CompTIA CV0-004 CompTIA Cloud+ (2024) Online Training
CompTIA CV0-004 Online Training
The questions for CV0-004 were last updated at Nov 19,2024.
- Exam Code: CV0-004
- Exam Name: CompTIA Cloud+ (2024)
- Certification Provider: CompTIA
- Latest update: Nov 19,2024
A cloud engineer is designing a cloud-native, three-tier application.
The engineer must adhere to the following security best practices:
• Minimal services should run on all layers of the stack.
• The solution should be vendor agnostic.
• Virealization could be used over physical hardware.
Which of the following concepts should the engineer use to design the system to best meet these requirements?
- A . Virtual machine
- B . Micro services
- C . Fan-out
- D . Cloud-provided managed services
A high-usage cloud resource needs to be monitored in real time on specific events to guarantee its availability.
Which of the following actions should be used to meet this requirement?
- A . Configure a ping command to identify when the cloud instance is out of service.
- B . Create a dashboard with visualizations to filter the status of critical activities.
- C . Collect all the daily activity from the cloud instance and create a dump file for analysis.
- D . Schedule an hourly scan of the network to check for the availability of the resource.
A junior cloud administrator was recently promoted to cloud administrator and has been added to the cloud administrator group. The cloud administrator group is the only one that can access the engineering VM. The new administrator unsuccessfully attempts to access the engineering VM. However, the other administrators can access it without issue.
Which of the following is the best way to identify the root cause?
- A . Rebooting the engineering VM
- B . Reviewing the administrator’s permissions to access the engineering VM
- C . Allowing connections from 0.0.0.070 to the engineering VM
- D . Performing a packet capture on the engineering VM
A cloud solutions architect is designing a VM-based solution that requires reducing the cost as much as possible.
Which of the following solutions will best satisfy this requirement?
- A . Using ephemeral storage on replicated VMs
- B . Creating Spot VMs in one availability zone
- C . Spreading the VMs across different regions
- D . Using provisioned IOPS storage
A critical security patch is required on a network load balancer in a public cloud. The organization has a major sales conference next week, and the Chief Executive Officer does not want any interruptions during the demonstration of an application behind the load balancer.
Which of the following approaches should the cloud security engineer take?
- A . Ask the management team to delay the conference.
- B . Apply the security patch after the event.
- C . Ask the upper management team to approve an emergency patch window.
- D . Apply the security patch immediately before the conference.
A cloud engineer has provisioned a VM for a high-frequency trading application. After the VM is put into production, users report high latency in trades.
The engineer checks the last six hours of VM metrics and sees the following:
• CPU utilization is between 30% to 60%.
• Networkln is between 50Kbps and 70Kbps.
• NetworkOut is between 3.000Kpbs and 5.000Kbps.
• DiskReadOps is at 30.
• DiskWriteOps is at 70
• Memory utilization is between 50% and 70%.
Which of the following steps should the engineer take next to solve the latency issue?
- A . Move to a network-optimized instance type as the network throughput is not enough.
- B . Modify the disk IOPS to a higher value as the disk IO is being bottlenecked at 100 IOPS.
- C . Increase the memory of the instance as the high-frequency trading application requires more RAM.
- D . Increase the instance size to allocate more vCPUs as the CPU utilization is very high.
A cloud engineer was deploying the company’s payment processing application, but it failed with the following error log:
ERFOR: root: Transaction failed http 429 response, please try again.
Which of the following are the most likely causes for this error? (Select two).
- A . API throttling
- B . API gateway outage
- C . Web server outage
- D . Oversubscription
- E . Unauthorized access
- F . Insufficient quota
An organization’s web application experiences penodic bursts of traffic when a new video is launched. Users are reporting poor performance in the middle of the month.
Which of the following scaling approaches should the organization use to scale based on forecasted traffic?
- A . Scheduled
- B . Manual
- C . Event
- D . Load
A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour.
Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?
- A . Use laC to deploy the laaS infrastructure.
- B . Convert the containers to VMs.
- C . Deploy the containers over SSH.
- D . Use private repositories for the containers.
Which of the following is an auditing procedure that ensures service providers securely manage the data to protect the interests of the organization and the privacy of its clients?
- A . CIS
- B . ITIL
- C . SOC2
- D . ISO 27001