CompTIA CV0-004 CompTIA Cloud+ (2024) Online Training
CompTIA CV0-004 Online Training
The questions for CV0-004 were last updated at Jan 28,2025.
- Exam Code: CV0-004
- Exam Name: CompTIA Cloud+ (2024)
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A cloud engineer needs to deploy a new version of a web application to 100 servers. In the past, new
version deployments have caused outages.
Which of the following deployment types should the cloud engineer implement to prevent the outages from happening this time?
- A . Rolling
- B . Blue-green
- C . Canary
- D . Round-robin
An organization needs to retain its data for compliance reasons but only when required.
Which of the following would be the most cost-effective type of tiered storage?
- A . Warm
- B . Hot
- C . Archive
- D . Cold
A developer is building a new application version using a CI/CD pipeline.
The developer receives the following error message log when the build fails:
Which of the following is the most likely cause of this failure?
- A . Incorrect version
- B . Test case failure
- C . Broken build pipeline
- D . Dependency issue
Which of the following cloud deployment strategies is best for an organization that wants to run open-source workloads with other organizations that are sharing the cost?
- A . Community
- B . Public
- C . Hybrid
- D . Private
A cloud administrator shortens the amount of time a backup runs. An executive in the company requires a guarantee that the backups can be restored with no data loss.
Which of the following backup features should the administrator lest for?
- A . Encryption
- B . Retention
- C . Schedule
- D . Integrity
Which of the following is the best type of database for storing different types of unstructured data that may change frequently?
- A . Vector
- B . Relational
- C . Non-relational
- D . Graph
A cloud administrator learns that a major version update. 4.6.0. is available for a business-critical application. The application is currently on version 4.5.2. with additional minor versions 3, 4, and 5 available. The administrator needs to perform the update while minimizing downtime.
Which of the following should the administrator do first?
- A . Apply the minor updates and then restart the machine before applying the major update.
- B . During off hours, decommission the machine and create a new one directly on major update 4.6.0.
- C . Stop the service and apply the major updates directly.
- D . Create a test environment and apply the major update
A software engineer at a cybersecurity company wants to access the cloud environment. Per company policy, the cloud environment should not be directly accessible via the internet.
Which of the following options best describes how the software engineer can access the cloud resources?
- A . SSH
- B . Bastion host
- C . Token-based access
- D . Web portal
A company requests that its cloud administrator provision virtual desktops for every user.
Given the following information:
• One hundred users are at the company.
• A maximum of 30 users work at the same time.
• Users cannot be interrupted while working on the desktop.
Which of the following strategies will reduce costs the most?
- A . Provisioning VMs of varying sizes to match user needs
- B . Configuring a group of VMs to share with multiple users
- C . Using VMs that have spot availability
- D . Setting up the VMs to turn off outside of business hours at night
A user’s assigned cloud credentials are locked, and the user is unable to access the project’s application. The cloud administrator reviews the logs and notices several attempts to log in with the user’s account were made to a different application after working hours.
Which of the following is the best approach for the administrator to troubleshoot this issue?
- A . Create new credentials for the user and restrict access to the authorized application.
- B . Track the source of the log-in attempts and block the IP address of the source in the WAR
- C . Reset the user’s account and implement a stronger lock-out policy.
- D . Install an IDS on the network to monitor suspicious activity