Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CV0-004 CompTIA Cloud+ (2025) Questions and Answers

Questions 4

A cloud engineer needs to determine a scaling approach for a payroll-processing solution that runs on a biweekly basis. Given the complexity of the process, the deployment to each

new VM takes about 25 minutes to get ready. Which of the following would be the best strategy?

Options:

A.

Horizontal

B.

Scheduled

C.

Trending

D.

Event

Buy Now
Questions 5

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

Identify the problematic device(s).

Part 2:

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

Part 2:

Only select a maximum of TWO options from the multiple choice question

Options:

Buy Now
Questions 6

A company has developed an online trading platform. The engineering team selected event-based scaling for the platform's underlying resources. The platform resources scale up

with every 2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains

why this is the case?

Options:

A.

Event-based scaling does not scale down resources.

B.

Event-based scaling should not be triggered at the 2,000-user frequency.

C.

Event-based scaling should not track user subscriptions.

D.

Event-based scaling does not take resource load into account.

Buy Now
Questions 7

An organization's security policy states that software applications should not exchange sensitive data in cleartext. The security analyst is concerned about a software application that uses Base64 to encode credit card data. Which of the following would be the best algorithm to replace Base64?

Options:

A.

3DES

B.

AES

C.

RC4

D.

SHA-3

Buy Now
Questions 8

Which of the following cloud deployment models is the best way to replicate a workload non-disruptively between on-premises servers and a public cloud?

Options:

A.

Public

B.

Community

C.

Private

D.

Hybrid

Buy Now
Questions 9

A company wants to build its new platform using a public cloud. The workload requirements include the following:

• Implementation of custom CIS compliance

• Patch for vulnerabilities within 24 hours

• Warrant at least 1,800 IOPS per volume

Which of the following meets the requirements?

Options:

A.

SaaS

B.

laaS

C.

FaaS

D.

PaaS

Buy Now
Questions 10

Which of the following Al/ML technologies consumes text input to discern tone?

Options:

A.

Text recognition

B.

Computer vision

C.

Visual recognition

D.

Sentiment analysis

Buy Now
Questions 11

A cloud administrator needs to collect process-level, memory-usage tracking for the virtual machines that are part of an autoscaling group. Which of the following is the best way to

accomplish the goal by using cloud-native monitoring services?

Options:

A.

Configuring page file/swap metrics

B.

Deploying the cloud-monitoring agent software

C.

Scheduling a script to collect the data

D.

Enabling memory monitoring in the VM configuration

Buy Now
Questions 12

An administrator used a script that worked in the past to create and tag five virtual machines. All of the virtual machines have been created: however, the administrator sees the following results:

{ tags: [ ] }

Which of the following is the most likely reason for this result?

Options:

A.

API throttling

B.

Service quotas

C.

Command deprecation

D.

Compatibility issues

Buy Now
Questions 13

A write-intensive workload is having frequent performance issues. The workload is running on pay-as-you-go VMs. These VMs use SSDs and have appropriate CPU and RAM sizes. The workload writes millions of small files and has a one-year retention requirement. Which of the following actions should be taken?

Options:

A.

Use provisioned IOPS volumes.

B.

Increase the VM size.

C.

Switch to reserved VMs.

D.

Change to ephemeral storage.

Buy Now
Questions 14

A systems administrator is configuring backups on a VM and needs the process to run as quickly as possible, reducing the bandwidth on the network during all times from Monday through Saturday. In the event of data corruption, the management team expects the mean time to recovery to be as low as possible. Which of the following backup methods can the administrator use to accomplish these goals?

Options:

A.

Incremental backup daily to the cloud

B.

Full backup on Sunday and incremental backups on all other days of the week

C.

Differential backup daily to the cloud

D.

Incremental backups during off-hours on Monday, Wednesday, and Friday

Buy Now
Questions 15

A cloud engineer is receiving multiple alerts from the infrastructure monitoring agent. The alerts state that all the VMs in the public subnet are at 100% CPU utilization. However, when the engineer checks the network utilization of the VMs, the network throughput is at normal levels. Which of the following is the most likely cause of this issue?

Options:

A.

Ransomware

B.

Cryptojacking

C.

DDoS

D.

Zombie instances

Buy Now
Questions 16

Which of the following technologies should be used by a person who is visually impaired to access data from the cloud?

Options:

A.

Object character recognition

B.

Text-to-voice

C.

Sentiment analysis

D.

Visual recognition

Buy Now
Questions 17

Which of the following is used to deliver code quickly and efficiently across the development, test, and production environments?

Options:

A.

Snapshot

B.

Container image

C.

Serverless function

D.

VM template

Buy Now
Questions 18

A social networking company operates globally. Some users from Brazil and Argentina are reporting the following error: website address was not found. Which of the following is the most likely cause of this outage?

Options:

A.

Client DNS misconfigutation

B.

Regional DNS provider outage

C.

DNS server misconfiguration

D.

DNS propagation issues

Buy Now
Questions 19

Between 11:00 a.m. and 1:00 p.m. on workdays, users report that the sales database is either not accessible, sluggish, or difficult to connect to. A cloud administrator discovers that during the impacted time, all hypervisors are at capacity. However, when 70% of the users are using the same database, those issues are not reported. Which of the following is the most likely cause?

Options:

A.

Oversubscription

B.

Resource allocation

C.

Sizing issues

D.

Service quotas

Buy Now
Questions 20

Which of the following best describes a system that keeps all different versions of a software separate from each other while giving access to all of the versions?

Options:

A.

Code documentation

B.

Code control

C.

Code repository

D.

Code versioning

Buy Now
Questions 21

A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

Options:

A.

Modifying the subnet mask to 255 255 254.0 for IT and operations departments

B.

Configuring static routing to allow access from each subnet to 10.1.40.1

C.

Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network

D.

Configuring static routing to allow access from 10.1.30.1 to each subnet

E.

Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee

F.

Modifying the subnet mask to 255.255.255.128 for the IT and operations departments

Buy Now
Questions 22

A cloud administrator recently created three servers in the cloud. The goal was to create ACLs so the servers could not communicate with each other. The servers were configured

with the following IP addresses:

After implementing the ACLs, the administrator confirmed that some servers are still able to reach the other servers. Which of the following should the administrator change to

prevent the servers from being on the same network?

Options:

A.

The IP address of Server 1 to 172.16.12.36

B.

The IP address of Server 1 to 172.16.12.2

C.

The IP address of Server 2 to 172.16.12.18

D.

The IP address of Server 2 to 172.16.14.14

Buy Now
Questions 23

An IT security team wants to ensure that the correct parties are informed when a specific user account is signed in. Which of the following would most likely allow an administrator to address this concern?

Options:

A.

Creating an alert based on user sign-in criteria

B.

Aggregating user sign-in logs from all systems

C.

Enabling the collection of user sign-in logs

D.

Configuring the retention of all sign-in logs

Buy Now
Questions 24

A technician receives an email from a vendor who is requesting payment of an invoice for human resources services. The email contains a request for bank account numbers. Which of the following types of attacks does this behavior most likely indicate?

Options:

A.

MaIware

B.

Cryptojacking

C.

Ransomware

D.

Phishing

Buy Now
Questions 25

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

Options:

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing

Buy Now
Questions 26

Which of the following integration systems would best reduce unnecessary network traffic by allowing data to travel bidirectionally and facilitating real-time results for developers who need to display critical information within applications?

Options:

A.

REST API

B.

RPC

C.

GraphQL

D.

Web sockets

Buy Now
Questions 27

A cloud engineer is reviewing a disaster recovery plan that includes the following requirements:

• System state, files, and configurations must be backed up on a weekly basis.

• The system state, file, and configuration backups must be tested annually.

Which of the following backup methods should the engineer implement for the first week the plan is executed?

Options:

A.

Differential

B.

Incremental

C.

Snapshot

D.

Full

Buy Now
Questions 28

Which of the following are best practices when working with a source control system? (Select two).

Options:

A.

Merging code often

B.

Pushing code directly to production

C.

Performing code deployment

D.

Maintaining one branch for all features

E.

Committing code often

F.

Initiating a pull request

Buy Now
Questions 29

A cloud engineer is extending on-premises services to a public cloud. The following design requirements must be considered in the overall solution:

" The ability to remotely connect systems from both environments

• No IP address conflicts or overlap

• Cost-effectiveness

Which of the following cloud network concepts best meets these requirements?

Options:

A.

Dedicated connection

B.

VPN

C.

VLAN

D.

ACL

Buy Now
Questions 30

Which of the following is true of SSDs?

Options:

A.

SSDs do not have self-encrypting capabilities.

B.

SSDs have small storage capacities.

C.

SSDs can be used for high-IOP applications.

D.

SSDs are used mostly in cold storage.

Buy Now
Questions 31

A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following

delivery mechanisms would best support this integration?

Options:

A.

Enterprise service bus

B.

Socket

C.

RPC

D.

Queue

Buy Now
Questions 32

A cloud administrator shortens the amount of time a backup runs. An executive in the company requires a guarantee that the backups can be restored with no data loss. Which of th€ following backup features should the administrator lest for?

Options:

A.

Encryption

B.

Retention

C.

Schedule

D.

Integrity

Buy Now
Questions 33

A systems engineer is migrating a batch of 25 VMs from an on-premises compute cluster to a public cloud using the public cloud's migration agent. The migration job shows data

copies at a rate of 250Mbps. After five servers migrate, the data copies at a rate of 25Mbps. Which of the following should the engineer review first to troubleshoot?

Options:

A.

The on-premises VM host hardware utilization

B.

The on-premises ISP throttling rate

C.

The IOPS on the SAN backing the on-premises cluster

D.

The compute utilization of the VMs being migrated

Buy Now
Questions 34

A company is developing a new web application that requires a relational database management system with minimal operational overhead. Which of the following should the company choose?

Options:

A.

A database installed on a virtual machine

B.

A managed SQL database on the cloud

C.

A database migration service

D.

A hybrid database setup

Buy Now
Questions 35

Which of the following provides secure, private communication between cloud environments without provisioning additional hardware or appliances?

Options:

A.

VPN

B.

VPC peering

C.

BGP

D.

Transit gateway

Buy Now
Questions 36

A banking firm's cloud server will be decommissioned after a successful proof of concept using mirrored data. Which of the following is the best action to take regarding the storage used on the decommissioned server?

Options:

A.

Keep it temporarily.

B.

Archive it.

C.

Delete it.

D.

Retain it permanently

Buy Now
Questions 37

A systems administrator notices a surge of network traffic is coming from the monitoring server. The administrator discovers that large amounts of data are being downloaded to an external source. While investigating, the administrator reviews the following logs:

Which of the following ports has been compromised?

Options:

A.

Port 20

B.

Port 22

C.

Port 443

D.

Port 4443

E.

Port 8048

Buy Now
Questions 38

A developer at a small startup company deployed some code for a new feature to its public repository. A few days later, a data breach occurred. A security team investigated the

incident and found that the database was hacked. Which of the following is the most likely cause of this breach?

Options:

A.

Database core dump

B.

Hard-coded credentials

C.

Compromised deployment agent

D.

Unpatched web servers

Buy Now
Questions 39

A cloud engineer is deploying a cloud solution that will be used on premises with need-to-know access. Which of the following cloud deployment models best meets this

requirement?

Options:

A.

Community

B.

Public

C.

Private

D.

Hybrid

Buy Now
Questions 40

A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour. Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

Options:

A.

Use laC to deploy the laaS infrastructure.

B.

Convert the containers to VMs.

C.

Deploy the containers over SSH.

D.

Use private repositories for the containers.

Buy Now
Questions 41

A junior cloud administrator was recently promoted to cloud administrator and has been added to the cloud administrator group. The cloud administrator group is the only one that can access the engineering VM. The new administrator unsuccessfully attempts to access the engineering VM. However, the other administrators can access it without issue. Which of the following is the best way to identify the root cause?

Options:

A.

Rebooting the engineering VM

B.

Reviewing the administrator's permissions to access the engineering VM

C.

Allowing connections from 0.0.0.070 to the engineering VM

D.

Performing a packet capture on the engineering VM

Buy Now
Questions 42

A cloud engineer hardened the WAF for a company that operates exclusively in North America. The engineer did not make changes to any ports, and all protected applications have

continued to function as expected. Which of the following configuration changes did the engineer most likely apply?

Options:

A.

The engineer implemented MFA to access the WAF configurations.

B.

The engineer blocked all traffic originating outside the region.

C.

The engineer installed the latest security patches on the WAF.

D.

The engineer completed an upgrade from TLS version 1.1 to version 1.3.

Buy Now
Questions 43

An DevOps engineer is receiving reports that users can no longer access the company's web application after hardening of a web server. The users are receiving the following error:

ERR_SSLJ/ERSION_OR_CIPHER_MISMATCH.

Which of the following actions should the engineer take to resolve the issue?

Options:

A.

Restart the web server.

B.

Configure TLS 1.2 or newer.

C.

Update the web server.

D.

Review logs on the WAF

Buy Now
Questions 44

A cloud administrator needs to distribute workloads across remote data centers for redundancy reasons. Which of the following deployment strategies would eliminate downtime, accelerate deployment, and remain cost efficient?

Options:

A.

In-place

B.

Rolling

C.

Blue-green

D.

Canary

Buy Now
Questions 45

A cloud engineer is designing a high-performance computing cluster for proprietary software. The software requires low network latency and high throughput between cluster nodes.

Which of the following would have the greatest impact on latency and throughput when designing the HPC infrastructure?

Options:

A.

Node placement

B.

Node size

C.

Node NIC

D.

Node OS

Buy Now
Questions 46

A cloud solutions architect is designing a VM-based solution that requires reducing the cost as much as possible. Which of the following solutions will best satisfy this requirement?

Options:

A.

Using ephemeral storage on replicated VMs

B.

Creating Spot VMs in one availability zone

C.

Spreading the VMs across different regions

D.

Using provisioned IOPS storage

Buy Now
Questions 47

A company has decided to adopt a microservices architecture for its applications that are deployed to the cloud. Which of the following is a major advantage of this type of architecture?

Options:

A.

Increased security

B.

Simplified communication

C.

Reduced server cost

D.

Rapid feature deployment

Buy Now
Questions 48

A customer's facility is located in an area where natural disasters happen frequently. The customer requires the following:

• Data resiliency due to exposure to frequent natural disasters

• Data localization because of privacy regulations in the country

• High availability

Which of the following cloud resources should be provisioned to meet these requirements?

Options:

A.

Storage in a separate data center located in same region

B.

An on-premises private cloud carrying duplicate data

C.

Storage in an availability zone outside the region

D.

Storage in the same availability zone as the primary data

Buy Now
Questions 49

A cloud engineer wants to implement a disaster recovery strategy that:

. Is cost-effective.

. Reduces the amount of data loss in case of a disaster.

. Enables recovery with the least amount of downtime.

Which of the following disaster recovery strategies best describes what the cloud engineer wants to achieve?

Options:

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Buy Now
Questions 50

Which of the following cloud deployment strategies is best for an organization that wants to run open-source workloads with other organizations that are sharing the cost?

Options:

A.

Community

B.

Public

C.

Hybrid

D.

Private

Buy Now
Questions 51

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

Options:

A.

Setting up private development, public development, and testing environments

B.

Segregating environments for internal and external teams

C.

Configuring DDoS protection to mitigate the risk of downtime

D.

Using IAM and ACL in order to bolster DLP

Buy Now
Questions 52

A company wants to optimize cloud resources and lower the overhead caused by managing multiple operating systems. Which of the following compute resources would be best to help to achieve this goal?

Options:

A.

VM

B.

Containers

C.

Remote desktops

D.

Bare-metal servers

Buy Now
Questions 53

A company implements a web farm with 100 servers behind an application load balancer. Dunng scaling events, new web servers that are placed in service have not loaded all their modules, which causes some requests to the web farm to fail. Which of the following should the cloud engineer implement to address the scaling issue?

Options:

A.

Instance warm-up

B.

Scheduled scaling

C.

Event-based scaling

D.

Load balancer passthrough

Buy Now
Questions 54

For compliance purposes, a cloud developer at an insurance company needs to save all customer policies for more than ten years. Which of the following options is the most cost-

efficient tier to save the data in the cloud?

Options:

A.

Archive

B.

Hot

C.

Cold

D.

Warm

Buy Now
Questions 55

A software engineer at a cybersecurity company wants to access the cloud environment. Per company policy, the cloud environment should not be directly accessible via the internet. Which of the following options best describes how the software engineer can access the cloud resources?

Options:

A.

SSH

B.

Bastion host

C.

Token-based access

D.

Web portal

Buy Now
Questions 56

Which of the following would allow a cloud engineer to flatten a deeply nested JSON log to improve readability for analysts?

Options:

A.

Grafana

B.

Kibana

C.

Elasticsearch

D.

Logstash

Buy Now
Questions 57

Which of the following cloud-native architecture designs is the most easily maintained, decentralized, and decoupled?

Options:

A.

Monolithic

B.

Hybrid cloud

C.

Mainframe

D.

Microservices

Buy Now
Questions 58

A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly experiencing high latency. Which of the following would best help determine the source of the latency?

Options:

A.

Configuring centralized logging to analyze HTTP requests

B.

Running a flow log on the network to analyze the packets

C.

Configuring an API gateway to track all incoming requests

D.

Enabling tracing to detect HTTP response times and codes

Buy Now
Questions 59

A cloud infrastructure administrator updated the IP tables to block incoming connections and outgoing responses to 104.225.110.203. Which of the following vulnerability management steps is this an example of?

Options:

A.

Scanning scope

B.

Remediation

C.

Identification

D.

Assessment

Buy Now
Questions 60

A company developed an online trading platform. The engineering team selected event-based scaling for the platform's underlying resources. The platform resources scale up with every 2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains why this is the case?

Options:

A.

Event-based scaling does not scale down resources.

B.

Event-based scaling should not be triggered at the 2,000-user frequency.

C.

Event-based scaling should not track user subscriptions.

D.

Event-based scaling does not take resource load into account.

Buy Now
Questions 61

Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?

Options:

A.

Scanning

B.

Assessment

C.

Remediation

D.

Identification

Buy Now
Questions 62

Which of the following is the most cost-effective and efficient strategy when migrating to the cloud?

Options:

A.

Retire

B.

Replatform

C.

Retain

D.

Refactor

Buy Now
Questions 63

A cloud administrator deploys new VMs in a cluster and discovers they are getting IP addresses in the range of 169.254.0.0/16. Which of the following is the most likely cause?

Options:

A.

The scope has been exhausted.

B.

The network is overlapping.

C.

The VLAN is missing.

D.

The NAT is Improperly configured.

Buy Now
Questions 64

A software engineer needs to transfer data over the internet using programmatic access while also being able to query the data. Which of the following will best help the engineer to complete this task?

Options:

A.

SQL

B.

Web sockets

C.

RPC

D.

GraphQL

Buy Now
Questions 65

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these

requirements?

Options:

A.

Cloning

B.

Clustering

C.

Hardware passthrough

D.

Stand-alone container

Buy Now
Questions 66

An IT manager is migrating the production environment to the cloud but needs to keep control of the operating systems, patches, and settings of all resources. Which of the following deployment models will best meet the requirements?

Options:

A.

FaaS

B.

PaaS

C.

laaS

D.

SaaS

Buy Now
Questions 67

A SaaS provider introduced new software functionality for customers as part of quarterly production enhancements. After an update is implemented, users cannot locate certain transactions from an inbound integration. During the investigation, the application owner finds the following error in the logs:

Error: REST API - Deprecated call is no longer supported in this release.

Which of the following is the best action for the application owner to take to resolve the issue?

Options:

A.

Update the custom integration to use a supported function.

B.

Include the custom integration in the quarterly testing scope.

C.

Ask the users to monitor the quarterly updates.

D.

Revert the application to the last stable quarterly release.

Buy Now
Questions 68

An administrator configures three subnets to the corporate network. All servers should communicate with the main corporate network and access the internet. The administrator creates the following configurations:

After configuring the networks, the administrator recognizes an issue with the configuration. Which of the following can the administrator change in one step to accomplish the goal?

Options:

A.

Remove source 192.168.12.0/24 and destination 192.168.1.0/24 from the routing table.

B.

Replace destination 192.168.1.0/24 with destination 192.168.0.0/24.

C.

Add source 192.168.12.0/24 and destination 192.168.0.0/24 to the routing table.

D.

Reconfigure Network 4 to 192.168.13.0/24.

Buy Now
Exam Code: CV0-004
Exam Name: CompTIA Cloud+ (2025)
Last Update: Jan 18, 2025
Questions: 229
CV0-004 pdf

CV0-004 PDF

$29.75  $84.99
CV0-004 Engine

CV0-004 Testing Engine

$35  $99.99
CV0-004 PDF + Engine

CV0-004 PDF + Testing Engine

$47.25  $134.99