New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA CV0-004 - CompTIA Cloud+ (2025)

Page: 7 / 8
Total 256 questions

A system surpasses 75% to 80% of resource consumption. Which of the following scaling approaches is the most appropriate?

A.

Trending

B.

Manual

C.

Load

D.

Scheduled

A cloud engineer is concerned about command-and-control (C2) communication out of a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify the type of communication?

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron listing connections

D.

Traffic mirroring

A project team is deciding how to break up a large project into smaller components so the project can be delivered without increasing the duration of the iteration cycles. Which of the following describes the grouping of the smaller components?

A.

An issue

B.

A goal

C.

A backlog item

D.

An epic

A log-parsing application requires significant processing power to ingest the logs streaming from web servers. The engineering team presents the cloud architect with four proposals

using the same underlying hardware. Which of the following should the cloud architect select in order to minimize the impact of an instance failure while keeping the cost as low as

possible?

A.

Four instances of 4vCPU, 8GB RAM, 80GB SSD

B.

Four instances of 4vCPU, 8GB RAM, 80GB HDD

C.

Two instances of 8vCPU, 16GB RAM, 80GB SSD

D.

Two instances of 8vCPU, 16GB RAM, 80GB HDD

Which of the following is used to detect signals and measure physical properties, such as the temperature of the human body?

A.

Beacon

B.

Transmission protocols

C.

Sensors

D.

Gateways

Which of the following container storage types loses data after a restart?

A.

Object

B.

Persistent volume

C.

Ephemeral

D.

Block

Which of the following provides secure, private communication between cloud environments without provisioning additional hardware or appliances?

A.

VPN

B.

VPC peering

C.

BGP

D.

Transit gateway

Which of the following service options would provide the best availability for critical applications in the event of a disaster?

A.

Edge computing

B.

Cloud bursting

C.

Availability zones

D.

Multicloud tenancy

A company migrated its CRM system to a SaaS solution. The security team is updating the RAG matrix for the newly migrated CRM. Given the following table:

Which of the following responsibility assignments best aligns with the shared responsibility model for the new CRM?

A.

Data-center security

B.

CRM software security

C.

CRM server patching

D.

CRM development life cycle

A technician receives an email from a vendor who is requesting payment of an invoice for human resources services. The email contains a request for bank account numbers. Which of the following types of attacks does this behavior most likely indicate?

A.

MaIware

B.

Cryptojacking

C.

Ransomware

D.

Phishing