CompTIA CV0-002 CompTIA Cloud+ Exam Online Training
CompTIA CV0-002 Online Training
The questions for CV0-002 were last updated at Jan 06,2025.
- Exam Code: CV0-002
- Exam Name: CompTIA Cloud+ Exam
- Certification Provider: CompTIA
- Latest update: Jan 06,2025
A user cannot consume SaaS services while working remotely. IP whitelisting is implemented to connect to a SaaS provider as a security mechanism.
Which of the following describes the MOST likely reason why the user cannot access the SaaS resources?
- A . The user is not utilizing VPN to connect to the home office.
- B . The user account does not exist in the SaaS provider.
- C . The user account is not assigned the correct role in RBAC policy.
- D . The user account has consumed all of the available subscriptions.
Email users report that it takes more than one minute to open emails, including those without attachments. There are three email instances in three different regions hosted by the same CSP. Other applications hosted by the same CSP have no reported issues.
Which of the following solutions BEST resolves the issue?
- A . Confirm that the email instances have sufficient bandwidth.
- B . Install monitoring software on the email instances.
- C . Check the antivirus software settings and disable real-time message scanning.
- D . Ensure the requested IOPS are being provided to the email instances.
An administrator defines a backup as follows:
✑ One weekly full backup
✑ Daily incremental backup
Which of the following BEST describes where the administrator would define this?
- A . Backup SLA document
- B . Backup orchestration workflow
- C . Backup schedule
- D . Provisioning schedule
A company is using storage-as-a-service from an IaaS provider for application services. The company has a mandate to protect personal information being stored on the cloud. The service provided includes encryption for in-transit data and requires a security solution for data-at-rest.
Which of the following should be deployed to secure the personal information?
- A . Implement data tokenization.
- B . Implement hardware-based encryption.
- C . Implement centralized key management.
- D . Implement database-embedded encryption.
A company is using storage-as-a-service from an IaaS provider for application services. The company has a mandate to protect personal information being stored on the cloud. The service provided includes encryption for in-transit data and requires a security solution for data-at-rest.
Which of the following should be deployed to secure the personal information?
- A . Implement data tokenization.
- B . Implement hardware-based encryption.
- C . Implement centralized key management.
- D . Implement database-embedded encryption.
A company is using storage-as-a-service from an IaaS provider for application services. The company has a mandate to protect personal information being stored on the cloud. The service provided includes encryption for in-transit data and requires a security solution for data-at-rest.
Which of the following should be deployed to secure the personal information?
- A . Implement data tokenization.
- B . Implement hardware-based encryption.
- C . Implement centralized key management.
- D . Implement database-embedded encryption.
Identify the problematic device(s).
Instructions:
If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.
Simulation
After deploying a VM with a baseline CPU utilization below 80%, a cloud engineer notices the current CPU utilization stays in the 95% to 99% range.
Which of the following describes how this should be fixed to BEST meet the baseline?
- A . Deploy an additional VM based on the baseline.
- B . Enable CPU hyperthreading.
- C . Increase the CPU amount on the VM.
- D . Add more RAM to the VM to decrease CPU utilization.
Based on demand, an IaaS provider wants to deploy a security application for its customers.
Which of the following is the BEST technique for the IaaS provider to apply this to target systems?
- A . Vendor application
- B . Scripting
- C . Orchestration
- D . Custom programming
A cloud implementation engineer successfully created a new VM. However, the engineer notices the new VM is not accessible from another network. A ping test works from another VM on the same subnet.
Which of the following is the MOST likely problem?
- A . Incorrect subnet
- B . Incorrect host IP address
- C . Incorrect VLAN
- D . Incorrect gateway
hi! good job