CompTIA CV0-004 CompTIA Cloud+ (2024) Online Training
CompTIA CV0-004 Online Training
The questions for CV0-004 were last updated at Nov 19,2024.
- Exam Code: CV0-004
- Exam Name: CompTIA Cloud+ (2024)
- Certification Provider: CompTIA
- Latest update: Nov 19,2024
An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements:
• Is simple and fast
• Can be performed on two Identical platforms
Which of the following strategies should the engineer use?
- A . Blue-green
- B . Canary
- C . Rolling
- D . in-place
The change control board received a request to approve a configuration change 10 deploy in the cloud production environment.
Which of the following should have already been competed?
- A . Penetration test
- B . End-to-end security testing
- C . Cost benefit analysis
- D . User acceptance testing
A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system.
Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).
- A . Resource tagging
- B . Discretionary access control
- C . Multifactor authentication
- D . Role-based access control
- E . Token-based authentication
- F . Bastion host
A system surpasses 75% to 80% of resource consumption.
Which of the following scaling approaches is the most appropriate?
- A . Trending
- B . Manual
- C . Load
- D . Scheduled
A network administrator is budding a site-to-site VPN tunnel from the company’s headquarters office 10 the company’s public cloud development network.
The network administrator confirms the following:
The VPN tunnel is established on the headquarter office firewall.
While inside the office, developers report that they cannot connect to the development network resources.
While outside the office on a client VPN, developers report that they can connect to the development network resources.
The office and the client VPN have different IP subnet ranges.
The firewall flow logs show VPN traffic is reaching the development network from the office.
Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?
- A . Review the development network routing table.
- B . Change the ciphers on the site-to-site VPN.
- C . Restart the site-to-site VPN tunnel.
- D . Check the ACLS on the development workloads
A company’s man web application is no longer accessible via the internet. The cloud administrator investigates and discovers the application is accessible locally and only via an IP access.
Which of the following was misconfigured?
- A . IP
- B . DHCP
- C . NAT
- D . DNS
A cloud engineer is provisioning a new application that requires access to the organization’s public cloud resources.
Which of the following is the best way for the cloud engineer to authenticate the application?
- A . Access key
- B . API
- C . MFA token
- D . Username and Password
A security engineer Identifies a vulnerability m a containerized application. The vulnerability can be exploited by a privileged process to read tie content of the host’s memory.
The security engineer reviews the following Dockerfile to determine a solution to mitigate similar exploits:
Which of the following is the best solution to prevent similar exploits by privileged processes?
- A . Adding the USER myappuserinstruction
- B . Patching the host running the Docker daemon
- C . Changing FROM alpiner3.17 to FROM alpine:latest
- D . Running the container with the ready-only filesystem configuration
A cross-site request forgery vulnerability exploited a web application that was hosted in a public laaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again.
Which of the following should the security engineer do to make the WAF control effective?
- A . Configure the DDoS protection on the CDN.
- B . Install endpoint protection software on the VMs
- C . Add an ACL to the VM subnet.
- D . Deploy an IDS on the laaS network.
A cloud engineer wants containers to run the latest version of a container base image to reduce the number of vulnerabilities. The applications in use requite Python 3.10 and ate not compatible with any other version. The containers’ images are created every time a new version is released from the source image.
Given the container Dockerfile below:
Which of the following actions will achieve the objectives with the least effort?
- A . Perform docker pull before executing docker run.
- B . Execute docker update using a local cron to get the latest container version.
- C . Change the image to use python:latest on the image build process.
- D . Update the Dockerfile to pin the source image version.