ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 44 - CV0-004 discussion

Report
Export

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

A.
Disk I/O
Answers
A.
Disk I/O
B.
Network packets
Answers
B.
Network packets
C.
Average memory utilization
Answers
C.
Average memory utilization
D.
Percent of CPU utilization
Answers
D.
Percent of CPU utilization
Suggested answer: D

Explanation:

To detect cryptojacking and other cryptomining malware on cloud instances, monitoring the percent of CPU utilization is most effective. Cryptomining malware typically consumes a significant amount of CPU resources for mining operations, leading to unusually high CPU usage. Monitoring and analyzing CPU utilization metrics can help identify instances of cryptojacking by highlighting abnormal levels of resource consumption.

Reference: Understanding management and technical operations in cloud environments, as outlined in the CompTIA Cloud+ objectives, includes the use of monitoring solutions to detect and respond to security threats like cryptomining malware, ensuring the integrity and performance of cloud resources.

asked 02/10/2024
Wilfried Bret
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first