ExamGecko
Home Home / CompTIA / CV0-004

CompTIA CV0-004 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











An administrator needs to provide a backup solution for a cloud infrastructure that enables the resources to run from another data center in case of a outage. Connectivity to the backup data center is via a third-party, untrusted network. Which of the following is the most important feature required for this solution?

A.
Deduplication
A.
Deduplication
Answers
B.
Replication
B.
Replication
Answers
C.
Compression
C.
Compression
Answers
D.
Encryption
D.
Encryption
Answers
E.
Labeling
E.
Labeling
Answers
Suggested answer: D

Explanation:

When backing up data that will traverse a third-party, untrusted network, encryption is the most important feature to ensure the confidentiality and integrity of the data. Encryption will protect the data from potential interception or tampering during transit to the backup data center.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

A group of cloud administrators frequently uses the same deployment template to recreate a cloud-based development environment. The administrators are unable to go back and review the history of changes they have made to the template. Which of the following cloud resource deployment concepts should the administrator start using?

A.
Drift detection
A.
Drift detection
Answers
B.
Repeatability
B.
Repeatability
Answers
C.
Documentation
C.
Documentation
Answers
D.
Versioning
D.
Versioning
Answers
Suggested answer: D

Which of the following describes what CRUD is typically used for?

A.
Relational databases
A.
Relational databases
Answers
B.
Time series databases
B.
Time series databases
Answers
C.
Graph databases
C.
Graph databases
Answers
D.
NoSQL databases
D.
NoSQL databases
Answers
Suggested answer: A

Explanation:

CRUD stands for Create, Read, Update, Delete, and it is most commonly used for interacting with relational databases. These operations form the basis of persistent storage manipulation in most applications that use a database to store data.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

Which of the following is a direct effect of cloud migration on an enterprise?

A.
The enterprise must reorganize the reporting structure.
A.
The enterprise must reorganize the reporting structure.
Answers
B.
Compatibility issues must be addressed on premises after migration.
B.
Compatibility issues must be addressed on premises after migration.
Answers
C.
Cloud solutions will require less resources than on-premises installations.
C.
Cloud solutions will require less resources than on-premises installations.
Answers
D.
Utility costs will be reduced on premises.
D.
Utility costs will be reduced on premises.
Answers
Suggested answer: D

Explanation:

Cloud migration typically results in a reduction of on-premises utility costs because the physical infrastructure requirements, such as power and cooling, are transferred to the cloud provider. This shift can lead to significant savings in utility expenses for the enterprise.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

A systems administrator needs to configure backups for the company's on-premises VM cluster. The storage used for backups will be constrained on free space until the company can implement cloud backups. Which of the following backup types will save the most space, assuming the frequency of backups is kept the same?

A.
Snapshot
A.
Snapshot
Answers
B.
Ful
B.
Ful
Answers
C.
Differential
C.
Differential
Answers
D.
Incremental
D.
Incremental
Answers
Suggested answer: D

Explanation:

An incremental backup strategy saves space because it only backs up data that has changed since the last backup. Compared to full and differential backups, incremental backups are smaller and save more space, which is essential when storage is constrained.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

A cloud server needs to automatically allocate more resources during sudden peak times. This allocation does not need to occur in regular intervals. Which of the following scaling approaches should be used?

A.
Event
A.
Event
Answers
B.
Manual
B.
Manual
Answers
C.
Trending
C.
Trending
Answers
D.
Scheduled
D.
Scheduled
Answers
Suggested answer: A

Explanation:

Event-based scaling is designed to allocate more resources automatically in response to specific events, such as sudden peak times that are not regular or predictable. This type of scaling ensures that resources are available when needed without the need to schedule them in advance or adjust them manually.

Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

An organization is hosting a seminar with eight individuals who need to connect to their own dedicated VM. The technician used the following VM configurations:

IP address: DHCP

NIC: 1Gbps

Network: 10.1.10.0/29

Several users are unable to access their VMs. Which of the following best describes the reason?

A.
Not enough addresses are available.
A.
Not enough addresses are available.
Answers
B.
The routes are misconfigured.
B.
The routes are misconfigured.
Answers
C.
Too much traffic is on the network.
C.
Too much traffic is on the network.
Answers
D.
DHCP is not working correctly on the VM.
D.
DHCP is not working correctly on the VM.
Answers
Suggested answer: A

Explanation:

The network is configured with a subnet of /29, which provides only 6 usable IP addresses after accounting for the network and broadcast addresses. With eight individuals needing to connect to their own dedicated VMs, there are not enough IP addresses available to assign to each VM, leading to several users being unable to access their VMs. This issue is not related to misconfigured routes, network traffic, or DHCP functionality, but rather the limited number of IP addresses available in the given subnet.

A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the following migration strategies is best approach for this use case?

A.
Retire
A.
Retire
Answers
B.
Rearchitect
B.
Rearchitect
Answers
C.
Refactor
C.
Refactor
Answers
D.
Rehost
D.
Rehost
Answers
Suggested answer: D

Explanation:

Rehosting, often referred to as 'lift-and-shift,' is the process of migrating an application or workload to the cloud without modifying it. This approach is suitable when there are timing constraints that prevent making changes to the application prior to migration. Rehosting can be the quickest migration strategy since it involves moving the existing applications to the cloud with minimal changes.

A cloud infrastructure administrator updated the IP tables to block incoming connections and outgoing responses to 104.225.110.203. Which of the following vulnerability management steps is this an example of?

A.
Scanning scope
A.
Scanning scope
Answers
B.
Remediation
B.
Remediation
Answers
C.
Identification
C.
Identification
Answers
D.
Assessment
D.
Assessment
Answers
Suggested answer: B

Explanation:

Updating the IP tables to block connections to a specific IP address as a response to vulnerabilities is an example of remediation. Remediation involves taking direct action to fix vulnerabilities, such as by applying patches, changing configurations, or, in this case, updating firewall rules to block potentially harmful traffic.

A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned. Which of the following scripts should the systems administrator use to achieve this goal?

A.
RESPONSE_CODE } string APP_URL bool RESPONSE_CODE string VM health checker (APP_URL, VM) { if [ http_probe (APP_URL) == 200] { echo RESPONSE_CODE } else{ stop (VM) echo
A.
RESPONSE_CODE } string APP_URL bool RESPONSE_CODE string VM health checker (APP_URL, VM) { if [ http_probe (APP_URL) == 200] { echo RESPONSE_CODE } else{ stop (VM) echo
Answers
B.
else{ echo string APP_URL float RESPONSE_CODE string VM health_checker (APP_URL, VM) { if [ http_probe (APP_URL) == 200] { stop (RESPONSE_CODE) echo VM } stop (VM) RESPONSE CODE }
B.
else{ echo string APP_URL float RESPONSE_CODE string VM health_checker (APP_URL, VM) { if [ http_probe (APP_URL) == 200] { stop (RESPONSE_CODE) echo VM } stop (VM) RESPONSE CODE }
Answers
C.
else{ echo string APP_URL int RESPONSE CODE string VM health checker (APP_URL, VM) { if [ http_probe (APP_URL) == 200] { echo RESPONSE_CODE } stop (VM) RESPONSE_CODE }
C.
else{ echo string APP_URL int RESPONSE CODE string VM health checker (APP_URL, VM) { if [ http_probe (APP_URL) == 200] { echo RESPONSE_CODE } stop (VM) RESPONSE_CODE }
Answers
D.
else{ echo string APP_URL int RESPONSE_CODE string VM health_checker (APP_URL, VM) { if [ http_probe (VM) == 200] { stop (VM) echo RESPONSE_CODE } RESPONSE CODE }
D.
else{ echo string APP_URL int RESPONSE_CODE string VM health_checker (APP_URL, VM) { if [ http_probe (VM) == 200] { stop (VM) echo RESPONSE_CODE } RESPONSE CODE }
Answers
Suggested answer: A

Explanation:

Script A is designed to monitor the health of an application by checking its response code. If the application returns a 200 (OK) status, it indicates that the application is healthy. Otherwise, the script will stop the VM to address the issue, which is a common approach to handle unhealthy application states in automated environments. This script effectively achieves the goal of monitoring application health and taking corrective action when an unsuccessful code is returned.

Total 224 questions
Go to page: of 23