ExamGecko
Home Home / CompTIA / CV0-004

CompTIA CV0-004 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











A developer is deploying a new version of a containerized application. The DevOps team wants:

* No disruption

* No performance degradation

* Cost-effective deployment

* Minimal deployment time

Which of the following is the best deployment strategy given the requirements?

A.
Canary
A.
Canary
Answers
B.
In-place
B.
In-place
Answers
C.
Blue-green
C.
Blue-green
Answers
D.
Rolling
D.
Rolling
Answers
Suggested answer: C

Explanation:

The blue-green deployment strategy is the best given the requirements for no disruption, no performance degradation, cost-effective deployment, and minimal deployment time. It involves maintaining two identical production environments (blue and green), where one hosts the current application version and the other is used to deploy the new version. Once testing on the green environment is complete, traffic is switched from blue to green, ensuring a seamless transition with no downtime.

Reference: Understanding various cloud deployment strategies, such as blue-green deployments, is essential for managing cloud environments effectively, as highlighted in the CompTIA Cloud+ objectives, to ensure smooth and efficient application updates.

An DevOps engineer is receiving reports that users can no longer access the company's web application after hardening of a web server. The users are receiving the following error:

ERR_SSLJ/ERSION_OR_CIPHER_MISMATCH.

Which of the following actions should the engineer take to resolve the issue?

A.
Restart the web server.
A.
Restart the web server.
Answers
B.
Configure TLS 1.2 or newer.
B.
Configure TLS 1.2 or newer.
Answers
C.
Update the web server.
C.
Update the web server.
Answers
D.
Review logs on the WAF
D.
Review logs on the WAF
Answers
Suggested answer: B

Explanation:

To resolve the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error after hardening a web server, the engineer should configure the server to use TLS 1.2 or newer. This error often occurs when the server or client supports an outdated version of SSL/TLS or incompatible cipher suites. Updating to a modern, secure version of TLS ensures compatibility and enhances security.

Reference: The CompTIA Cloud+ certification includes governance, risk, compliance, and security for the cloud, emphasizing the importance of implementing up-to-date security protocols like TLS to protect data in transit and ensure secure communications in cloud environments.

A healthcare organization must follow strict compliance requirements to ensure that Pll is not leaked. The cloud administrator needs to ensure the cloud email system can support this requirement Which of the following should the organization enable?

A.
IPS
A.
IPS
Answers
B.
OLP
B.
OLP
Answers
C.
ACL
C.
ACL
Answers
D.
WAF
D.
WAF
Answers
Suggested answer: B

Explanation:

To ensure that Personally Identifiable Information (PII) is not leaked and to comply with strict healthcare regulations, the organization should enable Data Loss Prevention (DLP). DLP systems are designed to detect and prevent unauthorized access or sharing of sensitive data, making them ideal for securing PII in cloud email systems and ensuring compliance with healthcare industry standards.

Reference: CompTIA Cloud+ content covers governance, risk, compliance, and security aspects of cloud computing, highlighting the role of DLP in safeguarding sensitive information and maintaining compliance in regulated industries like healthcare.

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

A.
Disk I/O
A.
Disk I/O
Answers
B.
Network packets
B.
Network packets
Answers
C.
Average memory utilization
C.
Average memory utilization
Answers
D.
Percent of CPU utilization
D.
Percent of CPU utilization
Answers
Suggested answer: D

Explanation:

To detect cryptojacking and other cryptomining malware on cloud instances, monitoring the percent of CPU utilization is most effective. Cryptomining malware typically consumes a significant amount of CPU resources for mining operations, leading to unusually high CPU usage. Monitoring and analyzing CPU utilization metrics can help identify instances of cryptojacking by highlighting abnormal levels of resource consumption.

Reference: Understanding management and technical operations in cloud environments, as outlined in the CompTIA Cloud+ objectives, includes the use of monitoring solutions to detect and respond to security threats like cryptomining malware, ensuring the integrity and performance of cloud resources.

A developer is testing code that will be used to deploy a web farm in a public cloud. The main code block is a function to create a load balancer and a loop to create 1.000 web servers, as shown below:

The developer runs the code against the company's cloud account and observes that the load balancer is successfully created, but only 100 web servers have been created. Which of the following should the developer do to fix this issue?

A.
Request an increase of Instance quota.
A.
Request an increase of Instance quota.
Answers
B.
Run the code multiple times until all servers are created.
B.
Run the code multiple times until all servers are created.
Answers
C.
Check the my_web_server () function to ensure it is using the right credentials.
C.
Check the my_web_server () function to ensure it is using the right credentials.
Answers
D.
Place the my_load_balancer () function after the loop.
D.
Place the my_load_balancer () function after the loop.
Answers
Suggested answer: A

Explanation:

The developer should request an increase of the instance quota from the cloud provider. Cloud services often have a limit on the number of instances that can be created, which is known as an instance quota. If the load balancer is successfully created but the number of web servers is limited to 100, it suggests that the quota has been reached. Increasing the quota will allow the creation of additional web server instances up to the desired number.

Reference: The scenario reflects an understanding of cloud resource management and limitations, which is a part of the CompTIA Cloud+ curriculum, specifically under the domain of Management and Technical Operations.

A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

A.
Modifying the subnet mask to 255 255 254.0 for IT and operations departments
A.
Modifying the subnet mask to 255 255 254.0 for IT and operations departments
Answers
B.
Configuring static routing to allow access from each subnet to 10.1.40.1
B.
Configuring static routing to allow access from each subnet to 10.1.40.1
Answers
C.
Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network
C.
Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network
Answers
D.
Configuring static routing to allow access from 10.1.30.1 to each subnet
D.
Configuring static routing to allow access from 10.1.30.1 to each subnet
Answers
E.
Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee
E.
Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee
Answers
F.
Modifying the subnet mask to 255.255.255.128 for the IT and operations departments
F.
Modifying the subnet mask to 255.255.255.128 for the IT and operations departments
Answers
Suggested answer: D, F

Explanation:

To meet the requirements of allowing the IT department to communicate with all subnets while keeping each department segregated and ensuring a maximum of three hosts per employee, two actions are required. First, configuring static routing from the IT subnet (10.1.30.1) to each of the other subnets would establish the necessary connectivity. Second, modifying the subnet mask to 255.255.255.128 for the IT and operations departments would provide the needed number of host addresses while maintaining subnet segregation.

Reference: This solution is based on networking and subnetting principles, which are part of the foundational knowledge for cloud networking within the CompTIA Cloud+ framework.

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

A.
VPC
A.
VPC
Answers
B.
Application load balancer
B.
Application load balancer
Answers
C.
CDN
C.
CDN
Answers
D.
API gateway
D.
API gateway
Answers
Suggested answer: C

Explanation:

A Content Delivery Network (CDN) is the service that will help reduce latency for a static website accessed globally. CDNs distribute content across multiple geographically dispersed servers, allowing users to connect to a server that is closer to them, thereby reducing the time it takes to load the website.

Reference: The use of CDNs is a common practice to enhance global access and improve user experience, as covered under Cloud Concepts in the CompTIA Cloud+ certification.

An administrator needs to adhere to the following requirements when moving a customer's data to the cloud:

* The new service must be geographically dispersed.

* The customer should have local access to data

* Legacy applications should be accessible.

Which of the following cloud deployment models is most suitable?

A.
On-premises
A.
On-premises
Answers
B.
Private
B.
Private
Answers
C.
Hybrid
C.
Hybrid
Answers
D.
Public
D.
Public
Answers
Suggested answer: C

Explanation:

A hybrid cloud deployment model is most suitable given the requirements. This model combines on-premises infrastructure (or private cloud) with public cloud services, providing geographic dispersion while allowing local access to data. It also facilitates the use of legacy applications that might not be well-suited for a full public cloud environment.

Reference: The hybrid model is a fundamental concept within the CompTIA Cloud+ curriculum, under the section of Cloud Concepts, that explains deployment models.

A technician receives an email from a vendor who is requesting payment of an invoice for human resources services. The email contains a request for bank account numbers. Which of the following types of attacks does this behavior most likely indicate?

A.
MaIware
A.
MaIware
Answers
B.
Cryptojacking
B.
Cryptojacking
Answers
C.
Ransomware
C.
Ransomware
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: D

Explanation:

The behavior described in the question indicates a phishing attack. Phishing typically involves an attacker masquerading as a legitimate entity to trick individuals into providing sensitive information, such as bank account numbers, through seemingly trustworthy communication channels like email.

Reference: Understanding security concerns and measures is part of the Governance, Risk, Compliance, and Security domain of the CompTIA Cloud+ objectives.

Which of the following best explains the concept of migrating from on premises to the cloud?

A.
The configuration of a dedicated pipeline to transfer content to a remote location
A.
The configuration of a dedicated pipeline to transfer content to a remote location
Answers
B.
The creation of virtual instances in an external provider to transfer operations of selected servers into a new. remotely managed environment
B.
The creation of virtual instances in an external provider to transfer operations of selected servers into a new. remotely managed environment
Answers
C.
The physical transportation, installation, and configuration of company IT equipment in a cloud services provider's facility
C.
The physical transportation, installation, and configuration of company IT equipment in a cloud services provider's facility
Answers
D.
The extension of company IT infrastructure to a managed service provider
D.
The extension of company IT infrastructure to a managed service provider
Answers
Suggested answer: B

Explanation:

Migrating from on-premises to the cloud generally involves creating virtual instances in an external provider's environment and transferring the operations of selected servers to this new, remotely managed setup. This process allows organizations to leverage the cloud provider's resources and services.

Reference: The migration process and strategies are topics included in the Business Principles of Cloud Environments within the CompTIA Cloud+ curriculum.

Total 224 questions
Go to page: of 23