Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CV0-003 CompTIA Cloud+ Certification Exam Questions and Answers

Questions 4

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL https://www.comptiasite.com. Which of the following would MOST likely resolve the issue?

Options:

A.

Renewing the expired certificate

B.

Updating the web-server software

C.

Changing the crypto settings on the web server

D.

Upgrading the users' browser to the latest version

Buy Now
Questions 5

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?

Options:

A.

Insufficient guest bandwidth

B.

Overwhelmed vCPU

C.

A storage error on the guest

D.

Incorrect VLAN assignment

E.

Inadequate memory allocation

Buy Now
Questions 6

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

Options:

A.

A firewall

B.

Switches

C.

Ballooning

D.

Autoscaling

Buy Now
Questions 7

A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM?

Options:

A.

CDN

B.

DNS

C.

NTP

D.

IPAM

Buy Now
Questions 8

A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?

Options:

A.

SNMPv3

B.

Community strings

C.

IPSec tunnels

D.

ACLs

Buy Now
Questions 9

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

Options:

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Buy Now
Questions 10

A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows:

Options:

A.

• Three public cloud hosts with four cores

• 120GB of RAM

• 100GB of storage

• 1Gbps

B.

• Three public cloud hosts with six cores

• 80GB of RAM

• 180GB of storage

• 150Mbps

C.

• Three public cloud hosts with six cores

• 80GB of RAM

• 1TB of storage

• 200Mbps

D.

• Four public cloud hosts with four cores

• 140GB of RAM

• 200GB of storage

Buy Now
Questions 11

All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST?

Options:

A.

Peer all the networks from each cloud environment.

B.

Migrate the servers.

C.

Create a VPN tunnel.

D.

Configure network access control lists.

Buy Now
Questions 12

A security audit related to confidentiality controls found the following transactions occurring in the system:

GET http://gateway.securetransaction.com/privileged/api/v1/changeResource?id=123 &user=277

Which of the following solutions will solve the audit finding?

Options:

A.

Using a TLS-protected API endpoint

B.

Implementing a software firewall

C.

Deploying a HIDS on each system

D.

Implementing a Layer 4 load balancer

Buy Now
Questions 13

A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying the CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue?

Options:

A.

Modify the deployment script to delete and recreate the database whenever the CMS application is deployed.

B.

Modify the ACL to allow the staging environment to access the database in the sandbox environment.

C.

Modify the CMS application deployment to use the previous version and redeploy the application.

D.

Modify the configuration settings of the CMS application to connect to the database in the current environment.

Buy Now
Questions 14

A cloud architect is reviewing four deployment options for a new application that will be hosted by a public cloud provider. The application must meet an SLA that allows for no more than five hours of downtime annually. The cloud architect is reviewing the SLAs for the services each option will use:

Based on the information above, which of the following minimally complies with the SLA requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 15

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

Options:

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Buy Now
Questions 16

Which of the following will provide a systems administrator with the MOST information about potential attacks on a cloud IaaS instance?

Options:

A.

Network flows

B.

FIM

C.

Software firewall

D.

HIDS

Buy Now
Questions 17

A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity?

Options:

A.

Patch management

B.

Hardening

C.

Scaling

D.

Log and event monitoring

Buy Now
Questions 18

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

Options:

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Buy Now
Questions 19

An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?

Options:

A.

Two load balancers behind a single firewall

B.

Firewalls in a blue-green configuration

C.

Two firewalls in a HA configuration

D.

A web application firewall

Buy Now
Questions 20

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

Options:

A.

RPO

B.

MTTR

C.

SLA

D.

RTO

Buy Now
Questions 21

A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue?

Options:

A.

Check the FAQ section of the vendor's documentation.

B.

Ask the user if the client device or access location has changed.

C.

Reboot the user's virtual desktop.

D.

Request permission to log in to the device remotely.

Buy Now
Questions 22

A systems administrator has migrated a web application to the cloud with a synchronous uplink speed of 100Mbps. After the migration, the administrator receives reports of slow connectivity to the web application. The administrator logs into the firewall and notices the WAN port is transmitting at a constant 12.5MBps. Which of the following BEST explains the reason for the issue?

Options:

A.

Misconfigured subnetting

B.

Insufficient compute

C.

Firewall issues

D.

Not enough upload bandwidth

Buy Now
Questions 23

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

Options:

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Buy Now
Questions 24

A cloud administrator wants to have a central repository for all the logs in the company’s private cloud. Which of the following should be implemented to BEST meet this requirement?

Options:

A.

SNMP

B.

Log scrubbing

C.

CMDB

D.

A syslog server

Buy Now
Questions 25

A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?

Options:

A.

Alternate location

B.

Rolling

C.

Storage live migration

D.

In-place

Buy Now
Questions 26

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

Options:

A.

Site-to-site

B.

Client-to-site

C.

Point-to-site

D.

Point-to-point

Buy Now
Questions 27

A piece of software applies licensing fees on a socket-based model. Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?

Options:

A.

The amount of memory in the server

B.

The number of CPUs in the server

C.

The type of cloud in which the software is deployed

D.

The number of customers who will be using the software

Buy Now
Questions 28

After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?

Options:

A.

One 32 vCPU node with CDN caching

B.

Two 8 vCPU nodes with load balancing

C.

Three to six 8 vCPU nodes autoscaling group

D.

Four 8 vCPU nodes with DNS round robin

Buy Now
Questions 29

A systems administrator is securing a new email system for a large corporation. The administrator wants to ensure private corporate information is not emailed to external users. Which of the following would be MOST useful to accomplish this task?

Options:

A.

DLP

B.

EDR

C.

DNSSEC

D.

SPF

Buy Now
Questions 30

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

Options:

A.

Service_level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Buy Now
Questions 31

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?

Options:

A.

There is a configuration failure in the syslog solution.

B.

The application servers were migrated to the cloud as laaS instances.

C.

The application administrators have not performed any activity in those servers.

D.

There is a local firewall policy restriction on the syslog server.

Buy Now
Questions 32

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

Options:

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Buy Now
Questions 33

A cloud administrator is configuring several security appliances hosted in the private laaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?

Options:

A.

Allow UDP 161 outbound from the web servers to the log collector .

B.

Allow TCP 514 outbound from the web servers to the log collector.

C.

Allow UDP 161 inbound from the log collector to the web servers .

D.

Allow TCP 514 inbound from the log collector to the web servers .

Buy Now
Questions 34

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment?

Options:

A.

The regional area

B.

Cloud bursting

C.

Lower costs

D.

Scalability

Buy Now
Questions 35

A company is planning its cloud architecture and wants to use a VPC for each of its three products per environment in two regions, totaling 18 VPCs. The products have interdependences, consuming services between VPCs. Which of the following should the cloud architect use to connect all the VPCs?

Options:

A.

MPLS connections

B.

VPC peering

C.

Hub and spoke

D.

VPN connections

Buy Now
Questions 36

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Select TWO).

Options:

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPI-J resources

F.

License issues

Buy Now
Questions 37

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).

Options:

A.

A load balancer

B.

SON

C.

A firewall

D.

SR-IOV

E.

Storage replication

F.

A VPN

Buy Now
Questions 38

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

Options:

A.

Firewall outbound rules

B.

Firewall inbound rules

C.

Load balancer certificates

D.

Load balancer stickiness

E.

WAF transaction throttling

Buy Now
Questions 39

A company is using a method of tests and upgrades in which a small set of end users are exposed to new services before the majority of other users. Which of the following deployment methods is being used?

Options:

A.

Blue-green

B.

Canary

C.

Big bang

D.

Rolling

Buy Now
Questions 40

A security analyst is investigating incidents in which attackers are able to access sensitive data from a corporate application's database. The attacks occur periodically and usually

after the release of a new application's version. The following log confirms the compromise:

USER: WebApp access—key accepted

WebApp user assumed DBA role

GetData API call executed

The following actions are made after every incident occurrence:

• Validation of firewall rules

• Scripted rebuild of the database and web instances

• Application deployment from a cloud code repository

Which of the following actions will MOST likely prevent future compromises?

Options:

A.

Rotating the account credentials

B.

Migrating the database to be on premises

C.

Forbidding the use of API calls to retrieve data

D.

Implementing a new database service account

Buy Now
Questions 41

An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection?

Options:

A.

WAF

B.

EDR

C.

IDS

D.

HIPS

E.

SSL

Buy Now
Questions 42

An administrator manages a file server that has a lot of users accessing and creating many files. As a result, the storage consumption is growing quickly. Which of the following would BEST control storage usage?

Options:

A.

Compression

B.

File permissions

C.

User quotas

D.

Access policies

Buy Now
Questions 43

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following

scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?

Options:

A.

Horizontal

B.

Vertical

C.

Cloud bursting

D.

Autoscaling

Buy Now
Questions 44

A cloud administrator needs to coordinate and automate the management of a company's secrets and keys for all its cloud services with minimal effort and low cost. Which of the following is the BEST option to achieve the goal?

Options:

A.

Implement database as a service

B.

Configure Key Vault

C.

Use password as a service

D.

Implement KeePass

Buy Now
Questions 45

A systems administrator needs to implement a service to protect a web application from external attacks. The administrator must have session-based granular control of all HTTP traffic. Which of the following should the administrator configure?

Options:

A.

IDS

B.

WAF

C.

DLP

D.

NAC

Buy Now
Questions 46

A systems administrator needs to deploy a solution to automate new application releases that come from the development team. The administrator is responsible for provisioning resources at the infrastructure layer without modifying any configurations in the application code. Which of the following would BEST accomplish this task?

Options:

A.

Implementing a CI/CD tool

B.

Configuring infrastructure as code

C.

Deploying an orchestration tool

D.

Employing DevOps methodology

Buy Now
Questions 47

A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Incorrect permissions

B.

Insufficient storage

C.

Billing issues with the cloud provider

D.

No connectivity to the public cloud

E.

Expired API token

F.

Disabled autoscaling

Buy Now
Questions 48

A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality?

Options:

A.

NAC

B.

IDS

C.

DLP

D.

EDR

Buy Now
Questions 49

The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other’s work.

Which of the following did the team MOST likely forget to implement?

Options:

A.

Incident type categories

B.

A calling tree

C.

Change management

D.

Roles and responsibilities

Buy Now
Questions 50

A cloud administrator is monitoring a database system and notices an unusual increase in the read operations, which is causing a heavy load in the system. The system is using a relational database and is running in a VM. Which of the following should the administrator do to resolve the issue with minimal architectural changes?

Options:

A.

Migrate the relational database to a NoSQL database.

B.

Use a cache system to store reading operations.

C.

Create a secondary standby database instance.

D.

Implement the database system using a DBaaS.

Buy Now
Questions 51

The human resources department was charged for a cloud service that belongs to another department. All other cloud costs seem to be correct.

Which of the following is the MOST likely cause for this error?

Options:

A.

Misconfigured templates

B.

Misconfigured chargeback

C.

Incorrect security groups

D.

Misconfigured tags

Buy Now
Questions 52

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPU resources

F.

License issues

Buy Now
Questions 53

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

Options:

A.

Performance testing

B.

Penetration testing

C.

Vulnerability testing

D.

Regression testing

Buy Now
Questions 54

A cloud administrator has built a new private cloud environment and needs to monitor all computer, storage, and network components of the environment.

Which of the following protocols would be MOST useful for this task?

Options:

A.

SMTP

B.

SCP

C.

SNMP

D.

SFTP

Buy Now
Questions 55

A systems administrator is configuring a storage array.

Which of the following should the administrator configure to set up mirroring on this array?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Buy Now
Questions 56

An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team.

Which of the following controls will BEST mitigate the risk of exploitation?

Options:

A.

DLP

B.

HIDS

C.

NAC

D.

WAF

Buy Now
Questions 57

A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site.

Which of the following should be configured in between the cloud environment and the DR site?

Options:

A.

Failback

B.

Playbook

C.

Zoning

D.

Replication

Buy Now
Questions 58

An organization’s web server farm, which is hosted in the cloud with DNS load balancing, is experiencing a spike in network traffic. This has caused an outage of the organization’s web server infrastructure.

Which of the following should be implemented to prevent this in the future as a mitigation method?

Options:

A.

Enable DLP

B.

Configure microsegmentation

C.

Enable DNSSEC

D.

Deploy a vADC appliance

Buy Now
Questions 59

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

Options:

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Buy Now
Questions 60

A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error.

Which of the following will MOST likely solve the issue?

Options:

A.

Checking user passwords

B.

Configuring QoS rules

C.

Enforcing TLS authentication

D.

Opening TCP port 3389

Buy Now
Questions 61

A company has deployed a new cloud solution and is required to meet security compliance.

Which of the following will MOST likely be executed in the cloud solution to meet security requirements?

Options:

A.

Performance testing

B.

Regression testing

C.

Vulnerability testing

D.

Usability testing

Buy Now
Questions 62

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

Options:

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Buy Now
Questions 63

A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.

This is an example of:

Options:

A.

a storage area network

B.

a network file system

C.

hyperconverged storage

D.

thick-provisioned disks

Buy Now
Questions 64

A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior.

Which of the following is MOST likely the cause?

Options:

A.

API provider rate limiting

B.

Invalid API token

C.

Depleted network bandwidth

D.

Invalid API request

Buy Now
Questions 65

A systems administrator needs to convert ten physical servers to virtual.

Which of the following would be the MOST efficient conversion method for the administrator to use?

Options:

A.

Rebuild the servers from scratch

B.

Use the vendor’s conversion tool

C.

Clone the hard drive

D.

Restore from backup

Buy Now
Questions 66

A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web- based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.

The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment.

Which of the following is the MOST likely reason for this issue?

Options:

A.

The license limit on the number of server deployments allowed per month was exceeded

B.

The deployment script changes made by the first administrator were not checked in and committed

C.

The new server images were incompatible with the application load-balancer configuration

D.

The application load balancer exceeded the maximum number of servers it could use

Buy Now
Questions 67

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations.

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?

Options:

A.

Integrity

B.

Versioning

C.

Classification

D.

Segmentation

Buy Now
Questions 68

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments.

Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?

Options:

A.

Chain

B.

Star

C.

Mesh

D.

Hub and spoke

Buy Now
Questions 69

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

Options:

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Buy Now
Questions 70

A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power.

Which of the following should be investigated FIRST?

Options:

A.

Server power

B.

Rack power

C.

Switch power

D.

SAN power

Buy Now
Questions 71

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Buy Now
Questions 72

A marketing team is using a SaaS-based service to send emails to large groups of potential customers. The internally managed CRM system is configured to generate a list of target customers automatically on a weekly basis, and then use that list to send emails to each customer as part of a marketing campaign. Last week, the first email campaign sent emails successfully to 3,000 potential customers. This week, the email campaign

attempted to send out 50,000 emails, but only 10,000 were sent.

Which of the following is the MOST likely reason for not sending all the emails?

Options:

A.

API request limit

B.

Incorrect billing account

C.

Misconfigured auto-scaling

D.

Bandwidth limitation

Buy Now
Questions 73

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs.

Which of the following should be verified NEXT?

Options:

A.

Application

B.

SAN

C.

VM GPU settings

D.

Network

Buy Now
Questions 74

A cloud administrator is planning to migrate a globally accessed application to the cloud.

Which of the following should the cloud administrator implement to BEST reduce latency for all users?

Options:

A.

Regions

B.

Auto-scaling

C.

Clustering

D.

Cloud bursting

Buy Now
Questions 75

A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:

  • High availability
  • Horizontal auto-scaling
  • 60 nodes peak capacity per region
  • Five reserved network IP addresses per subnet
  • /24 range

Which of the following would BEST meet the above requirements?

Options:

A.

Create two /25 subnets in different regions

B.

Create three /25 subnets in different regions

C.

Create two /26 subnets in different regions

D.

Create three /26 subnets in different regions

E.

Create two /27 subnets in different regions

F.

Create three /27 subnets in different regions

Buy Now
Questions 76

A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage.

Which of the following RAID types should the administrator choose?

Options:

A.

5

B.

6

C.

10

D.

50

Buy Now
Questions 77

A company developed a product using a cloud provider’s PaaS platform and many of the platform-based components within the application environment.

Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider?

Options:

A.

Licensing

B.

Authentication providers

C.

Service-level agreement

D.

Vendor lock-in

Buy Now
Questions 78

A company recently subscribed to a SaaS collaboration service for its business users. The company also has an on-premises collaboration solution and would like users to have a seamless experience regardless of the collaboration solution being used.

Which of the following should the administrator implement?

Options:

A.

LDAP

B.

WAF

C.

VDI

D.

SSO

Buy Now
Questions 79

A systems administrator is troubleshooting network throughput issues following a deployment. The network is currently being overwhelmed by the amount of traffic between the database and the web servers in the environment.

Which of the following should the administrator do to resolve this issue?

Options:

A.

Set up affinity rules to keep web and database servers on the same hypervisor

B.

Enable jumbo frames on the gateway

C.

Move the web and database servers onto the same VXLAN

D.

Move the servers onto thick-provisioned storage

Buy Now
Questions 80

Which of the following is relevant to capacity planning in a SaaS environment?

Options:

A.

Licensing

B.

A hypervisor

C.

Clustering

D.

Scalability

Buy Now
Questions 81

An organization requires the following to be achieved between the finance and marketing departments:

  • Allow HTTPS/HTTP.

  • Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

Options:

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Buy Now
Questions 82

A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found.

Which of the following is the MOST likely cause of the script failure?

Options:

A.

Account mismatches

B.

IP address changes

C.

API version incompatibility

D.

Server name changes

Buy Now
Questions 83

A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well.

Which of the following should the administrator recommend the user do FIRST?

Options:

A.

Disable antivirus/anti-malware software

B.

Turn off the software firewall

C.

Establish a VPN tunnel between the computer and the web server

D.

Update the web browser to the latest version

Buy Now
Questions 84

A VDI administrator is deploying 512 desktops for remote workers. Which of the following would meet the minimum number of IP addresses needed for the desktops?

Options:

A.

/22

B.

/23

C.

/24

D.

/25

Buy Now
Questions 85

A systems administrator has been notified of possible illegal activities taking place on the network and has been directed to ensure any relevant emails are preserved for court use.

Which of the following is this MOST likely an example of?

Options:

A.

Email archiving

B.

Version control

C.

Legal hold

D.

File integrity monitoring

Buy Now
Questions 86

A cloud engineer needs to perform a database migration. The database has a restricted SLA and cannot be offline for more than ten minutes per month. The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps Which of the following is the best option to perform the migration?

Options:

A.

Copy the database to an external device and ship the device to the CSP.

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-party tool to back up and restore the data to the new database.

D.

Use the database import/export method and copy the exported file.

Buy Now
Questions 87

A cloud administrator needs to reduce storage costs. Which of the following would best help the administrator reach that goal?

Options:

A.

Enabling compression

B.

Implementing deduplication

C.

Using containers

D.

Rightsizing the VMs

Buy Now
Questions 88

An organization is developing a new online product. The product must:

• Minimize organizational infrastructure and comply with security standards.

• Minimize organizational compliance efforts.

• Focus on application development and increase speed to market.

Which of the following should the organization consider, given the requirements listed above?

Options:

A.

Use cloud-native serverless services.

B.

Implement automated compliance scanning tools.

C.

Harden servers using repeatable compliance templates.

D.

Deploy compliance linters in the CI/CD pipeline.

Buy Now
Questions 89

A systems administrator is deploying a new version of a website. The website is deployed in the cloud using a VM cluster. The administrator must then deploy the new version into one VM first. After a period of time, if there are no issues detected, a second VM will be updated. This process must continue until all the VMS are updated. Which of the following upgrade methods is being implemented?

Options:

A.

Canary

B.

Blue-green

C.

Rolling

D.

Staging

Buy Now
Questions 90

A systems administrator deployed a new web application in a public cloud and would like to test it, but the company's network firewall is only allowing outside connections to the cloud provider network using TCP port 22. While waiting for the network administrator to open the required ports, which of the following actions should the systems administrator take to test the new application? (Select two).

Options:

A.

Create an IPSec tunnel.

B.

Create a VPN tunnel.

C.

Open a browser using the default gateway IP address.

D.

Open a browser using the localhost IP address.

E.

Create a GRE tunnel.

F.

Create a SSH tunnel.

Buy Now
Questions 91

A new development team requires workstations hosted in a PaaS to develop a new website. Members of the team also require remote access to the workstations using their corporate email addresses. Which of the following solutions will best meet these requirements? (Select two).

Options:

A.

Deploy new virtual machines.

B.

Configure email account replication.

C.

Integrate identity services.

D.

Implement a VDI solution.

E.

Migrate local VHD workstations.

F.

Create a new directory service.

Buy Now
Questions 92

A systems administrator is configuring a DNS server. Which of the following steps should a technician take to ensure confidentiality between the DNS server and an upstream DNS provider?

Options:

A.

Enable DNSSEC.

B.

Implement single sign-on.

C.

Configure DOH.

D.

Set up DNS over SSL.

Buy Now
Questions 93

Following the deployment of a new VM, a cloud engineer notices the backup platform has not added the machine to the appropriate job. The backup platform uses a text-based variable for job configuration. This variable is based on the RPO requirements for the workload. Which of the following did the cloud engineer forget to configure when deploying the virtual machine?

  • Tags

Options:

A.

RPO

B.

RTO

C.

Server name

D.

Template

Buy Now
Questions 94

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

Options:

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Buy Now
Questions 95

A systems administrator is attempting to gather information about services and resource utilization on VMS in a cloud environment. Which of the following will BEST accomplish this objective?

Options:

A.

Syslog

B.

SNMP

C.

CMDB

D.

Service management

E.

Performance monitoring

Buy Now
Questions 96

A cloud engineer is migrating a customer's web servers from a hypervisor platform to a CSP environment. The engineer needs to decouple the infrastructure and components during the migration to reduce the single points of failure. Which of the following storage options should the cloud engineer migrate the content to in order to improve availability?

Options:

A.

Block

B.

File

C.

Object

D.

iSCSI

E.

NFS

Buy Now
Questions 97

An organization's executives would like to allow access to devices that meet the corporate security compliance levels. Which of the following criteria are most important for the organization to consider? (Select two).

Options:

A.

Serial number

B.

Firmware

C.

Antivirus version and definition

D.

OS patch level

E.

CPU architecture

F.

Manufacturer

Buy Now
Questions 98

A systems administrator is reviewing the logs from a company's IDS and notices a large amount of outgoing traffic from a particular server. The administrator then runs a scan on the server, which detects malware that cannot be removed. Which of the following should the administrator do first?

Options:

A.

Determine the root cause.

B.

Disconnect the server from the network.

C.

Perform a more intrusive scan.

D.

Restore the server from a backup.

Buy Now
Questions 99

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

Options:

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Buy Now
Questions 100

A systems administrator is planning to deploy a database cluster in a virtualization environment. The administrator needs to ensure the database nodes do not exist on the same physical host. Which of the following would best meet this requirement?

Options:

A.

Oversubscription

B.

Anti-affinity

C.

A firewall

D.

A separate cluster

Buy Now
Questions 101

A company that performs passive vulnerability scanning at its transit VPC has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the company use to verify if this is a true positive with the least effort and cost? (Select two).

Options:

A.

A network-based scan

B.

An agent-based scan

C.

A port scan

D.

A red-team exercise

E.

A credentialed scan

F.

A blue-team exercise

G.

Unknown environment penetration testing

Buy Now
Questions 102

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the best action to correct the latency issue?

Options:

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Buy Now
Questions 103

A security analyst is investigating a recurring alert. The alert is reporting an insecure firewall configuration state after every cloud application deployment. The process of identifying the issue, requesting a fix, and waiting for the developers to manually patch the environment is being repeated multiple times. In an effort to identify the root issue, the following logs were collected:

Deploying template app prod. •yaml

Instance DB successfully created

DB keys successfully stored on vault

Instance WebApp successfully created

Access rules successfully applied

Access—keys successfully created

Which of the following options will provide a permanent fix for the issue?

Options:

A.

Validate the Iac code used during the deployment.

B.

Avoid the use of a vault to store database passwords.

C.

Rotate the access keys that were created during deployment.

D.

Recommend that the developers do not create multiple resources at once.

Buy Now
Questions 104

A systems administrator is troubleshooting a VDI deployment that is used to run high-frame-rate rendering. Users are reporting frequent application crashes. After running a benchmark, the administrator discovers the following:

Which of the following should the administrator do to resolve this issue?

Options:

A.

Configure the GPU to run in compute mode.

B.

Allocate more RAM in the VM template.

C.

Select a higher vGPU profile.

D.

Configure the GPU to run in graphics mode.

Buy Now
Questions 105

An enterprise is considering a cost model for a DBaaS. Which of the following is BEST for a cloud solution?

Options:

A.

per gigabyte

B.

per seat

C.

Per user

D.

Per device

Buy Now
Questions 106

A cloud administrator is choosing a backup schedule for a new application platform that creates many small files. The backup process impacts the performance of the application, and backup times should be minimized during weekdays. Which of the following backup types best meets the weekday requirements?

Options:

A.

Database dump

B.

Differential

C.

Incremental

D.

Full

Buy Now
Questions 107

A cloud administrator is troubleshooting an issue regarding users at one location who are reporting that their API access tokens have become invalid. The users are issued tokens based on their credentials in a federated cluster. Which of the following should the administrator check to determine the cause of this issue?

Options:

A.

SAML

B.

DNS

C.

SSL

D.

NTP

Buy Now
Questions 108

A systems administrator is responsible for upgrading operating systems on VMs that are hosted in a cloud environment. The systems administrator wants to ensure the VMs receive updates for as long as possible. Which of the following should the systems administrator choose?

Options:

A.

Stable

B.

Nightly

C.

LTS

D.

Canary

E.

EDR

Buy Now
Questions 109

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator most likely use?

Options:

A.

An API gateway

B.

An IPS/IDS

C.

A reverse proxy

D.

A WAF

Buy Now
Questions 110

A company would like to move all its on-premises platforms to the cloud. The company has enough skilled Linux and web-server engineers but only a couple of skilled database administrators. It also has little expertise in managing email services. Which of the following solutions would BEST match the skill sets of available personnel?

Options:

A.

Run the web servers in PaaS, and run the databases and email in SaaS.

B.

Run the web servers, databases, and email in SaaS.

C.

Run the web servers in laaS, the databases in PaaS, and the email in SaaS.

D.

Run the web servers, databases, and email in laaS.

Buy Now
Questions 111

An organization has a web-server farm. Which of the following solutions should be implemented to obtain efficient distribution of requests to theservers?

Options:

A.

A clustered web server infrastructure

B.

A load-balancing appliance

C.

A containerized application

D.

Distribution of web servers across different regions and zones

Buy Now
Questions 112

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to BEST reduce cost?

Options:

A.

Scaling of the environment after work hours

B.

Implementing access control after work hours

C.

Shutting down the environment after work hours

D.

Blocking external access to the environment after work hours

Buy Now
Questions 113

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to best reduce cost?

Options:

A.

Scaling of the environment after work hours

B.

Implementing access control after work hours

C.

Shutting down the environment after work hours

D.

Blocking external access to the environment after work hours

Buy Now
Questions 114

A cloud administrator is performing automated deployment of cloud infrastructure for clients. The administrator notices discrepancies from the baseline in the configuration of infrastructure that was deployed to a new client. Which of the following is most likely the cause?

Options:

A.

The deployment user account changed

B.

The deployment was done to a different resource group.

C.

The deployment was done by a different cloud administrator.

D.

The deployment template was modified.

Buy Now
Questions 115

A company has entered into a business relationship with another organization and needs to provide access to internal resources through directory services. Which of the following should a systems administrator implement?

Options:

A.

sso

B.

VPN

C.

SSH

D.

SAML

Buy Now
Questions 116

A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.)

Options:

A.

Install TLS certificates on the server.

B.

Forward port 80 traffic to port 443.

C.

Disable TLS 1.0/1.1 and SSL.

D.

Disable password authentication.

E.

Enable SSH key access only.

F.

Provision the server in a separate VPC.

G.

Disable the superuser/administrator account.

Buy Now
Questions 117

A systems administrator is configuring updates on a system. Which of the following update branches should the administrator choose to ensure the system receives updates that are maintained for at least four years?

Options:

A.

LTS

B.

Canary

C.

Beta

D.

Stable

Buy Now
Questions 118

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?

Options:

A.

Virtual machines

B.

Software as a service

C.

Serverless computing

D.

Containers

Buy Now
Questions 119

Which of the following service models would be used for a database in the cloud?

Options:

A.

PaaS

B.

laaS

C.

CaaS

D.

SaaS

Buy Now
Questions 120

A cloud administrator is setting up a new coworker for API access to a public cloud environment. The administrator creates a new user and gives the coworker access to a collection of automation scripts. When the coworker attempts to use a deployment script, a 403 error is returned. Which of the following is the MOST likely cause of the error?

Options:

A.

Connectivity to the public cloud is down.

B.

User permissions are not correct.

C.

The script has a configuration error.

D.

Oversubscription limits have been exceeded.

Buy Now
Questions 121

A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?

Options:

A.

DLP

B.

WAF

C.

FIM

D.

ADC

Buy Now
Questions 122

A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective?

Options:

A.

22, 53, 445

B.

22, 443, 445

C.

25, 123, 443

D.

137, 139, 445

Buy Now
Questions 123

A support engineer wants to prevent users from running malware on several IaaS compute instances. Which of the following will BEST achieve this objective?

Options:

A.

Encrypt all applications that users should not access.

B.

Set the execute filesystem permissions on the desired applications only.

C.

Implement an application whitelisting policy.

D.

Disable file sharing on the instance.

Buy Now
Questions 124

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?

Options:

A.

Incorrect encryption ciphers

B.

Broken trust relationship

C.

Invalid certificates

D.

Expired password

Buy Now
Questions 125

A company is considering consolidating a number of physical machines into a virtual infrastructure that will be located at its main office. The company has the following requirements:

High-performance VMs

More secure

Has system independence

Which of the following is the BEST platform for the company to use?

Options:

A.

Type 1 hypervisor

B.

Type 2 hypervisor

C.

Software application virtualization

D.

Remote dedicated hosting

Buy Now
Exam Code: CV0-003
Exam Name: CompTIA Cloud+ Certification Exam
Last Update: May 2, 2024
Questions: 405
CV0-003 pdf

CV0-003 PDF

$28  $80
CV0-003 Engine

CV0-003 Testing Engine

$33.25  $95
CV0-003 PDF + Engine

CV0-003 PDF + Testing Engine

$45.5  $130