ExamGecko
Home Home / CompTIA / CV0-004

CompTIA CV0-004 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











A cloud security analyst is investigating the impact of a recent cyberattack. The analyst is reviewing the following information:

Web server access log:

104.210.233.225 - - [21/10/2022:11:17: 40] 'POST /uploadfile.html?f=myfile.php' 200 1638674

45.32.10.66 - - [21/10/2022:11:19:12] 'GET /welcome.html' 200 5812

104.210.233.225 - - [21/10/2022:11:21:19] 'GET / .. / .. / .. / .. /conf/server.xml HTTP/1.1' 200 74458

45.32.10.66 - - [21/10/22:11:22:32] 'GET /admin.html HTTP/1.1' 200 9518

Web application firewall log:

'2022/10/21 11:17:33' '10.25.2.35' '104. 210.233.225' 'userl' 'File transfer completed successfully.'

'2022/10/21 11:21:05' '10. 25.2. 35' '104. 210.233.225' 'userl' 'Accessed application page.'

'2022/10/21 11:22:13' '10.25.2.35' '45. 32. 10. 66' 'user2' 'Accessing admin page. '

Which of the following has occurred?

A.
The corporate administration page was defaced by the attacker.
A.
The corporate administration page was defaced by the attacker.
Answers
B.
A denial-of-service attack was successfully performed on the web server.
B.
A denial-of-service attack was successfully performed on the web server.
Answers
C.
A new user was created on the web server by the attacker.
C.
A new user was created on the web server by the attacker.
Answers
D.
Sensitive information from the corporate web server was leaked.
D.
Sensitive information from the corporate web server was leaked.
Answers
Suggested answer: D

Explanation:

The logs indicate that the IP address 104.210.233.225 made a GET request that appears to traverse directories (as indicated by the '/../../') to access 'server.xml', which is a configuration file for the server. This type of request is indicative of a directory traversal attack, which can lead to unauthorized access to sensitive files on the server. The successful 200 response code suggests that the file was accessed, implying that sensitive configuration data could have been leaked.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg

A cloud consultant needs to modernize a legacy application that can no longer address user demand and is expensive to maintain. Which of the following is the best migration strategy?

A.
Retain
A.
Retain
Answers
B.
Rehost
B.
Rehost
Answers
C.
Refactor
C.
Refactor
Answers
D.
Replatform
D.
Replatform
Answers
Suggested answer: C

Explanation:

Refactoring is the process of restructuring existing computer code without changing its external behavior. In cloud computing, it often means modifying the application to better leverage cloud-native features and services. This can address user demand and reduce maintenance costs by making the application more scalable, resilient, and manageable.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg

A company has developed an online trading platform. The engineering team selected event-based scaling for the platform's underlying resources. The platform resources scale up with every 2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains why this is the case?

A.
Event-based scaling does not scale down resources.
A.
Event-based scaling does not scale down resources.
Answers
B.
Event-based scaling should not be triggered at the 2,000-user frequency.
B.
Event-based scaling should not be triggered at the 2,000-user frequency.
Answers
C.
Event-based scaling should not track user subscriptions.
C.
Event-based scaling should not track user subscriptions.
Answers
D.
Event-based scaling does not take resource load into account.
D.
Event-based scaling does not take resource load into account.
Answers
Suggested answer: D

Explanation:

Event-based scaling triggers based on specific events, such as the number of user subscriptions in this case. It does not necessarily account for the actual load or utilization of compute resources. This is why the platform's resources continue to scale up even though compute utilization is low; the scaling decision is being made based on the number of subscribed users rather than the current resource usage.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg

A developer at a small startup company deployed some code for a new feature to its public repository. A few days later, a data breach occurred. A security team investigated the incident and found that the database was hacked. Which of the following is the most likely cause of this breach?

A.
Database core dump
A.
Database core dump
Answers
B.
Hard-coded credentials
B.
Hard-coded credentials
Answers
C.
Compromised deployment agent
C.
Compromised deployment agent
Answers
D.
Unpatched web servers
D.
Unpatched web servers
Answers
Suggested answer: B

Explanation:

Hard-coded credentials within code, especially when deployed in a public repository, are a common security vulnerability. If credentials such as passwords or API keys are embedded in the code, anyone with access to the repository can potentially use them to gain unauthorized access to databases or other sensitive resources. This is a likely cause of the data breach in the scenario described.

Reference: CompTIA Security+ Guide to Network Security Fundamentals by Mark Ciampa.

Users have been reporting that a remotely hosted application is not accessible following a recent migration. However, the cloud administrator is able to access the application from the same site as the users. Which of the following should the administrator update?

A.
Cipher suite
A.
Cipher suite
Answers
B.
Network ACL
B.
Network ACL
Answers
C.
Routing table
C.
Routing table
Answers
D.
Permissions
D.
Permissions
Answers
Suggested answer: C

Explanation:

Since the cloud administrator can access the application from the same site but users cannot, it suggests a possible issue with the network routing. The routing table may need to be updated to ensure that traffic from the users' location is correctly directed to the new location of the remotely hosted application after the migration.

Reference: CompTIA Network+ Certification Study Guide by Glen E. Clarke.

A cloud administrator wants to provision a host with two VMs. The VMs require the following:

After configuring the servers, the administrator notices that during certain hours of the day, the performance heavily degrades. Which of the following is the best explanation?

A.
The host requires additional physical CPUs.
A.
The host requires additional physical CPUs.
Answers
B.
A higher number of processes occur at those times.
B.
A higher number of processes occur at those times.
Answers
C.
The RAM on each VM is insufficient.
C.
The RAM on each VM is insufficient.
Answers
D.
The storage is overutilized.
D.
The storage is overutilized.
Answers
Suggested answer: C

Explanation:

Given the provided table, the VMs have been allocated 2GB of RAM each, which may be insufficient for their workload, especially during peak hours which could lead to performance degradation. Insufficient RAM can cause the VMs to use swap space on disk, which is significantly slower and can lead to poor performance.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg.

A cloud engineer is exploring options to reduce the management overhead of the servers and network. Which of the following cloud service models should the engineer implement?

A.
SaaS
A.
SaaS
Answers
B.
XaaS
B.
XaaS
Answers
C.
PaaS
C.
PaaS
Answers
D.
laaS
D.
laaS
Answers
Suggested answer: C

Explanation:

Platform as a Service (PaaS) provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app. Adopting PaaS can significantly reduce the management overhead of servers and networks.

Reference: CompTIA Cloud Essentials+ Certification Study Guide (Exam CLO-002) by Scott Wilson.

Which of the following industry standards mentions that credit card data must not be exchanged or stored in cleartext?

A.
CSA
A.
CSA
Answers
B.
GDPR
B.
GDPR
Answers
C.
SOC2
C.
SOC2
Answers
D.
PCI-DSS
D.
PCI-DSS
Answers
Suggested answer: D

Explanation:

The Payment Card Industry Data Security Standard (PCI-DSS) is the industry standard that mandates that credit card data must not be stored or transmitted in cleartext. It includes requirements for encryption, access control, and other security measures to protect cardholder data.

Reference: Official PCI Security Standards Council Site.

A systems engineer is migrating a batch of 25 VMs from an on-premises compute cluster to a public cloud using the public cloud's migration agent. The migration job shows data copies at a rate of 250Mbps. After five servers migrate, the data copies at a rate of 25Mbps. Which of the following should the engineer review first to troubleshoot?

A.
The on-premises VM host hardware utilization
A.
The on-premises VM host hardware utilization
Answers
B.
The on-premises ISP throttling rate
B.
The on-premises ISP throttling rate
Answers
C.
The IOPS on the SAN backing the on-premises cluster
C.
The IOPS on the SAN backing the on-premises cluster
Answers
D.
The compute utilization of the VMs being migrated
D.
The compute utilization of the VMs being migrated
Answers
Suggested answer: A

Explanation:

The engineer should review the on-premises VM host hardware utilization first. A decrease in transfer rate after a batch of migrations could suggest that the host hardware resources (like CPU, RAM, or network bandwidth) are becoming saturated, which would slow down additional migrations.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg.

A log-parsing application requires significant processing power to ingest the logs streaming from web servers. The engineering team presents the cloud architect with four proposals using the same underlying hardware. Which of the following should the cloud architect select in order to minimize the impact of an instance failure while keeping the cost as low as possible?

A.
Four instances of 4vCPU, 8GB RAM, 80GB SSD
A.
Four instances of 4vCPU, 8GB RAM, 80GB SSD
Answers
B.
Four instances of 4vCPU, 8GB RAM, 80GB HDD
B.
Four instances of 4vCPU, 8GB RAM, 80GB HDD
Answers
C.
Two instances of 8vCPU, 16GB RAM, 80GB SSD
C.
Two instances of 8vCPU, 16GB RAM, 80GB SSD
Answers
D.
Two instances of 8vCPU, 16GB RAM, 80GB HDD
D.
Two instances of 8vCPU, 16GB RAM, 80GB HDD
Answers
Suggested answer: A

Explanation:

Choosing four instances with the given specifications would distribute the load and reduce the impact of any single instance failure. Using SSDs over HDDs would provide faster data processing capabilities which is crucial for a log-parsing application. This setup also retains cost efficiency by not over-provisioning resources.

Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg.

Total 224 questions
Go to page: of 23