ExamGecko
Home Home / CompTIA / CV0-004

CompTIA CV0-004 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











A government agency in the public sector is considering a migration from on premises to the cloud. Which of the following are the most important considerations for this cloud migration? (Select two).

A.
Compliance
A.
Compliance
Answers
B.
laaS vs. SaaS
B.
laaS vs. SaaS
Answers
C.
Firewall capabilities
C.
Firewall capabilities
Answers
D.
Regulatory
D.
Regulatory
Answers
E.
Implementation timeline
E.
Implementation timeline
Answers
F.
Service availability
F.
Service availability
Answers
Suggested answer: A, D

Explanation:

For a government agency considering cloud migration, compliance and regulatory considerations are of utmost importance. The agency must ensure that the migration aligns with legal requirements, industry standards, and government regulations specific to the public sector.

Reference: Compliance and regulatory considerations are crucial factors in the cloud migration process for government entities, as emphasized in the CompTIA Cloud+ certification.

Which of the following refers to the idea that data should stay within certain borders or territories?

A.
Data classification
A.
Data classification
Answers
B.
Data retention
B.
Data retention
Answers
C.
Data sovereignty
C.
Data sovereignty
Answers
D.
Data ownership
D.
Data ownership
Answers
Suggested answer: C

Explanation:

Data sovereignty refers to the concept that data is subject to the laws and governance structures within the nation it is collected or stored. It implies that regardless of where a company's data is stored, the data must comply with the laws of the country where it is physically located.

Reference: The principle of data sovereignty is a critical consideration in international cloud services and is included in the governance, risk, and compliance domain of CompTIA Cloud+.

A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

A.
Log retention
A.
Log retention
Answers
B.
Tracing
B.
Tracing
Answers
C.
Log aggregation
C.
Log aggregation
Answers
D.
Log rotation
D.
Log rotation
Answers
E.
Hashing
E.
Hashing
Answers
F.
Encryption
F.
Encryption
Answers
Suggested answer: A, C

Explanation:

For detailed logging to support root cause analysis of past events, the team should implement log retention to ensure logs are kept for the necessary amount of time and log aggregation to compile logs from various sources for easier analysis and correlation.

Reference: Log management practices, including retention and aggregation, are part of the cloud management strategies covered in the CompTIA Cloud+ curriculum, particularly in the domain of technical operations.

A company experienced a data leak through its website. A security engineer, who is investigating the issue, runs a vulnerability scan against the website and receives the following output:

Which of the following is the most likely cause of this leak?

A.
RTMP port open
A.
RTMP port open
Answers
B.
SQL injection
B.
SQL injection
Answers
C.
Privilege escalation
C.
Privilege escalation
Answers
D.
Insecure protocol
D.
Insecure protocol
Answers
Suggested answer: D

Explanation:

The data leak is most likely caused by the use of an insecure protocol. The vulnerability scan output shows that port 21/tcp for FTP (File Transfer Protocol) is open. FTP is known for transmitting data unencrypted, which could allow sensitive data to be intercepted during transfer.

Reference: The security risks associated with the use of insecure or unencrypted protocols are covered under cloud security best practices in the CompTIA Cloud+ curriculum.

An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements:

* Is simple and fast

* Can be performed on two Identical platforms

Which of the following strategies should the engineer use?

A.
Blue-green
A.
Blue-green
Answers
B.
Canary
B.
Canary
Answers
C.
Rolling
C.
Rolling
Answers
D.
in-place
D.
in-place
Answers
Suggested answer: A

Explanation:

The blue-green deployment strategy is ideal for scenarios where simplicity and speed are crucial. It involves two identical production environments: one (blue) hosts the current application version, while the other (green) is used to deploy the new version. Once testing is completed on the green environment and it's ready to go live, traffic is switched from blue to green, ensuring a quick and efficient rollout with minimal downtime. This method allows for immediate rollback if issues arise, by simply redirecting the traffic back to the blue environment.

Reference: CompTIA Cloud+ material emphasizes the importance of understanding various cloud deployment strategies, including blue-green, and their application in real-world scenarios to ensure efficient and reliable software deployment in cloud environments.

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

A.
Penetration test
A.
Penetration test
Answers
B.
End-to-end security testing
B.
End-to-end security testing
Answers
C.
Cost benefit analysis
C.
Cost benefit analysis
Answers
D.
User acceptance testing
D.
User acceptance testing
Answers
Suggested answer: D

Explanation:

Before a configuration change is deployed in the cloud production environment, it is crucial to conduct User Acceptance Testing (UAT). UAT involves testing the system by the end-users or clients to ensure it can handle required tasks in real-world scenarios, according to specifications. This testing is the final stage before the change is approved for production, ensuring that all functionalities meet user requirements and the system is ready for deployment.

Reference: The CompTIA Cloud+ certification highlights the significance of various testing phases, including UAT, as part of the cloud deployment process to validate the system's readiness and functionality for end-users.

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

A.
Resource tagging
A.
Resource tagging
Answers
B.
Discretionary access control
B.
Discretionary access control
Answers
C.
Multifactor authentication
C.
Multifactor authentication
Answers
D.
Role-based access control
D.
Role-based access control
Answers
E.
Token-based authentication
E.
Token-based authentication
Answers
F.
Bastion host
F.
Bastion host
Answers
Suggested answer: B, D

Explanation:

Discretionary Access Control (DAC) and Role-Based Access Control (RBAC) are effective methods for granting authorization based on system classification levels. DAC allows resource owners to grant access rights, making it flexible for environments with varying classification levels. RBAC assigns permissions based on roles within an organization, aligning access rights with the user's job functions and ensuring that users access only what is necessary for their role, which can be mapped to system classifications.

Reference: CompTIA Cloud+ content covers various access control models, emphasizing the importance of implementing appropriate security measures that align with organizational policies and classification levels to ensure secure and authorized access to cloud systems.

A system surpasses 75% to 80% of resource consumption. Which of the following scaling approaches is the most appropriate?

A.
Trending
A.
Trending
Answers
B.
Manual
B.
Manual
Answers
C.
Load
C.
Load
Answers
D.
Scheduled
D.
Scheduled
Answers
Suggested answer: C

Explanation:

Load scaling is the most appropriate approach when a system surpasses 75% to 80% of resource consumption. This method involves adjusting resources dynamically in response to the current load, ensuring the system can handle increased demand without performance degradation. Load scaling can be automatic, allowing systems to scale up or down based on predefined metrics like CPU usage, memory, or network traffic, providing an efficient way to manage resources and maintain optimal performance.

Reference: The CompTIA Cloud+ exam objectives include understanding cloud management and technical operations, which encompass knowledge of various scaling approaches, including load scaling, to ensure efficient resource utilization in cloud environments.

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

A.
Review the development network routing table.
A.
Review the development network routing table.
Answers
B.
Change the ciphers on the site-to-site VPN.
B.
Change the ciphers on the site-to-site VPN.
Answers
C.
Restart the site-to-site VPN tunnel.
C.
Restart the site-to-site VPN tunnel.
Answers
D.
Check the ACLS on the development workloads
D.
Check the ACLS on the development workloads
Answers
Suggested answer: A

Explanation:

The next step in troubleshooting the VPN tunnel issue is to review the development network routing table. This action will help determine if the routing configurations are correctly directing traffic from the headquarters office through the VPN tunnel to the development network resources. Proper routing ensures that data packets find their way to the correct destination within the cloud environment, which is critical for establishing successful communication between different network segments.

Reference: CompTIA Cloud+ materials stress the importance of networking fundamentals in cloud environments, including VPN configurations and routing, to ensure secure and efficient connectivity between on-premises infrastructure and cloud resources.

A company's man web application is no longer accessible via the internet. The cloud administrator investigates and discovers the application is accessible locally and only via an IP access. Which of the following was misconfigured?

A.
IP
A.
IP
Answers
B.
DHCP
B.
DHCP
Answers
C.
NAT
C.
NAT
Answers
D.
DNS
D.
DNS
Answers
Suggested answer: D

Explanation:

When a web application is accessible locally via an IP address but not via the internet, the issue likely lies with the Domain Name System (DNS). DNS is responsible for translating domain names into IP addresses. A misconfiguration in DNS records or failure in DNS resolution can prevent users from accessing the application through its domain name, even though the application itself is running and accessible via its direct IP address.

Reference: In the CompTIA Cloud+ curriculum, understanding cloud concepts and networking fundamentals, including DNS, is crucial for troubleshooting and ensuring applications are accessible and perform optimally in cloud environments.

Total 224 questions
Go to page: of 23