Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA CV0-004 - CompTIA Cloud+ (V4)

Page: 1 / 8
Total 254 questions

The performance of an e-commerce website decreases dramatically during random periods. The IT team is evaluating available resources to mitigate the situation. Which of the following is the best approach to effectively manage this scenario'?

A.

Migrating to a dedicated host

B.

Purchasing additional servers

C.

Scheduling resource allocation

D.

Configuring automatic elasticity

A company has solid, validated border protection including a next-generation firewall and IPS. However, compromises and breaches continue. Which of the following is the best way to improve the company's security controls and reduce the number of incidents?

A.

Assess the border protection assets against a CIS benchmark and apply recommendations.

B.

Execute a network scan on the border protection and close ports that can be used by attackers.

C.

Shift the focus from border protection to a Zero Trust architecture focused on identities.

D.

Include a WAF on the network border, increasing protection and adopting security in layers.

A cloud administrator needs to collect process-level, memory-usage tracking for the virtual machines that are part of an autoscaling group. Which of the following is the best way to

accomplish the goal by using cloud-native monitoring services?

A.

Configuring page file/swap metrics

B.

Deploying the cloud-monitoring agent software

C.

Scheduling a script to collect the data

D.

Enabling memory monitoring in the VM configuration

Which of the following requirements are core considerations when migrating a small business's on-premises applications to the cloud? (Select two).

A.

Availability

B.

Hybrid

C.

Testing

D.

Networking

E.

Compute

F.

Logs

A security team recently hired multiple interns who all need the same level of access. Which of the following controls should the security team implement to provide access to the

cloud environment with the least amount of overhead?

A.

MFA

B.

Discretionary access

C.

Local user access

D.

Group-based access control

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

A.

Review the development network routing table.

B.

Change the ciphers on the site-to-site VPN.

C.

Restart the site-to-site VPN tunnel.

D.

Check the ACLS on the development workloads

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to

calculate the severity of the risk from using this component?

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

A social networking company operates globally. Some users from Brazil and Argentina are reporting the following error: website address was not found. Which of the following is the most likely cause of this outage?

A.

Client DNS misconfigutation

B.

Regional DNS provider outage

C.

DNS server misconfiguration

D.

DNS propagation issues

A company wants to implement a work environment that will have low operational overhead and highly accessible enterprise resource planning, email, and data resources. Which of

the following cloud service models should the company implement?

A.

laaS

B.

PaaS

C.

DBaaS

D.

SaaS

A company's website suddenly crashed. A cloud engineer investigates the following logs:

Which of the following is the most likely cause of the issue?

A.

SQL injection

B.

Cross-site scripting

C.

Leaked credentials

D.

DDoS