ExamGecko
Home Home / CompTIA / CV0-004

CompTIA CV0-004 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











An organization's critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of a software web application:

'2021/12/18 09:33:12' '10. 34. 32.18' '104. 224. 123. 119' 'POST / login.php?u=administrator&p=or%201%20=1'

'2021/12/18 09:33:13' '10.34. 32.18' '104. 224. 123.119' 'POST /login. php?u=administrator&p=%27%0A'

'2021/12/18 09:33:14' '10. 34. 32.18' '104. 224. 123. 119' 'POST /login. php?u=administrator&p=%26'

'2021/12/18 09:33:17' '10.34. 32.18' '104. 224. 123.119' 'POST / login.php?u=administrator&p=%3B'

'2021/12/18 09:33:12' '10.34. 32. 18' '104. 224. 123. 119' 'POST / login. php?u=admin&p=or%201%20=1'

'2021/12/18 09:33:19' '10.34.32.18' '104. 224. 123.119' 'POST / login. php?u=admin&p=%27%0A'

'2021/12/18 09:33:21' '10. 34. 32.18' '104.224. 123.119' 'POST / login. php?u=admin&p=%26'

'2021/12/18 09:33:23' '10. 34. 32.18' '104. 224. 123.119' 'POST / login. php?u=admin&p=%3B'

Which of the following types of attacks occurred?

A.
SQL injection
A.
SQL injection
Answers
B.
Cross-site scripting
B.
Cross-site scripting
Answers
C.
Reuse of leaked credentials
C.
Reuse of leaked credentials
Answers
D.
Privilege escalation
D.
Privilege escalation
Answers
Suggested answer: A

Explanation:

The security logs of the software web application show patterns that are typical of an SQL injection attack. This is evidenced by the inclusion of SQL syntax in the user input fields in an attempt to manipulate the database.

Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Security Threats

A company wants to create a few additional VDIs so support vendors and contractors have a secure method to access the company's cloud environment. When a cloud administrator attempts to create the additional instances in the new locations, the operation is successful in some locations but fails in others. Which of the following is the most likely reason for this failure?

A.
Partial service outages
A.
Partial service outages
Answers
B.
Regional service availability
B.
Regional service availability
Answers
C.
Service quotas
C.
Service quotas
Answers
D.
Deprecation of functionality
D.
Deprecation of functionality
Answers
Suggested answer: C

Explanation:

If a cloud administrator can create additional instances in some locations but not others, the most likely reason for this failure is service quotas. Cloud providers often have quotas on the number of resources that can be created, and these limits can vary by region.

Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Resource Management

An IT manager is migrating the production environment to the cloud but needs to keep control of the operating systems, patches, and settings of all resources. Which of the following deployment models will best meet the requirements?

A.
FaaS
A.
FaaS
Answers
B.
PaaS
B.
PaaS
Answers
C.
laaS
C.
laaS
Answers
D.
SaaS
D.
SaaS
Answers
Suggested answer: C

Explanation:

Infrastructure as a Service (IaaS) is the deployment model that will best meet the requirements of retaining control over the operating systems, patches, and settings of all resources. IaaS provides the cloud infrastructure but leaves the management of the operating system and applications to the user.

Reference: The cloud service models and the level of control they offer are fundamental topics in the CompTIA Cloud+ certification material.

A cloud engineer is reviewing a disaster recovery plan that includes the following requirements:

* System state, files, and configurations must be backed up on a weekly basis.

* The system state, file, and configuration backups must be tested annually.

Which of the following backup methods should the engineer implement for the first week the plan is executed?

A.
Differential
A.
Differential
Answers
B.
Incremental
B.
Incremental
Answers
C.
Snapshot
C.
Snapshot
Answers
D.
Full
D.
Full
Answers
Suggested answer: D

Explanation:

A full backup method should be implemented for the first week the disaster recovery plan is executed. This will ensure that a complete copy of the system state, files, and configurations are backed up. Subsequent backups can be differential or incremental as per the plan.

Reference: Backup methodologies, including the importance of full backups, are part of the data management strategies in cloud computing covered in the CompTIA Cloud+ certification.

A cloud engineer is troubleshooting a connectivity issue. The application server with IP 192.168.1.10 in one subnet is not connecting to the MySQL database server with IP 192.168.2 20 in a different subnet. The cloud engineer reviews the following information:

Application Server Stateful Firewall

Which of the following should the cloud engineer address lo fix the communication issue?

A.
The Application Server Stateful Firewall
A.
The Application Server Stateful Firewall
Answers
B.
The Application Server Subnet Routing Table
B.
The Application Server Subnet Routing Table
Answers
C.
The MySQL Server Stateful Firewall
C.
The MySQL Server Stateful Firewall
Answers
D.
The MySQL Server Subnet Routing Table
D.
The MySQL Server Subnet Routing Table
Answers
Suggested answer: C

Explanation:

The connectivity issue between the application server and the MySQL database server in different subnets is likely due to the MySQL Server Stateful Firewall's inbound rules. The application server has an IP of 192.168.1.10, but the MySQL server's inbound rules only permit IP 192.168.1.10/32 on port 3306. This rule allows only a single IP address (192.168.1.10) to communicate on port 3306, which is typical for MySQL. However, if the application server's IP is not 192.168.1.10 or the application is trying to communicate on a different port, it would be blocked. To fix the communication issue, the cloud engineer should address the inbound rules on the MySQL Server Stateful Firewall to ensure that the application server's IP address and the required port are allowed.

Reference: Based on the information provided in the question and general networking principles.

A SaaS provider introduced new software functionality for customers as part of quarterly production enhancements. After an update is implemented, users cannot locate certain transactions from an inbound integration. During the investigation, the application owner finds the following error in the logs:

Error: REST API - Deprecated call is no longer supported in this release.

Which of the following is the best action for the application owner to take to resolve the issue?

A.
Update the custom integration to use a supported function.
A.
Update the custom integration to use a supported function.
Answers
B.
Include the custom integration in the quarterly testing scope.
B.
Include the custom integration in the quarterly testing scope.
Answers
C.
Ask the users to monitor the quarterly updates.
C.
Ask the users to monitor the quarterly updates.
Answers
D.
Revert the application to the last stable quarterly release.
D.
Revert the application to the last stable quarterly release.
Answers
Suggested answer: A

Explanation:

The error message indicates that the SaaS provider has deprecated a function that was previously called by the custom integration. The best action for the application owner to take is to update the custom integration to use a function that is supported in the current release. This is a direct solution to the problem and ensures the custom integration conforms to the updated SaaS provider's API.

Reference: Based on the error message provided and standard practices for dealing with deprecated API calls in a SaaS environment.

A company wants to build its new platform using a public cloud. The workload requirements include the following:

* Implementation of custom CIS compliance

* Patch for vulnerabilities within 24 hours

* Warrant at least 1,800 IOPS per volume

Which of the following meets the requirements?

A.
SaaS
A.
SaaS
Answers
B.
laaS
B.
laaS
Answers
C.
FaaS
C.
FaaS
Answers
D.
PaaS
D.
PaaS
Answers
Suggested answer: B

Explanation:

Infrastructure as a Service (IaaS) provides the most flexibility among cloud service models, allowing for the implementation of custom security and compliance standards, such as CIS compliance. IaaS environments offer control over the infrastructure, enabling patch management within specific time frames. Additionally, IaaS providers typically offer configurable storage options, including the ability to specify IOPS (Input/Output Operations Per Second) per volume to meet performance requirements.

A cloud engineer is extending on-premises services to a public cloud. The following design requirements must be considered in the overall solution:

' The ability to remotely connect systems from both environments

* No IP address conflicts or overlap

* Cost-effectiveness

Which of the following cloud network concepts best meets these requirements?

A.
Dedicated connection
A.
Dedicated connection
Answers
B.
VPN
B.
VPN
Answers
C.
VLAN
C.
VLAN
Answers
D.
ACL
D.
ACL
Answers
Suggested answer: B

Explanation:

A Virtual Private Network (VPN) is the most cost-effective solution for extending on-premises services to a public cloud while ensuring secure remote connectivity. VPNs can be configured to avoid IP address conflicts and overlap by using IP address translation and tunneling techniques, making them suitable for connecting disparate environments without significant changes to the existing network infrastructure.

An administrator is creating a cron job that shuts down the virtual machines at night to save on costs. Which of the following is the best way to achieve this task?

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: C

Explanation:

Option C is the correct script for shutting down virtual machines that are currently running. It iterates through a list of VMs, checks if the status of each VM is 'running', and if so, proceeds to shut down the VM. The script then prints a message stating that the VM has been stopped. This approach ensures that only VMs that are actively running are targeted for shutdown, optimizing resource utilization and cost savings.

A cloud engineer is developing an operating expense report that will be used to purchase various cloud billing models for virtual machine instances. The cloud billing model must meet the following requirements:

* The instance cannot be ephemeral.

* The minimum life cycle of the instance is expected to be five years.

* The software license is charged per physical CPU count.

Which of the following models would best meet these requirements?

A.
Dedicated host
A.
Dedicated host
Answers
B.
Spot instance
B.
Spot instance
Answers
C.
Pay-as-you-go
C.
Pay-as-you-go
Answers
D.
Reserved resources
D.
Reserved resources
Answers
Suggested answer: D

Explanation:

Reserved resources, or Reserved Instances, are ideal for workloads with predictable usage and a long-term commitment, such as a minimum lifecycle of five years. This model allows for significant cost savings compared to on-demand pricing, and the instance is not ephemeral, meaning it persists and is dedicated to the user for the duration of the reservation. The licensing charged per physical CPU count aligns with dedicated host or reserved instance models, but the long-term commitment points more towards reserved resources.

Total 224 questions
Go to page: of 23