Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CompTIA Cloud+ CV0-004 Questions and answers with Dumpstech

Exam CV0-004 Premium Access

View all detail and faqs for the CV0-004 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions
Questions # 11:

A user's assigned cloud credentials are locked, and the user is unable to access the project's application. The cloud administrator reviews the logs and notices several attempts to log in with the user's account were made to a different application after working hours. Which of the following is the best approach for the administrator to troubleshoot this issue?

Options:

A.

Create new credentials for the user and restrict access to the authorized application.

B.

Track the source of the log-in attempts and block the IP address of the source in the WAR

C.

Reset the user's account and implement a stronger lock-out policy.

D.

Install an IDS on the network to monitor suspicious activity

Questions # 12:

A company's content management system (CMS) service runs on an laaS cluster on a public cloud. The CMS service is frequently targeted by a malicious threat actor using DDoS.

Which of the following should a cloud engineer monitor to identify attacks?

Options:

A.

Network flow logs

B.

Endpoint detection and response logs

C.

Cloud provider event logs

D.

Instance syslog

Questions # 13:

Which of the transfer when comparing a multiregional to a single-region cloud platform design?

Options:

A.

Storage

B.

Power and cooling

C.

Network

D.

Compliance and regulation

Questions # 14:

An on-call cloud engineer receives a critical alert about an e-commerce web server being unresponsive. Which of the following steps should the engineer take first?

Options:

A.

Triage

B.

Remediation

C.

Escalation

D.

Monitoring

Questions # 15:

A company has solid, validated border protection including a next-generation firewall and IPS. However, compromises and breaches continue. Which of the following is the best way to improve the company's security controls and reduce the number of incidents?

Options:

A.

Assess the border protection assets against a CIS benchmark and apply recommendations.

B.

Execute a network scan on the border protection and close ports that can be used by attackers.

C.

Shift the focus from border protection to a Zero Trust architecture focused on identities.

D.

Include a WAF on the network border, increasing protection and adopting security in layers.

Questions # 16:

A cloud engineer needs to deploy a new version of a web application to 100 servers. In the past, new version deployments have caused outages. Which of the following deployment types should the cloud engineer implement to prevent the outages from happening this time?

Options:

A.

Rolling

B.

Blue-green

C.

Canary

D.

Round-robin

Questions # 17:

An administrator needs to provide a backup solution for a cloud infrastructure that enables the resources to run from another data center in case of a outage. Connectivity to the

backup data center is via a third-party, untrusted network. Which of the following is the most important feature required for this solution?

Options:

A.

Deduplication

B.

Replication

C.

Compression

D.

Encryption

E.

Labeling

Questions # 18:

A cloud engineer is receiving multiple alerts from the infrastructure monitoring agent. The alerts state that all the VMs in the public subnet are at 100% CPU utilization. However, when the engineer checks the network utilization of the VMs, the network throughput is at normal levels. Which of the following is the most likely cause of this issue?

Options:

A.

Ransomware

B.

Cryptojacking

C.

DDoS

D.

Zombie instances

Questions # 19:

Which of the following do developers use to keep track of changes made during software development projects?

Options:

A.

Code drifting

B.

Code control

C.

Code testing

D.

Code versioning

Questions # 20:

A cloud engineer wants containers to run the latest version of a container base image to reduce the number of vulnerabilities. The applications in use requite Python 3.10 and ate not compatible with any other version. The containers' images are created every time a new version is released from the source image. Given the container Dockerfile below:

Question # 20

Which of the following actions will achieve the objectives with the least effort?

Options:

A.

Perform docker pull before executing docker run.

B.

Execute docker update using a local cron to get the latest container version.

C.

Change the image to use python:latest on the image build process.

D.

Update the Dockerfile to pin the source image version.

Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions