Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > CompTIA > CompTIA Cloud+ > CV0-004

CV0-004 CompTIA Cloud+ (2025) Question and Answers

Question # 4

A cloud engineer is exploring options to reduce the management overhead of the servers and network. Which of the following cloud service models should the engineer implement?

A.

SaaS

B.

XaaS

C.

PaaS

D.

laaS

Full Access
Question # 5

A cloud infrastructure administrator updated the IP tables to block incoming connections and outgoing responses to 104.225.110.203. Which of the following vulnerability management steps is this an example of?

A.

Scanning scope

B.

Remediation

C.

Identification

D.

Assessment

Full Access
Question # 6

A security engineer recently discovered a vulnerability in the operating system of the company VMs. The operations team reviews the issue and decides all VMs need to be updated

from version 3.4.0 to 3.4.1. Which of the following best describes the type of update that will be applied?

A.

Consistent

B.

Major

C.

Minor

D.

Ephemeral

Full Access
Question # 7

A cloud administrator is building a company-standard VM image, which will be based on a public image. Which of the following should the administrator implement to secure the image?

A.

ACLs

B.

Least privilege

C.

Hardening

D.

Vulnerability scanning

Full Access
Question # 8

A cloud engineer is concerned about command-and-control (C2) communication out of a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify the type of communication?

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron listing connections

D.

Traffic mirroring

Full Access
Question # 9

A software engineer at a cybersecurity company wants to access the cloud environment. Per company policy, the cloud environment should not be directly accessible via the internet. Which of the following options best describes how the software engineer can access the cloud resources?

A.

SSH

B.

Bastion host

C.

Token-based access

D.

Web portal

Full Access
Question # 10

Servers in the hot site are clustered with the main site.

A.

Network traffic is balanced between the main site and hot site servers.

B.

Offline server backups are replicated hourly from the main site.

C.

All servers are replicated from the main site in an online status.

D.

Which of the following best describes a characteristic of a hot site?

Full Access
Question # 11

A company wants to combine solutions in a central and scalable environment to achieve the following goals:

• Control

• Visibility

• Automation

• Cost efficiency

Which of the following best describes what the company should implement?

A.

Batch processing

B.

Workload orchestration

C.

Containerization

D.

Application modernization

Full Access
Question # 12

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

A.

Review the development network routing table.

B.

Change the ciphers on the site-to-site VPN.

C.

Restart the site-to-site VPN tunnel.

D.

Check the ACLS on the development workloads

Full Access
Question # 13

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing

Full Access
Question # 14

A company needs to deploy its own code directly in the cloud without provisioning additional infrastructure. Which of the following is the best cloud service model for the company to use?

A.

PaaS

B.

SaaS

C.

laaS

D.

XaaS

Full Access
Question # 15

Given the following command:

Sdocker pull images.comptia.org/user1/myimage:latest

Which of the following correctly identifies images.comptia.org?

A.

Image registry

B.

Image creator

C.

Image version

D.

Image name

Full Access
Question # 16

Which of the following is a field of computer science that enables computers to identify and understand objects and people in images and videos?

A.

Image reconstruction

B.

Facial recognition

C.

Natural language processing

D.

Computer vision

Full Access
Question # 17

An DevOps engineer is receiving reports that users can no longer access the company's web application after hardening of a web server. The users are receiving the following error:

ERR_SSLJ/ERSION_OR_CIPHER_MISMATCH.

Which of the following actions should the engineer take to resolve the issue?

A.

Restart the web server.

B.

Configure TLS 1.2 or newer.

C.

Update the web server.

D.

Review logs on the WAF

Full Access
Question # 18

A company that has several branches worldwide needs to facilitate full access to a specific cloud resource to a branch in Spain. Other branches will have only read access. Which of

the following is the best way to grant access to the branch in Spain?

A.

Set up MFA for the users working at the branch.

B.

Create a network security group with required permissions for users in Spain.

C.

Apply a rule on the WAF to allow only users in Spain access to the resource.

D.

Implement an IPS/IDS to detect unauthorized users.

Full Access
Question # 19

You are a cloud engineer working for a cloud service provider that is responsible for an

IaaS offering.

Your customer, who creates VMs and manages virtual storage, has noticed I/O bandwidth issues and low IOPS (under 9000).

Your manager wants you to verify the proper storage configuration as dictated by your service level agreement (SLA).

The SLA specifies:

. Each SFP on the hypervisor host must be set to the maximum link speed

allowed by the SAN array. . All SAN array disk groups must be configured in a RAID 5.

. The SAN array must be fully configured for redundant fabric paths. . IOPS should not fall below 14000

INSTRUCTIONS

Click on each service processor to review the displayed information. Then click on the drop-down menus to change the settings of each device as necessary to conform to the SLA requirements.

Full Access
Question # 20

A banking firm's cloud server will be decommissioned after a successful proof of concept using mirrored data. Which of the following is the best action to take regarding the storage used on the decommissioned server?

A.

Keep it temporarily.

B.

Archive it.

C.

Delete it.

D.

Retain it permanently

Full Access
Question # 21

A cloud engineer wants to deploy a new application to the cloud and is writing the following script:

Which of the following actions will this script perform?

A.

Upload a new VM image.

B.

Create a new cloud resource.

C.

Build a local server.

D.

Import a cloud module.

Full Access
Question # 22

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

A.

Splicing

B.

Rotation

C.

Sampling

D.

Inspection

Full Access
Question # 23

A write-intensive workload is having frequent performance issues. The workload is running on pay-as-you-go VMs. These VMs use SSDs and have appropriate CPU and RAM sizes. The workload writes millions of small files and has a one-year retention requirement. Which of the following actions should be taken?

A.

Use provisioned IOPS volumes.

B.

Increase the VM size.

C.

Switch to reserved VMs.

D.

Change to ephemeral storage.

Full Access
Question # 24

Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year.

Which of the following is this an example of?

A.

Recoverability

B.

Retention

C.

Encryption

D.

Integrity

Full Access
Question # 25

A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?

A.

Analyze

B.

Report

C.

Remediation

D.

identification

Full Access
Question # 26

A cloud administrator wants to provision a host with two VMs. The VMs require the following:

After configuring the servers, the administrator notices that during certain hours of the day, the performance heavily degrades. Which of the following is the best explanation?

A.

The host requires additional physical CPUs.

B.

A higher number of processes occur at those times.

C.

The RAM on each VM is insufficient.

D.

The storage is overutilized.

Full Access
Question # 27

Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?

A.

Scanning

B.

Assessment

C.

Remediation

D.

Identification

Full Access
Question # 28

A company has one cloud-based web server that is prone to downtime during maintenance. Which ot the following should the cloud engineer add to ensure high availability?

A.

A redundant web server behind a load balancer

B.

A backup cloud web server

C.

A secondary network link to the web server

D.

An autoscaling feature on the web server

Full Access
Question # 29

A technician receives an email from a vendor who is requesting payment of an invoice for human resources services. The email contains a request for bank account numbers. Which of the following types of attacks does this behavior most likely indicate?

A.

MaIware

B.

Cryptojacking

C.

Ransomware

D.

Phishing

Full Access
Question # 30

A cloud security analyst is investigating the impact of a recent cyberattack. The analyst is reviewing the following information:

Web server access log:

104.210.233.225 - - [21/10/2022:11:17: 40] "POST /uploadfile.html?f=myfile.php" 200 1638674

45.32.10.66 - - [21/10/2022:11:19:12] "GET /welcome.html" 200 5812

104.210.233.225 - - [21/10/2022:11:21:19] "GET / .. / .. / .. / .. /conf/server.xml HTTP/1.1" 200 74458

45.32.10.66 - - [21/10/22:11:22:32] "GET /admin.html HTTP/1.1" 200 9518

Web application firewall log:

"2022/10/21 11:17:33" "10.25.2.35" "104. 210.233.225" "userl" "File transfer completed successfully."

"2022/10/21 11:21:05" "10. 25.2. 35" "104. 210.233.225" "userl" "Accessed application page."

"2022/10/21 11:22:13" "10.25.2.35" "45. 32. 10. 66" "user2" "Accessing admin page. "

Which of the following has occurred?

A.

The corporate administration page was defaced by the attacker.

B.

A denial-of-service attack was successfully performed on the web server.

C.

A new user was created on the web server by the attacker.

D.

Sensitive information from the corporate web server was leaked.

Full Access
Question # 31

Once a change has been made to templates, which of the following commands should a cloud architect use next to deploy an laaS platform?

A.

git pull

B.

git fetch

C.

git commit

D.

git push

Full Access
Question # 32

A bank informs an administrator that changes must be made to backups for long-term reporting purposes. Which of the following is the most important change the administrator

should make to satisfy these requirements?

A.

Location of the backups

B.

Type of the backups

C.

Retention of the backups

D.

Schedule of the backups

Full Access
Question # 33

An organization's web application experiences penodic bursts of traffic when a new video is launched. Users are reporting poor performance in the middle of the month. Which of the following scaling approaches should the organization use to scale based on forecasted traffic?

A.

Scheduled

B.

Manual

C.

Event

D.

Load

Full Access
Question # 34

A company wants to build its new platform using a public cloud. The workload requirements include the following:

• Implementation of custom CIS compliance

• Patch for vulnerabilities within 24 hours

• Warrant at least 1,800 IOPS per volume

Which of the following meets the requirements?

A.

SaaS

B.

laaS

C.

FaaS

D.

PaaS

Full Access
Question # 35

A cloud developer receives a security vulnerability scan report and needs to analyze and record the true positives. Which of the following vulnerability management steps is this an example of?

A.

Assessment

B.

Identification

C.

Scanning scope

D.

Remediation

Full Access
Question # 36

A company recently set up a CDN for its photography and image-sharing website. Which of the following is the most likely reason for the company's action?

A.

To eliminate storage costs

B.

To improve site speed

C.

To enhance security of static assets

D.

To prevent unauthorized access

Full Access
Question # 37

A software engineer needs to transfer data over the internet using programmatic access while also being able to query the data. Which of the following will best help the engineer to complete this task?

A.

SQL

B.

Web sockets

C.

RPC

D.

GraphQL

Full Access
Question # 38

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

A.

Setting up private development, public development, and testing environments

B.

Segregating environments for internal and external teams

C.

Configuring DDoS protection to mitigate the risk of downtime

D.

Using IAM and ACL in order to bolster DLP

Full Access
Question # 39

Which of the following service options would provide the best availability for critical applications in the event of a disaster?

A.

Edge computing

B.

Cloud bursting

C.

Availability zones

D.

Multicloud tenancy

Full Access
Question # 40

Which of the following compute resources is the most optimal for running a single scripted task on a schedule?

A.

Bare-metal server

B.

Managed container

C.

Virtual machine

D.

Serverless function

Full Access
Question # 41

A company implements a web farm with 100 servers behind an application load balancer. Dunng scaling events, new web servers that are placed in service have not loaded all their modules, which causes some requests to the web farm to fail. Which of the following should the cloud engineer implement to address the scaling issue?

A.

Instance warm-up

B.

Scheduled scaling

C.

Event-based scaling

D.

Load balancer passthrough

Full Access
Question # 42

A developer is sending requests to a SaaS application. The developer becomes unable to send more requests after sending a number of them, but other developers can still send requests. Which of the following is most likely causing the issue?

A.

Partial outage

B.

API throttling

C.

Rate limiting

D.

Service quota

Full Access
Question # 43

A company's content management system (CMS) service runs on an laaS cluster on a public cloud. The CMS service is frequently targeted by a malicious threat actor using DDoS.

Which of the following should a cloud engineer monitor to identify attacks?

A.

Network flow logs

B.

Endpoint detection and response logs

C.

Cloud provider event logs

D.

Instance syslog

Full Access
Question # 44

A cloud server needs to automatically allocate more resources during sudden peak times. This allocation does not need to occur in regular intervals. Which of the following scaling

approaches should be used?

A.

Event

B.

Manual

C.

Trending

D.

Scheduled

Full Access
Question # 45

A cloud engineer is designing a high-performance computing cluster for proprietary software. The software requires low network latency and high throughput between cluster nodes.

Which of the following would have the greatest impact on latency and throughput when designing the HPC infrastructure?

A.

Node placement

B.

Node size

C.

Node NIC

D.

Node OS

Full Access
Question # 46

A cloud administrator is working on the deployment of an e-commerce website. The administrator evaluates the scaling methods to be implemented when seasonal or flash sales are launched. Which of the following scaling approaches should the administrator use to best manage this scenario?

A.

Scheduled

B.

Load

C.

Event

D.

Trending

Full Access
Question # 47

An engineer wants lo scale several cloud workloads on demand. Which of the following approaches is the most suitable?

A.

Load

B.

Scheduled

C.

Manual

D.

Trending

Full Access
Question # 48

A cloud engineer was deploying the company's payment processing application, but it failed with the following error log:

ERFOR:root: Transaction failed http 429 response, please try again Which of the following are the most likely causes for this error? (Select two).

A.

API throttling

B.

API gateway outage

C.

Web server outage

D.

Oversubscription

E.

Unauthorized access

F.

Insufficient quota

Full Access
Question # 49

Which of the following best explains the concept of migrating from on premises to the cloud?

A.

The configuration of a dedicated pipeline to transfer content to a remote location

B.

The creation of virtual instances in an external provider to transfer operations of selected servers into a new. remotely managed environment

C.

The physical transportation, installation, and configuration of company IT equipment in a cloud services provider's facility

D.

The extension of company IT infrastructure to a managed service provider

Full Access
Question # 50

The performance of an e-commerce website decreases dramatically during random periods. The IT team is evaluating available resources to mitigate the situation. Which of the following is the best approach to effectively manage this scenario'?

A.

Migrating to a dedicated host

B.

Purchasing additional servers

C.

Scheduling resource allocation

D.

Configuring automatic elasticity

Full Access
Question # 51

A system surpasses 75% to 80% of resource consumption. Which of the following scaling approaches is the most appropriate?

A.

Trending

B.

Manual

C.

Load

D.

Scheduled

Full Access
Question # 52

A company operates a website that allows customers to upload, share, and retain full ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

A.

Sovereignty

B.

Data classification

C.

Litigation holds

D.

Retention

Full Access
Question # 53

An administrator configures three subnets to the corporate network. All servers should communicate with the main corporate network and access the internet. The administrator creates the following configurations:

After configuring the networks, the administrator recognizes an issue with the configuration. Which of the following can the administrator change in one step to accomplish the goal?

A.

Remove source 192.168.12.0/24 and destination 192.168.1.0/24 from the routing table.

B.

Replace destination 192.168.1.0/24 with destination 192.168.0.0/24.

C.

Add source 192.168.12.0/24 and destination 192.168.0.0/24 to the routing table.

D.

Reconfigure Network 4 to 192.168.13.0/24.

Full Access
Question # 54

Users report being unable to access an application that uses TLS 1.1. The users are able to access other applications on the internet. Which of the following is the most likely

reason for this issue?

A.

The security team modified user permissions.

B.

Changes were made on the web server to address vulnerabilities.

C.

Privileged access was implemented.

D.

The firewall was modified.

Full Access
Question # 55

A cloud service provider just launched a new serverless service that is compliant with all security regulations. A company deployed its code using the service, and the company's application was hacked due to leaked credentials. Which of the following is responsible?

A.

Customer

B.

Cloud service provider

C.

Hacker

D.

Code repository

Full Access
Question # 56

An organization wants to ensure its data is protected in the event of a natural disaster. To support this effort, the company has rented a colocation space in another part of the

country. Which of the following disaster recovery practices can be used to best protect the data?

A.

On-site

B.

Replication

C.

Retention

D.

Off-site

Full Access
Question # 57

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

A.

Disk I/O

B.

Network packets

C.

Average memory utilization

D.

Percent of CPU utilization

Full Access
Question # 58

A cloud engineer is reviewing the following Dockerfile to deploy a Python web application:

Which of the following changes should the engineer make lo the file to improve container security?

A.

Add the instruction "JSER nonroot.

B.

Change the version from latest to 3.11.

C.

Remove the EHTRYPOIKT instruction.

D.

Ensure myapp/main.pyls owned by root.

Full Access
Question # 59

Which of the following cloud-native architecture designs is the most easily maintained, decentralized, and decoupled?

A.

Monolithic

B.

Hybrid cloud

C.

Mainframe

D.

Microservices

Full Access
Question # 60

A company runs a discussion forum that caters to global users. The company's monitoring system reports that the home page suddenly is seeing elevated response times, even

though internal monitoring has reported no issues or changes. Which of the following is the most likely cause of this issue?

A.

Cryptojacking

B.

Human error

C.

DDoS

D.

Phishing

Full Access
Question # 61

An organization's internal security team mandated that public cloud resources must be accessible only by a corporate VPN and not by direct public internet access. Which of the

following would achieve this objective?

A.

WAF

B.

ACL

C.

VPC

D.

SSH

Full Access
Question # 62

A cloud engineer needs to integrate a new payment processor with an existing e-commerce website. Which of the following technologies is the best fit for this integration?

A.

RPC over SSL

B.

Transactional SQL

C.

REST API over HTTPS

D.

Secure web socket

Full Access
Question # 63

Which of the following can reduce the risk of CI/CD pipelines leaking secrets?

A.

Protected Git branches

B.

Use of a VM instead of containers

C.

Private image repositories

D.

Canary tests

Full Access
Question # 64

Which of the following requirements are core considerations when migrating a small business's on-premises applications to the cloud? (Select two).

A.

Availability

B.

Hybrid

C.

Testing

D.

Networking

E.

Compute

F.

Logs

Full Access
Question # 65

A security analyst confirms a zero-day vulnerability was exploited by hackers who gained access to confidential customer data and installed ransomware on the server Which of the following steps should the security analyst take? (Select two).

A.

Contact the customers to inform them about the data breach.

B.

Contact the hackers to negotiate payment lo unlock the server.

C.

Send a global communication to inform all impacted users.

D.

Inform the management and legal teams about the data breach

E.

Delete confidential data used on other servers that might be compromised.

F.

Modify the firewall rules to block the IP addresses and update the ports.

Full Access
Question # 66

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

A.

Rehost

B.

Rearchitect

C.

Refactor

D.

Retain

Full Access
Question # 67

A cloud engineer hardened the WAF for a company that operates exclusively in North America. The engineer did not make changes to any ports, and all protected applications have

continued to function as expected. Which of the following configuration changes did the engineer most likely apply?

A.

The engineer implemented MFA to access the WAF configurations.

B.

The engineer blocked all traffic originating outside the region.

C.

The engineer installed the latest security patches on the WAF.

D.

The engineer completed an upgrade from TLS version 1.1 to version 1.3.

Full Access
Question # 68

Five thousand employees always access the company's public cloud-hosted web application on a daily basis during the same time frame. Some users have been reporting performance issues while attempting to connect to the web application Which of the following is the best configuration approach to resolve this issue?

A.

Scale vertically based on a trend.

B.

Scale horizontally based on a schedule

C.

Scale vertically based on a load.

D.

Scale horizontally based on an event

Full Access