New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA CV0-004 - CompTIA Cloud+ (2025)

Page: 8 / 8
Total 256 questions

A systems administrator is provisioning VMs according to the following requirements:

· A VM instance needs to be present in at least two data centers.

. During replication, the application hosted on the VM tolerates a maximum latency of one second.

· When a VM is unavailable, failover must be immediate.

Which of the following replication methods will best meet these requirements?

A.

Snapshot

B.

Transactional

C.

Live

D.

Point-in-time

A systems administrator needs to configure backups for the company's on-premises VM cluster. The storage used for backups will be constrained on free space until the company

can implement cloud backups. Which of the following backup types will save the most space, assuming the frequency of backups is kept the same?

A.

Snapshot

B.

Ful

C.

Differential

D.

Incremental

A cloud service provider just launched a new serverless service that is compliant with all security regulations. A company deployed its code using the service, and the company's application was hacked due to leaked credentials. Which of the following is responsible?

A.

Customer

B.

Cloud service provider

C.

Hacker

D.

Code repository

An organization's security policy states that software applications should not exchange sensitive data in cleartext. The security analyst is concerned about a software application that uses Base64 to encode credit card data. Which of the following would be the best algorithm to replace Base64?

A.

3DES

B.

AES

C.

RC4

D.

SHA-3

A user's assigned cloud credentials are locked, and the user is unable to access the project's application. The cloud administrator reviews the logs and notices several attempts to log in with the user's account were made to a different application after working hours. Which of the following is the best approach for the administrator to troubleshoot this issue?

A.

Create new credentials for the user and restrict access to the authorized application.

B.

Track the source of the log-in attempts and block the IP address of the source in the WAR

C.

Reset the user's account and implement a stronger lock-out policy.

D.

Install an IDS on the network to monitor suspicious activity

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing