ExamGecko
Home Home / CompTIA / CV0-004

CompTIA CV0-004 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











An organization located in Asia connects to a cloud infrastructure hosted in North America and Europe. Sporadic slowness has been observed when using the PaaS and laaS components. A diagnostic using the following commands was run, and the following results were collected:

Which of the following is the most likely reason for the latency?

A.
Service degradation on the ISP
A.
Service degradation on the ISP
Answers
B.
A DDoS attack on the organization's infrastructure
B.
A DDoS attack on the organization's infrastructure
Answers
C.
Misconfiguration of the network security groups
C.
Misconfiguration of the network security groups
Answers
D.
Switch failure at the organization
D.
Switch failure at the organization
Answers
Suggested answer: A

Explanation:

The most likely reason for the latency is service degradation on the ISP. The results show that the ping and traceroute commands have sporadic timeout and increased round-trip values when reaching the public IP address of the cloud provider. This indicates that there is a network issue between the organization and the cloud provider, which could be caused by service degradation on the ISP. Service degradation on the ISP means that the ISP is experiencing reduced performance or availability of its network services, which can affect the quality and speed of the data transmission.

A systems administrator is responsible for upgrading operating systems on VMs that are hosted in a cloud environment. The systems administrator wants to ensure the VMs receive updates for as long as possible. Which of the following should the systems administrator choose?

A.
Stable
A.
Stable
Answers
B.
Nightly
B.
Nightly
Answers
C.
LTS
C.
LTS
Answers
D.
Canary
D.
Canary
Answers
E.
EDR
E.
EDR
Answers
Suggested answer: C

Explanation:

LTS stands for Long Term Support, and it is a term that refers to a version of an operating system that receives updates and security patches for a longer period of time than other versions. LTS versions are usually more stable and reliable than other versions, and they are suitable for users who want to avoid frequent changes or compatibility issues. By choosing LTS versions for the VMs that are hosted in a cloud environment, the systems administrator can ensure that the VMs receive updates for as long as possible, and benefit from the enhanced security and performance of the operating system.

A cloud administrator receives an email stating the following:

"Clients are receiving emails from our web application with non-encrypted links."

The administrator notices that links generated from the web application are opening in http://.

Which of the following should be configured to redirect the traffic to https://?

A.
User account access
A.
User account access
Answers
B.
Programming code
B.
Programming code
Answers
C.
Web server configuration
C.
Web server configuration
Answers
D.
Load balancer setting
D.
Load balancer setting
Answers
Suggested answer: C

Explanation:

To redirect the traffic from HTTP to HTTPS, the web server configuration should be modified to include a rule that forces the HTTP requests to be redirected to HTTPS. This can be done by using the web server’s configuration file or a .htaccess file. The exact syntax may vary depending on the web server software, but the general idea is to use a rewrite rule that matches the HTTP protocol and changes it to HTTPS. For example, on Apache web server, the following code can be added to the .htaccess file:

RewriteEngine On

RewriteCond %{HTTPS} off

RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301]

This code will check if the HTTPS is off, and if so, it will rewrite the URL to use HTTPS and redirect the client with a 301 status code, which means permanent redirection. This way, the clients will always use HTTPS to access the web application, and the links generated from the web application will be encrypted.

User account access (A) is not relevant to the redirection of HTTP to HTTPS, as it only controls who can access the web application. Programming code (B) may be used to generate the links with HTTPS, but it will not redirect the existing HTTP requests to HTTPS. Load balancer setting (D) may also be used to redirect the traffic to HTTPS, but it is not the most efficient or secure way, as it will add an extra layer of processing and expose the HTTP traffic to the load alancer. Therefore, web server configuration © is the best option to redirect the traffic to HTTPS.

Reference: The Official CompTIA Cloud+ Student Guide (Exam CV0-003), Chapter 4: Cloud Security,

A cloud engineer recently used a deployment script template to implement changes on a cloudhosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

A.
Misconfiguration in the user permissions
A.
Misconfiguration in the user permissions
Answers
B.
Misconfiguration in the routing traffic
B.
Misconfiguration in the routing traffic
Answers
C.
Misconfiguration in the network ACL
C.
Misconfiguration in the network ACL
Answers
D.
Misconfiguration in the firewall
D.
Misconfiguration in the firewall
Answers
Suggested answer: D

Explanation:

A misconfiguration in the firewall is the most likely cause of the issue. A firewall is a security device or service that controls the incoming and outgoing network traffic based on predefined rules. A firewall can help protect the cloud-hosted web application and the managed database from unauthorized or malicious access. However, if the firewall rules are not configured properly, they can also block the legitimate communication between the web application and the database. For example, if the firewall rules deny the port or protocol that the web application uses to connect to the database, the web application will not be able to receive data from the database. To fix this issue,

A cloud administrator recently created three servers in the cloud. The goal was to create ACLs so the servers could not communicate with each other. The servers were configured with the following IP addresses:

After implementing the ACLs, the administrator confirmed that some servers are still able to reach the other servers. Which of the following should the administrator change to prevent the servers from being on the same network?

A.
The IP address of Server 1 to 172.16.12.36
A.
The IP address of Server 1 to 172.16.12.36
Answers
B.
The IP address of Server 1 to 172.16.12.2
B.
The IP address of Server 1 to 172.16.12.2
Answers
C.
The IP address of Server 2 to 172.16.12.18
C.
The IP address of Server 2 to 172.16.12.18
Answers
D.
The IP address of Server 2 to 172.16.14.14
D.
The IP address of Server 2 to 172.16.14.14
Answers
Suggested answer: B

Explanation:

To prevent the servers from being on the same network and communicating with each other, the administrator should change the IP address of Server 1 to 172.16.12.2. This IP address is outside the subnet defined by the subnet mask 255.255.255.240, which would place Server 1 on a different subnet, preventing direct communication without routing.

Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson

A company serves customers globally from its website hosted in North America. A cloud engineer recently deployed new instances of the website in the Europe region. Which of the following is the most likely reason?

A.
To simplify workflow
A.
To simplify workflow
Answers
B.
To enhance security
B.
To enhance security
Answers
C.
To reduce latency
C.
To reduce latency
Answers
D.
To decrease cost
D.
To decrease cost
Answers
Suggested answer: C

Explanation:

The most likely reason for deploying new instances of a website in the Europe region, in addition to the ones hosted in North America, is to reduce latency for users located in Europe. By having the website's resources closer to the end-users, the data has a shorter distance to travel, resulting in faster load times and better performance.

Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

INSTRUCTIONS

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

Web app 1

Web app 2

Web app 3

Web app 4

Client app

A.
Check the Explanation for the complete Solution
A.
Check the Explanation for the complete Solution
Answers
Suggested answer: A

Explanation:

The issue is with Web app 1 (Finance application).

From the WAF logs, we can see that requests to https://webapp1.comptia.org/FIN/login.html are being blocked (Rule ID 1006). The rule is configured to block access to the finance application's login page. This corresponds to the reported issue of the web-based login prompt not loading.

To remediate the issue, the WAF configuration for Rule ID 1006 should be changed from 'Block' to 'Allow'. This will enable the web-based login prompt to load for the client.

Additionally, the client app configuration indicates that the client laptop (IP 192.168.10.142) is trying to access the service, and the WAF logs show that requests from this IP are being blocked due to the current rule set. Changing the action for Rule ID 1006 will also ensure that legitimate attempts to access the login page from this IP are not blocked.

Steps for remediation:

Go to the WAF configuration.

Find Rule ID 1006 for the Finance application 1.

Change the action from 'Block' to 'Allow'.

Save the changes.

Web application firewall (WAF) configurations typically include rules that define which traffic should be allowed or blocked. Blocking legitimate traffic to login pages can prevent users from accessing the application, which seems to be the case here.

Client application configurations and WAF logs provide valuable insights into the source of the traffic and the rules that are affecting it. It's important to ensure that the rules align with the intended access policies for the application.

You are a cloud engineer working for a cloud service provider that is responsible for an

IaaS offering.

Your customer, who creates VMs and manages virtual storage, has noticed I/O bandwidth issues and low IOPS (under 9000).

Your manager wants you to verify the proper storage configuration as dictated by your service level agreement (SLA).

The SLA specifies:

. Each SFP on the hypervisor host must be set to the maximum link speed allowed by the SAN array. . All SAN array disk groups must be configured in a RAID 5.

. The SAN array must be fully configured for redundant fabric paths. . IOPS should not fall below 14000

INSTRUCTIONS

Click on each service processor to review the displayed information. Then click on the drop-down menus to change the settings of each device as necessary to conform to the SLA requirements.

A.
See the explanation for complete solution
A.
See the explanation for complete solution
Answers
Suggested answer: A

Explanation:

Based on the SLA requirements and the information provided in the diagram:

For the Hypervisor:

Slot A fiber channel card:

Port 1 link speed should be set to 16 Gbps since it's connected to Fabric switch A which supports 16 Gbps.

Port 2 link speed should be set to 8 Gbps because it's connected to Fabric switch B which supports up to 8 Gbps.

Slot B fiber channel card:

Port 1 link speed should be set to 16 Gbps since it's connected to Fabric switch A which supports 16 Gbps.

Port 2 link speed should be set to 8 Gbps because it's connected to Fabric switch B which supports up to 8 Gbps.


A company runs a discussion forum that caters to global users. The company's monitoring system reports that the home page suddenly is seeing elevated response times, even though internal monitoring has reported no issues or changes. Which of the following is the most likely cause of this issue?

A.
Cryptojacking
A.
Cryptojacking
Answers
B.
Human error
B.
Human error
Answers
C.
DDoS
C.
DDoS
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: C

Explanation:

Elevated response times without reported issues or changes internally could indicate a Distributed Denial of Service (DDoS) attack, where multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.

Reference: CompTIA Security+ Guide to Network Security Fundamentals by Mark Ciampa.

Which of the following technologies should be used by a person who is visually impaired to access data from the cloud?

A.
Object character recognition
A.
Object character recognition
Answers
B.
Text-to-voice
B.
Text-to-voice
Answers
C.
Sentiment analysis
C.
Sentiment analysis
Answers
D.
Visual recognition
D.
Visual recognition
Answers
Suggested answer: B

Explanation:

Text-to-voice (or text-to-speech) technology should be used by a person who is visually impaired to access data from the cloud. It converts text data into audible speech, allowing visually impaired individuals to receive the information audibly.

Reference: CompTIA Accessibility in IT Study Guide.

Total 224 questions
Go to page: of 23