Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Cloud+ CV0-004 Questions and answers with CertsForce

Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following is the correct order of the steps to take when a system is suspected of being vulnerable?

Options:

A.

Scanning scope, identification, assessment, and remediation


B.

Assessment, identification, scanning scope, and remediation


C.

Identification, scanning scope, assessment, and remediation


D.

Assessment, scanning scope, identification, and remediation


Expert Solution
Questions # 12:

A cloud solutions architect needs to design a solution that will collect a report and upload it to an object storage service every time a virtual machine is gracefully or non-gracefully

stopped. Which of the following will best satisfy this requirement?

Options:

A.

An event-driven architecture that will send a message when the VM shuts down to a log-collecting function that extracts and uploads the log directly from the storage volume


B.

Creating a webhook that will trigger on VM shutdown API calls and upload the requested files from the volume attached to the VM into the object-defined storage service


C.

An API of the object-defined storage service that will scrape the stopped VM disk and self-upload the required files as objects


D.

A script embedded on the stopping VM's OS that will upload the logs on system shutdown


Expert Solution
Questions # 13:

Which of the following is used to detect signals and measure physical properties, such as the temperature of the human body?

Options:

A.

Beacon


B.

Transmission protocols


C.

Sensors


D.

Gateways


Expert Solution
Questions # 14:

A company's website suddenly crashed. A cloud engineer investigates the following logs:

Question # 14

Which of the following is the most likely cause of the issue?

Options:

A.

SQL injection


B.

Cross-site scripting


C.

Leaked credentials


D.

DDoS


Expert Solution
Questions # 15:

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

Options:

A.

Disk I/O


B.

Network packets


C.

Average memory utilization


D.

Percent of CPU utilization


Expert Solution
Questions # 16:

A cloud engineer is developing an operating expense report that will be used to purchase various cloud billing models for virtual machine instances. The cloud billing model must meet the following requirements:

• The instance cannot be ephemeral.

• The minimum life cycle of the instance is expected to be five years.

• The software license is charged per physical CPU count.

Which of the following models would best meet these requirements?

Options:

A.

Dedicated host


B.

Spot instance


C.

Pay-as-you-go


D.

Reserved resources


Expert Solution
Questions # 17:

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

Options:

A.

Operating system patches


B.

Table-level permissions


C.

Minor database engine updates


D.

Cluster configuration


E.

Row-level encryption


F.

Availability of hardware for scaling


Expert Solution
Questions # 18:

Which of the following are best practices when working with a source control system? (Select two).

Options:

A.

Merging code often


B.

Pushing code directly to production


C.

Performing code deployment


D.

Maintaining one branch for all features


E.

Committing code often


F.

Initiating a pull request


Expert Solution
Questions # 19:

Servers in the hot site are clustered with the main site.

Options:

A.

Network traffic is balanced between the main site and hot site servers.


B.

Offline server backups are replicated hourly from the main site.


C.

All servers are replicated from the main site in an online status.


D.

Which of the following best describes a characteristic of a hot site?


Expert Solution
Questions # 20:

A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?

Options:

A.

Analyze


B.

Report


C.

Remediation


D.

identification


Expert Solution
Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions