Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA CV0-004 - CompTIA Cloud+ (V4)

Page: 6 / 8
Total 254 questions

Which of the following is a protocol frequently used with IoT devices to communicate with a gateway?

A.

ICMP

B.

MQTT

C.

RPC

D.

SSH

Which of the following integration systems would best reduce unnecessary network traffic by allowing data to travel bidirectionally and facilitating real-time results for developers who need to display critical information within applications?

A.

REST API

B.

RPC

C.

GraphQL

D.

Web sockets

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production

environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

A.

Canary

B.

Blue-green

C.

Rolling

D.

In-place

A company's VMs that are created using the noncritical application tag are automatically shut down at 5:00 p.m. using a cronjob. Which of the following actions would allow a cloud engineer to stop all unresponsive instances with the least effort in case the automation fails?

A.

Using the cloud audit logs for tagging and stopping events

B.

Using the cloud provider web console to check and stop the instances

C.

Using the cloud provider command line to stop the Instances based on tags

D.

Using a Bash script to shut down all instances

A company receives files daily from a bank. The company requires that the files must be copied from the cloud storage resource to another cloud storage resource for further

processing. Which of the following methods requires the least amount of effort to achieve the task?

A.

Remote procedure call

B.

SOAP

C.

Event-driven architecture

D.

REST

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

A.

Setting up private development, public development, and testing environments

B.

Segregating environments for internal and external teams

C.

Configuring DDoS protection to mitigate the risk of downtime

D.

Using IAM and ACL in order to bolster DLP

A company operates a website that allows customers to upload, share, and retain full ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

A.

Sovereignty

B.

Data classification

C.

Litigation holds

D.

Retention

A company runs a discussion forum that caters to global users. The company's monitoring system reports that the home page suddenly is seeing elevated response times, even

though internal monitoring has reported no issues or changes. Which of the following is the most likely cause of this issue?

A.

Cryptojacking

B.

Human error

C.

DDoS

D.

Phishing

A cloud solutions architect is designing a VM-based solution that requires reducing the cost as much as possible. Which of the following solutions will best satisfy this requirement?

A.

Using ephemeral storage on replicated VMs

B.

Creating Spot VMs in one availability zone

C.

Spreading the VMs across different regions

D.

Using provisioned IOPS storage

A software engineer at a cybersecurity company wants to access the cloud environment. Per company policy, the cloud environment should not be directly accessible via the internet. Which of the following options best describes how the software engineer can access the cloud resources?

A.

SSH

B.

Bastion host

C.

Token-based access

D.

Web portal