Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-004 Exam Dumps - CompTIA Cloud+

Question # 4

Which of the following would allow a cloud engineer to flatten a deeply nested JSON log to improve readability for analysts?

A.

Grafana

B.

Kibana

C.

Elasticsearch

D.

Logstash

Full Access
Question # 5

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

A.

VPC

B.

Application load balancer

C.

CDN

D.

API gateway

Full Access
Question # 6

An organization's web application experiences penodic bursts of traffic when a new video is launched. Users are reporting poor performance in the middle of the month. Which of the following scaling approaches should the organization use to scale based on forecasted traffic?

A.

Scheduled

B.

Manual

C.

Event

D.

Load

Full Access
Question # 7

You are a cloud engineer working for a cloud service provider that is responsible for an

IaaS offering.

Your customer, who creates VMs and manages virtual storage, has noticed I/O bandwidth issues and low IOPS (under 9000).

Your manager wants you to verify the proper storage configuration as dictated by your service level agreement (SLA).

The SLA specifies:

. Each SFP on the hypervisor host must be set to the maximum link speed

allowed by the SAN array. . All SAN array disk groups must be configured in a RAID 5.

. The SAN array must be fully configured for redundant fabric paths. . IOPS should not fall below 14000

INSTRUCTIONS

Click on each service processor to review the displayed information. Then click on the drop-down menus to change the settings of each device as necessary to conform to the SLA requirements.

Full Access
Question # 8

A cloud server needs to automatically allocate more resources during sudden peak times. This allocation does not need to occur in regular intervals. Which of the following scaling

approaches should be used?

A.

Event

B.

Manual

C.

Trending

D.

Scheduled

Full Access
Question # 9

A cloud engineer is in charge of deploying a platform in an laaS public cloud. The application tracks the state using session cookies, and there are no affinity restrictions. Which of

the following will help the engineer reduce monthly expenses and allow the application to provide the service?

A.

Resource metering

B.

Reserved resources

C.

Dedicated host

D.

Pay-as-you-go model

Full Access
Question # 10

A company receives files daily from a bank. The company requires that the files must be copied from the cloud storage resource to another cloud storage resource for further

processing. Which of the following methods requires the least amount of effort to achieve the task?

A.

Remote procedure call

B.

SOAP

C.

Event-driven architecture

D.

REST

Full Access
Question # 11

A company has decided to adopt a microservices architecture for its applications that are deployed to the cloud. Which of the following is a major advantage of this type of architecture?

A.

Increased security

B.

Simplified communication

C.

Reduced server cost

D.

Rapid feature deployment

Full Access
Question # 12

A systems engineer is migrating a batch of 25 VMs from an on-premises compute cluster to a public cloud using the public cloud's migration agent. The migration job shows data

copies at a rate of 250Mbps. After five servers migrate, the data copies at a rate of 25Mbps. Which of the following should the engineer review first to troubleshoot?

A.

The on-premises VM host hardware utilization

B.

The on-premises ISP throttling rate

C.

The IOPS on the SAN backing the on-premises cluster

D.

The compute utilization of the VMs being migrated

Full Access
Question # 13

A company wants to create a few additional VDIs so support vendors and contractors have a secure method to access the company's cloud environment. When a cloud

administrator attempts to create the additional instances in the new locations, the operation is successful in some locations but fails in others. Which of the following is the

most likely reason for this failure?

A.

Partial service outages

B.

Regional service availability

C.

Service quotas

D.

Deprecation of functionality

Full Access
Question # 14

A cross-site request forgery vulnerability exploited a web application that was hosted in a public laaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?

A.

Configure the DDoS protection on the CDN.

B.

Install endpoint protection software on the VMs

C.

Add an ACL to the VM subnet.

D.

Deploy an IDS on the laaS network.

Full Access
Question # 15

A company has ten cloud engineers working on different manual following is the best method to address this issue?

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Full Access
Question # 16

An organization's internal security team mandated that public cloud resources must be accessible only by a corporate VPN and not by direct public internet access. Which of the

following would achieve this objective?

A.

WAF

B.

ACL

C.

VPC

D.

SSH

Full Access
Question # 17

A cloud engineer is troubleshooting a connectivity issue. The application server with IP 192.168.1.10 in one subnet is not connecting to the MySQL database server with IP 192.168.2 20 in a different subnet. The cloud engineer reviews the following information:

Application Server Stateful Firewall

Which of the following should the cloud engineer address lo fix the communication issue?

A.

The Application Server Stateful Firewall

B.

The Application Server Subnet Routing Table

C.

The MySQL Server Stateful Firewall

D.

The MySQL Server Subnet Routing Table

Full Access
Question # 18

A company serves customers globally from its website hosted in North America. A cloud engineer recently deployed new instances of the website in the Europe region. Which of the

following is the most likely reason?

A.

To simplify workflow

B.

To enhance security

C.

To reduce latency

D.

To decrease cost

Full Access
Question # 19

Which of the following compute resources is the most optimal for running a single scripted task on a schedule?

A.

Bare-metal server

B.

Managed container

C.

Virtual machine

D.

Serverless function

Full Access
Question # 20

A cloud administrator is building a company-standard VM image, which will be based on a public image. Which of the following should the administrator implement to secure the image?

A.

ACLs

B.

Least privilege

C.

Hardening

D.

Vulnerability scanning

Full Access
Question # 21

A CI/CD pipeline is used to deploy VMs to an laaS environment. Which of the following can be used to harden the operating system once the VM is running?

A.

Docker

B.

Kubernetes

C.

Git

D.

Ansible

Full Access
Question # 22

An DevOps engineer is receiving reports that users can no longer access the company's web application after hardening of a web server. The users are receiving the following error:

ERR_SSLJ/ERSION_OR_CIPHER_MISMATCH.

Which of the following actions should the engineer take to resolve the issue?

A.

Restart the web server.

B.

Configure TLS 1.2 or newer.

C.

Update the web server.

D.

Review logs on the WAF

Full Access
Question # 23

A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour. Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

A.

Use laC to deploy the laaS infrastructure.

B.

Convert the containers to VMs.

C.

Deploy the containers over SSH.

D.

Use private repositories for the containers.

Full Access
Question # 24

Which of the following storage resources provides higher availability and speed for currently used files?

A.

Warm/HDD

B.

Cold/SSD

C.

Hot/SSD

D.

Archive/HDD

Full Access
Question # 25

Users have been reporting that a remotely hosted application is not accessible following a recent migration. However, the cloud administrator is able to access the application from

the same site as the users. Which of the following should the administrator update?

A.

Cipher suite

B.

Network ACL

C.

Routing table

D.

Permissions

Full Access
Question # 26

An administrator used a script that worked in the past to create and tag five virtual machines. All of the virtual machines have been created: however, the administrator sees the following results:

{ tags: [ ] }

Which of the following is the most likely reason for this result?

A.

API throttling

B.

Service quotas

C.

Command deprecation

D.

Compatibility issues

Full Access
Question # 27

Which of the following technologies should be used by a person who is visually impaired to access data from the cloud?

A.

Object character recognition

B.

Text-to-voice

C.

Sentiment analysis

D.

Visual recognition

Full Access
Question # 28

Servers in the hot site are clustered with the main site.

A.

Network traffic is balanced between the main site and hot site servers.

B.

Offline server backups are replicated hourly from the main site.

C.

All servers are replicated from the main site in an online status.

D.

Which of the following best describes a characteristic of a hot site?

Full Access
Question # 29

An on-premises data center is located in an earthquake-prone location. The workload consists of real-time, online transaction processing. Which ot the following data protection strategies should be used to back up on-premises data to the cloud while also being cost effective?

A.

Remote replication for failover

B.

A copy that is RAID 1 protected on spinning drives in an on-premises private cloud

C.

A full backup to on-site tape libraries in a private cloud

D.

Air-gapped protection to provide cyber resiliency

Full Access
Question # 30

A cloud engineer was deploying the company's payment processing application, but it failed with the following error log:

ERFOR:root: Transaction failed http 429 response, please try again Which of the following are the most likely causes for this error? (Select two).

A.

API throttling

B.

API gateway outage

C.

Web server outage

D.

Oversubscription

E.

Unauthorized access

F.

Insufficient quota

Full Access
Question # 31

A list of CVEs was identified on a web server. The systems administrator decides to close the ports and disable weak TLS ciphers. Which of the following describes this vulnerability management stage?

A.

Scanning

B.

Identification

C.

Assessment

D.

Remediation

Full Access
Question # 32

Which of the following can reduce the risk of CI/CD pipelines leaking secrets?

A.

Protected Git branches

B.

Use of a VM instead of containers

C.

Private image repositories

D.

Canary tests

Full Access
Question # 33

The performance of an e-commerce website decreases dramatically during random periods. The IT team is evaluating available resources to mitigate the situation. Which of the following is the best approach to effectively manage this scenario'?

A.

Migrating to a dedicated host

B.

Purchasing additional servers

C.

Scheduling resource allocation

D.

Configuring automatic elasticity

Full Access
Question # 34

Which of the following Al/ML technologies consumes text input to discern tone?

A.

Text recognition

B.

Computer vision

C.

Visual recognition

D.

Sentiment analysis

Full Access
Question # 35

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

A.

Review the development network routing table.

B.

Change the ciphers on the site-to-site VPN.

C.

Restart the site-to-site VPN tunnel.

D.

Check the ACLS on the development workloads

Full Access
Question # 36

An IT manager needs to deploy a cloud solution that meets the following requirements:

. Users must use two authentication methods to access resources.

· Each user must have 10GB of storage space by default.

Which of the following combinations should the manager use to provision these requirements?

A.

OAuth 2.0 and ephemeral storage

B.

OIDC and persistent storage

C.

MFA and storage quotas

D.

SSO and external storage

Full Access
Question # 37

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

A.

Operating system patches

B.

Table-level permissions

C.

Minor database engine updates

D.

Cluster configuration

E.

Row-level encryption

F.

Availability of hardware for scaling

Full Access
Question # 38

Which of the following do developers use to keep track of changes made during software development projects?

A.

Code drifting

B.

Code control

C.

Code testing

D.

Code versioning

Full Access
Question # 39

Which of the following best describes a system that keeps all different versions of a software separate from each other while giving access to all of the versions?

A.

Code documentation

B.

Code control

C.

Code repository

D.

Code versioning

Full Access
Question # 40

A cloud engineer wants to deploy a new application to the cloud and is writing the following script:

Which of the following actions will this script perform?

A.

Upload a new VM image.

B.

Create a new cloud resource.

C.

Build a local server.

D.

Import a cloud module.

Full Access
Question # 41

Which of the following cloud-native architecture designs is the most easily maintained, decentralized, and decoupled?

A.

Monolithic

B.

Hybrid cloud

C.

Mainframe

D.

Microservices

Full Access
Question # 42

A manager wants information about which users signed in to a certain VM during the past month. Which of the following can the cloud administrator use to obtain this information?

A.

Retention

B.

Alerting

C.

Aggregation

D.

Collection

Full Access
Question # 43

A company wants to build its new platform using a public cloud. The workload requirements include the following:

• Implementation of custom CIS compliance

• Patch for vulnerabilities within 24 hours

• Warrant at least 1,800 IOPS per volume

Which of the following meets the requirements?

A.

SaaS

B.

laaS

C.

FaaS

D.

PaaS

Full Access
Question # 44

A cloud solutions architect needs to design a solution that will collect a report and upload it to an object storage service every time a virtual machine is gracefully or non-gracefully

stopped. Which of the following will best satisfy this requirement?

A.

An event-driven architecture that will send a message when the VM shuts down to a log-collecting function that extracts and uploads the log directly from the storage volume

B.

Creating a webhook that will trigger on VM shutdown API calls and upload the requested files from the volume attached to the VM into the object-defined storage service

C.

An API of the object-defined storage service that will scrape the stopped VM disk and self-upload the required files as objects

D.

A script embedded on the stopping VM's OS that will upload the logs on system shutdown

Full Access
Question # 45

A cloud developer needs to update a REST API endpoint to resolve a defect. When too many users attempt to call the API simultaneously, the following message is displayed:

Error: Request Timeout - Please Try Again Later

Which of the following concepts should the developer consider to resolve this error?

A.

Server patch

B.

TLS encryption

C.

Rate limiting

D.

Permission issues

Full Access
Question # 46

A software engineer at a cybersecurity company wants to access the cloud environment. Per company policy, the cloud environment should not be directly accessible via the internet. Which of the following options best describes how the software engineer can access the cloud resources?

A.

SSH

B.

Bastion host

C.

Token-based access

D.

Web portal

Full Access
Question # 47

A developer is building an application that has multiple microservices that need to communicate with each other. The developer currently manually updates the IP address of each service. Which of the following best resolves the communication issue and automates the process?

A.

Service discovery

B.

Fan-out

C.

Managed container services

D.

DNS

Full Access
Question # 48

A bank informs an administrator that changes must be made to backups for long-term reporting purposes. Which of the following is the most important change the administrator

should make to satisfy these requirements?

A.

Location of the backups

B.

Type of the backups

C.

Retention of the backups

D.

Schedule of the backups

Full Access
Question # 49

Once a change has been made to templates, which of the following commands should a cloud architect use next to deploy an laaS platform?

A.

git pull

B.

git fetch

C.

git commit

D.

git push

Full Access
Question # 50

An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements:

• Is simple and fast

• Can be performed on two Identical platforms

Which of the following strategies should the engineer use?

A.

Blue-green

B.

Canary

C.

Rolling

D.

in-place

Full Access
Question # 51

A cloud engineer needs to deploy a new version of a web application to 100 servers. In the past, new version deployments have caused outages. Which of the following deployment types should the cloud engineer implement to prevent the outages from happening this time?

A.

Rolling

B.

Blue-green

C.

Canary

D.

Round-robin

Full Access
Question # 52

A company wants to combine solutions in a central and scalable environment to achieve the following goals:

• Control

• Visibility

• Automation

• Cost efficiency

Which of the following best describes what the company should implement?

A.

Batch processing

B.

Workload orchestration

C.

Containerization

D.

Application modernization

Full Access
Question # 53

Which of the following types of storage provides the greatest performance advantage for a traditional relational database?

A.

File

B.

Object

C.

Block

D.

Ephemeral

Full Access
Question # 54

Which of the following is a direct effect of cloud migration on an enterprise?

A.

The enterprise must reorganize the reporting structure.

B.

Compatibility issues must be addressed on premises after migration.

C.

Cloud solutions will require less resources than on-premises installations.

D.

Utility costs will be reduced on premises.

Full Access
Question # 55

A cloud engineer hardened the WAF for a company that operates exclusively in North America. The engineer did not make changes to any ports, and all protected applications have

continued to function as expected. Which of the following configuration changes did the engineer most likely apply?

A.

The engineer implemented MFA to access the WAF configurations.

B.

The engineer blocked all traffic originating outside the region.

C.

The engineer installed the latest security patches on the WAF.

D.

The engineer completed an upgrade from TLS version 1.1 to version 1.3.

Full Access
Question # 56

A social networking company operates globally. Some users from Brazil and Argentina are reporting the following error: website address was not found. Which of the following is the most likely cause of this outage?

A.

Client DNS misconfigutation

B.

Regional DNS provider outage

C.

DNS server misconfiguration

D.

DNS propagation issues

Full Access
Question # 57

A SaaS provider introduced new software functionality for customers as part of quarterly production enhancements. After an update is implemented, users cannot locate certain transactions from an inbound integration. During the investigation, the application owner finds the following error in the logs:

Error: REST API - Deprecated call is no longer supported in this release.

Which of the following is the best action for the application owner to take to resolve the issue?

A.

Update the custom integration to use a supported function.

B.

Include the custom integration in the quarterly testing scope.

C.

Ask the users to monitor the quarterly updates.

D.

Revert the application to the last stable quarterly release.

Full Access
Question # 58

A cloud engineer wants to implement a disaster recovery strategy that:

. Is cost-effective.

. Reduces the amount of data loss in case of a disaster.

. Enables recovery with the least amount of downtime.

Which of the following disaster recovery strategies best describes what the cloud engineer wants to achieve?

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Full Access
Question # 59

Which of the following network protocols is generally used in a NAS environment?

A.

BGP

B.

RDP

C.

TCP/IP

D.

iSCSI

Full Access
Question # 60

Two CVEs are discovered on servers in the company's public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which

of the following actions would be the best way to mitigate the vulnerabilities?

A.

Patching the operating systems

B.

Upgrading the operating systems to the latest beta

C.

Encrypting the operating system disks

D.

Disabling unnecessary open ports

Full Access
Question # 61

Which of the following is a field of computer science that enables computers to identify and understand objects and people in images and videos?

A.

Image reconstruction

B.

Facial recognition

C.

Natural language processing

D.

Computer vision

Full Access
Question # 62

A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

A.

Modifying the subnet mask to 255 255 254.0 for IT and operations departments

B.

Configuring static routing to allow access from each subnet to 10.1.40.1

C.

Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network

D.

Configuring static routing to allow access from 10.1.30.1 to each subnet

E.

Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee

F.

Modifying the subnet mask to 255.255.255.128 for the IT and operations departments

Full Access
Question # 63

A company needs to deploy its own code directly in the cloud without provisioning additional infrastructure. Which of the following is the best cloud service model for the company to use?

A.

PaaS

B.

SaaS

C.

laaS

D.

XaaS

Full Access