Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA CV0-003 - CompTIA Cloud+ Certification Exam

Page: 13 / 14
Total 452 questions

A cloud administrator is supporting an application that has several reliability issues. The administrator needs visibility into the performance characteristics of the application. Which of the following will MOST likely be used in a reporting dashboard?

A.

Data from files containing error messages from the application

B.

Results from the last performance and workload testing

C.

Detail log data from syslog files of the application

D.

Metrics and time-series data measuring key performance indicators

Which of the following should be enabled to reduce cloud compute costs when planning hardware capacity?

A.

Compression and deduplication on the object storage.

B.

Autoscaling with load balancing.

C.

Affinity settings per node.

D.

Lifecycle management on the data storage.

A company is comparing an application environment to be hosted on site versus a SaaS model of the same application. Which of the following SaaS-based licensing models should the administrator consider?

A.

Per core

B.

Per socket

C.

Per instance

D.

Per user

A cloud administrator is looking at the company's cloud services bill for the previous month. The administrator notices on the billing dashboard that certain resources are not being billed to any particular department. Which of the following actions will help correct this billing issue?

A.

Check the utilization of the resources.

B.

Modify the chargeback details of the consumer.

C.

Add the resources to the consumer monitoring group.

D.

Modify the tags for all the unmapped resources.

As a result of an IT audit, a customer has decided to move some applications from an old legacy system to a private cloud. The current server location is remote with low bandwidth. Which of the following is the best migration strategy to use for this deployment?

A.

P2V with physical data transport

B.

P2P with remote data copy

C.

V2V with physical data transport

D.

V2P with physical data transport

E.

V2P with remote data copy

The Chief Information Officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud. The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information. Which of the following should be configured during the migration?

A.

ACL

B.

VPN

C.

P2V

D.

VDI

A cloud administrator deployed new hosts in a private cloud. After a few months elapsed, some of the hypervisor features did not seem to be working. Which of the following was MOST likely causing the issue?

A.

Incorrect permissions

B.

Missing license

C.

Incorrect tags

D.

Oversubscription

A systems administrator is trying to connect to a remote KVM host. The command line appears as follows:

After logging in to the remote server, the administrator verifies the daemon is running. Which of the following should the administrator try NEXT?

A.

Opening port 22 on the firewall

B.

Running the command with elevated privileges

C.

Checking if the SSH password is correct

D.

Ensuring the private key was properly imported

A systems administrator deployed a new web application in a public cloud and would like to test it, but the company's network firewall is only allowing outside connections to the cloud provider network using TCP port 22. While waiting for the network administrator to open the required ports, which of the following actions should the systems administrator take to test the new application? (Select two).

A.

Create an IPSec tunnel.

B.

Create a VPN tunnel.

C.

Open a browser using the default gateway IP address.

D.

Open a browser using the localhost IP address.

E.

Create a GRE tunnel.

F.

Create a SSH tunnel.

An organization is conducting a performance test of a public application. The following actions have already been completed:

• The baseline performance has been established.

• A load test has passed.

• A benchmark report has been generated.

Which of the following needs to be done to conclude the performance test?

A.

Verify the application works well under an unexpected volume of requests.

B.

Assess the application against vulnerabilities and/or misconfiguration exploitation.

C.

Test how well the application can resist a DDoS attack.

D.

Conduct a test with the end users and collect feedback.