Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > CompTIA > CompTIA Cloud+ > CV0-004

CV0-004 CompTIA Cloud+ (2024) Question and Answers

Question # 4

A cloud engineer is exploring options to reduce the management overhead of the servers and network. Which of the following cloud service models should the engineer implement?

A.

SaaS

B.

XaaS

C.

PaaS

D.

laaS

Full Access
Question # 5

Servers in the hot site are clustered with the main site.

A.

Network traffic is balanced between the main site and hot site servers.

B.

Offline server backups are replicated hourly from the main site.

C.

All servers are replicated from the main site in an online status.

D.

Which of the following best describes a characteristic of a hot site?

Full Access
Question # 6

A log-parsing application requires significant processing power to ingest the logs streaming from web servers. The engineering team presents the cloud architect with four proposals

using the same underlying hardware. Which of the following should the cloud architect select in order to minimize the impact of an instance failure while keeping the cost as low as

possible?

A.

Four instances of 4vCPU, 8GB RAM, 80GB SSD

B.

Four instances of 4vCPU, 8GB RAM, 80GB HDD

C.

Two instances of 8vCPU, 16GB RAM, 80GB SSD

D.

Two instances of 8vCPU, 16GB RAM, 80GB HDD

Full Access
Question # 7

Which of the following is the most cost-effective way to store data that is infrequently accessed?

A.

Cold site

B.

Hot site

C.

Off-site

D.

Warm site

Full Access
Question # 8

Which of the following cloud deployment models is the best way to replicate a workload non-disruptively between on-premises servers and a public cloud?

A.

Public

B.

Community

C.

Private

D.

Hybrid

Full Access
Question # 9

The performance of an e-commerce website decreases dramatically during random periods. The IT team is evaluating available resources to mitigate the situation. Which of the following is the best approach to effectively manage this scenario'?

A.

Migrating to a dedicated host

B.

Purchasing additional servers

C.

Scheduling resource allocation

D.

Configuring automatic elasticity

Full Access
Question # 10

A cloud administrator needs to distribute workloads across remote data centers for redundancy reasons. Which of the following deployment strategies would eliminate downtime, accelerate deployment, and remain cost efficient?

A.

In-place

B.

Rolling

C.

Blue-green

D.

Canary

Full Access
Question # 11

A cloud solutions architect needs to design a solution that will collect a report and upload it to an object storage service every time a virtual machine is gracefully or non-gracefully

stopped. Which of the following will best satisfy this requirement?

A.

An event-driven architecture that will send a message when the VM shuts down to a log-collecting function that extracts and uploads the log directly from the storage volume

B.

Creating a webhook that will trigger on VM shutdown API calls and upload the requested files from the volume attached to the VM into the object-defined storage service

C.

An API of the object-defined storage service that will scrape the stopped VM disk and self-upload the required files as objects

D.

A script embedded on the stopping VM's OS that will upload the logs on system shutdown

Full Access
Question # 12

Five thousand employees always access the company's public cloud-hosted web application on a daily basis during the same time frame. Some users have been reporting performance issues whileattempting to connect to the web application Which of the following is the best configuration approach to resolve this issue?

A.

Scale vertically based on a trend.

B.

Scale horizontally based on a schedule

C.

Scale vertically based on a load.

D.

Scale horizontally based on an event

Full Access
Question # 13

Which of the following migration types is best to use when migrating a highly available application, which is normally hosted on a local VM cluster, for usage with an external user population?

A.

Cloud to on-premises

B.

Cloud to cloud

C.

On-premises to cloud

D.

On-premises to on-premises

Full Access
Question # 14

A banking firm's cloud server will be decommissioned after a successful proof of concept using mirrored data. Which of the following is the best action to take regarding the storage used on the decommissioned server?

A.

Keep it temporarily.

B.

Archive it.

C.

Delete it.

D.

Retain it permanently

Full Access
Question # 15

A systems administrator notices a surge of network traffic is coming from the monitoring server. The administrator discovers that large amounts of data are being downloaded to an external source. While investigating, the administrator reviews the following logs:

Which of the following ports has been compromised?

A.

Port 20

B.

Port 22

C.

Port 443

D.

Port 4443

E.

Port 8048

Full Access
Question # 16

A company wants to use a solution that will allow for quick recovery from ransomware attacks, as well as intentional and unintentional attacks on data integrity and availability. Which of the following should the company implement that will minimize administrative overhead?

A.

Object versioning

B.

Data replication

C.

Off-site backups

D.

Volume snapshots

Full Access
Question # 17

A cloud engineer wants containers to run the latest version of a container base image to reduce the number of vulnerabilities. The applications in use requite Python 3.10 and ate not compatible with any other version. The containers' images are created every time a new version is released from the source image. Given the container Dockerfile below:

Which of the following actions will achieve the objectives with the least effort?

A.

Perform docker pull before executing docker run.

B.

Execute docker update using a local cron to get the latest container version.

C.

Change the image to use python:latest on the image build process.

D.

Update the Dockerfile to pin the source image version.

Full Access
Question # 18

A company's content management system (CMS) service runs on an laaS cluster on a public cloud. The CMS service is frequently targeted by a malicious threat actor using DDoS.

Which of the following should a cloud engineer monitor to identify attacks?

A.

Network flow logs

B.

Endpoint detection and response logs

C.

Cloud provider event logs

D.

Instance syslog

Full Access
Question # 19

A developer is testing code that will be used to deploy a web farm in a public cloud. The main code block is a function to create a load balancer and a loop to create 1.000 web servers, as shown below:

The developer runs the code against the company's cloud account and observes that the load balancer is successfully created, but only 100 web servers have been created. Which of the following should the developer do to fix this issue?

A.

Request an increase of Instance quota.

B.

Run the code multiple times until all servers are created.

C.

Check the my_web_server () function to ensure it is using the right credentials.

D.

Place the my_load_balancer () function after the loop.

Full Access
Question # 20

A cloud engineer is designing a cloud-native, three-tier application. The engineer must adhere to the following security best practices:

• Minimal services should run on all layers of the stack.

• The solution should be vendor agnostic.

• Virealization could be used over physical hardware.

Which of the following concepts should the engineer use to design the system to best meet these requirements?

A.

Virtual machine

B.

Micro services

C.

Fan-out

D.

Cloud-provided managed services

Full Access
Question # 21

A company recently set up a CDN for its photography and image-sharing website. Which of the following is the most likely reason for the company's action?

A.

To eliminate storage costs

B.

To improve site speed

C.

To enhance security of static assets

D.

To prevent unauthorized access

Full Access
Question # 22

A company is developing a new web application that requires a relational database management system with minimal operational overhead. Which of the following should the company choose?

A.

A database installed on a virtual machine

B.

A managed SQL database on the cloud

C.

A database migration service

D.

A hybrid database setup

Full Access
Question # 23

A customer relationship management application, which is hosted in a public cloud laaS network, is vulnerable to a remote command execution vulnerability. Which of the following is

the best solution for the security engineer to implement to prevent the application from being exploited by basic attacks?

A.

IPS

B.

ACL

C.

DLP

D.

WAF

Full Access
Question # 24

An DevOps engineer is receiving reports that users can no longer access the company's web application after hardening of a web server. The users are receiving the following error:

ERR_SSLJ/ERSION_OR_CIPHER_MISMATCH.

Which of the following actions should the engineer take to resolve the issue?

A.

Restart the web server.

B.

Configure TLS 1.2 or newer.

C.

Update the web server.

D.

Review logs on the WAF

Full Access
Question # 25

A cloud engineer needs to deploy a new version of a web application to 100 servers. In the past, new version deployments have caused outages. Which of the following deployment types should the cloud engineer implement to prevent the outages from happening this time?

A.

Rolling

B.

Blue-green

C.

Canary

D.

Round-robin

Full Access
Question # 26

An administrator is creating a cron job that shuts down the virtual machines at night to save on costs. Which of the following is the best way to achieve this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

Which of the following is the most cost-effective and efficient strategy when migrating to the cloud?

A.

Retire

B.

Replatform

C.

Retain

D.

Refactor

Full Access
Question # 28

A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following

delivery mechanisms would best support this integration?

A.

Enterprise service bus

B.

Socket

C.

RPC

D.

Queue

Full Access
Question # 29

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

A.

Review the development network routing table.

B.

Change the ciphers on the site-to-site VPN.

C.

Restart the site-to-site VPN tunnel.

D.

Check the ACLS on the development workloads

Full Access
Question # 30

A cloud engineer is in charge of deploying a platform in an laaS public cloud. The application tracks the state using session cookies, and there are no affinity restrictions. Which of

the following will help the engineer reduce monthly expenses and allow the application to provide the service?

A.

Resource metering

B.

Reserved resources

C.

Dedicated host

D.

Pay-as-you-go model

Full Access
Question # 31

Between 11:00 a.m. and 1:00 p.m. on workdays, users report that the sales database is either not accessible, sluggish, or difficult to connect to. A cloud administrator discovers that during the impacted time, all hypervisors are at capacity. However, when 70% of the users are using the same database, those issues are not reported. Which of the following is the most likely cause?

A.

Oversubscription

B.

Resource allocation

C.

Sizing issues

D.

Service quotas

Full Access
Question # 32

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production

environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

A.

Canary

B.

Blue-green

C.

Rolling

D.

In-place

Full Access
Question # 33

A cloud engineer hardened the WAF for a company that operates exclusively in North America. The engineer did not make changes to any ports, and all protected applications have

continued to function as expected. Which of the following configuration changes did the engineer most likely apply?

A.

The engineer implemented MFA to access the WAF configurations.

B.

The engineer blocked all traffic originating outside the region.

C.

The engineer installed the latest security patches on the WAF.

D.

The engineer completed an upgrade from TLS version 1.1 to version 1.3.

Full Access
Question # 34

A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

A.

Log retention

B.

Tracing

C.

Log aggregation

D.

Log rotation

E.

Hashing

F.

Encryption

Full Access
Question # 35

An e-commerce company is migrating from an on-premises private cloud environment to

a public cloud IaaS environment. You are tasked with right-sizing the environment to

save costs after the migration. The company's requirements are to provide a 20% overhead above the average resource consumption, rounded up.

INSTRUCTIONS

Review the specifications and graphs showing resource usage for the web and database servers. Determine the average resource usage and select the correct specifications from the available drop-down options.

Full Access
Question # 36

A cloud administrator shortens the amount of time a backup runs. An executive in the company requires a guarantee that the backups can be restored with no data loss. Which of th€ following backup features should the administrator lest for?

A.

Encryption

B.

Retention

C.

Schedule

D.

Integrity

Full Access
Question # 37

Which of the following describes the main difference between public and private container repositories?

A.

Private container repository access requires authorization, while public repository access does not require authorization.

B.

Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.

C.

Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.

D.

Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.

Full Access
Question # 38

A newly configured VM fails to run application updates despite having internet access. The updates download automatically from a third-party network. Given the following output:

Which of the following troubleshooting steps would be best to take?

A.

Checking DNS configurations

B.

Reconfiguring routing protocols

C.

Testing the IP address configuration

D.

Running a trace to the router

Full Access
Question # 39

A cloud architect attempts to modify a protected branch but is unable to do so. The architect receives an error indicating the action cannot be completed. Which of the following should the architect try instead''

A.

Adding a new remote

B.

Creating a pull request

C.

Merging the branch

D.

Rebasing the branch

Full Access
Question # 40

An administrator is setting up a cloud backup solution that requires the following features:

• Cost effective

• Granular recovery

• Multilocation

Which of the following backup types best meets these requirements?

A.

Off-site, full, incremental, and differential

B.

Cloud site, full, and differential

C.

On-site. full, and incremental

D.

On-site. full, and differential

Full Access
Question # 41

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

A.

Splicing

B.

Rotation

C.

Sampling

D.

Inspection

Full Access
Question # 42

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

A.

Operating system patches

B.

Table-level permissions

C.

Minor database engine updates

D.

Cluster configuration

E.

Row-level encryption

F.

Availability of hardware for scaling

Full Access
Question # 43

A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?

A.

The company should have switched from object storage to file storage.

B.

The company should have hashed the data.

C.

The company should have changed the file access permissions.

D.

The company should have encrypted the data at rest.

Full Access
Question # 44

A CI/CD pipeline is used to deploy VMs to an laaS environment. Which of the following can be used to harden the operating system once the VM is running?

A.

Docker

B.

Kubernetes

C.

Git

D.

Ansible

Full Access
Question # 45

A cloud engineer is extending on-premises services to a public cloud. The following design requirements must be considered in the overall solution:

" The ability to remotely connect systems from both environments

• No IP address conflicts or overlap

• Cost-effectiveness

Which of the following cloud network concepts best meets these requirements?

A.

Dedicated connection

B.

VPN

C.

VLAN

D.

ACL

Full Access
Question # 46

A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

A.

Modifying the subnet mask to 255 255 254.0 for IT and operations departments

B.

Configuring static routing to allow access from each subnet to 10.1.40.1

C.

Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network

D.

Configuring static routing to allow access from 10.1.30.1 to each subnet

E.

Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee

F.

Modifying the subnet mask to 255.255.255.128 for the IT and operations departments

Full Access
Question # 47

Which of the following describes what CRUD is typically used for?

A.

Relational databases

B.

Time series databases

C.

Graph databases

D.

NoSQL databases

Full Access
Question # 48

A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned. Which of the following

scripts should the systems administrator use to achieve this goal?

A.

RESPONSE_CODE }

string APP_URL

bool RESPONSE_CODE

string VM

health checker (APP_URL, VM) {

if [ http_probe (APP_URL) == 200] {

echo RESPONSE_CODE }

else{

stop (VM)

echo

B.

else{

echo

string APP_URL

float RESPONSE_CODE

string VM

health_checker (APP_URL, VM) {

if [ http_probe (APP_URL) == 200] {

stop (RESPONSE_CODE)

echo VM }

stop (VM)

RESPONSE CODE }

C.

else{

echo

string APP_URL

int RESPONSE CODE

string VM

health checker (APP_URL, VM) {

if [ http_probe (APP_URL) == 200] {

echo RESPONSE_CODE }

stop (VM)

RESPONSE_CODE }

D.

else{

echo

string APP_URL

int RESPONSE_CODE

string VM

health_checker (APP_URL, VM) {

if [ http_probe (VM) == 200] {

stop (VM)

echo RESPONSE_CODE }

RESPONSE CODE }

Full Access
Question # 49

Which of the following network protocols is generally used in a NAS environment?

A.

BGP

B.

RDP

C.

TCP/IP

D.

iSCSI

Full Access
Question # 50

A company wants to optimize cloud resources and lower the overhead caused by managing multiple operating systems. Which of the following compute resources would be best to help to achieve this goal?

A.

VM

B.

Containers

C.

Remote desktops

D.

Bare-metal servers

Full Access
Question # 51

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

A.

VPC

B.

Application load balancer

C.

CDN

D.

API gateway

Full Access
Question # 52

Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year.

Which of the following is this an example of?

A.

Recoverability

B.

Retention

C.

Encryption

D.

Integrity

Full Access
Question # 53

Which of the following requirements are core considerations when migrating a small business's on-premises applications to the cloud? (Select two).

A.

Availability

B.

Hybrid

C.

Testing

D.

Networking

E.

Compute

F.

Logs

Full Access
Question # 54

A customer's facility is located in an area where natural disasters happen frequently. The customer requires the following:

• Data resiliency due to exposure to frequent natural disasters

• Data localization because of privacy regulations in the country

• High availability

Which of the following cloud resources should be provisioned to meet these requirements?

A.

Storage in a separate data center located in same region

B.

An on-premises private cloud carrying duplicate data

C.

Storage in an availability zone outside the region

D.

Storage in the same availability zone as the primary data

Full Access
Question # 55

Which of the following provides secure, private communication between cloud environments without provisioning additional hardware or appliances?

A.

VPN

B.

VPC peering

C.

BGP

D.

Transit gateway

Full Access
Question # 56

A cloud engineer wants to deploy a new application to the cloud and is writing the following script:

Which of the following actions will this script perform?

A.

Upload a new VM image.

B.

Create a new cloud resource.

C.

Build a local server.

D.

Import a cloud module.

Full Access
Question # 57

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

A.

Rehost

B.

Rearchitect

C.

Refactor

D.

Retain

Full Access
Question # 58

A cloud developer needs to update a REST API endpoint to resolve a defect. When too many users attempt to call the API simultaneously, the following message is displayed:

Error: Request Timeout - Please Try Again Later

Which of the following concepts should the developer consider to resolve this error?

A.

Server patch

B.

TLS encryption

C.

Rate limiting

D.

Permission issues

Full Access
Question # 59

A company operates a website that allows customers to upload, share, and retain tull ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

A.

Sovereignty

B.

Data classification

C.

Litigation holds

D.

Retention

Full Access
Question # 60

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

A.

Setting up private development, public development, and testing environments

B.

Segregating environments for internal and external teams

C.

Configuring DDoS protection to mitigate the risk of downtime

D.

Using IAM and ACL in order to bolster DLP

Full Access
Question # 61

Users have been reporting that a remotely hosted application is not accessible following a recent migration. However, the cloud administrator is able to access the application from

the same site as the users. Which of the following should the administrator update?

A.

Cipher suite

B.

Network ACL

C.

Routing table

D.

Permissions

Full Access
Question # 62

A cloud solutions architect is designing a VM-based solution that requires reducing the cost as much as possible. Which of the following solutions will best satisfy this requirement?

A.

Using ephemeral storage on replicated VMs

B.

Creating Spot VMs in one availability zone

C.

Spreading the VMs across different regions

D.

Using provisioned IOPS storage

Full Access
Question # 63

An e-commerce store is preparing for an annual holiday sale. Previously, this sale has increased the number of transactions between two and ten times the normal level of

transactions. A cloud administrator wants to implement a process to scale the web server seamlessly. The goal is to automate changes only when necessary and with minimal cost.

Which of the following scaling approaches should the administrator use?

A.

Scale horizontally with additional web servers to provide redundancy.

B.

Allow the load to trigger adjustments to the resources.

C.

When traffic increases, adjust the resources using the cloud portal.

D.

Schedule the environment to scale resources before the sale begins.

Full Access