Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-004 Exam Dumps - CompTIA Cloud+ (V4)

Searching for workable clues to ace the CompTIA CV0-004 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CV0-004 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 41

Which of the following industry standards mentions that credit card data must not be exchanged or stored in cleartext?

A.

CSA

B.

GDPR

C.

SOC2

D.

PCI-DSS

Full Access
Question # 42

Which of the following is a protocol frequently used with IoT devices to communicate with a gateway?

A.

ICMP

B.

MQTT

C.

RPC

D.

SSH

Full Access
Question # 43

A company’s cybersecurity team receives the following alert that a production VM was deleted from the virtual network:

21 September 09:19:08 (GMT-5)

Resource with ID: PROD-WEB001 was deleted by User: Logging Service

The console to manage virtual network resources uses directory authentication. Only users in a particular directory group can interactively access the virtual network management console. The logging service account is not part of this group and requires some local administration privileges to aggregate logs from various resources. The cybersecurity team discovers the logging service account was previously given full directory administrator privileges and sees the following entry:

21 September 09:10:55 (GMT-5)

User with ID: Logging Service was added to the Group: VNet Console Administrators by actor: Logging Service.

The cybersecurity team removes the compromised service account from the directory group. Which of the following should the cybersecurity team do next to prevent repeat instances of this issue?

A.

Enable two-factor authentication on the virtual network console.

B.

Reset the logging service account to use a long and complex password.

C.

Disable RDP on the production virtual machines.

D.

Create a scoped administrative role for the logging service account.

Full Access
Question # 44

A web server hosted in a PaaS public cloud platform has been the target of DDoS attacks. A cloud engineer needs to protect the server from future volumetric DDoS attacks. Which of the following are the best actions for the engineer to take? (Select two.)

A.

Add a CDN in front of the web server.

B.

Add a DLP on the PaaS platform.

C.

Add a hardened web server instance.

D.

Add an ACL to the web server network.

E.

Add an IDS in-line on the web server network.

F.

Add a WAF in front of the web server.

Full Access
Question # 45

Which of the following is an auditing procedure that ensures service providers securely manage the data to protect the interests of the organization and the privacy of its clients?

A.

CIS

B.

ITIL

C.

SOC2

D.

ISO 27001

Full Access
Question # 46

A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the

following migration strategies is best approach for this use case?

A.

Retire

B.

Rearchitect

C.

Refactor

D.

Rehost

Full Access
Question # 47

An organization is preparing for seasonal sales on its storefront web application. Which of the following approaches is best suited to meet this requirement with the minimal cost?

A.

Configuring a load balancer with a least-connections load-balancing method

B.

Enabling a scaling configuration for the identified timeline

C.

Reconfiguring the application to have more resources

D.

Deploying additional compute resources in advance to the web application pool

Full Access
Question # 48

For compliance purposes, a cloud developer at an insurance company needs to save all customer policies for more than ten years. Which of the following options is the most cost-

efficient tier to save the data in the cloud?

A.

Archive

B.

Hot

C.

Cold

D.

Warm

Full Access
Go to page: