ExamGecko
Home Home / CompTIA / CV0-004

CompTIA CV0-004 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to calculate the severity of the risk from using this component?

A.
CWE
A.
CWE
Answers
B.
CVSS
B.
CVSS
Answers
C.
CWSS
C.
CWSS
Answers
D.
CVE
D.
CVE
Answers
Suggested answer: B

Explanation:

The Common Vulnerability Scoring System (CVSS) is what the organization should use to calculate the severity of the risk from using an old version of Apache Log4j software component. CVSS provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.

Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Risk Management

A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to recommend?

A.
Using CIS-hardened images
A.
Using CIS-hardened images
Answers
B.
Using watermarked images
B.
Using watermarked images
Answers
C.
Using digitally signed images
C.
Using digitally signed images
Answers
D.
Using images that have an application firewall
D.
Using images that have an application firewall
Answers
Suggested answer: A

A cloud engineer wants to run a script that increases the volume storage size if it is below 100GB. Which of the following should the engineer run?

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: A

Explanation:

The correct script is Option A, which uses a conditional test to check if the volume size is less than 100GB. If it is, then it performs a resize operation; otherwise, it outputs a message indicating the volume is already the desired size.

Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Automation

Servers in the hot site are clustered with the main site.

A.
Network traffic is balanced between the main site and hot site servers.
A.
Network traffic is balanced between the main site and hot site servers.
Answers
B.
Offline server backups are replicated hourly from the main site.
B.
Offline server backups are replicated hourly from the main site.
Answers
C.
All servers are replicated from the main site in an online status.
C.
All servers are replicated from the main site in an online status.
Answers
D.
Which of the following best describes a characteristic of a hot site?
D.
Which of the following best describes a characteristic of a hot site?
Answers
Suggested answer: C

Explanation:

When servers in a hot site are clustered with the main site, it indicates that all servers are replicated from the main site in an online status. This means that the hot site maintains a live, real-time copy of data and applications, ensuring immediate availability in the event of a failure at the main site. Unlike options A and B, which describe load balancing and backup strategies respectively, clustering with a hot site as described in option C ensures that the hot site can take over with minimal downtime, maintaining business continuity.

Which of the following container storage types loses data after a restart?

A.
Object
A.
Object
Answers
B.
Persistent volume
B.
Persistent volume
Answers
C.
Ephemeral
C.
Ephemeral
Answers
D.
Block
D.
Block
Answers
Suggested answer: C

Explanation:

In the context of container storage, ephemeral storage types are designed to be temporary, losing their data when the container is restarted or deleted. This is in contrast to persistent volumes, which retain data across container restarts and lifecycle, and object and block storage, which are used for specific types of data storage but not inherently temporary. Ephemeral storage is often used for temporary computation data, caching, or any data that doesn't need to persist beyond the lifecycle of the container instance.

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

A.
Canary
A.
Canary
Answers
B.
Blue-green
B.
Blue-green
Answers
C.
Rolling
C.
Rolling
Answers
D.
In-place
D.
In-place
Answers
Suggested answer: A

Explanation:

The canary deployment model is an approach where a new feature or service is rolled out to a small subset of users before being deployed widely. This method allows the company to test the impact of the new feature in the production environment with a limited scope, minimizing risk and potential cost implications if issues arise. This approach contrasts with blue-green deployments, which involve switching between two identical environments; rolling deployments, which gradually update all instances; and in-place deployments, which update the current environment. The canary model is particularly suited for targeting specific user groups and gathering feedback before a full rollout.

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these requirements?

A.
Cloning
A.
Cloning
Answers
B.
Clustering
B.
Clustering
Answers
C.
Hardware passthrough
C.
Hardware passthrough
Answers
D.
Stand-alone container
D.
Stand-alone container
Answers
Suggested answer: B

Explanation:

Clustering refers to the use of multiple servers/computers to form what appears to be a single system. This concept is key for achieving high availability and resilience, especially for latency-sensitive workloads. By distributing the workload across a cluster that spans multiple regions, the system can continue to operate even if one or more nodes fail, thus maintaining performance and availability.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

Which of the following describes the main difference between public and private container repositories?

A.
Private container repository access requires authorization, while public repository access does not require authorization.
A.
Private container repository access requires authorization, while public repository access does not require authorization.
Answers
B.
Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.
B.
Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.
Answers
C.
Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.
C.
Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.
Answers
D.
Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.
D.
Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.
Answers
Suggested answer: A

Explanation:

The main difference between public and private container repositories lies in access control. Public repositories allow users to download and use container images without requiring any authorization, making them accessible to anyone. On the other hand, private repositories require users to have proper authorization, usually through credentials, to access the container images, thus providing a level of privacy and security control.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

Two CVEs are discovered on servers in the company's public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which of the following actions would be the best way to mitigate the vulnerabilities?

A.
Patching the operating systems
A.
Patching the operating systems
Answers
B.
Upgrading the operating systems to the latest beta
B.
Upgrading the operating systems to the latest beta
Answers
C.
Encrypting the operating system disks
C.
Encrypting the operating system disks
Answers
D.
Disabling unnecessary open ports
D.
Disabling unnecessary open ports
Answers
Suggested answer: A

Explanation:

For vulnerabilities with a high CVSS score and a network attack vector, the most effective and direct mitigation action is to patch the operating systems. Patching addresses the specific vulnerabilities that have been identified and helps to secure the servers against the known exploits that could take advantage of these CVEs.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

A.
Operating system patches
A.
Operating system patches
Answers
B.
Table-level permissions
B.
Table-level permissions
Answers
C.
Minor database engine updates
C.
Minor database engine updates
Answers
D.
Cluster configuration
D.
Cluster configuration
Answers
E.
Row-level encryption
E.
Row-level encryption
Answers
F.
Availability of hardware for scaling
F.
Availability of hardware for scaling
Answers
Suggested answer: B, E

Explanation:

In a provider-managed database service, the cloud provider typically manages the infrastructure, operating system, and database engine updates. However, the customer is responsible for the data and its security within the database, which includes setting table-level permissions and row-level encryption to ensure that data access and security is managed appropriately.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

Total 224 questions
Go to page: of 23