Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CV0-003 CompTIA Cloud+ Certification Exam Questions and Answers

Questions 4

A systems administrator is troubleshooting issues with network slowness. Traffic analysis shows that uplink bandwidth on the core switch is often sustained at 125Mbps due to a

combination of production traffic from other sources. Which of the following would BEST resolve the issue?

Options:

A.

Turn off the servers that use the most bandwidth.

B.

Enable QoS to prioritize production traffic.

C.

Increase the buffer size on the core switch.

D.

Reboot the core switch.

Buy Now
Questions 5

A large pharmaceutical company needs to ensure it is in compliance with the following requirements:

• An application must run on its own virtual machine.

• The hardware the application is hosted on does not change.

Which of the following will BEST ensure compliance?

Options:

A.

Containers

B.

A firewall

C.

Affinity rules

D.

Load balancers

Buy Now
Questions 6

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

Options:

A.

Require the user's source IP to be an RFC1918 address.

B.

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.

Require the use of a password and a physical token.

D.

Require the password to be ten characters long.

Buy Now
Questions 7

A cloud architect is deploying a web application that contains many large images and will be accessed on two continents. Which of the following will MOST improve the user experience while keeping costs low?

Options:

A.

Implement web servers in both continents and set up a VPN between the VPCs.

B.

Implement web servers on both continents and peer the VPCs.

C.

Implement a CDN and offload the images to an object storage.

D.

Implement a replica of the entire solution on every continent.

Buy Now
Questions 8

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

Options:

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Buy Now
Questions 9

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

Options:

A.

Firewall outbound rules

B.

Firewall inbound rules

C.

Load balancer certificates

D.

Load balancer stickiness

E.

WAF transaction throttling

Buy Now
Questions 10

A piece of software applies licensing fees on a socket-based model. Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?

Options:

A.

The amount of memory in the server

B.

The number of CPUs in the server

C.

The type of cloud in which the software is deployed

D.

The number of customers who will be using the software

Buy Now
Questions 11

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

Options:

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Buy Now
Questions 12

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?

Options:

A.

IPAM

B.

DoH

C.

VLAN

D.

SDN

Buy Now
Questions 13

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?

Options:

A.

Log monitoring

B.

Patch management

C.

Vulnerability scanning

D.

System hardening

Buy Now
Questions 14

A startup online gaming company is designing the optimal graphical user experience for multiplayer scenarios. However, online players have reported latency issues. Which of the following should the company configure as a remediation?

Options:

A.

Additional GPU memory

B.

Faster clock speed

C.

Additional CPU cores

D.

Dynamic allocations

Buy Now
Questions 15

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public laaS. The team identifies the following rule as a potential

A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IR" Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the

server from their locations?

Options:

A.

Modify the outbound rule to allow the company's external IP address as a source.

B.

Add an inbound rule to use the IP address for the company's main office as a source.

C.

Modify the inbound rule to allow the company's external IP address as a source.

D.

Delete the inbound rule to allow the company's external IP address as a source.

Buy Now
Questions 16

A cloud administrator has deployed several VM instances that are running the same applications on VDI nodes. Users are reporting that a role instance is looping between STARTED, INITIALIZING, BUSY, and stop. Upon investigation, the cloud administrator can see the status changing every few minutes. Which of the following should be done to resolve the issue?

Options:

A.

Reboot the hypervisor.

B.

Review the package and configuration file.

C.

Configure service healing.

D.

Disable memory swap.

Buy Now
Questions 17

An application deployment team has observed delays in deployments and has asked the cloud administrator to evaluate the issue. Below is the result of a latency test that was conducted by the cloud administrator from offices located in the following regions:

• Asia-Pacific (APAC)

• Europe, the Middle East, and Africa (EMEA)

• Americas

Tests were conducted from each location, and the results are shown below:

Which of the following locations needs to be investigated further?

Options:

A.

• Connectivity from APAC to APAC regions

• Connectivity from APAC to EMEA and US - North

B.

• Connectivity from APAC to all regions

• Connectivity from Americas to all regions

C.

• Connectivity from EMEA to all regions

• Connectivity from APAC to APAC and EMEA regions

D.

• Connectivity from APAC to EMEA and Americas regions

• Connectivity from EMEA to all regions

Buy Now
Questions 18

A storage administrator is reviewing the storage consumption of a SAN appliance that is running a VDI environment. Which of the following features should the administrator implement to BEST reduce the storage consumption of the SAN?

Options:

A.

Deduplication

B.

Thick provisioning

C.

Compression

D.

SDS

Buy Now
Questions 19

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

Options:

A.

RPO

B.

MTTR

C.

SLA

D.

RTO

Buy Now
Questions 20

A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement?

Options:

A.

Create /25 subnets in two regions and run 80 instances on each one.

B.

Create /26 subnets in two regions and run 40 instances on each one.

C.

Create /26 subnets in three regions and run 40 instances on each one.

D.

Create /26 subnets in three regions and run 80 instances on each one.

Buy Now
Questions 21

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

Options:

A.

Site-to-site

B.

Client-to-site

C.

Point-to-site

D.

Point-to-point

Buy Now
Questions 22

A cloud engineer, who manages workloads in a public cloud environment, uses autoscaling to maintain availability of a critical application. During a recent burst in demands, the engineer received the following error alert:

LimitedlnstanceCapacity

Which of the following is MOST likely cause of the error?

Options:

A.

The cloud account has a misconfigured security group.

B.

The cloud account has exhausted the number of instances quota.

C.

The cloud account has had rights revoked to create instances.

D.

The autoscaling feature does not have permissions to create instances.

Buy Now
Questions 23

An administrator needs to back up all the data from each VM daily while also saving space. Which of the following backup types will BEST fit this scenario?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Full

Buy Now
Questions 24

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?

Options:

A.

Implement a secret management solution.

B.

Create autoscaling capabilities.

C.

Develop CI/CD tools.

D.

Deploy a CMDB tool.

Buy Now
Questions 25

A company is planning its cloud architecture and wants to use a VPC for each of its three products per environment in two regions, totaling 18 VPCs. The products have interdependences, consuming services between VPCs. Which of the following should the cloud architect use to connect all the VPCs?

Options:

A.

MPLS connections

B.

VPC peering

C.

Hub and spoke

D.

VPN connections

Buy Now
Questions 26

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?

Options:

A.

Store the credentials in a variable on every worker node

B.

Store the credentials on a shared volume using whole-disk encryption

C.

Store the credentials in a configuration file using SHA-256 inside the container image

D.

Store the credentials using the orchestrator secret manager

Buy Now
Questions 27

A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Incorrect permissions

B.

Insufficient storage

C.

Billing issues with the cloud provider

D.

No connectivity to the public cloud

E.

Expired API token

F.

Disabled autoscaling

Buy Now
Questions 28

A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?

Options:

A.

The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS

B.

The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor

C.

The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule

D.

Migrating from laaS to on premises, the network traffic between on-premises users and the laaS instance, and the CPU utilization of the hypervisor host

Buy Now
Questions 29

A cloud administrator is responsible for managing a VDI environment that provides end users with access to limited applications. Which of the following should the administrator make changes to when a new application needs to be provided?

Options:

A.

Application security policy

B.

Application whitelisting policy

C.

Application hardening policy

D.

Application testing policy

Buy Now
Questions 30

A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet.

Which of the following should the systems administrator implement to achieve this objective?

Options:

A.

A stateful firewall

B.

DLP

C.

DNSSEC

D.

Network flows

Buy Now
Questions 31

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

Options:

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Buy Now
Questions 32

An IaaS provider has numerous devices and services that are commissioned and decommissioned automatically on an ongoing basis. The cloud administrator needs to implement a solution that will help reduce administrative overhead.

Which of the following will accomplish this task?

Options:

A.

IPAM

B.

NAC

C.

NTP

D.

DNS

Buy Now
Questions 33

A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier.

Which of the following access control rules should be changed?

Options:

A.

Discretionary-based

B.

Attribute-based

C.

Mandatory-based

D.

Role-based

Buy Now
Questions 34

An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time.

Which of the following should be implemented to improve application performance?

Options:

A.

Increase disk capacity

B.

Increase the memory and network bandwidth

C.

Upgrade the application

D.

Upgrade the environment and use SSD drives

Buy Now
Questions 35

A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company.

Which of the following BEST describes this attack?

Options:

A.

VM escape

B.

Directory traversal

C.

Buffer overflow

D.

Heap spraying

Buy Now
Questions 36

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks. After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

Options:

A.

The target system's API functionality has been deprecated.

B.

The password for the service account has expired.

C.

The IP addresses of the target system have changed.

D.

The target system has failed after the updates.

Buy Now
Questions 37

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

Options:

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Buy Now
Questions 38

A marketing team is using a SaaS-based service to send emails to large groups of potential customers. The internally managed CRM system is configured to generate a list of target customers automatically on a weekly basis, and then use that list to send emails to each customer as part of a marketing campaign. Last week, the first email campaign sent emails successfully to 3,000 potential customers. This week, the email campaign

attempted to send out 50,000 emails, but only 10,000 were sent.

Which of the following is the MOST likely reason for not sending all the emails?

Options:

A.

API request limit

B.

Incorrect billing account

C.

Misconfigured auto-scaling

D.

Bandwidth limitation

Buy Now
Questions 39

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Select TWO).

Options:

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPI-J resources

F.

License issues

Buy Now
Questions 40

A systems administrator received an email from a cloud provider stating that storage is 80% full on the volume that stores VDI desktops. Which of the following is the MOST efficient way to mitigate the situation?

Options:

A.

Deduplication

B.

Compression

C.

Replication

D.

Storage migration

Buy Now
Questions 41

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs.

Which of the following should be verified NEXT?

Options:

A.

Application

B.

SAN

C.

VM GPU settings

D.

Network

Buy Now
Questions 42

A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error.

Which of the following will MOST likely solve the issue?

Options:

A.

Checking user passwords

B.

Configuring QoS rules

C.

Enforcing TLS authentication

D.

Opening TCP port 3389

Buy Now
Questions 43

A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command,

and notices the following relevant output:

Which of the following actions should the cloud administrator take to resolve the issue?

Options:

A.

Assign a new IP address of 192.168.100.10 to the web server

B.

Modify the firewall on 72.135.10.100 to allow only UDP

C.

Configure the WAF to filter requests from 17.3.130.3

D.

Update the gateway on the web server to use 72.135.10.1

Buy Now
Questions 44

The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other’s work.

Which of the following did the team MOST likely forget to implement?

Options:

A.

Incident type categories

B.

A calling tree

C.

Change management

D.

Roles and responsibilities

Buy Now
Questions 45

A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements.

Which of the following solutions will be BEST to help the administrator achieve the requirements?

Options:

A.

Containers

B.

Infrastructure as code

C.

Desktop virtualization

D.

Virtual machines

Buy Now
Questions 46

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Buy Now
Questions 47

Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?

Options:

A.

Using only open-source technologies

B.

Keeping all resources up to date

C.

Creating a standby environment with a different cloud provider

D.

Having a detailed incident response plan

Buy Now
Questions 48

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

Options:

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Buy Now
Questions 49

A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible.

Which of the following is the MOST important consideration to ensure a seamless migration?

Options:

A.

The cost of the environment

B.

The I/O of the storage

C.

Feature compatibility

D.

Network utilization

Buy Now
Questions 50

A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled.

Which of the following techniques would BEST help the administrator assess these business requirements?

Options:

A.

Performance testing

B.

Usability testing

C.

Vulnerability testing

D.

Regression testing

Buy Now
Questions 51

A SaaS provider wants to maintain maximum availability for its service.

Which of the following should be implemented to attain the maximum SLA?

Options:

A.

A hot site

B.

An active-active site

C.

A warm site

D.

A cold site

Buy Now
Questions 52

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

Options:

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Buy Now
Questions 53

A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations.

Which of the following actions should the cloud administrator take FIRST?

Options:

A.

Initiate a failover

B.

Restore backups

C.

Configure the network

D.

Perform a failback

Buy Now
Questions 54

An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation:

    Production traffic (10.10.0.0/24)

    Network backup (10.20.0.0/25)

    Virtual IP network (10.20.0.128/25)

The following configuration exists on the server:

The backup administrator observes that the weekly backup is failing for this server. Which of the following commands should the administrator run to identify the issue?

Options:

A.

ROUTE PRINT

B.

NETSTAT -A

C.

IPCONFIG /ALL

D.

NET SM

Buy Now
Questions 55

An organization has two businesses that are developing different software products. They are using a single cloud provider with multiple IaaS instances. The organization identifies that the tracking of costs for each

business are inaccurate.

Which of the following is the BEST method for resolving this issue?

Options:

A.

Perform segregation of the VLAN and capture egress and ingress values of each network interface

B.

Tag each server with a dedicated cost and sum them based on the businesses

C.

Split the total monthly invoice equally between the businesses

D.

Create a dedicated subscription for the businesses to manage the costs

Buy Now
Questions 56

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A – The end user accesses the application through a web browser to enter and view clinical data.

2A – The CTM application server reads/writes data to/from the database server.

1B – The end user accesses the application through a web browser to run reports on clinical data.

2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B – The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 57

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

Identify the problematic device(s).

Part 2:

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

Part 2:

Only select a maximum of TWO options from the multiple choice question

Options:

Buy Now
Questions 58

In an existing IaaS instance, it is required to deploy a single application that has different versions.

Which of the following should be recommended to meet this requirement?

Options:

A.

Deploy using containers

B.

Install a Type 2 hypervisor

C.

Enable SR-IOV on the host

D.

Create snapshots

Buy Now
Questions 59

A company has deployed a new cloud solution and is required to meet security compliance.

Which of the following will MOST likely be executed in the cloud solution to meet security requirements?

Options:

A.

Performance testing

B.

Regression testing

C.

Vulnerability testing

D.

Usability testing

Buy Now
Questions 60

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

Options:

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Buy Now
Questions 61

A cloud administrator needs to implement a mechanism to monitor the expense of the company’s cloud resources.

Which of the following is the BEST option to execute this task with minimal effort?

Options:

A.

Ask the cloud provider to send a daily expense report

B.

Set custom notifications for exceeding budget thresholds

C.

Use the API to collect expense information from cloud resources

D.

Implement a financial tool to monitor cloud resource expenses

Buy Now
Questions 62

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

Options:

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Buy Now
Questions 63

A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web- based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.

The following week, a new update was required to add more front-end servers to the sandbox environment. A second administrator made the necessary changes and checked out the deployment scripts. The second administrator then ran the script, but the application load balancer was missing from the new deployment.

Which of the following is the MOST likely reason for this issue?

Options:

A.

The license limit on the number of server deployments allowed per month was exceeded

B.

The deployment script changes made by the first administrator were not checked in and committed

C.

The new server images were incompatible with the application load-balancer configuration

D.

The application load balancer exceeded the maximum number of servers it could use

Buy Now
Questions 64

A systems administrator for an e-commerce company will be migrating the company’s main website to a cloud provider. The principal requirement is that the website must be highly available.

Which of the following will BEST address this requirement?

Options:

A.

Vertical scaling

B.

A server cluster

C.

Redundant switches

D.

A next-generation firewall

Buy Now
Questions 65

A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage.

Which of the following RAID types should the administrator choose?

Options:

A.

5

B.

6

C.

10

D.

50

Buy Now
Questions 66

A company has two primary offices, one in the United States and one in Europe. The company uses a public laaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

Options:

A.

Add an application load balancer to the applications to spread workloads.

B.

Integrate a CDN solution to distribute web content globally.

C.

Upgrade the bandwidth of the dedicated connection to the laaS provider.

D.

Migrate the applications to a region hosted in Europe.

Buy Now
Questions 67

An organization has the following requirements that need to be met when implementing cloud services:

    SSO to cloud infrastructure

    On-premises directory service

    RBAC for IT staff

Which of the following cloud models would meet these requirements?

Options:

A.

Public

B.

Community

C.

Hybrid

D.

Multitenant

Buy Now
Questions 68

An administrator is performing an in-place upgrade on a quest VM operating system.

Which of the following can be performed as a quick method to roll back to an earlier state, if necessary?

Options:

A.

A configuration file backup

B.

A full backup of the database

C.

A differential backup

D.

A VM-level snapshot

Buy Now
Questions 69

An organization will be deploying a web application in a public cloud with two web servers, two database servers, and a load balancer that is accessible over a single public IP.

Taking into account the gateway for this subnet and the potential to add two more web servers, which of the following will meet the minimum IP requirement?

Options:

A.

192.168.1.0/26

B.

192.168.1.0/27

C.

192.168.1.0/28

D.

192.168.1.0/29

Buy Now
Questions 70

A systems administrator is attempting to gather information about services and resource utilization on VMs in a cloud environment. Which of the following will best accomplish this objective?

Options:

A.

Syslog

B.

SNMP

C.

CMDB

D.

Service management

E.

Performance monitoring

Buy Now
Questions 71

A cloud engineer gathered the following requirements for a factory automation system:

    Assembly line systems are latency-sensitive.

    Internet connectivity issues are common and can be prolonged.

    Services must support a 99.999% system uptime.

Which of the following components would be useful in implementing a hybrid model? (Select two).

Options:

A.

Cloud-based orchestration.

B.

Cloud edge devices.

C.

Local services.

D.

Cloud-managed services.

E.

Centralized logging and alerting.

F.

CDN provider.

Buy Now
Questions 72

A systems administrator received a report stating resumes submitted through the company's website are being exposed at the URL https://careers.company.com/upload/. Which of the following actions should the administrator take to fix the issue?

Options:

A.

Remove write permissions to the folder /upload/.

B.

Implement file integrity monitoring.

C.

Reconfigure the folder /upload/ to request authentication.

D.

Implement a DLP solution.

E.

Implement encryption in transit.

Buy Now
Questions 73

Which of the following provides groups of compute units that can horizontally scale according to a workload?

Options:

A.

Orchestrated container environment

B.

Cloud-reserved instances

C.

Autoscaling

D.

Cloud bursting

Buy Now
Questions 74

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

Options:

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Buy Now
Questions 75

A systems administrator is implementing a new file storage service that has been deployed in the company's private cloud instance. The key requirement is fast read/write times for the targeted users, and the budget for this project is not a concern. Which of the following storage types should the administrator deploy?

Options:

A.

Spinning disks

B.

NVMe

C.

SSD

D.

Hybrid

Buy Now
Questions 76

A cloud administrator needs to deploy a security virtual appliance in a private cloud environment, but this appliance will not be part of the standard catalog of items for other users to request. Which of the following is the BEST way to accomplish this task?

Options:

A.

Create an empty VM. import the hard disk of the virtual appliance. and configure the CPU and memory.

B.

Acquire the build scripts from the vendor and recreate the appliance using the baseline templates

C.

Import the virtual appliance into the environment and deploy it as a VM

D.

Convert the virtual appliance to a template and deploy a new VM using the template.

Buy Now
Questions 77

The Chief Information Officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud. The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information. Which of the following should be configured during the migration?

Options:

A.

ACL

B.

VPN

C.

P2V

D.

VDI

Buy Now
Questions 78

A company's marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?

Options:

A.

GPU passthrough

B.

Increased memory

C.

Converged infrastructure

D.

An additional CPU core

Buy Now
Questions 79

A new development team requires workstations hosted in a PaaS to develop a new website. Members of the team also require remote access to the workstations using their corporate email addresses. Which of the following solutions will BEST meet these requirements? (Select TWO).

Options:

A.

Deploy new virtual machines.

B.

Configure email account replication.

C.

Integrate identity services.

D.

Implement a VDI solution.

E.

Migrate local VHD workstations.

F.

Create a new directory service.

Buy Now
Questions 80

A cloud solutions architect is working on a private cloud environment in which storage consumption is increasing daily, resulting in high costs. Which of the following can the architect use to provide more space without adding more capacity? (Select two).

Options:

A.

Tiering

B.

Deduplication

C.

RAID provisioning

D.

Compression

E.

Flash optimization

F.

NVMe

Buy Now
Questions 81

A cloud administrator is performing automated deployment of cloud infrastructure for clients. The administrator notices discrepancies from the baseline in the configuration of infrastructure that was deployed to a new client. Which of the following is most likely the cause?

Options:

A.

The deployment user account changed

B.

The deployment was done to a different resource group.

C.

The deployment was done by a different cloud administrator.

D.

The deployment template was modified.

Buy Now
Questions 82

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator most likely use?

Options:

A.

An API gateway

B.

An IPS/IDS

C.

A reverse proxy

D.

A WAF

Buy Now
Questions 83

A systems administrator wants to be notified every time an application's configuration files are updated. Which of the following should the administrator implement to achieve the objective?

Options:

A.

ZFS

B.

FIM

C.

MAC

D.

DLP

Buy Now
Questions 84

A company that performs passive vulnerability scanning at its transit VPC has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the use to verify if this is a true positive with the LEAST effort and cost? (Select TWO).

Options:

A.

A network-based scan

B.

An agent-based scan

C.

A port scan

D.

A red-team exercise

E.

A credentialed scan

F.

A blue-team exercise

G.

Unknown environment penetration testing

Buy Now
Questions 85

A company has entered into a business relationship with another organization and needs to provide access to internal resources through directory services. Which of the following should a systems administrator implement?

Options:

A.

sso

B.

VPN

C.

SSH

D.

SAML

Buy Now
Questions 86

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the best action to correct the latency issue?

Options:

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Buy Now
Questions 87

Which of the following enables CSPs to offer unlimited capacity to customers?

Options:

A.

Adequate budget

B.

Global data center distribution

C.

Economies of scale

D.

Agile project management

Buy Now
Questions 88

A company is using a hybrid cloud environment. The private cloud is hosting the business applications, and the cloud services are being used to replicate for availability purposes.

The cloud services are also being used to accommodate the additional resource requirements to provide continued services. Which of the following scalability models is the company utilizing?

Options:

A.

Vertical scaling

B.

Autoscaling

C.

Cloud bursting

D.

Horizontal scaling

Buy Now
Questions 89

An organization's two-node, hybrid container cluster is experiencing failures during horizontal scaling to the cloud cluster instance. The on-premises IP range is 192.168.0.0/16, and the cloud environment is 10.168.0.0/16. Overlapping or stretched VLANs are not permitted, and a node is deployed in each location. The cloud monitoring agent reports a healthy status for the second instance, but when pinging the clusters from on premises, the following output is received:

pinging cluster1. comptia. containers.com C192.168.100 reply

pinging cluster2. comptia. containers.com [192.16B .100 .128] request timed out

Which of the following is the most likely reason for the scaling failure?

Options:

A.

Incorrect DNS entry

B.

Offline cluster node

C.

Incorrect proxy entry

D.

Incorrect cluster IP

E.

Incorrect IP route

Buy Now
Questions 90

An organization is deploying development, quality assurance, and production environments with equal numbers of IP addresses to the cloud. The IP address range provided is 10.168.0.0/24, and it needs to be terminated on a firewall. Which of the following IP subnets and firewall IPS should be used for one of the environments?

Options:

A.

10.168.0.0/26 and 10.168.0.63

B.

10.168.0.64/26 and 10.168.0.64

C.

10.168.0.128/26 and 10.168.0.190

D.

10.168.0.128/26 and 10.168.0.194

E.

10.168.0.192/26 and 10.168.0.191

Buy Now
Questions 91

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled? (Select two).

Options:

A.

Telnet

B.

FTP

C.

Remote log-in

D.

DNS

E.

DHCP

F.

LDAP

Buy Now
Questions 92

A cloud administrator receives an email stating the following:

"Clients are receiving emails from our web application with non-encrypted links."

The administrator notices that links generated from the web application are opening in http://. Which of the following should be configured to redirect the traffic to https://?

Options:

A.

User account access

B.

Programming code

C.

Web server configuration

D.

Load balancer setting

Buy Now
Questions 93

A DevOps engineer needs to make application deployments more efficient. The current process to deploy and scale the application is very manual, with hours spent configuring servers from scratch each time. The application has many platform-based dependencies but is highly portable and can run on multiple platforms. Which of the following is most likely to reduce deployment time and improve efficiencies?

Options:

A.

Deploying the application using persistent storage.

B.

Leveraging IaC templates.

C.

Creating a runbook.

D.

Using serverless technology to minimize overheads.

Buy Now
Questions 94

A systems administrator is working within a private cloud environment. Over time. random 4K read/write speeds on all VMS in the environment slow down until the VMS are completely unusable, with disk speeds of less than 1MBps. The administrator has gathered the information below:

• There is no correlation between the slowdown and VM/hypervisor resource utilization.

• The network is rated to 40Gbps and utilization is between 1—5%.

• The hypervisors use hundreds of NFSv3 mounts to the same storage appliance, one per VM.

• The VMS on each hypervisor become unresponsive after two weeks of uptime.

• The unresponsiveness is resolved by moving slow VMS onto a rebooted hypervisor.

Which of the following solutions will MOST likely resolve this issue?

Options:

A.

Increase caching on the storage appliance.

B.

Configure jumbo frames on the hypervisors and storage.

C.

Increase CPU/RAM resources on affected VMS.

D.

Reduce the number of NFSv3 mounts to one.

Buy Now
Questions 95

A cloud administrator receives a billing report and notices the IT department billing has been the same for the last few months, despite the deployment of ten new instances for the SIEM solution. Which of the following is the most likely cause of the issue?

Options:

A.

Inconsistent hostnames.

B.

Misconfigured VM names.

C.

Incomplete provisioning tasks.

D.

Incorrect tagging.

Buy Now
Questions 96

A company that performs passive vulnerability scanning at its transit VPC has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the company use to verify if this is a true positive with the least effort and cost? (Select two).

Options:

A.

A network-based scan

B.

An agent-based scan

C.

A port scan

D.

A red-team exercise

E.

A credentialed scan

F.

A blue-team exercise

G.

Unknown environment penetration testing

Buy Now
Questions 97

A cloud architect is reviewing the design for a new cloud-based ERP solution. The solution consists of eight servers with a single network interface. The allocated IP range is 172.16.0.0/28. One of the requirements of the solution is that it must be able to handle the potential addition of 16 new servers to the environment. Because of the complexity of the firewall and related ACL requirements, these new servers will need to be in the same network range. Which of the following changes

would allow for the potential server addition?

Options:

A.

Change the IP address range to use a 10.0.0.0 address.

B.

Change the server template to add network interfaces.

C.

Change the subnet mask to use a 255.255.255.128 range.

D.

Change the server scaling configuration to increase the maximum limit.

Buy Now
Questions 98

A company uses multiple SaaS-based cloud applications. All the applications require authentication upon access. An administrator has been asked to address this issue and enhance security. Which of the following technologies would be the BEST solution?

Options:

A.

Single sign-on

B.

Certificate authentication

C.

Federation

D.

Multifactor authentication

Buy Now
Questions 99

A company recently acquired another company, and the human resources staff expects to see a 50% increase in usage for the employee benefits web portal once the employees from the acquired company receive access. The cloud administrator needs to assess whether the current web portal can handle the increased load. Which of the following should the cloud administrator do first?

Options:

A.

Increase CPU resources by 50% on the web portal.

B.

Review current monitoring logs to determine resource usage on the web portal.

C.

Create an autoscaling policy to expand the web portal environment dynamically.

D.

Provision additional servers to handle the expected increased usage.

Buy Now
Questions 100

A SaaS provider wants to maintain maximum availability for its service. Which of the following should be implemented to attain the maximum SLA?

Options:

A.

A mobile site.

B.

An active-active site.

C.

A warm site.

D.

A cold site.

Buy Now
Questions 101

A systems administrator needs to implement a way for users to verify software integrity. Which of the following tools would BEST meet the administrator's needs?

Options:

A.

TLS 1.3

B.

CRC32

C.

AES-256

D.

SHA-512

Buy Now
Questions 102

An organization is implementing a new requirement to facilitate faster downloads for users of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?

Options:

A.

Implement CDN for overall cloud application.

B.

Implement autoscaling of the compute resources.

C.

Implement SR-IOV on the server instances.

D.

Implement an application container solution.

Buy Now
Questions 103

A systems administrator has migrated a web application to the cloud with a synchronous uplink speed of 100Mbps. After the migration, the administrator receives reports of slow connectivity to the web application. The administrator logs into the firewall and notices the WAN port is transmitting at a constant 12.5MBps. Which of the following BEST explains the reason for the issue?

Options:

A.

Misconfigured subnetting

B.

Insufficient compute

C.

Firewall issues

D.

Not enough upload bandwidth

Buy Now
Questions 104

A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.)

Options:

A.

The fabric interconnects

B.

The virtual appliances

C.

The firmware

D.

The virtual machines

E.

The baselines

F.

The operating system

Buy Now
Questions 105

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

Options:

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Buy Now
Questions 106

A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies.

Which of the following cloud service subscription types would BEST meet these requirements?

Options:

A.

PaaS

B.

SaaS

C.

DBaaS

D.

IaaS

Buy Now
Questions 107

An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort. Which of the following ports needs to be opened to fulfill this requirement?

Options:

A.

53

B.

67

C.

123

D.

161

Buy Now
Questions 108

An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used?

Options:

A.

Thick provisioning

B.

Software-defined storage

C.

User quotas

D.

Network file system

Buy Now
Questions 109

A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?

Options:

A.

SNMPv3

B.

Community strings

C.

IPSec tunnels

D.

ACLs

Buy Now
Questions 110

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

Options:

A.

Internet of Things

B.

Digital transformation

C.

Artificial intelligence

D.

DNS over TLS

Buy Now
Questions 111

A cloud administrator is upgrading a cloud environment and needs to update the automation script to use a new feature from the cloud provider. After executing the script, the deployment fails. Which of the following is the MOST likely cause?

Options:

A.

API incompatibility

B.

Location changes

C.

Account permissions

D.

Network failure

Buy Now
Questions 112

Which of the following definitions of serverless computing BEST explains how it is different from using VMs?

Options:

A.

Serverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP.

B.

Serverless computing uses predictable billing and offers lower costs than VM compute services.

C.

Serverless computing is a scalable, highly available cloud service that uses SDN technologies.

D.

Serverless computing allows developers to focus on writing code and organizations to focus on business.

Buy Now
Questions 113

An organization is using multiple SaaS-based business applications, and the systems administrator is unable to monitor and control the use of these subscriptions. The administrator needs to implement a solution that will help the organization apply security policies and monitor each individual SaaS subscription. Which of the following should be deployed to achieve these requirements?

Options:

A.

DLP

B.

CASB

C.

IPS

D.

HIDS

Buy Now
Questions 114

A systems administrator is troubleshooting performance issues with a VDI environment. The administrator determines the issue is GPU related and then increases the frame buffer on the virtual machines. Testing confirms the issue is solved, and everything is now working correctly. Which of the following should the administrator do NEXT?

Options:

A.

Consult corporate policies to ensure the fix is allowed

B.

Conduct internal and external research based on the symptoms

C.

Document the solution and place it in a shared knowledge base

D.

Establish a plan of action to resolve the issue

Buy Now
Questions 115

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL https://www.comptiasite.com. Which of the following would MOST likely resolve the issue?

Options:

A.

Renewing the expired certificate

B.

Updating the web-server software

C.

Changing the crypto settings on the web server

D.

Upgrading the users' browser to the latest version

Buy Now
Questions 116

A cloud engineer has deployed a virtual storage appliance into a public cloud environment. The storage appliance has a NAT to a public IP address. An administrator later notices there are some strange files on the storage appliance and a large spike in network traffic on the machine. Which of the following is the MOST likely cause?

Options:

A.

The default password is still configured on the appliance.

B.

The appliance's certificate has expired.

C.

The storage appliance has no firewall.

D.

Data encryption is enabled, and the files are hashed.

Buy Now
Questions 117

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it.

Which of the following configuration options would BEST meet this requirement?

Options:

A.

Virtual GPU

B.

External GPU

C.

Passthrough GPU

D.

Shared GPU

Buy Now
Questions 118

A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity?

Options:

A.

Patch management

B.

Hardening

C.

Scaling

D.

Log and event monitoring

Buy Now
Questions 119

A vendor is installing a new retail store management application for a customer. The application license ensures software costs are low when the application is not being used, but costs go up when use is higher.

Which of the following licensing models is MOST likely being used?

Options:

A.

Socket-based

B.

Core-based

C.

Subscription

D.

Volume-based

Buy Now
Questions 120

A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit?

Options:

A.

An SLA report

B.

Tagging

C.

Quotas

D.

Showback

Buy Now
Questions 121

A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements:

No downtime

Instant switch to a new version using traffic control for all users

Which of the following deployment strategies would be the BEST solution?

Options:

A.

Hot site

B.

Blue-green

C.

Canary

D.

Rolling

Buy Now
Questions 122

A cloud administrator wants to have a central repository for all the logs in the company’s private cloud. Which of the following should be implemented to BEST meet this requirement?

Options:

A.

SNMP

B.

Log scrubbing

C.

CMDB

D.

A syslog server

Buy Now
Questions 123

A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?

Options:

A.

V2V

B.

V2P

C.

P2P

D.

P2V

Buy Now
Questions 124

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

Options:

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Buy Now
Questions 125

A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other. Which of the following should an administrator perform to comply with the security requirement?

Options:

A.

Create separate virtual networks for production, QA, and development servers.

Move the servers to the appropriate virtual network.

Apply a network security group to each virtual network that denies all traffic except for the firewall.

B.

Create separate network security groups for production, QA, and development servers.

Apply the network security groups on the appropriate production, QA, and development servers.

Peer the networks together.

C.

Create separate virtual networks for production, QA, and development servers.

Move the servers to the appropriate virtual network.

Peer the networks together.

D.

Create separate network security groups for production, QA, and development servers.

Peer the networks together.

Create static routes for each network to the firewall.

Buy Now
Questions 126

Which of the following should be considered for capacity planning?

Options:

A.

Requirements, licensing, and trend analysis

B.

Laws and regulations

C.

Regions, clusters, and containers

D.

Hypervisors and scalability

Buy Now
Questions 127

Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue?

Options:

A.

Perform a memory dump of the OS.

Analyze the memory dump.

Upgrade the host CPU to a higher clock speed CPU.

B.

Perform a packet capture during authentication.

Validate the load-balancing configuration.

Analyze the network throughput of the load balancer.

C.

Analyze the storage system IOPS.

Increase the storage system capacity.

Replace the storage system disks to SSD.

D.

Evaluate the OS ACLs.

Upgrade the router firmware.

Increase the memory of the router.

Buy Now
Questions 128

A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying the CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue?

Options:

A.

Modify the deployment script to delete and recreate the database whenever the CMS application is deployed.

B.

Modify the ACL to allow the staging environment to access the database in the sandbox environment.

C.

Modify the CMS application deployment to use the previous version and redeploy the application.

D.

Modify the configuration settings of the CMS application to connect to the database in the current environment.

Buy Now
Questions 129

A software development manager is looking for a solution that will allow a team of developers to work in isolated environments that can be spun up and torn down quickly.

Which of the following is the MOST appropriate solution?

Options:

A.

Containers

B.

File subscriptions

C.

Ballooning

D.

Software-defined storage

Buy Now
Questions 130

A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?

Options:

A.

API version incompatibility

B.

Misconfigured script account

C.

Wrong template selection

D.

Incorrect provisioning script indentation

Buy Now
Questions 131

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols should the company use? (Choose two.)

Options:

A.

CIFS

B.

FTP

C.

iSCSI

D.

RAID 10

E.

NFS

F.

FC

Buy Now
Questions 132

A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective?

Options:

A.

22, 53, 445

B.

22, 443, 445

C.

25, 123, 443

D.

137, 139, 445

Buy Now
Questions 133

A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM?

Options:

A.

CDN

B.

DNS

C.

NTP

D.

IPAM

Buy Now
Questions 134

An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would be MOST useful to accomplish this task?

Options:

A.

VLAN

B.

NIPS

C.

WAF

D.

NAC

Buy Now
Questions 135

A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?

Options:

A.

A service availability scan

B.

An agent-based vulnerability scan

C.

A default and common credentialed scan

D.

A network port scan

Buy Now
Questions 136

A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low-latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?

Options:

A.

SR-IOV

B.

GENEVE

C.

SDN

D.

VLAN

Buy Now
Exam Code: CV0-003
Exam Name: CompTIA Cloud+ Certification Exam
Last Update: Jan 18, 2025
Questions: 456
CV0-003 pdf

CV0-003 PDF

$29.75  $84.99
CV0-003 Engine

CV0-003 Testing Engine

$35  $99.99
CV0-003 PDF + Engine

CV0-003 PDF + Testing Engine

$47.25  $134.99