Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Cloud+ CV0-004 Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

Options:

A.

Operating system patches


B.

Table-level permissions


C.

Minor database engine updates


D.

Cluster configuration


E.

Row-level encryption


F.

Availability of hardware for scaling


Expert Solution
Questions # 32:

Which of the following is the focus of DevSecOps?

Options:

A.

Securing, testing, and maintaining new software


B.

Developing, testing, and maintaining software


C.

Developing, maintaining, and securing software


D.

Developing, securing, and testing software


Expert Solution
Questions # 33:

A security engineer recently discovered a vulnerability in the operating system of the company VMs. The operations team reviews the issue and decides all VMs need to be updated

from version 3.4.0 to 3.4.1. Which of the following best describes the type of update that will be applied?

Options:

A.

Consistent


B.

Major


C.

Minor


D.

Ephemeral


Expert Solution
Questions # 34:

A social networking company operates globally. Some users from Brazil and Argentina are reporting the following error: website address was not found. Which of the following is the most likely cause of this outage?

Options:

A.

Client DNS misconfigutation


B.

Regional DNS provider outage


C.

DNS server misconfiguration


D.

DNS propagation issues


Expert Solution
Questions # 35:

A security analyst reviews the daily logs and notices the following suspicious activity:

Question # 35

The analyst investigates the firewall logs and identities the following:

Question # 35

Which of the following steps should the security analyst take next to resolve this issue? (Select two).

Options:

A.

Submit an IT support ticket and request Kali Linux be uninstalled from John Smith's computer


B.

Block all inbound connections on port 4444 and block the IP address 201.101.25.121.


C.

Contact John Smith and request the Ethernet cable attached to the desktop be unplugged


D.

Check the running processes to confirm if a backdoor connection has been established.


E.

Upgrade the Windows x64 operating system on John Smith's computer to the latest version.


F.

Block all outbound connections from the IP address 10.150.71.151.


Expert Solution
Questions # 36:

Which of the following best describes why a project manager would decide to sign a fixed-price contract with a vendor?

Options:

A.

The scope of the project deliverable is clearly defined


B.

There is a non-disclosure agreement in place


C.

There are multiple requirements for the product


D.

The PM wants to simplify the logistics of the required product


Expert Solution
Questions # 37:

A company has been using a CRM application that was developed in-house and is hosted on local servers. Due to internal changes, the company wants to migrate the application to the cloud without having to manage the infrastructure. Which of the following services should the company consider?

Options:

A.

SaaS


B.

PaaS


C.

XaaS


D.

laaS


Expert Solution
Questions # 38:

A cloud security analyst is investigating the impact of a recent cyberattack. The analyst is reviewing the following information:

Web server access log:

104.210.233.225 - - [21/10/2022:11:17: 40] "POST /uploadfile.html?f=myfile.php" 200 1638674

45.32.10.66 - - [21/10/2022:11:19:12] "GET /welcome.html" 200 5812

104.210.233.225 - - [21/10/2022:11:21:19] "GET / .. / .. / .. / .. /conf/server.xml HTTP/1.1" 200 74458

45.32.10.66 - - [21/10/22:11:22:32] "GET /admin.html HTTP/1.1" 200 9518

Web application firewall log:

"2022/10/21 11:17:33" "10.25.2.35" "104. 210.233.225" "userl" "File transfer completed successfully."

"2022/10/21 11:21:05" "10. 25.2. 35" "104. 210.233.225" "userl" "Accessed application page."

"2022/10/21 11:22:13" "10.25.2.35" "45. 32. 10. 66" "user2" "Accessing admin page. "

Which of the following has occurred?

Options:

A.

The corporate administration page was defaced by the attacker.


B.

A denial-of-service attack was successfully performed on the web server.


C.

A new user was created on the web server by the attacker.


D.

Sensitive information from the corporate web server was leaked.


Expert Solution
Questions # 39:

A cloud engineer is extending on-premises services to a public cloud. The following design requirements must be considered in the overall solution:

" The ability to remotely connect systems from both environments

• No IP address conflicts or overlap

• Cost-effectiveness

Which of the following cloud network concepts best meets these requirements?

Options:

A.

Dedicated connection


B.

VPN


C.

VLAN


D.

ACL


Expert Solution
Questions # 40:

A project team is reviewing the project plan and related documents and identifies tasks that could be spread into smaller deliverables. Which of the following documents should the team edit first?

Options:

A.

Risk assessment


B.

Preliminary scope statement


C.

Work breakdown structure


D.

Milestone chart


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions