.

Stakeholder identification

Full Access
Question # 41

A government agency in the public sector is considering a migration from on premises to the cloud. Which of the following are the most important considerations for this cloud migration? (Select two).

A.

Compliance

B.

laaS vs. SaaS

C.

Firewall capabilities

D.

Regulatory

E.

Implementation timeline

F.

Service availability

Full Access
Question # 42

Which of the following is an intended outcome of a stand-up meeting?

A.

To identify team members for next tasks

B.

To identify future tasks

C.

To identify stakeholders for next tasks

D.

To identify blocking tasks

Full Access
Question # 43

A company has developed an online trading platform. The engineering team selected event-based scaling for the platform's underlying resources. The platform resources scale up

with every 2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains

why this is the case?

A.

Event-based scaling does not scale down resources.

B.

Event-based scaling should not be triggered at the 2,000-user frequency.

C.

Event-based scaling should not track user subscriptions.

D.

Event-based scaling does not take resource load into account.

Full Access
Question # 44

A cloud security analyst is investigating the impact of a recent cyberattack. The analyst is reviewing the following information:

Web server access log:

104.210.233.225 - - [21/10/2022:11:17: 40] "POST /uploadfile.html?f=myfile.php" 200 1638674

45.32.10.66 - - [21/10/2022:11:19:12] "GET /welcome.html" 200 5812

104.210.233.225 - - [21/10/2022:11:21:19] "GET / .. / .. / .. / .. /conf/server.xml HTTP/1.1" 200 74458

45.32.10.66 - - [21/10/22:11:22:32] "GET /admin.html HTTP/1.1" 200 9518

Web application firewall log:

"2022/10/21 11:17:33" "10.25.2.35" "104. 210.233.225" "userl" "File transfer completed successfully."

"2022/10/21 11:21:05" "10. 25.2. 35" "104. 210.233.225" "userl" "Accessed application page."

"2022/10/21 11:22:13" "10.25.2.35" "45. 32. 10. 66" "user2" "Accessing admin page. "

Which of the following has occurred?

A.

The corporate administration page was defaced by the attacker.

B.

A denial-of-service attack was successfully performed on the web server.

C.

A new user was created on the web server by the attacker.

D.

Sensitive information from the corporate web server was leaked.

Full Access
Question # 45

A project team is reviewing the project plan and related documents and identifies tasks that could be spread into smaller deliverables. Which of the following documents should the team edit first?

A.

Risk assessment

B.

Preliminary scope statement

C.

Work breakdown structure

D.

Milestone chart

Full Access
Question # 46

A security team recently hired multiple interns who all need the same level of access. Which of the following controls should the security team implement to provide access to the

cloud environment with the least amount of overhead?

A.

MFA

B.

Discretionary access

C.

Local user access

D.

Group-based access control

Full Access
Question # 47

A project manager is reviewing quality planning techniques. Which of the following involves comparing results of similar activities?

A.

Performing a cost-benefit analysis

B.

Defining metrics

C.

Benchmarking

D.

Brainstorming

Full Access
Question # 48

Which of the following best describes a benefit of the CI/CD process?

A.

Software delivery is sped up without compromising quality

B.

Incremental changes are done at the end of the project

C.

The software is integrated with other projects easily

D.

Updates are released every sprint

Full Access
Question # 49

Users report being unable to access an application that uses TLS 1.1. The users are able to access other applications on the internet. Which of the following is the most likely

reason for this issue?

A.

The security team modified user permissions.

B.

Changes were made on the web server to address vulnerabilities.

C.

Privileged access was implemented.

D.

The firewall was modified.

Full Access
Question # 50

A company wants to build its new platform using a public cloud. The workload requirements include the following:

• Implementation of custom CIS compliance

• Patch for vulnerabilities within 24 hours

• Warrant at least 1,800 IOPS per volume

Which of the following meets the requirements?

A.

SaaS

B.

laaS

C.

FaaS

D.

PaaS

Full Access
Question # 51

A project team is deciding how to break up a large project into smaller components so the project can be delivered without increasing the duration of the iteration cycles. Which of the following describes the grouping of the smaller components?

A.

An issue

B.

A goal

C.

A backlog item

D.

An epic

Full Access
Question # 52

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

INSTRUCTIONS

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

Web app 1

Web app 2

Web app 3

Web app 4

Client app

Full Access
Question # 53

Which of the following is the most cost-effective and efficient strategy when migrating to the cloud?

A.

Retire

B.

Replatform

C.

Retain

D.

Refactor

Full Access
Question # 54

An e-commerce company is migrating from an on-premises private cloud environment to

a public cloud IaaS environment. You are tasked with right-sizing the environment to

save costs after the migration. The company's requirements are to provide a 20% overhead above the average resource consumption, rounded up.

INSTRUCTIONS

Review the specifications and graphs showing resource usage for the web and database servers. Determine the average resource usage and select the correct specifications from the available drop-down options.

Full Access
Question # 55

Which of the following situations would require a project manager to revise the communication plan during a project's execution?

A.

A change is approved that impacts the project schedule and budget

B.

The test results are not as expected

C.

The team is unclear which meetings they should attend

D.

A stakeholder requests some changes to the scope

Full Access
Question # 56

Which of the following industry standards mentions that credit card data must not be exchanged or stored in cleartext?

A.

CSA

B.

GDPR

C.

SOC2

D.

PCI-DSS

Full Access
Question # 57

A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:

    secure connectivity that minimizes user login

    tracks user activity and monitors for anomalous activity

    requires secondary authentication

INSTRUCTIONS

Select controls and servers for the proper control points.

Full Access
Question # 58

A technician receives an email from a vendor who is requesting payment of an invoice for human resources services. The email contains a request for bank account numbers. Which of the following types of attacks does this behavior most likely indicate?

A.

MaIware

B.

Cryptojacking

C.

Ransomware

D.

Phishing

Full Access
Question # 59

Which of the following Al/ML technologies consumes text input to discern tone?

A.

Text recognition

B.

Computer vision

C.

Visual recognition

D.

Sentiment analysis

Full Access
Question # 60

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

A.

Splicing

B.

Rotation

C.

Sampling

D.

Inspection

Full Access
Question # 61

An administrator needs to adhere to the following requirements when moving a customer's data to the cloud:

• The new service must be geographically dispersed.

• The customer should have local access to data

• Legacy applications should be accessible.

Which of the following cloud deployment models is most suitable?

A.

On-premises

B.

Private

C.

Hybrid

D.

Public

Full Access
Question # 62

Which of the following provides secure, private communication between cloud environments without provisioning additional hardware or appliances?

A.

VPN

B.

VPC peering

C.

BGP

D.

Transit gateway

Full Access
Question # 63

An engineer wants lo scale several cloud workloads on demand. Which of the following approaches is the most suitable?

A.

Load

B.

Scheduled

C.

Manual

D.

Trending

Full Access
Question # 64

A cloud engineer needs to determine a scaling approach for a payroll-processing solution that runs on a biweekly basis. Given the complexity of the process, the deployment to each

new VM takes about 25 minutes to get ready. Which of the following would be the best strategy?

A.

Horizontal

B.

Scheduled

C.

Trending

D.

Event

Full Access
Question # 65

A system surpasses 75% to 80% of resource consumption. Which of the following scaling approaches is the most appropriate?

A.

Trending

B.

Manual

C.

Load

D.

Scheduled

Full Access
Question # 66

Which of the following refers to the idea that data should stay within certain borders or territories?

A.

Data classification

B.

Data retention

C.

Data sovereignty

D.

Data ownership

Full Access
Question # 67

Which of the following types of storage provides the greatest performance advantage for a traditional relational database?

A.

File

B.

Object

C.

Block

D.

Ephemeral

Full Access
Question # 68

Five thousand employees always access the company's public cloud-hosted web application on a daily basis during the same time frame. Some users have been reporting performance issues while attempting to connect to the web application Which of the following is the best configuration approach to resolve this issue?

A.

Scale vertically based on a trend.

B.

Scale horizontally based on a schedule

C.

Scale vertically based on a load.

D.

Scale horizontally based on an event

Full Access
Question # 69

An IT manager needs to deploy a cloud solution that meets the following requirements:

. Users must use two authentication methods to access resources.

· Each user must have 10GB of storage space by default.

Which of the following combinations should the manager use to provision these requirements?

A.

OAuth 2.0 and ephemeral storage

B.

OIDC and persistent storage

C.

MFA and storage quotas

D.

SSO and external storage

Full Access
Question # 70

A cloud engineer is designing a cloud-native, three-tier application. The engineer must adhere to the following security best practices:

• Minimal services should run on all layers of the stack.

• The solution should be vendor agnostic.

• Virealization could be used over physical hardware.

Which of the following concepts should the engineer use to design the system to best meet these requirements?

A.

Virtual machine

B.

Micro services

C.

Fan-out

D.

Cloud-provided managed services

Full Access
Question # 71

During a project kickoff meeting, the project manager wants to set expectations for all of the team members. Which of the following actions should the project manager take to accomplish this goal?

A.

Assign tasks and responsibilities to the team members

B.

Provide an overview of the project objectives and timeline

C.

Develop a project communication plan

D.

Set a meeting cadence for the rest of the project

Full Access
Question # 72

A systems administrator needs to configure backups for the company's on-premises VM cluster. The storage used for backups will be constrained on free space until the company

can implement cloud backups. Which of the following backup types will save the most space, assuming the frequency of backups is kept the same?

A.

Snapshot

B.

Ful

C.

Differential

D.

Incremental

Full Access
Question # 73

Two CVEs are discovered on servers in the company's public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which

of the following actions would be the best way to mitigate the vulnerabilities?

A.

Patching the operating systems

B.

Upgrading the operating systems to the latest beta

C.

Encrypting the operating system disks

D.

Disabling unnecessary open ports

Full Access
Question # 74

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production

environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

A.

Canary

B.

Blue-green

C.

Rolling

D.

In-place

Full Access
Question # 75

A cloud engineer is concerned about command-and-control (C2) communication out of a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify the type of communication?

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron listing connections

D.

Traffic mirroring

Full Access
Question # 76

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

A.

Resource tagging

B.

Discretionary access control

C.

Multifactor authentication

D.

Role-based access control

E.

Token-based authentication

F.

Bastion host

Full Access