Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA Cloud+ CV0-004 Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions
Questions # 31:

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

Options:

A.

Resource tagging


B.

Discretionary access control


C.

Multifactor authentication


D.

Role-based access control


E.

Token-based authentication


F.

Bastion host


Expert Solution
Questions # 32:

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

Options:

A.

Rehost


B.

Rearchitect


C.

Refactor


D.

Retain


Expert Solution
Questions # 33:

Which of the following is an auditing procedure that ensures service providers securely manage the data to protect the interests of the organization and the privacy of its clients?

Options:

A.

CIS


B.

ITIL


C.

SOC2


D.

ISO 27001


Expert Solution
Questions # 34:

A developer is testing code that will be used to deploy a web farm in a public cloud. The main code block is a function to create a load balancer and a loop to create 1.000 web servers, as shown below:

Question # 34

The developer runs the code against the company's cloud account and observes that the load balancer is successfully created, but only 100 web servers have been created. Which of the following should the developer do to fix this issue?

Options:

A.

Request an increase of Instance quota.


B.

Run the code multiple times until all servers are created.


C.

Check the my_web_server () function to ensure it is using the right credentials.


D.

Place the my_load_balancer () function after the loop.


Expert Solution
Questions # 35:

A cloud infrastructure administrator updated the IP tables to block incoming connections and outgoing responses to 104.225.110.203. Which of the following vulnerability management steps is this an example of?

Options:

A.

Scanning scope


B.

Remediation


C.

Identification


D.

Assessment


Expert Solution
Questions # 36:

A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

Options:

A.

Log retention


B.

Tracing


C.

Log aggregation


D.

Log rotation


E.

Hashing


F.

Encryption


Expert Solution
Questions # 37:

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these

requirements?

Options:

A.

Cloning


B.

Clustering


C.

Hardware passthrough


D.

Stand-alone container


Expert Solution
Questions # 38:

An administrator is setting up a cloud backup solution that requires the following features:

• Cost effective

• Granular recovery

• Multilocation

Which of the following backup types best meets these requirements?

Options:

A.

Off-site, full, incremental, and differential


B.

Cloud site, full, and differential


C.

On-site. full, and incremental


D.

On-site. full, and differential


Expert Solution
Questions # 39:

An organization is preparing for seasonal sales on its storefront web application. Which of the following approaches is best suited to meet this requirement with the minimal cost?

Options:

A.

Configuring a load balancer with a least-connections load-balancing method


B.

Enabling a scaling configuration for the identified timeline


C.

Reconfiguring the application to have more resources


D.

Deploying additional compute resources in advance to the web application pool


Expert Solution
Questions # 40:

Users report being unable to access an application that uses TLS 1.1. The users are able to access other applications on the internet. Which of the following is the most likely

reason for this issue?

Options:

A.

The security team modified user permissions.


B.

Changes were made on the web server to address vulnerabilities.


C.

Privileged access was implemented.


D.

The firewall was modified.


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions