New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA CV0-004 - CompTIA Cloud+ (2025)

Page: 6 / 8
Total 256 questions

An organization is hosting a seminar with eight individuals who need to connect to their own dedicated VM. The technician used the following VM configurations:

IP address: DHCP

NIC: 1Gbps

Network: 10.1.10.0/29

Several users are unable to access their VMs. Which of the following best describes the reason?

A.

Not enough addresses are available.

B.

The routes are misconfigured.

C.

Too much traffic is on the network.

D.

DHCP is not working correctly on the VM.

Which of the following are best practices when working with a source control system? (Select two).

A.

Merging code often

B.

Pushing code directly to production

C.

Performing code deployment

D.

Maintaining one branch for all features

E.

Committing code often

F.

Initiating a pull request

Which of the following do developers use to keep track of changes made during software development projects?

A.

Code drifting

B.

Code control

C.

Code testing

D.

Code versioning

A social networking company operates globally. Some users from Brazil and Argentina are reporting the following error: website address was not found. Which of the following is the most likely cause of this outage?

A.

Client DNS misconfigutation

B.

Regional DNS provider outage

C.

DNS server misconfiguration

D.

DNS propagation issues

A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

A.

Log retention

B.

Tracing

C.

Log aggregation

D.

Log rotation

E.

Hashing

F.

Encryption

A project manager must determine how ideas from the organization and results from the review committee should move through the enterprise for a new project. Which of the following does the project manager need to do?

A.

Establish communication channels

B.

Plan a kickoff meeting

C.

Develop a responsibility assignment matrix

D.

Identify the stakeholders

Which of the following is the most cost-effective way to store data that is infrequently accessed?

A.

Cold site

B.

Hot site

C.

Off-site

D.

Warm site

A developer is testing code that will be used to deploy a web farm in a public cloud. The main code block is a function to create a load balancer and a loop to create 1.000 web servers, as shown below:

The developer runs the code against the company's cloud account and observes that the load balancer is successfully created, but only 100 web servers have been created. Which of the following should the developer do to fix this issue?

A.

Request an increase of Instance quota.

B.

Run the code multiple times until all servers are created.

C.

Check the my_web_server () function to ensure it is using the right credentials.

D.

Place the my_load_balancer () function after the loop.

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

A.

Review the development network routing table.

B.

Change the ciphers on the site-to-site VPN.

C.

Restart the site-to-site VPN tunnel.

D.

Check the ACLS on the development workloads

Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year.

Which of the following is this an example of?

A.

Recoverability

B.

Retention

C.

Encryption

D.

Integrity