CompTIA CV0-004 Practice Test - Questions Answers, Page 14

List of questions
Question 131

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to calculate the severity of the risk from using this component?
The Common Vulnerability Scoring System (CVSS) is what the organization should use to calculate the severity of the risk from using an old version of Apache Log4j software component. CVSS provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.
Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Risk Management
Question 132

A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to recommend?
Question 133

A cloud engineer wants to run a script that increases the volume storage size if it is below 100GB. Which of the following should the engineer run?
The correct script is Option A, which uses a conditional test to check if the volume size is less than 100GB. If it is, then it performs a resize operation; otherwise, it outputs a message indicating the volume is already the desired size.
Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Automation
Question 134

Servers in the hot site are clustered with the main site.
When servers in a hot site are clustered with the main site, it indicates that all servers are replicated from the main site in an online status. This means that the hot site maintains a live, real-time copy of data and applications, ensuring immediate availability in the event of a failure at the main site. Unlike options A and B, which describe load balancing and backup strategies respectively, clustering with a hot site as described in option C ensures that the hot site can take over with minimal downtime, maintaining business continuity.
Question 135

Which of the following container storage types loses data after a restart?
In the context of container storage, ephemeral storage types are designed to be temporary, losing their data when the container is restarted or deleted. This is in contrast to persistent volumes, which retain data across container restarts and lifecycle, and object and block storage, which are used for specific types of data storage but not inherently temporary. Ephemeral storage is often used for temporary computation data, caching, or any data that doesn't need to persist beyond the lifecycle of the container instance.
Question 136

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?
The canary deployment model is an approach where a new feature or service is rolled out to a small subset of users before being deployed widely. This method allows the company to test the impact of the new feature in the production environment with a limited scope, minimizing risk and potential cost implications if issues arise. This approach contrasts with blue-green deployments, which involve switching between two identical environments; rolling deployments, which gradually update all instances; and in-place deployments, which update the current environment. The canary model is particularly suited for targeting specific user groups and gathering feedback before a full rollout.
Question 137

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these requirements?
Clustering refers to the use of multiple servers/computers to form what appears to be a single system. This concept is key for achieving high availability and resilience, especially for latency-sensitive workloads. By distributing the workload across a cluster that spans multiple regions, the system can continue to operate even if one or more nodes fail, thus maintaining performance and availability.
Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)
Question 138

Which of the following describes the main difference between public and private container repositories?
The main difference between public and private container repositories lies in access control. Public repositories allow users to download and use container images without requiring any authorization, making them accessible to anyone. On the other hand, private repositories require users to have proper authorization, usually through credentials, to access the container images, thus providing a level of privacy and security control.
Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)
Question 139

Two CVEs are discovered on servers in the company's public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which of the following actions would be the best way to mitigate the vulnerabilities?
For vulnerabilities with a high CVSS score and a network attack vector, the most effective and direct mitigation action is to patch the operating systems. Patching addresses the specific vulnerabilities that have been identified and helps to secure the servers against the known exploits that could take advantage of these CVEs.
Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)
Question 140

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).
In a provider-managed database service, the cloud provider typically manages the infrastructure, operating system, and database engine updates. However, the customer is responsible for the data and its security within the database, which includes setting table-level permissions and row-level encryption to ensure that data access and security is managed appropriately.
Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)
Question