Exam4Training

Which of the following metrics would most likely be used to identify the activity?

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances.

Which of the following metrics would most likely be used to identify the activity?
A . Disk I/O
B . Network packets
C . Average memory utilization
D . Percent of CPU utilization

Answer: D

Explanation:

To detect cryptojacking and other cryptomining malware on cloud instances, monitoring the percent of CPU utilization is most effective. Cryptomining malware typically consumes a significant amount of CPU resources for mining operations, leading to unusually high CPU usage. Monitoring and analyzing CPU utilization metrics can help identify instances of cryptojacking by highlighting abnormal levels of resource consumption.

Reference: Understanding management and technical operations in cloud environments, as outlined in the CompTIA Cloud+ objectives, includes the use of monitoring solutions to detect and respond to security threats like cryptomining malware, ensuring the integrity and performance of cloud resources.

Latest CV0-004 Dumps Valid Version with 213 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version