CompTIA CV0-004 Practice Test - Questions Answers, Page 15
List of questions
Question 141

An administrator needs to provide a backup solution for a cloud infrastructure that enables the resources to run from another data center in case of a outage. Connectivity to the backup data center is via a third-party, untrusted network. Which of the following is the most important feature required for this solution?
Explanation:
When backing up data that will traverse a third-party, untrusted network, encryption is the most important feature to ensure the confidentiality and integrity of the data. Encryption will protect the data from potential interception or tampering during transit to the backup data center.
Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)
Question 142

A group of cloud administrators frequently uses the same deployment template to recreate a cloud-based development environment. The administrators are unable to go back and review the history of changes they have made to the template. Which of the following cloud resource deployment concepts should the administrator start using?
Question 143

Which of the following describes what CRUD is typically used for?
Explanation:
CRUD stands for Create, Read, Update, Delete, and it is most commonly used for interacting with relational databases. These operations form the basis of persistent storage manipulation in most applications that use a database to store data.
Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)
Question 144

Which of the following is a direct effect of cloud migration on an enterprise?
Explanation:
Cloud migration typically results in a reduction of on-premises utility costs because the physical infrastructure requirements, such as power and cooling, are transferred to the cloud provider. This shift can lead to significant savings in utility expenses for the enterprise.
Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)
Question 145

A systems administrator needs to configure backups for the company's on-premises VM cluster. The storage used for backups will be constrained on free space until the company can implement cloud backups. Which of the following backup types will save the most space, assuming the frequency of backups is kept the same?
Explanation:
An incremental backup strategy saves space because it only backs up data that has changed since the last backup. Compared to full and differential backups, incremental backups are smaller and save more space, which is essential when storage is constrained.
Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)
Question 146

A cloud server needs to automatically allocate more resources during sudden peak times. This allocation does not need to occur in regular intervals. Which of the following scaling approaches should be used?
Explanation:
Event-based scaling is designed to allocate more resources automatically in response to specific events, such as sudden peak times that are not regular or predictable. This type of scaling ensures that resources are available when needed without the need to schedule them in advance or adjust them manually.
Reference: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)
Question 147

An organization is hosting a seminar with eight individuals who need to connect to their own dedicated VM. The technician used the following VM configurations:
IP address: DHCP
NIC: 1Gbps
Network: 10.1.10.0/29
Several users are unable to access their VMs. Which of the following best describes the reason?
Explanation:
The network is configured with a subnet of /29, which provides only 6 usable IP addresses after accounting for the network and broadcast addresses. With eight individuals needing to connect to their own dedicated VMs, there are not enough IP addresses available to assign to each VM, leading to several users being unable to access their VMs. This issue is not related to misconfigured routes, network traffic, or DHCP functionality, but rather the limited number of IP addresses available in the given subnet.
Question 148

A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the following migration strategies is best approach for this use case?
Explanation:
Rehosting, often referred to as 'lift-and-shift,' is the process of migrating an application or workload to the cloud without modifying it. This approach is suitable when there are timing constraints that prevent making changes to the application prior to migration. Rehosting can be the quickest migration strategy since it involves moving the existing applications to the cloud with minimal changes.
Question 149

A cloud infrastructure administrator updated the IP tables to block incoming connections and outgoing responses to 104.225.110.203. Which of the following vulnerability management steps is this an example of?
Explanation:
Updating the IP tables to block connections to a specific IP address as a response to vulnerabilities is an example of remediation. Remediation involves taking direct action to fix vulnerabilities, such as by applying patches, changing configurations, or, in this case, updating firewall rules to block potentially harmful traffic.
Question 150

A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned. Which of the following scripts should the systems administrator use to achieve this goal?
Explanation:
Script A is designed to monitor the health of an application by checking its response code. If the application returns a 200 (OK) status, it indicates that the application is healthy. Otherwise, the script will stop the VM to address the issue, which is a common approach to handle unhealthy application states in automated environments. This script effectively achieves the goal of monitoring application health and taking corrective action when an unsuccessful code is returned.
Question