Pass the CompTIA CompTIA Cloud+ CV0-004 Questions and answers with CertsForce

Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
Questions # 1:

A company recently set up a CDN for its photography and image-sharing website. Which of the following is the most likely reason for the company's action?

Options:

A.

To eliminate storage costs


B.

To improve site speed


C.

To enhance security of static assets


D.

To prevent unauthorized access


Expert Solution
Questions # 2:

A developer at a small startup company deployed some code for a new feature to its public repository. A few days later, a data breach occurred. A security team investigated the

incident and found that the database was hacked. Which of the following is the most likely cause of this breach?

Options:

A.

Database core dump


B.

Hard-coded credentials


C.

Compromised deployment agent


D.

Unpatched web servers


Expert Solution
Questions # 3:

A software engineer notices that the newest update to the reporting software includes many new features that were not defined in the requirements document. Which of the following steps should the engineer take next?

Options:

A.

Seek approval before continuing


B.

Edit the requirements document


C.

Disregard the update


D.

Notify the users of the new features


Expert Solution
Questions # 4:

A cross-site request forgery vulnerability exploited a web application that was hosted in a public laaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?

Options:

A.

Configure the DDoS protection on the CDN.


B.

Install endpoint protection software on the VMs


C.

Add an ACL to the VM subnet.


D.

Deploy an IDS on the laaS network.


Expert Solution
Questions # 5:

A user's assigned cloud credentials are locked, and the user is unable to access the project's application. The cloud administrator reviews the logs and notices several attempts to log in with the user's account were made to a different application after working hours. Which of the following is the best approach for the administrator to troubleshoot this issue?

Options:

A.

Create new credentials for the user and restrict access to the authorized application.


B.

Track the source of the log-in attempts and block the IP address of the source in the WAR


C.

Reset the user's account and implement a stronger lock-out policy.


D.

Install an IDS on the network to monitor suspicious activity


Expert Solution
Questions # 6:

A systems administrator is provisioning VMs according to the following requirements:

· A VM instance needs to be present in at least two data centers.

. During replication, the application hosted on the VM tolerates a maximum latency of one second.

· When a VM is unavailable, failover must be immediate.

Which of the following replication methods will best meet these requirements?

Options:

A.

Snapshot


B.

Transactional


C.

Live


D.

Point-in-time


Expert Solution
Questions # 7:

A company's VMs that are created using the noncritical application tag are automatically shut down at 5:00 p.m. using a cronjob. Which of the following actions would allow a cloud engineer to stop all unresponsive instances with the least effort in case the automation fails?

Options:

A.

Using the cloud audit logs for tagging and stopping events


B.

Using the cloud provider web console to check and stop the instances


C.

Using the cloud provider command line to stop the Instances based on tags


D.

Using a Bash script to shut down all instances


Expert Solution
Questions # 8:

A company wants to optimize cloud resources and lower the overhead caused by managing multiple operating systems. Which of the following compute resources would be best to help to achieve this goal?

Options:

A.

VM


B.

Containers


C.

Remote desktops


D.

Bare-metal servers


Expert Solution
Questions # 9:

Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year.

Which of the following is this an example of?

Options:

A.

Recoverability


B.

Retention


C.

Encryption


D.

Integrity


Expert Solution
Questions # 10:

Which of the following is used to detect signals and measure physical properties, such as the temperature of the human body?

Options:

A.

Beacon


B.

Transmission protocols


C.

Sensors


D.

Gateways


Expert Solution
Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions