Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CV0-003 CompTIA Cloud+ Certification Exam Questions and Answers

Questions 4

A cloud administrator would like to maintain file integrity checks through hashing on a cloud object store. Which of the following is MOST suitable from a performance perspective?

Options:

A.

SHA-256

B.

SHA-512

C.

MD5

D.

AES

Buy Now
Questions 5

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

Options:

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Buy Now
Questions 6

A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?

Options:

A.

A CDN solution

B.

An MPLS connection between data centers

C.

A DNS round robin

D.

A site-to-site VPN between data centers

Buy Now
Questions 7

In an IaaS platform, which of the following actions would a systems administrator take FIRST to identify the scope of an incident?

Options:

A.

Conduct a memory acquisition.

B.

Snapshot all volumes attached to an instance.

C.

Retrieve data from a backup.

D.

Perform a traffic capture.

Buy Now
Questions 8

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?

Options:

A.

IPAM

B.

DoH

C.

VLAN

D.

SDN

Buy Now
Questions 9

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?

Options:

A.

HTTPS

B.

IPSec

C.

TLS

D.

SSH

Buy Now
Questions 10

A systems administrator needs to deploy a solution to automate new application releases that come from the development team. The administrator is responsible for provisioning resources at the infrastructure layer without modifying any configurations in the application code. Which of the following would BEST accomplish this task?

Options:

A.

Implementing a CI/CD tool

B.

Configuring infrastructure as code

C.

Deploying an orchestration tool

D.

Employing DevOps methodology

Buy Now
Questions 11

An organization recently deployed a private cloud on a cluster of systems that delivers compute, network, and storage resources in a single hardware, managed by an intelligent software. Which of the following BEST describes this type of deployment?

Options:

A.

High-performance computing

B.

Hyperconverged infrastructure

C.

Stand-alone computing

D.

Dynamic allocations

Buy Now
Questions 12

A cloud administrator is configuring several security appliances hosted in the private laaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?

Options:

A.

Allow UDP 161 outbound from the web servers to the log collector .

B.

Allow TCP 514 outbound from the web servers to the log collector.

C.

Allow UDP 161 inbound from the log collector to the web servers .

D.

Allow TCP 514 inbound from the log collector to the web servers .

Buy Now
Questions 13

A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:

Which Of the following actions Should the analyst take to accomplish the Objective?

Options:

A.

Remove rules I, 2. and 5.

B.

Remove rules I, 3, and 4.

C.

Remove rules 2.3. and 4.

D.

Remove rules 3.4. and 5.

Buy Now
Questions 14

A cloud engineer has deployed a virtual storage appliance into a public cloud environment. The storage appliance has a NAT to a public IP address. An administrator later notices there are some strange files on the storage appliance and a large spike in network traffic on the machine. Which of the following is the MOST likely cause?

Options:

A.

The default password is still configured on the appliance.

B.

The appliance's certificate has expired.

C.

The storage appliance has no firewall.

D.

Data encryption is enabled, and the files are hashed.

Buy Now
Questions 15

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?

Options:

A.

Insufficient guest bandwidth

B.

Overwhelmed vCPU

C.

A storage error on the guest

D.

Incorrect VLAN assignment

E.

Inadequate memory allocation

Buy Now
Questions 16

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the BEST action to correct the latency issue?

Options:

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Buy Now
Questions 17

A systems administrator is setting up a backup solution to follow the 3-2-1 policy. Currently, the solution is set to back up from the servers to an on-site storage server. Which of the following should the administrator configure to comply with the 3-2-1 policy?

Options:

A.

Weekly lull backups, with daily incremental backups

B.

A second on-site storage server for backups

C.

Storage snapshots

D.

An off-site storage server for backups

Buy Now
Questions 18

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?

Options:

A.

Implement a secret management solution.

B.

Create autoscaling capabilities.

C.

Develop CI/CD tools.

D.

Deploy a CMDB tool.

Buy Now
Questions 19

A cloud engineer, who manages workloads in a public cloud environment, uses autoscaling to maintain availability of a critical application. During a recent burst in demands, the engineer received the following error alert:

LimitedlnstanceCapacity

Which of the following is MOST likely cause of the error?

Options:

A.

The cloud account has a misconfigured security group.

B.

The cloud account has exhausted the number of instances quota.

C.

The cloud account has had rights revoked to create instances.

D.

The autoscaling feature does not have permissions to create instances.

Buy Now
Questions 20

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?

Options:

A.

Create a directory security group.

B.

Create a resource group.

C.

Create separate VLANs.

D.

Create a network security group.

Buy Now
Questions 21

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?

Options:

A.

There is a configuration failure in the syslog solution.

B.

The application servers were migrated to the cloud as laaS instances.

C.

The application administrators have not performed any activity in those servers.

D.

There is a local firewall policy restriction on the syslog server.

Buy Now
Questions 22

A DevOps team needs to provide a solution that offers isolation, portability, and scalability Which of the following would BEST meet these requirements?

Options:

A.

Virtual machines

B.

Containers

C.

Appliances

D.

Clusters

Buy Now
Questions 23

A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well.

Which of the following should the administrator recommend the user do FIRST?

Options:

A.

Disable antivirus/anti-malware software

B.

Turn off the software firewall

C.

Establish a VPN tunnel between the computer and the web server

D.

Update the web browser to the latest version

Buy Now
Questions 24

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

Options:

A.

RPO

B.

MTTR

C.

SLA

D.

RTO

Buy Now
Questions 25

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols Should the company use? (Select TWO)

Options:

A.

CIFS

B.

FTP

C.

Iscsi

D.

Raid 10

E.

Nfs

F.

fc

Buy Now
Questions 26

A company is moving its entire infrastructure to the cloud. The infrastructure consists of:

    100 virtual desktops

    10 database servers

    10 web servers

    15 application servers

    15 development servers

    7 VDI servers

Each server, except for web, application, and database servers, needs to be on an isolated subnet. The CSP has allocated a /24 subnet. Which of the following would best divide the IP space to meet these requirements?

Options:

Options:

A.

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

B.

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

C.

VDI: /25Web, application, and database: /27Development: /27VDI servers: /28

D.

VDI: /26Web, application, and database: /26Development: /26VDI servers: /28

Buy Now
Questions 27

A systems administrator is deploying a new version of a website. The website is deployed in the cloud using a VM cluster. The administrator must then deploy the new version into one VM first. After a period of time, if there are no issues detected, a second VM will be updated. This process must continue until all the VMS are updated. Which of the following upgrade methods is being implemented?

Options:

A.

Canary

B.

Blue-green

C.

Rolling

D.

Staging

Buy Now
Questions 28

A systems administrator is diagnosing performance issues on a web application. The web application sends thousands of extremely complex SQL queries to a database server, which has trouble retrieving the information in time. The administrator checks the database server and notes the following resource utilization:

    CPU: 64%

    RAM: 97%

    Network throughput: 384/1000 Kbps

    Disk throughput: 382,700 Kbps

The administrator also notices that the storage for the database server is consistently near its IOPS limit. Which of the following will best resolve these performance issues?

Options:

A.

Increase CPU resources on the database server.

B.

Increase caching on the database server.

C.

Put the storage and the database on the same VLAN.

D.

Enable compression on storage traffic.

E.

Enable deduplication on the storage appliance.

Buy Now
Questions 29

A systems administrator is planning to migrate to a cloud solution with volume-based licensing. Which of the following is most important when considering licensing costs?

Options:

A.

The number of cores

B.

The number of threads

C.

The number of machines

D.

The number of sockets

Buy Now
Questions 30

Which of the following are advantages of a public cloud? (Select TWO).

Options:

A.

Full control of hardware

B.

Reduced monthly costs

C.

Decreased network latency

D.

Pay as you use

E.

Availability of self-service

F.

More secure data

Buy Now
Questions 31

A systems administrator is trying to connect to a remote KVM host. The command line appears as follows:

After logging in to the remote server, the administrator verifies the daemon is running. Which of the following should the administrator try NEXT?

Options:

A.

Opening port 22 on the firewall

B.

Running the command with elevated privileges

C.

Checking if the SSH password is correct

D.

Ensuring the private key was properly imported

Buy Now
Questions 32

An organization provides integration services for finance companies that use web services. A new company that sends and receives more than 100,000 transactions per second has been integrated using the web service. The other integrated companies are now reporting slowness with regard to the integration service. Which of the following is the cause of the issue?

Options:

A.

Incorrect configuration in the authentication process

B.

Incorrect configuration in the message queue length

C.

Incorrect configuration in user access permissions

D.

Incorrect configuration in the SAN storage pool

Buy Now
Questions 33

A company has two identical environments (X and Y) running its core business application. As part of an upgrade, the X environment is patched/upgraded and tested while the Y environment is still serving the consumer workloads. Upon successful testing of the X environment, all workload is sent to this environment, and the Y environment is then upgraded before both environments start to manage the workloads. Which of the following upgrade methods is being used?

Options:

A.

Active-passive

B.

Canary

C.

Development/production

D.

Blue-green

Buy Now
Questions 34

A company that requires full administrative control at the OS level is considering the use of public cloud services. Which of the following service models would BEST fit the company's requirements?

Options:

A.

SaaS

B.

DBaaS

C.

PaaS

D.

laaS

Buy Now
Questions 35

A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows:

Options:

A.

• Three public cloud hosts with four cores• 120GB of RAM• 100GB of storage• 1Gbps

B.

• Three public cloud hosts with six cores• 80GB of RAM• 180GB of storage• 150Mbps

C.

• Three public cloud hosts with six cores• 80GB of RAM• 1TB of storage• 200Mbps

D.

• Four public cloud hosts with four cores• 140GB of RAM• 200GB of storage

Buy Now
Questions 36

A cloud administrator is responsible for managing a VDI environment that provides end users with access to limited applications. Which of the following should the administrator make changes to when a new application needs to be provided?

Options:

A.

Application security policy

B.

Application whitelisting policy

C.

Application hardening policy

D.

Application testing policy

Buy Now
Questions 37

A systems administrator is responsible for upgrading operating systems on VMs that are hosted in a cloud environment. The systems administrator wants to ensure the VMs receive updates for as long as possible. Which of the following should the systems administrator choose?

Options:

A.

Stable

B.

Nightly

C.

LTS

D.

Canary

E.

EDR

Buy Now
Questions 38

A cloud administrator receives an email stating the following:

"Clients are receiving emails from our web application with non-encrypted links."

The administrator notices that links generated from the web application are opening in http://. Which of the following should be configured to redirect the traffic to https://?

Options:

A.

User account access

B.

Programming code

C.

Web server configuration

D.

Load balancer setting

Buy Now
Questions 39

A cloud administrator is investigating slow VM performance. The administrator has checked the physical server performance and has identified the host is under stress due to a peak usage workload. Which of the following is the NEXT step the administrator should complete?

Options:

A.

Perform a root cause analysis

B.

Migrate the VM to a different host.

C.

Document the findings.

D.

Perform a system restart.

Buy Now
Questions 40

A systems administrator receives a ticket stating the following:

“The programming team received an error during the process deploying applications to the container platform. The error after the containerized applications were created”

Which the following should the administrator Check FIRST?

Options:

A.

The containers

B.

The application

C.

The Scripts

D.

The templates

Buy Now
Questions 41

An environment has a dual-stack infrastructure in an active-active configuration in two separate data centers. Which of the following best describes replication between the two sites?

Options:

A.

Data is moved constantly from the hot site to the warm site.

B.

Data is replicated every 15 minutes from one site to the other.

C.

Data is moved from one site to the other once per day.

D.

Data is synchronized in real time across the sites.

E.

Data is moved twice a day from Site A to Site B, and then from Site B to Site A.

Buy Now
Questions 42

A SaaS provider wants to maintain maximum availability for its service. Which of the following should be implemented to attain the maximum SLA?

Options:

A.

A mobile site.

B.

An active-active site.

C.

A warm site.

D.

A cold site.

Buy Now
Questions 43

When designing a three-node. load-balanced application, a systems administrator must ensure each node runs on a different physical server for HA purposes. Which of the following does the systems administrator need to configure?

Options:

A.

Round-robin methods

B.

Live migration

C.

Anti-affinity rule

D.

Priority queues

Buy Now
Questions 44

A cloud engineer is required to move legacy systems to a public cloud. The system configuration is provided below:

Server Name

Cores

OS Disk (Used)

Data Disk (Used)

Encryption

Web1

2

500GB (45%)

1TB (20%)

OS

Web2

2

500GB (40%)

1TB (90%)

OS

App1

4

250GB (90%)

2TB (65%)

No

App2

4

250GB (70%)

2TB (95%)

No

DB1

16

250GB (25%)

4TB (65%)

Data

The public cloud provider VMs support a maximum OS disk size of 250GB and a data disk size of 2TB. Which of the following tasks will contribute to a successful migration to the cloud environment? (Select two).

Options:

A.

Clean up Web1's OS disk.

B.

Shrink the OS disk for Web1 and Web2.

C.

Migrate DB1 to DBaaS.

D.

Clean up App1's OS Disk.

E.

Decrypt DB1.

F.

Convert DB1 to a clustered database.

Buy Now
Questions 45

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled? (Select TWO).

Options:

A.

Telnet

B.

FTP

C.

Remote login

D.

DNS

E.

DHCP

F.

LDAP

Buy Now
Questions 46

A cloud solutions architect has an environment that must only be accessed during work hours. Which of the following processes should be automated to BEST reduce cost?

Options:

A.

Scaling of the environment after work hours

B.

Implementing access control after work hours

C.

Shutting down the environment after work hours

D.

Blocking external access to the environment after work hours

Buy Now
Questions 47

A cloud security engineer needs to design an IDS/IPS solution for a web application in a single virtual private network. The engineer is considering implementing IPS protection for traffic coming from the internet. Which of the following should the engineer consider to meet this requirement?

Options:

A.

Configuring a web proxy server

B.

Implementing load balancing using SSI- in front of web applications

C.

Implementing IDS/IPS agents on each instance running in that virtual private network

D.

Implementing dynamic routing

Buy Now
Questions 48

A company that performs passive vulnerability scanning at its transit VPC has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the company use to verify if this is a true positive with the least effort and cost? (Select two).

Options:

A.

A network-based scan

B.

An agent-based scan

C.

A port scan

D.

A red-team exercise

E.

A credentialed scan

F.

A blue-team exercise

G.

Unknown environment penetration testing

Buy Now
Questions 49

A cloud engineer is responsible for a legacy web application that runs on an on-premises VM environment. The VM environment is approaching end of life. The engineer needs to migrate the web application to the cloud as quickly as possible because the VM environment has the following limitations:

• The VM environment has a single IOGB disk.

• The VM environment still uses 10Mbps, which leaves a 100Mbps WAN connection underutilized.

• No installation media is available.

Which of the following is the best way to migrate the web application to the cloud?

Options:

A.

Use the VM import connector to import the VM into the cloud.

B.

Use import/export to import the VM as a snapshot and attach it to a cloud instance.

C.

Use REST APIs to import an image of the VM into the cloud.

D.

Use object storage to create a backup of the VM and restore data into the cloud instance.

Buy Now
Questions 50

A company has a large environment with multiple VPCs across three regions in a public cloud. The company is concerned about connectivity within the regions. Which of the following should the cloud administrator implement?

Options:

A.

Peering

B.

A firewall

C.

Network access control

D.

A load balancer

Buy Now
Questions 51

A cloud engineer recently set up a container image repository. The engineer wants to ensure that downloaded images are not modified in transit. Which of the following is the best method to achieve this goal?

Options:

A.

SHA-256

B.

IPSec

C.

AES-256

D.

MD5

E.

serpent-256

Buy Now
Questions 52

A corporation is evaluating an offer from a CSP to take advantage of volume discounts on a shared platform. The finance department is concerned about cost allocation transparency, as the current structure splits projects into dedicated billing accounts. Which of the following can be used to address this concern?

Options:

A.

Implementing resource tagging

B.

Defining a cost baseline

C.

Consolidating the billing accounts

D.

Using a third-party accounting tool

Buy Now
Questions 53

An organization's security team must determine the likelihood of a breach on its external-facing websites. Which of the following would be best to identify the organization’s chances of incurring a breach?

Options:

A.

Regression testing.

B.

Functional testing.

C.

Vulnerability scanning.

D.

Penetration testing.

Buy Now
Questions 54

After an infrastructure-as-code cloud migration to an laaS environment, the cloud engineer discovers that configurations on DB servers have drifted from the corporate standard baselines. Which of the following should the cloud engineer do to best ensure configurations are restored to the baselines?

Options:

A.

Utilize a template to automate and update the DB configuration.

B.

Create an image of the DB, delete the previous DB server, and restore from the image.

C.

Manually log in to the DB servers and update the configurations.

D.

Rename and change the IP of the old DB server and rebuild a new DB server.

Buy Now
Questions 55

A company is migrating a large fleet of on-premises servers into the public cloud. The number of servers is estimated to be between 800 and 900. The systems administrator is doing the network planning. Which of the following subnets should the administrator use? (Select two).

Options:

A.

10.10.115.0/22

B.

B. 10.10.119.0/23

C.

C. 10.10.120.0/23

D.

D. 192.168.1.0/23

E.

E. 192.168.1.0/24

F.

F. 192.168.10.0/21

Buy Now
Questions 56

An organization's executives would like to allow access to devices that meet the corporate security compliance levels. Which of the following criteria are most important for the organization to consider? (Select two).

Options:

A.

Serial number

B.

Firmware

C.

Antivirus version and definition

D.

OS patch level

E.

CPU architecture

F.

Manufacturer

Buy Now
Questions 57

A systems administrator needs to implement a way for users to verify software integrity. Which of the following tools would BEST meet the administrator's needs?

Options:

A.

TLS 1.3

B.

CRC32

C.

AES-256

D.

SHA-512

Buy Now
Questions 58

One of the web applications in a public subnet is vulnerable to a newly discovered zero-day vulnerability. Which of the following actions can a security engineer perform to reduce the risk of exploitation and application downtime?

Options:

A.

Stop the web server in the affected host.

B.

Insert a deny rule in the host firewall.

C.

Add a new signature in the network IDS.

D.

Implement a virtual patch in the WAF.

Buy Now
Questions 59

A systems administrator needs to connect the companys network to a public cloud services provider. Which of the following will BEST ensure encryption in transit for data transfers?

Options:

A.

Identity federation

B.

A VPN tunnel

C.

A proxy solution

D.

A web application firewall

Buy Now
Questions 60

A cloud administrator for a retail business identified a significant month-to-month increase in the cost of storage. The current IaaS instances are hosting the organization's ERP solution. Which of the following is the most likely cause for the cost increase?

Options:

A.

The database (DB) data drive size is set to 512GB, and the DB size is 384GB.

B.

The virtual memory in IaaS instances is utilizing space from the OS drive.

C.

The storage tiers for the archival data have a suboptimal configuration.

D.

The DB backup drive is reaching 80% of utilization and needs to be cleaned up.

Buy Now
Questions 61

An organization has the following requirements that need to be met when implementing cloud services:

    SSO to cloud infrastructure

    On-premises directory service

    RBAC for IT staff

Which of the following cloud models would meet these requirements?

Options:

A.

Public

B.

Community

C.

Hybrid

D.

Multitenant

Buy Now
Questions 62

Due to a policy change, a few of a customer’s application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%.

Which of the following is the MOST likely cause?

Options:

A.

There is not enough vCPU assigned

B.

The application is not compatible with the new settings

C.

The new configuration is adding latency

D.

The memory of the VM is underallocated

Buy Now
Questions 63

Which of the following cloud deployment models allows a company to have full control over its IT infrastructure?

Options:

A.

Private

B.

Cloud within a cloud

C.

Hybrid

D.

Public

Buy Now
Questions 64

An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources.

Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?

Options:

A.

Dedicated

B.

Shared

C.

Passthrough

D.

vGPU

Buy Now
Questions 65

An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time.

Which of the following should be implemented to improve application performance?

Options:

A.

Increase disk capacity

B.

Increase the memory and network bandwidth

C.

Upgrade the application

D.

Upgrade the environment and use SSD drives

Buy Now
Questions 66

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

Options:

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Buy Now
Questions 67

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

Options:

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Buy Now
Questions 68

A systems administrator is troubleshooting network throughput issues following a deployment. The network is currently being overwhelmed by the amount of traffic between the database and the web servers in the environment.

Which of the following should the administrator do to resolve this issue?

Options:

A.

Set up affinity rules to keep web and database servers on the same hypervisor

B.

Enable jumbo frames on the gateway

C.

Move the web and database servers onto the same VXLAN

D.

Move the servers onto thick-provisioned storage

Buy Now
Questions 69

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

Options:

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Buy Now
Questions 70

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments.

Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?

Options:

A.

Chain

B.

Star

C.

Mesh

D.

Hub and spoke

Buy Now
Questions 71

A technician needs to deploy two virtual machines in preparation for the configuration of a financial application next week. Which of the following cloud deployment models should the technician use?

Options:

A.

XaaS

B.

IaaS

C.

PaaS

D.

SaaS

Buy Now
Questions 72

A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?

Options:

A.

V2V

B.

V2P

C.

P2P

D.

P2V

Buy Now
Questions 73

A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?

Options:

A.

Alternate location

B.

Rolling

C.

Storage live migration

D.

In-place

Buy Now
Questions 74

An organization is required to set a custom registry key on the guest operating system.

Which of the following should the organization implement to facilitate this requirement?

Options:

A.

A configuration management solution

B.

A log and event monitoring solution

C.

A file integrity check solution

D.

An operating system ACL

Buy Now
Questions 75

An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation:

    Production traffic (10.10.0.0/24)

    Network backup (10.20.0.0/25)

    Virtual IP network (10.20.0.128/25)

The following configuration exists on the server:

The backup administrator observes that the weekly backup is failing for this server. Which of the following commands should the administrator run to identify the issue?

Options:

A.

ROUTE PRINT

B.

NETSTAT -A

C.

IPCONFIG /ALL

D.

NET SM

Buy Now
Questions 76

A systems administrator needs to convert ten physical servers to virtual.

Which of the following would be the MOST efficient conversion method for the administrator to use?

Options:

A.

Rebuild the servers from scratch

B.

Use the vendor’s conversion tool

C.

Clone the hard drive

D.

Restore from backup

Buy Now
Questions 77

A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled.

Which of the following techniques would BEST help the administrator assess these business requirements?

Options:

A.

Performance testing

B.

Usability testing

C.

Vulnerability testing

D.

Regression testing

Buy Now
Questions 78

A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities.

Which of the following testing techniques would be BEST to use?

Options:

A.

Usability testing

B.

Regression testing

C.

Vulnerability testing

D.

Penetration testing

Buy Now
Questions 79

A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible.

Which of the following will BEST achieve this goal?

Options:

A.

Configure CPU passthrough

B.

Oversubscribe CPU resources

C.

Switch from a Type 1 to a Type 2 hypervisor

D.

Increase instructions per cycle

E.

Enable simultaneous multithreading

Buy Now
Questions 80

A cloud administrator recently noticed that a number of files stored at a SaaS provider’s file-sharing service were deleted. As part of the root cause analysis, the administrator noticed the parent folder permissions were modified last week. The administrator then used a test user account and determined the permissions on the files allowed everyone to have write access.

Which of the following is the best step for the administrator to take NEXT?

Options:

A.

Identify the changes to the file-sharing service and document

B.

Acquire a third-party DLP solution to implement and manage access

C.

Test the current access permissions to the file-sharing service

D.

Define and configure the proper permissions for the file-sharing service

Buy Now
Questions 81

A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure?

Options:

A.

GPU

B.

CPU

C.

Storage

D.

Memory

Buy Now
Questions 82

A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying the CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue?

Options:

A.

Modify the deployment script to delete and recreate the database whenever the CMS application is deployed.

B.

Modify the ACL to allow the staging environment to access the database in the sandbox environment.

C.

Modify the CMS application deployment to use the previous version and redeploy the application.

D.

Modify the configuration settings of the CMS application to connect to the database in the current environment.

Buy Now
Questions 83

Which of the following definitions of serverless computing BEST explains how it is different from using VMs?

Options:

A.

Serverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP.

B.

Serverless computing uses predictable billing and offers lower costs than VM compute services.

C.

Serverless computing is a scalable, highly available cloud service that uses SDN technologies.

D.

Serverless computing allows developers to focus on writing code and organizations to focus on business.

Buy Now
Questions 84

A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?

Options:

A.

DLP

B.

WAF

C.

FIM

D.

ADC

Buy Now
Questions 85

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

Options:

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Buy Now
Questions 86

A systems administrator is examining a managed hosting agreement and wants to determine how much data would be lost if a server had to be restored from backups. To which of the following metrics should the administrator refer?

Options:

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Buy Now
Questions 87

A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue?

Options:

A.

Upgrade the virtual database server.

B.

Move the virtual machine to flash storage and test again.

C.

Check if other machines on the same storage are having issues.

D.

Document the findings and place them in a shared knowledge base.

Buy Now
Questions 88

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL https://www.comptiasite.com. Which of the following would MOST likely resolve the issue?

Options:

A.

Renewing the expired certificate

B.

Updating the web-server software

C.

Changing the crypto settings on the web server

D.

Upgrading the users' browser to the latest version

Buy Now
Questions 89

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

Options:

A.

Performance testing

B.

Penetration testing

C.

Vulnerability testing

D.

Regression testing

Buy Now
Questions 90

A company wants to move its environment from on premises to the cloud without vendor lock-in. Which of the following would BEST meet this requirement?

Options:

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Buy Now
Questions 91

An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would be MOST useful to accomplish this task?

Options:

A.

VLAN

B.

NIPS

C.

WAF

D.

NAC

Buy Now
Questions 92

A cloud security analyst is implementing a vulnerability scan of the web server in the DMZ, which is running in an IaaS compute instance. The default inbound firewall settings are as follows:

Which of the following will provide the analyst with the MOST accurate report?

Options:

A.

An agent-based scan

B.

A network vulnerability scan

C.

A default and common credentialed scan

D.

A network credentialed vulnerability scan

Buy Now
Questions 93

A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other. Which of the following should an administrator perform to comply with the security requirement?

Options:

A.

Create separate virtual networks for production, QA, and development servers.Move the servers to the appropriate virtual network.Apply a network security group to each virtual network that denies all traffic except for the firewall.

B.

Create separate network security groups for production, QA, and development servers.Apply the network security groups on the appropriate production, QA, and development servers.Peer the networks together.

C.

Create separate virtual networks for production, QA, and development servers.Move the servers to the appropriate virtual network.Peer the networks together.

D.

Create separate network security groups for production, QA, and development servers.Peer the networks together.Create static routes for each network to the firewall.

Buy Now
Questions 94

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

Options:

A.

Internet of Things

B.

Digital transformation

C.

Artificial intelligence

D.

DNS over TLS

Buy Now
Questions 95

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Buy Now
Questions 96

A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below:

The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions.

Which of the following solutions would help the company accommodate the new workload in the SHORTEST amount of time and with the maximum financial benefits?

Options:

A.

Configure auto-scaling within the private cloud

B.

Set up cloud bursting for the additional resources

C.

Migrate all workloads to a public cloud provider

D.

Add more capacity to the private cloud

Buy Now
Questions 97

An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team.

Which of the following controls will BEST mitigate the risk of exploitation?

Options:

A.

DLP

B.

HIDS

C.

NAC

D.

WAF

Buy Now
Questions 98

A systems administrator needs to configure SSO authentication in a hybrid cloud environment.

Which of the following is the BEST technique to use?

Options:

A.

Access controls

B.

Federation

C.

Multifactor authentication

D.

Certificate authentication

Buy Now
Questions 99

A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed.

Which of the following will BEST identify the CPU with more computational power?

Options:

A.

Simultaneous multithreading

B.

Bus speed

C.

L3 cache

D.

Instructions per cycle

Buy Now
Questions 100

A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information:

    The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.

    The cloud management console does not show an IP address for that server.

    A DNS lookup shows the hostname resolves to an IP address.

    The server is a member of the same security group as the others.

    The cloud administrator is able to log in remotely to the other servers without issue.

Which of the following is the MOST likely cause of the server being unavailable?

Options:

A.

The network driver updates did not apply successfully, and the interface is in a down state.

B.

The ACL policy for the server was updated as part of the server reboot, preventing login access.

C.

The server was assigned a new IP address, and DNS entry for the server name was not updated.

D.

The update caused an increase in the output to the logs, and the server is too busy to respond.

Buy Now
Questions 101

Which of the following is relevant to capacity planning in a SaaS environment?

Options:

A.

Licensing

B.

A hypervisor

C.

Clustering

D.

Scalability

Buy Now
Questions 102

A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site.

Which of the following should be configured in between the cloud environment and the DR site?

Options:

A.

Failback

B.

Playbook

C.

Zoning

D.

Replication

Buy Now
Questions 103

All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST?

Options:

A.

Peer all the networks from each cloud environment.

B.

Migrate the servers.

C.

Create a VPN tunnel.

D.

Configure network access control lists.

Buy Now
Questions 104

A company had a system compromise, and the engineering team resolved the issue after 12 hours. Which of the following information will MOST likely be requested by the Chief Information Officer (CIO) to understand the issue and its resolution?

Options:

A.

A root cause analysis

B.

Application documentation

C.

Acquired evidence

D.

Application logs

Buy Now
Questions 105

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?

Options:

A.

Deploy web servers into an laaS provider.

B.

Implement a cloud-based VDI solution.

C.

Provision web servers in a container environment.

D.

Use PaaS components in the cloud to implement the product.

Buy Now
Questions 106

A systems administrator for an e-commerce company will be migrating the company’s main website to a cloud provider. The principal requirement is that the website must be highly available.

Which of the following will BEST address this requirement?

Options:

A.

Vertical scaling

B.

A server cluster

C.

Redundant switches

D.

A next-generation firewall

Buy Now
Questions 107

A VDI administrator has received reports of poor application performance.

Which of the following should the administrator troubleshoot FIRST?

Options:

A.

The network environment

B.

Container resources

C.

Client devices

D.

Server resources

Buy Now
Questions 108

A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal.

Which of the following should the administrator do to fix this issue?

Options:

A.

Change the database application IP

B.

Create a database cluster between the primary site and the DR site

C.

Update the connection string

D.

Edit the DNS record at the DR site for the application servers

Buy Now
Questions 109

An IaaS provider has numerous devices and services that are commissioned and decommissioned automatically on an ongoing basis. The cloud administrator needs to implement a solution that will help reduce administrative overhead.

Which of the following will accomplish this task?

Options:

A.

IPAM

B.

NAC

C.

NTP

D.

DNS

Buy Now
Questions 110

A company recently subscribed to a SaaS collaboration service for its business users. The company also has an on-premises collaboration solution and would like users to have a seamless experience regardless of the collaboration solution being used.

Which of the following should the administrator implement?

Options:

A.

LDAP

B.

WAF

C.

VDI

D.

SSO

Buy Now
Questions 111

A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST?

Options:

A.

The firewall

B.

The subnet

C.

The gateway

D.

The services

Buy Now
Questions 112

A cloud administrator is assigned to establish a connection between the on-premises data center and the new CSP infrastructure. The connection between the two locations must be secure at all times and provide service for all users inside the organization. Low latency is also required to improve performance during data transfer operations. Which of the following would BEST meet these requirements?

Options:

A.

A VPC peering configuration

B.

An IPSec tunnel

C.

An MPLS connection

D.

A point-to-site VPN

Buy Now
Questions 113

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

Options:

A.

The target system's API functionality has been deprecated

B.

The password for the service account has expired

C.

The IP addresses of the target system have changed

D.

The target system has failed after the updates

Buy Now
Questions 114

A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM?

Options:

A.

CDN

B.

DNS

C.

NTP

D.

IPAM

Buy Now
Questions 115

After announcing a big sales promotion, an e-commerce company starts to experience a slow response on its platform that is hosted in a public cloud. When checking the resources involved, the systems administrator sees the following consumption:

Considering all VMs were built from the same templates, which of the following actions should the administrator perform FIRST to speed up the response of the e-commerce platform?

Options:

A.

Spin up a new web server

B.

Spin up a new application server

C.

Add more memory to the web server

D.

Spin up a new database server

Buy Now
Questions 116

A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity?

Options:

A.

Patch management

B.

Hardening

C.

Scaling

D.

Log and event monitoring

Buy Now
Questions 117

An administrator has been informed that some requests are taking a longer time to respond than other requests of the same type. The cloud consumer is using multiple network service providers and is performing link load balancing for bandwidth aggregation. Which of the following commands will help the administrator understand the possible latency issues?

Options:

A.

ping

B.

ipconfig

C.

traceroute

D.

netstat

Buy Now
Questions 118

A support engineer wants to prevent users from running malware on several IaaS compute instances. Which of the following will BEST achieve this objective?

Options:

A.

Encrypt all applications that users should not access.

B.

Set the execute filesystem permissions on the desired applications only.

C.

Implement an application whitelisting policy.

D.

Disable file sharing on the instance.

Buy Now
Questions 119

Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps.

Which of the following solutions will resolve the issue the FASTEST?

Options:

A.

Change the connection to point-to-site VPN

B.

Order a direct link to the provider

C.

Enable quality of service

D.

Upgrade the link to 200Mbps

Buy Now
Questions 120

A systems administrator has migrated a web application to the cloud with a synchronous uplink speed of 100Mbps. After the migration, the administrator receives reports of slow connectivity to the web application. The administrator logs into the firewall and notices the WAN port is transmitting at a constant 12.5MBps. Which of the following BEST explains the reason for the issue?

Options:

A.

Misconfigured subnetting

B.

Insufficient compute

C.

Firewall issues

D.

Not enough upload bandwidth

Buy Now
Questions 121

An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?

Options:

A.

Two load balancers behind a single firewall

B.

Firewalls in a blue-green configuration

C.

Two firewalls in a HA configuration

D.

A web application firewall

Buy Now
Questions 122

After a few new web servers were deployed, the storage team began receiving incidents in their queue about the web servers. The storage administrator wants to verify the incident tickets that should have gone to the web server team. Which of the following is the MOST likely cause of the issue?

Options:

A.

Incorrect assignment group in service management

B.

Incorrect IP address configuration

C.

Incorrect syslog configuration on the web servers

D.

Incorrect SNMP settings

Buy Now
Questions 123

Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?

Options:

A.

A business continuity plan

B.

Incident response/disaster recovery documentation

C.

A tabletop exercise

D.

A root cause analysis

Buy Now
Questions 124

A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would all ow for the maximum number of two-core machines with equal memory?

Options:

A.

30 VMs, 3GB of memory

B.

40 VMs, 1,5GB of memory

C.

45 VMs, 2 GB of memory

D.

60 VMs, 1 GB of memory

Buy Now
Questions 125

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

Options:

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Buy Now
Questions 126

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections.

Which of the following MOST likely needs to be analyzed before rehosting the ERP?

Options:

A.

Software

B.

Licensing

C.

Right-sizing

D.

The network

Buy Now
Questions 127

After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)

Options:

A.

Identify the resources that are accessible to the affected IAM user

B.

Remove the published plain-text password

C.

Notify users that a data breach has occurred

D.

Change the affected IAM user’s password

E.

Delete the affected IAM user

Buy Now
Questions 128

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

Options:

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Buy Now
Questions 129

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

Options:

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Buy Now
Questions 130

A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Incorrect permissions

B.

Insufficient storage

C.

Billing issues with the cloud provider

D.

No connectivity to the public cloud

E.

Expired API token

F.

Disabled autoscaling

Buy Now
Questions 131

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

Options:

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Buy Now
Questions 132

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

Options:

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Buy Now
Questions 133

A cloud security engineer needs to ensure authentication to the cloud pro-vider console is secure. Which of the following would BEST achieve this ob-jective?

Options:

A.

Require the user's source IP to be an RFC1918 address.

B.

Require the password to contain uppercase letters, lowercase letters, numbers, and symbols.

C.

Require the use of a password and a physical token.

D.

Require the password to be ten characters long.

Buy Now
Questions 134

A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?

Options:

A.

RAID 5

B.

RAID 6

C.

RAID 10

D.

RAID 50

Buy Now
Questions 135

A company has hired a security firm to perform a vulnerability assessment of its environment. In the first phase, an engineer needs to scan the network services exposed by the hosts. Which of the following will help achieve this with the LEAST privileges?

Options:

A.

An agent-based scan

B.

A credentialed scan

C.

A network-based scan

D.

An application scan

Buy Now
Exam Code: CV0-003
Exam Name: CompTIA Cloud+ Certification Exam
Last Update: Apr 2, 2025
Questions: 452
CV0-003 pdf

CV0-003 PDF

$25.5  $84.99
CV0-003 Engine

CV0-003 Testing Engine

$30  $99.99
CV0-003 PDF + Engine

CV0-003 PDF + Testing Engine

$40.5  $134.99