ExamGecko
Home Home / CompTIA / CV0-004

CompTIA CV0-004 Practice Test - Questions Answers, Page 23

Question list
Search
Search

Related questions











A cloud administrator is building a company-standard VM image, which will be based on a public image. Which of the following should the administrator implement to secure the image?

A.
ACLs
A.
ACLs
Answers
B.
Least privilege
B.
Least privilege
Answers
C.
Hardening
C.
Hardening
Answers
D.
Vulnerability scanning
D.
Vulnerability scanning
Answers
Suggested answer: C

Explanation:

Hardening a VM image involves implementing security measures to reduce vulnerabilities and protect against threats. This process includes removing unnecessary software, services, and permissions, ensuring that the remaining software is updated with the latest security patches, and configuring settings to enhance security. Starting with a public image, the administrator should apply hardening techniques to ensure the custom company-standard VM image is secure and resilient against attacks.

A company's website suddenly crashed. A cloud engineer investigates the following logs:

Which of the following is the most likely cause of the issue?

A.
SQL injection
A.
SQL injection
Answers
B.
Cross-site scripting
B.
Cross-site scripting
Answers
C.
Leaked credentials
C.
Leaked credentials
Answers
D.
DDoS
D.
DDoS
Answers
Suggested answer: D

Explanation:

The logs indicate a sudden surge in access requests to the website's homepage, followed by 502 errors, which are indicative of server overload or failure to handle incoming requests. This pattern is typical of a Distributed Denial of Service (DDoS) attack, where multiple compromised systems flood the target with traffic, exceeding its capacity to handle requests, leading to service disruption.

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

A.
Setting up private development, public development, and testing environments
A.
Setting up private development, public development, and testing environments
Answers
B.
Segregating environments for internal and external teams
B.
Segregating environments for internal and external teams
Answers
C.
Configuring DDoS protection to mitigate the risk of downtime
C.
Configuring DDoS protection to mitigate the risk of downtime
Answers
D.
Using IAM and ACL in order to bolster DLP
D.
Using IAM and ACL in order to bolster DLP
Answers
Suggested answer: D

Explanation:

In a project handling sensitive data with a mix of internal and external team members, implementing Identity and Access Management (IAM) and Access Control Lists (ACL) is crucial for Data Loss Prevention (DLP). These controls ensure that only authorized individuals have access to specific resources, and actions are governed according to the principle of least privilege, minimizing the risk of data leakage or unauthorized access.

A company operates a website that allows customers to upload, share, and retain tull ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

A.
Sovereignty
A.
Sovereignty
Answers
B.
Data classification
B.
Data classification
Answers
C.
Litigation holds
C.
Litigation holds
Answers
D.
Retention
D.
Retention
Answers
Suggested answer: A

Explanation:

Data sovereignty refers to the legal implications of storing data in a country, subject to that country's laws. As the website's usage expands globally, data sovereignty becomes a critical concern because laws governing data ownership, privacy, and rights can vary significantly from one jurisdiction to another, potentially affecting the users' ownership rights over their photographs.

Total 224 questions
Go to page: of 23