ExamGecko
Home Home / CompTIA / CV0-004

CompTIA CV0-004 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











A company recently set up a CDN for its photography and image-sharing website. Which of the following is the most likely reason for the company's action?

A.
To eliminate storage costs
A.
To eliminate storage costs
Answers
B.
To improve site speed
B.
To improve site speed
Answers
C.
To enhance security of static assets
C.
To enhance security of static assets
Answers
D.
To prevent unauthorized access
D.
To prevent unauthorized access
Answers
Suggested answer: B

Explanation:

The most likely reason for setting up a Content Delivery Network (CDN) is to improve site speed, especially for a photography and image-sharing website. CDNs cache content at edge locations closer to end-users, significantly reducing load times for static assets like images and videos. This enhancement in speed can improve user experience and site performance.

A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?

A.
The company should have switched from object storage to file storage.
A.
The company should have switched from object storage to file storage.
Answers
B.
The company should have hashed the data.
B.
The company should have hashed the data.
Answers
C.
The company should have changed the file access permissions.
C.
The company should have changed the file access permissions.
Answers
D.
The company should have encrypted the data at rest.
D.
The company should have encrypted the data at rest.
Answers
Suggested answer: D

Explanation:

Encrypting the data at rest is a crucial security measure to make the data unusable to unauthorized parties. If the object storage data was accessed by an unauthorized party, having the data encrypted would ensure that the data remains confidential and inaccessible without the proper encryption keys, thus mitigating the impact of the breach.

Which of the following storage resources provides higher availability and speed for currently used files?

A.
Warm/HDD
A.
Warm/HDD
Answers
B.
Cold/SSD
B.
Cold/SSD
Answers
C.
Hot/SSD
C.
Hot/SSD
Answers
D.
Archive/HDD
D.
Archive/HDD
Answers
Suggested answer: C

Explanation:

Hot storage using Solid State Drives (SSD) is designed for data that needs to be accessed frequently and quickly. SSDs provide faster access times compared to HDDs, making them suitable for high-availability and speed-critical files, such as those currently in use or requiring rapid access.

A company is required to save historical data for seven years. A cloud administrator implements a script that automatically deletes data older than seven years. Which of the following concepts best describes why the historical data is being deleted?

A.
End of life
A.
End of life
Answers
B.
Data loss prevention
B.
Data loss prevention
Answers
C.
Cost implications
C.
Cost implications
Answers
D.
Tiered storage for archiving
D.
Tiered storage for archiving
Answers
Suggested answer: A

Explanation:

Deleting historical data older than seven years as described is an example of data end of life (EOL) policies in action. These policies dictate when data is no longer needed or relevant and should be securely disposed of, often for compliance, legal, or cost-saving reasons.

A company receives files daily from a bank. The company requires that the files must be copied from the cloud storage resource to another cloud storage resource for further processing. Which of the following methods requires the least amount of effort to achieve the task?

A.
Remote procedure call
A.
Remote procedure call
Answers
B.
SOAP
B.
SOAP
Answers
C.
Event-driven architecture
C.
Event-driven architecture
Answers
D.
REST
D.
REST
Answers
Suggested answer: C

Explanation:

An event-driven architecture is the most efficient method for automating the task of copying files from one cloud storage resource to another upon their arrival. This architecture allows systems to automatically trigger actions based on specific events, such as the arrival of new files, minimizing manual effort and ensuring timely processing.

A developer is building an application that has multiple microservices that need to communicate with each other. The developer currently manually updates the IP address of each service. Which of the following best resolves the communication issue and automates the process?

A.
Service discovery
A.
Service discovery
Answers
B.
Fan-out
B.
Fan-out
Answers
C.
Managed container services
C.
Managed container services
Answers
D.
DNS
D.
DNS
Answers
Suggested answer: A

Explanation:

Service discovery is a key component in microservices architectures, allowing services to dynamically discover and communicate with each other. By implementing service discovery, the developer can automate the process of updating service addresses, resolving the communication issue without manual updates to IP addresses, thus ensuring seamless interaction between the microservices.

A bank informs an administrator that changes must be made to backups for long-term reporting purposes. Which of the following is the most important change the administrator should make to satisfy these requirements?

A.
Location of the backups
A.
Location of the backups
Answers
B.
Type of the backups
B.
Type of the backups
Answers
C.
Retention of the backups
C.
Retention of the backups
Answers
D.
Schedule of the backups
D.
Schedule of the backups
Answers
Suggested answer: C

Explanation:

For long-term reporting purposes, the most critical aspect to consider is the retention period of the backups. This is because the bank will likely require access to historical data for audit, compliance, and reporting purposes. The retention policy will need to ensure that backups are kept for the required duration, which may be several years depending on regulatory and business needs. Adjusting the retention policy will help ensure that the necessary data is preserved for as long as it is needed, without unnecessary data accumulation that could lead to higher costs and management complexity.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg

The company's IDS has reported an anomaly. The cloud engineer remotely accesses the cloud instance, runs a command, and receives the following information:

Which of the following is the most likely root cause of this anomaly?

A.
Privilege escalation
A.
Privilege escalation
Answers
B.
Leaked credentials
B.
Leaked credentials
Answers
C.
Cryptojacking
C.
Cryptojacking
Answers
D.
Defaced website
D.
Defaced website
Answers
Suggested answer: A

Explanation:

The output from the 'ps' command indicates there is a process running under the UID (User ID) of 0, which is the root user, and the command that was run is '/var/www/command.py'. Given that the normal Apache processes are running under their own UID (65535), this suggests that a command was executed with root privileges that typically should not have such high-level access. This is a strong indicator of privilege escalation, where an unauthorized user or process gains elevated access to resources that are normally protected from an application or user.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg

A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following delivery mechanisms would best support this integration?

A.
Enterprise service bus
A.
Enterprise service bus
Answers
B.
Socket
B.
Socket
Answers
C.
RPC
C.
RPC
Answers
D.
Queue
D.
Queue
Answers
Suggested answer: A

Explanation:

An Enterprise Service Bus (ESB) is designed to facilitate application integration by providing a centralized architecture for high-level, message-based, and event-driven communication between different systems. It is particularly well-suited for integrating multiple systems with their own APIs because it can handle various data formats and protocols, enabling different applications to communicate with each other seamlessly.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg

A cloud engineer is deploying a cloud solution that will be used on premises with need-to-know access. Which of the following cloud deployment models best meets this requirement?

A.
Community
A.
Community
Answers
B.
Public
B.
Public
Answers
C.
Private
C.
Private
Answers
D.
Hybrid
D.
Hybrid
Answers
Suggested answer: C

Explanation:

A private cloud deployment model is the most appropriate when the requirement is for 'need-to-know' access, as it offers a more secure environment with resources dedicated to a single organization. It can be hosted on-premises or off-premises but is maintained on a private network, ensuring greater control over the data, security, and compliance when compared to other cloud models.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg

Total 224 questions
Go to page: of 23