ExamGecko
Home / CompTIA / CV0-004 / List of questions
Ask Question

CompTIA CV0-004 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

An IT security team wants to ensure that the correct parties are informed when a specific user account is signed in. Which of the following would most likely allow an administrator to address this concern?

Creating an alert based on user sign-in criteria
Creating an alert based on user sign-in criteria
Aggregating user sign-in logs from all systems
Aggregating user sign-in logs from all systems
Enabling the collection of user sign-in logs
Enabling the collection of user sign-in logs
Configuring the retention of all sign-in logs
Configuring the retention of all sign-in logs
Suggested answer: A
Explanation:

To ensure that the correct parties are informed when a specific user account is signed in, the best action is to create an alert based on user sign-in criteria. This alert can notify administrators or security personnel when the specified event occurs.

Reference: Security monitoring and alerting are critical components of managing cloud environments securely, as discussed in the CompTIA Cloud+ certification.

asked 02/10/2024
Srinivasan Kumaresan
40 questions

Question 92

Report Export Collapse

An on-premises data center is located in an earthquake-prone location. The workload consists of real-time, online transaction processing. Which ot the following data protection strategies should be used to back up on-premises data to the cloud while also being cost effective?

Remote replication for failover
Remote replication for failover
A copy that is RAID 1 protected on spinning drives in an on-premises private cloud
A copy that is RAID 1 protected on spinning drives in an on-premises private cloud
A full backup to on-site tape libraries in a private cloud
A full backup to on-site tape libraries in a private cloud
Air-gapped protection to provide cyber resiliency
Air-gapped protection to provide cyber resiliency
Suggested answer: A
Explanation:

Remote replication for failover is the data protection strategy that should be used to back up on-premises data to the cloud for an earthquake-prone location. It provides real-time or near-real-time copying of data to a remote location, which can be quickly activated in case the primary site fails.

Reference: Disaster recovery strategies, including remote replication for failover, are part of the cloud-based data protection methods covered in the CompTIA Cloud+ certification.

asked 02/10/2024
sicnarep sicnarep
57 questions

Question 93

Report Export Collapse

Which of the following will best reduce the cost of running workloads while maintaining the same performance? (Select two).

Instance size
Instance size
Tagging
Tagging
Reserved resources model
Reserved resources model
Spot instance model
Spot instance model
Pay-as-you-go model
Pay-as-you-go model
Dedicated host model
Dedicated host model
Suggested answer: C, D
Explanation:

The Reserved resources model offers cost savings for committed use over a long term, which can reduce costs while maintaining performance for predictable workloads. The Spot instance model allows users to take advantage of unused capacity at lower prices, offering significant cost savings, though with the possibility of instances being terminated when demand rises. Both models can be strategically used to optimize costs without compromising performance.

asked 02/10/2024
Aleh Patskevich
53 questions

Question 94

Report Export Collapse

Which of the following is a difference between a SAN and a NAS?

A SAN works only with fiber-based networks.
A SAN works only with fiber-based networks.
A SAN works with any Ethernet-based network.
A SAN works with any Ethernet-based network.
A NAS uses a faster protocol than a SAN
A NAS uses a faster protocol than a SAN
A NAS uses a slower protocol than a SAN.
A NAS uses a slower protocol than a SAN.
Suggested answer: D
Explanation:

A NAS (Network Attached Storage) typically uses file-level protocols such as NFS or SMB, which are generally considered slower and less efficient than the block-level protocols used by SANs (Storage Area Networks), such as iSCSI or Fibre Channel. SANs are designed for high performance and low latency, making them more suitable for applications requiring fast and efficient storage access.

asked 02/10/2024
AHOPlvaro Zorrilla
44 questions

Question 95

Report Export Collapse

A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly expenenang high latency. Which of the following would best help determine the source of the latency?

Configuring centralized logging to analyze HTTP requests
Configuring centralized logging to analyze HTTP requests
Running a flow log on the network to analyze the packets
Running a flow log on the network to analyze the packets
Configuring an API gateway to track all incoming requests
Configuring an API gateway to track all incoming requests
Enabling tracing to detect HTTP response times and codes
Enabling tracing to detect HTTP response times and codes
Suggested answer: D
Explanation:

Enabling tracing in the application can help determine the source of high latency by providing detailed information on HTTP request and response times, as well as response codes. This can identify which API calls are experiencing delays and contribute to overall application latency, allowing for targeted troubleshooting and optimization.

asked 02/10/2024
Nichal Maharaj
49 questions

Question 96

Report Export Collapse

A cloud architect attempts to modify a protected branch but is unable to do so. The architect receives an error indicating the action cannot be completed. Which of the following should the architect try instead''

Adding a new remote
Adding a new remote
Creating a pull request
Creating a pull request
Merging the branch
Merging the branch
Rebasing the branch
Rebasing the branch
Suggested answer: B
Explanation:

When unable to modify a protected branch directly, the recommended approach is to create a pull request. This allows changes to be reviewed and approved by authorized personnel before being merged into the protected branch, maintaining code integrity and compliance with the project's workflow and policies.

asked 02/10/2024
CRISTIAN FONSECA
44 questions

Question 97

Report Export Collapse

A cloud administrator deploys new VMs in a cluster and discovers they are getting IP addresses in the range of 169.254.0.0/16. Which of the following is the most likely cause?

The scope has been exhausted.
The scope has been exhausted.
The network is overlapping.
The network is overlapping.
The VLAN is missing.
The VLAN is missing.
The NAT is Improperly configured.
The NAT is Improperly configured.
Suggested answer: A
Explanation:

IP addresses in the range of 169.254.0.0/16 are Automatic Private IP Addressing (APIPA) addresses, which devices assign themselves when they are configured to obtain an IP automatically but are unable to reach a DHCP server to get one. The most likely cause for VMs in a cluster to receive APIPA addresses is the exhaustion of the DHCP scope, meaning there are no more available IP addresses in the DHCP range to be assigned.

asked 02/10/2024
Mark Theeuwes
46 questions

Question 98

Report Export Collapse

Which of the following integration systems would best reduce unnecessary network traffic by allowing data to travel bidirectionally and facilitating real-time results for developers who need to display critical information within applications?

REST API
REST API
RPC
RPC
GraphQL
GraphQL
Web sockets
Web sockets
Suggested answer: D
Explanation:

Web sockets provide a full-duplex communication channel over a single, long-lived connection, allowing data to flow bidirectionally between a client and a server. This is ideal for real-time applications where developers need to display critical information without unnecessary network overhead, as it reduces the need for repetitive HTTP requests and allows for more efficient, instantaneous data updates and interactions.

asked 02/10/2024
abdelhafid houssa
46 questions

Question 99

Report Export Collapse

A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?

Analyze
Analyze
Report
Report
Remediation
Remediation
identification
identification
Suggested answer: D
Explanation:

The phase of vulnerability management that involves looking for existing security vulnerabilities on software applications is known as 'Identification'. This step precedes analysis, reporting, and remediation, focusing on discovering known and unknown vulnerabilities within the system or software to assess the security posture effectively.

asked 02/10/2024
Nishan Perera
45 questions

Question 100

Report Export Collapse

Which of the following can reduce the risk of CI/CD pipelines leaking secrets?

Protected Git branches
Protected Git branches
Use of a VM instead of containers
Use of a VM instead of containers
Private image repositories
Private image repositories
Canary tests
Canary tests
Suggested answer: A
Explanation:

Protected Git branches help reduce the risk of CI/CD pipelines leaking secrets by imposing restrictions on who can commit to the branches, enforce status checks before merging, and prevent unauthorized access or changes to sensitive information, such as API keys, passwords, and secret tokens. This ensures that only approved changes can be made to the codebase, and sensitive information is safeguarded.

asked 02/10/2024
Nathalie Agustin
38 questions
Total 239 questions
Go to page: of 24
Search

Related questions