ExamGecko
Home / CompTIA / CV0-004 / List of questions
Ask Question

CompTIA CV0-004 Practice Test - Questions Answers, Page 14

Add to Whishlist

List of questions

Question 131

Report Export Collapse

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to calculate the severity of the risk from using this component?

CWE
CWE
CVSS
CVSS
CWSS
CWSS
CVE
CVE
Suggested answer: B
Explanation:

The Common Vulnerability Scoring System (CVSS) is what the organization should use to calculate the severity of the risk from using an old version of Apache Log4j software component. CVSS provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.

Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Risk Management

asked 02/10/2024
EduBP srl EduBP
48 questions

Question 132

Report Export Collapse

A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to recommend?

Using CIS-hardened images
Using CIS-hardened images
Using watermarked images
Using watermarked images
Using digitally signed images
Using digitally signed images
Using images that have an application firewall
Using images that have an application firewall
Suggested answer: A
asked 02/10/2024
David Romano
33 questions

Question 133

Report Export Collapse

A cloud engineer wants to run a script that increases the volume storage size if it is below 100GB. Which of the following should the engineer run?

CompTIA CV0-004 image Question 133 95083 10022024175116000000

Option A
Option A
Option B
Option B
Option C
Option C
Option D
Option D
Suggested answer: A
Explanation:

The correct script is Option A, which uses a conditional test to check if the volume size is less than 100GB. If it is, then it performs a resize operation; otherwise, it outputs a message indicating the volume is already the desired size.

Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Automation

asked 02/10/2024
Keona Campbell
41 questions

Question 134

Report Export Collapse

Servers in the hot site are clustered with the main site.

Network traffic is balanced between the main site and hot site servers.
Network traffic is balanced between the main site and hot site servers.
Offline server backups are replicated hourly from the main site.
Offline server backups are replicated hourly from the main site.
All servers are replicated from the main site in an online status.
All servers are replicated from the main site in an online status.
Which of the following best describes a characteristic of a hot site?
Which of the following best describes a characteristic of a hot site?
Suggested answer: C
Explanation:

When servers in a hot site are clustered with the main site, it indicates that all servers are replicated from the main site in an online status. This means that the hot site maintains a live, real-time copy of data and applications, ensuring immediate availability in the event of a failure at the main site. Unlike options A and B, which describe load balancing and backup strategies respectively, clustering with a hot site as described in option C ensures that the hot site can take over with minimal downtime, maintaining business continuity.

asked 02/10/2024
Kajenthiran Varnamyilvaganam
51 questions

Question 135

Report Export Collapse

Which of the following container storage types loses data after a restart?

Object
Object
Persistent volume
Persistent volume
Ephemeral
Ephemeral
Block
Block
Suggested answer: C
Explanation:

In the context of container storage, ephemeral storage types are designed to be temporary, losing their data when the container is restarted or deleted. This is in contrast to persistent volumes, which retain data across container restarts and lifecycle, and object and block storage, which are used for specific types of data storage but not inherently temporary. Ephemeral storage is often used for temporary computation data, caching, or any data that doesn't need to persist beyond the lifecycle of the container instance.

asked 02/10/2024
EDUARDO LEE
44 questions

Question 136

Report Export Collapse

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

Canary
Canary
Blue-green
Blue-green
Rolling
Rolling
In-place
In-place
Suggested answer: A
Explanation:

The canary deployment model is an approach where a new feature or service is rolled out to a small subset of users before being deployed widely. This method allows the company to test the impact of the new feature in the production environment with a limited scope, minimizing risk and potential cost implications if issues arise. This approach contrasts with blue-green deployments, which involve switching between two identical environments; rolling deployments, which gradually update all instances; and in-place deployments, which update the current environment. The canary model is particularly suited for targeting specific user groups and gathering feedback before a full rollout.

asked 02/10/2024
Johan Benavides
52 questions

Question 137

Report Export Collapse

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these requirements?

Cloning
Cloning
Clustering
Clustering
Hardware passthrough
Hardware passthrough
Stand-alone container
Stand-alone container
Suggested answer: B
Explanation:

Clustering refers to the use of multiple servers/computers to form what appears to be a single system. This concept is key for achieving high availability and resilience, especially for latency-sensitive workloads. By distributing the workload across a cluster that spans multiple regions, the system can continue to operate even if one or more nodes fail, thus maintaining performance and availability.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

asked 02/10/2024
Jason Evans
52 questions

Question 138

Report Export Collapse

Which of the following describes the main difference between public and private container repositories?

Private container repository access requires authorization, while public repository access does not require authorization.
Private container repository access requires authorization, while public repository access does not require authorization.
Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.
Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.
Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.
Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.
Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.
Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.
Suggested answer: A
Explanation:

The main difference between public and private container repositories lies in access control. Public repositories allow users to download and use container images without requiring any authorization, making them accessible to anyone. On the other hand, private repositories require users to have proper authorization, usually through credentials, to access the container images, thus providing a level of privacy and security control.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

asked 02/10/2024
Kumail Alsinan
46 questions

Question 139

Report Export Collapse

Two CVEs are discovered on servers in the company's public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which of the following actions would be the best way to mitigate the vulnerabilities?

Patching the operating systems
Patching the operating systems
Upgrading the operating systems to the latest beta
Upgrading the operating systems to the latest beta
Encrypting the operating system disks
Encrypting the operating system disks
Disabling unnecessary open ports
Disabling unnecessary open ports
Suggested answer: A
Explanation:

For vulnerabilities with a high CVSS score and a network attack vector, the most effective and direct mitigation action is to patch the operating systems. Patching addresses the specific vulnerabilities that have been identified and helps to secure the servers against the known exploits that could take advantage of these CVEs.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

asked 02/10/2024
Nick Daniel
41 questions

Question 140

Report Export Collapse

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

Operating system patches
Operating system patches
Table-level permissions
Table-level permissions
Minor database engine updates
Minor database engine updates
Cluster configuration
Cluster configuration
Row-level encryption
Row-level encryption
Availability of hardware for scaling
Availability of hardware for scaling
Suggested answer: B, E
Explanation:

In a provider-managed database service, the cloud provider typically manages the infrastructure, operating system, and database engine updates. However, the customer is responsible for the data and its security within the database, which includes setting table-level permissions and row-level encryption to ensure that data access and security is managed appropriately.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

asked 02/10/2024
Stergios Gaidatzis
45 questions
Total 239 questions
Go to page: of 24
Search

Related questions