New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CV0-003 CompTIA Cloud+ Certification Exam Questions and Answers

Questions 4

A systems administrator is troubleshooting issues with network slowness. Traffic analysis shows that uplink bandwidth on the core switch is often sustained at 125Mbps due to a

combination of production traffic from other sources. Which of the following would BEST resolve the issue?

Options:

A.

Turn off the servers that use the most bandwidth.

B.

Enable QoS to prioritize production traffic.

C.

Increase the buffer size on the core switch.

D.

Reboot the core switch.

Buy Now
Questions 5

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

Options:

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Buy Now
Questions 6

A company wants to move to a multicloud environment and utilize the technology that provides the most portability. Which of the following technology solutions would BEST meet the company's needs?

Options:

A.

Bootstrap

B.

Virtual machines

C.

Clusters

D.

Containers

Buy Now
Questions 7

A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?

Options:

A.

RAID 5

B.

RAID 6

C.

RAID 10

D.

RAID 50

Buy Now
Questions 8

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations.

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?

Options:

A.

Integrity

B.

Versioning

C.

Classification

D.

Segmentation

Buy Now
Questions 9

A startup online gaming company is designing the optimal graphical user experience for multiplayer scenarios. However, online players have reported latency issues. Which of the following should the company configure as a remediation?

Options:

A.

Additional GPU memory

B.

Faster clock speed

C.

Additional CPU cores

D.

Dynamic allocations

Buy Now
Questions 10

A cloud engineer has deployed a virtual storage appliance into a public cloud environment. The storage appliance has a NAT to a public IP address. An administrator later notices there are some strange files on the storage appliance and a large spike in network traffic on the machine. Which of the following is the MOST likely cause?

Options:

A.

The default password is still configured on the appliance.

B.

The appliance's certificate has expired.

C.

The storage appliance has no firewall.

D.

Data encryption is enabled, and the files are hashed.

Buy Now
Questions 11

A company is using a method of tests and upgrades in which a small set of end users are exposed to new services before the majority of other users. Which of the following deployment methods is being used?

Options:

A.

Blue-green

B.

Canary

C.

Big bang

D.

Rolling

Buy Now
Questions 12

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

Options:

A.

Service_level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Buy Now
Questions 13

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?

Options:

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Buy Now
Questions 14

A cloud engineer is performing updates to an application and needs to gracefully stop any new transactions from processing before the updates can be applied. Which of the following steps should the engineer take?

Options:

A.

Enable maintenance mode from the application dashboard

B.

Wait until after business hours to conduct the change when the system is not in use

C.

Run a kill command on the system to stop the application services

D.

Use a load balancer to redirect traffic to other systems serving the application

Buy Now
Questions 15

A cloud administrator implemented SSO and received a business requirement to increase security when users access the cloud environment. Which of the following should be implemented NEXT to improve the company's security posture?

Options:

A.

SSH

B.

MFA

C.

Certificates

D.

Federation

Buy Now
Questions 16

A security audit related to confidentiality controls found the following transactions occurring in the system:

GET http://gateway.securetransaction.com/privileged/api/v1/changeResource?id=123 &user=277

Which of the following solutions will solve the audit finding?

Options:

A.

Using a TLS-protected API endpoint

B.

Implementing a software firewall

C.

Deploying a HIDS on each system

D.

Implementing a Layer 4 load balancer

Buy Now
Questions 17

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?

Options:

A.

Consult the law for the country where the company’s headquarters is located

B.

Consult the regulatory requirements for the company’s industry

C.

Consult the law for the country where the cloud services provider is located

D.

Consult the cloud services provider's policies and guidelines

Buy Now
Questions 18

A company has hired a security firm to perform a vulnerability assessment of its environment. In the first phase, an engineer needs to scan the network services exposed by the hosts. Which of the following will help achieve this with the LEAST privileges?

Options:

A.

An agent-based scan

B.

A credentialed scan

C.

A network-based scan

D.

An application scan

Buy Now
Questions 19

A large pharmaceutical company needs to ensure it is in compliance with the following requirements:

• An application must run on its own virtual machine.

• The hardware the application is hosted on does not change.

Which of the following will BEST ensure compliance?

Options:

A.

Containers

B.

A firewall

C.

Affinity rules

D.

Load balancers

Buy Now
Questions 20

Audit and system logs are being forwarded to a syslog solution. An administrator observes that two application servers have not generated any logs for a period of three days, while others continue to send logs normally. Which of the following BEST explains what is occurring?

Options:

A.

There is a configuration failure in the syslog solution.

B.

The application servers were migrated to the cloud as laaS instances.

C.

The application administrators have not performed any activity in those servers.

D.

There is a local firewall policy restriction on the syslog server.

Buy Now
Questions 21

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

Options:

A.

RPO

B.

MTTR

C.

SLA

D.

RTO

Buy Now
Questions 22

A DevOps administrator is building a new application slack in a private cloud. This application will store sensitive information and be accessible from the internet. Which of the following would be MOST useful in maintaining confidentiality?

Options:

A.

NAC

B.

IDS

C.

DLP

D.

EDR

Buy Now
Questions 23

A company is using an laaS environment. Which of the following licensing models would BEST suit the organization from a financial perspective to implement scaling?

Options:

A.

Subscription

B.

Volume-based

C.

per user

D.

Socket-based

Buy Now
Questions 24

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?

Options:

A.

Log monitoring

B.

Patch management

C.

Vulnerability scanning

D.

System hardening

Buy Now
Questions 25

A company has two identical environments (X and Y) running its core business application. As part of an upgrade, the X environment is patched/upgraded and tested while the Y environment is still serving the consumer workloads. Upon successful testing of the X environment, all workload is sent to this environment, and the Y environment is then upgraded before both environments start to manage the workloads. Which of the following upgrade methods is being used?

Options:

A.

Active-passive

B.

Canary

C.

Development/production

D.

Blue-green

Buy Now
Questions 26

A cloud administrator is troubleshooting a highly available web application running within three containers behind a Layer 7 load balancer with a WAF inspecting all traffic. The application frequently asks the users to log in again even when the session timeout has not been reached. Which of the following should the cloud administrator configure to solve this issue?

Options:

A.

Firewall outbound rules

B.

Firewall inbound rules

C.

Load balancer certificates

D.

Load balancer stickiness

E.

WAF transaction throttling

Buy Now
Questions 27

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?

Options:

A.

MTTF

B.

SLA

C.

RTO

D.

RPO

Buy Now
Questions 28

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?

Options:

A.

Store the credentials in a variable on every worker node

B.

Store the credentials on a shared volume using whole-disk encryption

C.

Store the credentials in a configuration file using SHA-256 inside the container image

D.

Store the credentials using the orchestrator secret manager

Buy Now
Questions 29

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

Options:

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Buy Now
Questions 30

A company has two primary offices, one in the United States and one in Europe. The company uses a public laaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

Options:

A.

Add an application load balancer to the applications to spread workloads.

B.

Integrate a CDN solution to distribute web content globally.

C.

Upgrade the bandwidth of the dedicated connection to the laaS provider.

D.

Migrate the applications to a region hosted in Europe.

Buy Now
Questions 31

After initial stress testing showed that a platform performed well with the specification of a single 32 vCPU node, which of the following will provide the desired service with the LOWEST cost and downtime?

Options:

A.

One 32 vCPU node with CDN caching

B.

Two 8 vCPU nodes with load balancing

C.

Three to six 8 vCPU nodes autoscaling group

D.

Four 8 vCPU nodes with DNS round robin

Buy Now
Questions 32

An administrator manages a file server that has a lot of users accessing and creating many files. As a result, the storage consumption is growing quickly. Which of the following would BEST control storage usage?

Options:

A.

Compression

B.

File permissions

C.

User quotas

D.

Access policies

Buy Now
Questions 33

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

Options:

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Buy Now
Questions 34

Users currently access SaaS email with five-character passwords that use only letters and numbers. An administrator needs to make access more secure without changing the password policy. Which of the following will provide a more secure way of accessing email at the lowest cost?

Options:

A.

Change the email service provider.

B.

Enable MFA with a one-time password.

C.

Implement SSO for all users.

D.

Institute certificate-based authentication

Buy Now
Questions 35

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment?

Options:

A.

The regional area

B.

Cloud bursting

C.

Lower costs

D.

Scalability

Buy Now
Questions 36

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?

Options:

A.

Create a directory security group.

B.

Create a resource group.

C.

Create separate VLANs.

D.

Create a network security group.

Buy Now
Questions 37

An organization is developing a new online product. The product must:

• Minimize organizational infrastructure and comply with security standards.

• Minimize organizational compliance efforts.

• Focus on application development and increase speed to market.

Which of the following should the organization consider, given the requirements listed above?

Options:

A.

Use cloud-native serverless services.

B.

Implement automated compliance scanning tools.

C.

Harden servers using repeatable compliance templates.

D.

Deploy compliance linters in the CI/CD pipeline.

Buy Now
Questions 38

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols Should the company use? (Select TWO)

Options:

A.

CIFS

B.

FTP

C.

Iscsi

D.

Raid 10

E.

Nfs

F.

fc

Buy Now
Questions 39

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the best action to correct the latency issue?

Options:

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Buy Now
Questions 40

A systems administrator is building a standardized OS template for the deployment of a web service. The image is intended for various autoscaling groups. Which of the following should be included in the image as best practice?

Options:

A.

Graphical user interface.

B.

Website configuration.

C.

System security hardening elements.

D.

Compute, memory, and storage capacity.

Buy Now
Questions 41

A company uses multiple SaaS-based cloud applications. All the applications require authentication upon access. An administrator has been asked to address this issue and enhance security. Which of the following technologies would be the BEST solution?

Options:

A.

Single sign-on

B.

Certificate authentication

C.

Federation

D.

Multifactor authentication

Buy Now
Questions 42

A cloud administrator is having difficulty correlating logs for multiple servers. Upon inspection, the administrator finds that the time-zone settings are mismatched throughout the deployment. Which of the following solutions can help maintain time synchronization between all the resources?

Options:

A.

DNS

B.

IPAM

C.

NTP

D.

SNMP

Buy Now
Questions 43

A cloud administrator recently misconfigured the permission policy on a credential vault by granting public access to it. Which of the following should the administrator do? (Select two).

Options:

A.

Reduce the system resources.

B.

Delete the affected users.

C.

Revoke the misconfigured permission policy.

D.

Scan the systems for vulnerabilities.

E.

Change the affected credentials.

F.

Block public access to the application.

Buy Now
Questions 44

A company has entered into a business relationship with another organization and needs to provide access to internal resources through directory services. Which of the following should a systems administrator implement?

Options:

A.

sso

B.

VPN

C.

SSH

D.

SAML

Buy Now
Questions 45

A cloud administrator is looking at the company's cloud services bill for the previous month. The administrator notices on the billing dashboard that certain resources are not being billed to any particular department. Which of the following actions will help correct this billing issue?

Options:

A.

Check the utilization of the resources.

B.

Modify the chargeback details of the consumer.

C.

Add the resources to the consumer monitoring group.

D.

Modify the tags for all the unmapped resources.

Buy Now
Questions 46

A systems administrator has been notified of possible illegal activities taking place on the network and has been directed to ensure any relevant emails are preserved for court use.

Which of the following is this MOST likely an example of?

Options:

A.

Email archiving

B.

Version control

C.

Legal hold

D.

File integrity monitoring

Buy Now
Questions 47

A cloud administrator is supporting an application that has several reliability issues. The administrator needs visibility into the performance characteristics of the application. Which of the following will MOST likely be used in a reporting dashboard?

Options:

A.

Data from files containing error messages from the application

B.

Results from the last performance and workload testing

C.

Detail log data from syslog files of the application

D.

Metrics and time-series data measuring key performance indicators

Buy Now
Questions 48

A systems administrator is implementing a new file storage service that has been deployed in the company's private cloud instance. The key requirement is fast read/write times for the targeted users, and the budget for this project is not a concern. Which of the following storage types should the administrator deploy?

Options:

A.

Spinning disks

B.

NVMe

C.

SSD

D.

Hybrid

Buy Now
Questions 49

As a result of an IT audit, a customer has decided to move some applications from an old legacy system to a private cloud. The current server location is remote with low bandwidth. Which of the following is the best migration strategy to use for this deployment?

Options:

A.

P2V with physical data transport

B.

P2P with remote data copy

C.

V2V with physical data transport

D.

V2P with physical data transport

E.

V2P with remote data copy

Buy Now
Questions 50

Which of the following enables CSPs to offer unlimited capacity to customers?

Options:

A.

Adequate budget

B.

Global data center distribution

C.

Economies of scale

D.

Agile project management

Buy Now
Questions 51

A company that performs passive vulnerability scanning at its transit VPC has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the use to verify if this is a true positive with the LEAST effort and cost? (Select TWO).

Options:

A.

A network-based scan

B.

An agent-based scan

C.

A port scan

D.

A red-team exercise

E.

A credentialed scan

F.

A blue-team exercise

G.

Unknown environment penetration testing

Buy Now
Questions 52

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the most likely cause of the issue?

Options:

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Buy Now
Questions 53

A web consultancy group currently works in an isolated development environment. The group uses this environment for the creation of the final solution, but also for showcasing it to customers, before commissioning the sites in production. Recently, customers of newly commissioned sites have reported they are not receiving the final product shown by the group, and

the website is performing in unexpected ways. Which of the following additional environments should the group adopt and include in its process?

Options:

A.

Provide each web consultant a local environment on their device.

B.

Require each customer to have a blue-green environment.

C.

Leverage a staging environment that is tightly controlled for showcasing.

D.

Initiate a disaster recovery environment to fail to in the event of reported issues.

Buy Now
Questions 54

A cloud administrator receives a billing report and notices the IT department billing has been the same for the last few months, despite the deployment of ten new instances for the SIEM solution. Which of the following is the most likely cause of the issue?

Options:

A.

Inconsistent hostnames.

B.

Misconfigured VM names.

C.

Incomplete provisioning tasks.

D.

Incorrect tagging.

Buy Now
Questions 55

A systems administrator is implementing a new version of a company's primary human-resources application. An upgrade will be performed on the production server, as there is no development environment. The administrator needs to have a

plan in case something goes wrong with the upgrade. Which of the following will work best to ensure a quick rollback in case an issue arises?

Options:

A.

An application-level backup

B.

A production snapshot

C.

A full backup

D.

A differential backup

Buy Now
Questions 56

An application deployment team has observed delays in deployments and has asked the cloud administrator to evaluate the issue. Below is the result of a latency test that was conducted by the cloud administrator from offices located in the following regions:

• Asia-Pacific (APAC)

• Europe, the Middle East, and Africa (EMEA)

• Americas

Tests were conducted from each location, and the results are shown below:

Which of the following locations needs to be investigated further?

Options:

A.

• Connectivity from APAC to APAC regions

• Connectivity from APAC to EMEA and US - North

B.

• Connectivity from APAC to all regions

• Connectivity from Americas to all regions

C.

• Connectivity from EMEA to all regions

• Connectivity from APAC to APAC and EMEA regions

D.

• Connectivity from APAC to EMEA and Americas regions

• Connectivity from EMEA to all regions

Buy Now
Questions 57

A cloud engineer is migrating a customer's web servers from a hypervisor platform to a CSP environment. The engineer needs to decouple the infrastructure and components during the migration to reduce the single points of failure. Which of the following storage options should the cloud engineer migrate the content to in order to improve availability?

Options:

A.

Block

B.

File

C.

Object

D.

iSCSI

E.

NFS

Buy Now
Questions 58

An organization is conducting a performance test of a public application. The following actions have already been completed:

• The baseline performance has been established.

• A load test has passed.

• A benchmark report has been generated.

Which of the following needs to be done to conclude the performance test?

Options:

A.

Verify the application works well under an unexpected volume of requests.

B.

Assess the application against vulnerabilities and/or misconfiguration exploitation.

C.

Test how well the application can resist a DDoS attack.

D.

Conduct a test with the end users and collect feedback.

Buy Now
Questions 59

A systems administrator audits a cloud application and discovers one of the key regulatory requirements has not been addressed. The requirement states that if

a physical breach occurs and hard drives are stolen, the contents of the drives should not be readable. Which of the following should be used to address the requirement?

Options:

A.

Obfuscation

B.

Encryption

C.

EDR

D.

HIPS

Buy Now
Questions 60

A cloud security engineer needs to design an IDS/IPS solution for a web application in a single virtual private network. The engineer is considering implementing IPS protection for traffic coming from the internet. Which of the following should the engineer consider to meet this requirement?

Options:

A.

Configuring a web proxy server

B.

Implementing load balancing using SSI- in front of web applications

C.

Implementing IDS/IPS agents on each instance running in that virtual private network

D.

Implementing dynamic routing

Buy Now
Questions 61

A cloud administrator created a developer desktop image and added it to the VDI farm in a private cloud environment. One of the developers opened a VDI session and noticed that compiling the code was taking up to one hour to complete. However, when the developer compiles the code on a local machine, the job completes in less than five minutes. Which of the following sizing techniques would be best to use to improve the performance of the compile job?

Options:

A.

Add more servers to the VDI environment.

B.

Increase the CPU and the memory on the VDI template.

C.

Configure the VDI environment to increase sessions automatically.

D.

Migrate code compile jobs to a public cloud provider.

Buy Now
Questions 62

A cloud administrator is performing automated deployment of cloud infrastructure for clients. The administrator notices discrepancies from the baseline in the configuration of infrastructure that was deployed to a new client. Which of the following is most likely the cause?

Options:

A.

The deployment user account changed

B.

The deployment was done to a different resource group.

C.

The deployment was done by a different cloud administrator.

D.

The deployment template was modified.

Buy Now
Questions 63

A cloud engineer is troubleshooting poor performance on a corporate website configured behind a cloud application load balancer. The following output was collected on the cloud console:

    CDN status: Configured and content replicated to edge locations.

    WAF status: 10 rules applied; 8,787,638 hits / 37,634 blocks.

    Listening on ports: 80/443.

    Forwarding traffic to instances: 5 (2 healthy).

    Autoscaling events: 25.

Which of the following is the most likely cause of the issue?

Options:

A.

The web servers are not responding properly.

B.

The web firewall is blocking legitimate traffic.

C.

The CDN should not be used during high loads.

D.

Autoscaling events are too high.

Buy Now
Questions 64

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled? (Select two).

Options:

A.

Telnet

B.

FTP

C.

Remote log-in

D.

DNS

E.

DHCP

F.

LDAP

Buy Now
Questions 65

An IT administrator is implementing security controls on an OS. Which of the following will provide the best protection against a brute-force attack? (Select two).

Options:

A.

Implementing MFA

B.

Enforcing strong passwords

C.

Configuring user passwords to change every 30 days

D.

Limiting failed log-in requests

E.

Using API keys

F.

Implementing SSH keys

Buy Now
Questions 66

A cloud architect is receiving complaints from VDI users overseas about slowness, even though the remote office has Gigabit internet. Which of the following will most likely solve the issue?

Options:

A.

Increasing bandwidth.

B.

Enabling compression.

C.

Lowering latency.

D.

Adding redundancy.

Buy Now
Questions 67

A systems administrator is performing an OS upgrade on a production VM. Which of the following actions should the administrator take before the upgrade to ensure the FASTEST recovery of the system in case the upgrade fails in an unrecoverable way?

Options:

A.

Submit the upgrade to the CAB.

B.

Perform a full backup.

C.

Take a snapshot of the system.

D.

Test the upgrade in a preproduction environment.

Buy Now
Questions 68

A database system is causing performance issues due to an increase in the number of transactions. Which of the following is the best way to solve these performance issues?

Options:

A.

Changing to object storage.

B.

Adding more volume storage.

C.

Increasing storage IOPS.

D.

Configuring RAID.

Buy Now
Questions 69

A cloud engineer gathered the following requirements for a factory automation system:

    Assembly line systems are latency-sensitive.

    Internet connectivity issues are common and can be prolonged.

    Services must support a 99.999% system uptime.

Which of the following components would be useful in implementing a hybrid model? (Select two).

Options:

A.

Cloud-based orchestration.

B.

Cloud edge devices.

C.

Local services.

D.

Cloud-managed services.

E.

Centralized logging and alerting.

F.

CDN provider.

Buy Now
Questions 70

A company's marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?

Options:

A.

GPU passthrough

B.

Increased memory

C.

Converged infrastructure

D.

An additional CPU core

Buy Now
Questions 71

A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the only group allowed to modify files in the directory.

Which of the following will accomplish the desired objective?

Options:

A.

Remove the file write permissions for the application service account.

B.

Restrict the file write permissions to the development group only.

C.

Add access to the fileshare for the systems administrator’s group.

D.

Deny access to all development user accounts

Buy Now
Questions 72

Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A’s cloud resources while retaining its IAM solution.

Which of the following should be implemented?

Options:

A.

Multifactor authentication

B.

Single sign-on

C.

Identity federation

D.

Directory service

Buy Now
Questions 73

A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below:

The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions.

Which of the following solutions would help the company accommodate the new workload in the SHORTEST amount of time and with the maximum financial benefits?

Options:

A.

Configure auto-scaling within the private cloud

B.

Set up cloud bursting for the additional resources

C.

Migrate all workloads to a public cloud provider

D.

Add more capacity to the private cloud

Buy Now
Questions 74

A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company.

Which of the following BEST describes this attack?

Options:

A.

VM escape

B.

Directory traversal

C.

Buffer overflow

D.

Heap spraying

Buy Now
Questions 75

A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content.

Which of the following solutions will assist with the increased workload?

Options:

A.

DoH

B.

WAF

C.

IPS

D.

CDN

Buy Now
Questions 76

A cloud administrator is building a new VM for a network security appliance. The security appliance installer says the CPU clock speed does not meet the requirements.

Which of the following will MOST likely solve the issue?

Options:

A.

Move the VM to a host with a faster CPU

B.

Add more vCPUs to the VM

C.

Enable CPU masking on the VM

D.

Enable hyperthreading on the virtual host

Buy Now
Questions 77

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

Options:

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Buy Now
Questions 78

An organization has two businesses that are developing different software products. They are using a single cloud provider with multiple IaaS instances. The organization identifies that the tracking of costs for each

business are inaccurate.

Which of the following is the BEST method for resolving this issue?

Options:

A.

Perform segregation of the VLAN and capture egress and ingress values of each network interface

B.

Tag each server with a dedicated cost and sum them based on the businesses

C.

Split the total monthly invoice equally between the businesses

D.

Create a dedicated subscription for the businesses to manage the costs

Buy Now
Questions 79

A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities.

Which of the following testing techniques would be BEST to use?

Options:

A.

Usability testing

B.

Regression testing

C.

Vulnerability testing

D.

Penetration testing

Buy Now
Questions 80

A systems administrator is deploying a solution that requires a virtual network in a private cloud environment. The solution design requires the virtual network to transport multiple payload types.

Which of the following network virtualization options would BEST satisfy the requirement?

Options:

A.

VXLAN

B.

STT

C.

NVGRE

D.

GENEVE

Buy Now
Questions 81

A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention.

Which of the following will BEST resolve this issue?

Options:

A.

Ensure all database queries are encrypted

B.

Create an IPSec tunnel between the database server and its clients

C.

Enable protocol encryption between the storage and the hypervisor

D.

Enable volume encryption on the storage

E.

Enable OS encryption

Buy Now
Questions 82

A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible.

Which of the following is the MOST important consideration to ensure a seamless migration?

Options:

A.

The cost of the environment

B.

The I/O of the storage

C.

Feature compatibility

D.

Network utilization

Buy Now
Questions 83

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance.

Which of the following licensing models is the application MOST likely using?

Options:

A.

Per device

B.

Per user

C.

Core-based

D.

Volume-based

Buy Now
Questions 84

A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command,

and notices the following relevant output:

Which of the following actions should the cloud administrator take to resolve the issue?

Options:

A.

Assign a new IP address of 192.168.100.10 to the web server

B.

Modify the firewall on 72.135.10.100 to allow only UDP

C.

Configure the WAF to filter requests from 17.3.130.3

D.

Update the gateway on the web server to use 72.135.10.1

Buy Now
Questions 85

A SaaS provider wants to maintain maximum availability for its service.

Which of the following should be implemented to attain the maximum SLA?

Options:

A.

A hot site

B.

An active-active site

C.

A warm site

D.

A cold site

Buy Now
Questions 86

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

Options:

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Buy Now
Questions 87

The human resources department was charged for a cloud service that belongs to another department. All other cloud costs seem to be correct.

Which of the following is the MOST likely cause for this error?

Options:

A.

Misconfigured templates

B.

Misconfigured chargeback

C.

Incorrect security groups

D.

Misconfigured tags

Buy Now
Questions 88

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

Options:

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Buy Now
Questions 89

An organization has multiple VLANs configured to segregate the network traffic. Following is the breakdown of the network segmentation:

    Production traffic (10.10.0.0/24)

    Network backup (10.20.0.0/25)

    Virtual IP network (10.20.0.128/25)

The following configuration exists on the server:

The backup administrator observes that the weekly backup is failing for this server. Which of the following commands should the administrator run to identify the issue?

Options:

A.

ROUTE PRINT

B.

NETSTAT -A

C.

IPCONFIG /ALL

D.

NET SM

Buy Now
Questions 90

A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible.

Which of the following will BEST achieve this goal?

Options:

A.

Configure CPU passthrough

B.

Oversubscribe CPU resources

C.

Switch from a Type 1 to a Type 2 hypervisor

D.

Increase instructions per cycle

E.

Enable simultaneous multithreading

Buy Now
Questions 91

A VDI administrator has received reports of poor application performance.

Which of the following should the administrator troubleshoot FIRST?

Options:

A.

The network environment

B.

Container resources

C.

Client devices

D.

Server resources

Buy Now
Questions 92

A cloud administrator is planning to migrate a globally accessed application to the cloud.

Which of the following should the cloud administrator implement to BEST reduce latency for all users?

Options:

A.

Regions

B.

Auto-scaling

C.

Clustering

D.

Cloud bursting

Buy Now
Questions 93

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections.

Which of the following MOST likely needs to be analyzed before rehosting the ERP?

Options:

A.

Software

B.

Licensing

C.

Right-sizing

D.

The network

Buy Now
Questions 94

A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled.

Which of the following techniques would BEST help the administrator assess these business requirements?

Options:

A.

Performance testing

B.

Usability testing

C.

Vulnerability testing

D.

Regression testing

Buy Now
Questions 95

A systems administrator is creating a playbook to run tasks against a server on a set schedule.

Which of the following authentication techniques should the systems administrator use within the playbook?

Options:

A.

Use the server’s root credentials

B.

Hard-code the password within the playbook

C.

Create a service account on the server

D.

Use the administrator’s SSO credentials

Buy Now
Questions 96

An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time.

Which of the following should be implemented to improve application performance?

Options:

A.

Increase disk capacity

B.

Increase the memory and network bandwidth

C.

Upgrade the application

D.

Upgrade the environment and use SSD drives

Buy Now
Questions 97

An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team.

Which of the following controls will BEST mitigate the risk of exploitation?

Options:

A.

DLP

B.

HIDS

C.

NAC

D.

WAF

Buy Now
Questions 98

A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies.

Which of the following cloud service subscription types would BEST meet these requirements?

Options:

A.

PaaS

B.

SaaS

C.

DBaaS

D.

IaaS

Buy Now
Questions 99

Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue?

Options:

A.

Perform a memory dump of the OS.

Analyze the memory dump.

Upgrade the host CPU to a higher clock speed CPU.

B.

Perform a packet capture during authentication.

Validate the load-balancing configuration.

Analyze the network throughput of the load balancer.

C.

Analyze the storage system IOPS.

Increase the storage system capacity.

Replace the storage system disks to SSD.

D.

Evaluate the OS ACLs.

Upgrade the router firmware.

Increase the memory of the router.

Buy Now
Questions 100

A systems administrator in a large enterprise needs to alter the configuration of one of the finance department’s database servers.

Which of the following should the administrator perform FIRST?

Options:

A.

Capacity planning

B.

Change management

C.

Backups

D.

Patching

Buy Now
Questions 101

A cloud administrator has built a new private cloud environment and needs to monitor all computer, storage, and network components of the environment.

Which of the following protocols would be MOST useful for this task?

Options:

A.

SMTP

B.

SCP

C.

SNMP

D.

SFTP

Buy Now
Questions 102

A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed.

Which of the following will BEST identify the CPU with more computational power?

Options:

A.

Simultaneous multithreading

B.

Bus speed

C.

L3 cache

D.

Instructions per cycle

Buy Now
Questions 103

Which of the following cloud deployment models allows a company to have full control over its IT infrastructure?

Options:

A.

Private

B.

Cloud within a cloud

C.

Hybrid

D.

Public

Buy Now
Questions 104

A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power.

Which of the following should be investigated FIRST?

Options:

A.

Server power

B.

Rack power

C.

Switch power

D.

SAN power

Buy Now
Questions 105

A systems administrator adds servers to a round-robin, load-balanced pool, and then starts receiving reports of the website being intermittently unavailable. Which of the following is the MOST likely cause of the issue?

Options:

A.

The network is being saturated.

B.

The load balancer is being overwhelmed.

C.

New web nodes are not operational.

D.

The API version is incompatible.

E.

There are time synchronization issues.

Buy Now
Questions 106

A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit?

Options:

A.

An SLA report

B.

Tagging

C.

Quotas

D.

Showback

Buy Now
Questions 107

A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure?

Options:

A.

GPU

B.

CPU

C.

Storage

D.

Memory

Buy Now
Questions 108

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly.

Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?

Options:

A.

Tier pricing

B.

Licensing

C.

Estimated consumption

D.

Feature compatibility

Buy Now
Questions 109

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

Options:

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Buy Now
Questions 110

A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue?

Options:

A.

Upgrade the virtual database server.

B.

Move the virtual machine to flash storage and test again.

C.

Check if other machines on the same storage are having issues.

D.

Document the findings and place them in a shared knowledge base.

Buy Now
Questions 111

Which of the following actions should a systems administrator perform during the containment phase of a security incident in the cloud?

Options:

A.

Deploy a new instance using a known-good base image.

B.

Configure a firewall rule to block the traffic on the affected instance.

C.

Perform a forensic analysis of the affected instance.

D.

Conduct a tabletop exercise involving developers and systems administrators.

Buy Now
Questions 112

Which of the following cloud services is fully managed?

Options:

A.

IaaS

B.

GPU in the cloud

C.

IoT

D.

Serverless compute

E.

SaaS

Buy Now
Questions 113

A systems administrator is examining a managed hosting agreement and wants to determine how much data would be lost if a server had to be restored from backups. To which of the following metrics should the administrator refer?

Options:

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Buy Now
Questions 114

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed.

Which of the following actions will make the server fully operational?

Options:

A.

Restart the RAID resynchronization process

B.

Perform a P2V migration of the server

C.

Swap the failed hard drive with a fresh one

D.

Restore the server from backup

Buy Now
Questions 115

A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?

Options:

A.

V2V

B.

V2P

C.

P2P

D.

P2V

Buy Now
Questions 116

A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers’ activity?

Options:

A.

Patch management

B.

Hardening

C.

Scaling

D.

Log and event monitoring

Buy Now
Questions 117

A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?

Options:

A.

A service availability scan

B.

An agent-based vulnerability scan

C.

A default and common credentialed scan

D.

A network port scan

Buy Now
Questions 118

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?

Options:

A.

Virtual machines

B.

Software as a service

C.

Serverless computing

D.

Containers

Buy Now
Questions 119

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Buy Now
Questions 120

A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying the CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue?

Options:

A.

Modify the deployment script to delete and recreate the database whenever the CMS application is deployed.

B.

Modify the ACL to allow the staging environment to access the database in the sandbox environment.

C.

Modify the CMS application deployment to use the previous version and redeploy the application.

D.

Modify the configuration settings of the CMS application to connect to the database in the current environment.

Buy Now
Questions 121

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

Options:

A.

Service-level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Buy Now
Questions 122

A technician just received the lessons learned from some recent data that was lost due to an on-premises file-server crash. The action point is to change the backup strategy to minimize manual intervention. Which of the following is the BEST approach for the technician to implement?

Options:

A.

Backup as a service

B.

RAID 1

C.

Long-term storage

D.

New backup devices

Buy Now
Questions 123

A systems administrator has finished installing monthly updates to servers in a cloud environment. The administrator notices certain portions of the playbooks are no longer functioning. Executing the playbook commands manually on a server does not work as well. There are no other reports of issues.

Which of the following is the MOST likely cause of this issue?

Options:

A.

Change management failure

B.

Service overload

C.

Patching failure

D.

Job validation issues

E.

Deprecated features

Buy Now
Questions 124

To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public DBaaS solution. Which of the following would be the BEST technique?

Options:

A.

Live migration

B.

Physical-to-virtual

C.

Storage-level mirroring

D.

Database replication

Buy Now
Questions 125

A cloud administrator is assigned to establish a connection between the on-premises data center and the new CSP infrastructure. The connection between the two locations must be secure at all times and provide service for all users inside the organization. Low latency is also required to improve performance during data transfer operations. Which of the following would BEST meet these requirements?

Options:

A.

A VPC peering configuration

B.

An IPSec tunnel

C.

An MPLS connection

D.

A point-to-site VPN

Buy Now
Questions 126

A cloud administrator needs to reduce the cost of cloud services by using the company's off-peak period. Which of the following would be the BEST way to achieve this with minimal effort?

Options:

A.

Create a separate subscription.

B.

Create tags.

C.

Create an auto-shutdown group.

D.

Create an auto-scaling group.

Buy Now
Questions 127

An organization is using multiple SaaS-based business applications, and the systems administrator is unable to monitor and control the use of these subscriptions. The administrator needs to implement a solution that will help the organization apply security policies and monitor each individual SaaS subscription. Which of the following should be deployed to achieve these requirements?

Options:

A.

DLP

B.

CASB

C.

IPS

D.

HIDS

Buy Now
Questions 128

A technician is trying to delete six decommissioned VMs. Four VMs were deleted without issue. However, two of the VMs cannot be deleted due to an error. Which of the following would MOST likely enable the technician to delete the VMs?

Options:

A.

Remove the snapshots

B.

Remove the VMs' IP addresses

C.

Remove the VMs from the resource group

D.

Remove the lock from the two VMs

Buy Now
Questions 129

A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.)

Options:

A.

The fabric interconnects

B.

The virtual appliances

C.

The firmware

D.

The virtual machines

E.

The baselines

F.

The operating system

Buy Now
Questions 130

A systems administrator has received an email from the virtualized environment's alarms indicating the memory was reaching full utilization. When logging in, the administrator notices that one out of a five-host cluster has a utilization of 500GB out of 512GB of RAM. The baseline utilization has been 300GB for that host. Which of the following should the administrator check NEXT?

Options:

A.

Storage array

B.

Running applications

C.

VM integrity

D.

Allocated guest resources

Buy Now
Questions 131

Users of a public website that is hosted on a cloud platform are receiving a message indicating the connection is not secure when landing on the website. The administrator has found that only a single protocol is opened to the service and accessed through the URL https://www.comptiasite.com. Which of the following would MOST likely resolve the issue?

Options:

A.

Renewing the expired certificate

B.

Updating the web-server software

C.

Changing the crypto settings on the web server

D.

Upgrading the users' browser to the latest version

Buy Now
Questions 132

A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.)

Options:

A.

Install TLS certificates on the server.

B.

Forward port 80 traffic to port 443.

C.

Disable TLS 1.0/1.1 and SSL.

D.

Disable password authentication.

E.

Enable SSH key access only.

F.

Provision the server in a separate VPC.

G.

Disable the superuser/administrator account.

Buy Now
Questions 133

A systems administrator is trying to reduce storage consumption. Which of the following file types would benefit the MOST from compression?

Options:

A.

System files

B.

User backups

C.

Relational database

D.

Mail database

Buy Now
Questions 134

A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST?

Options:

A.

The firewall

B.

The subnet

C.

The gateway

D.

The services

Buy Now
Questions 135

A systems administrator wants to ensure two VMs remain together on the same host. Which of the following must be set up to enable this functionality?

Options:

A.

Affinity

B.

Zones

C.

Regions

D.

A cluster

Buy Now
Questions 136

A system administrator supports an application in the cloud, which includes a restful API that receives an encrypted message that is passed to a calculator system. The administrator needs to ensure the proper function of the API using a new automation tool. Which of the following techniques would be BEST for the administrator to use to accomplish this requirement?

Options:

A.

Functional testing

B.

Performance testing

C.

Integration testing

D.

Unit testing

Buy Now
Exam Code: CV0-003
Exam Name: CompTIA Cloud+ Certification Exam
Last Update: Dec 26, 2024
Questions: 456
CV0-003 pdf

CV0-003 PDF

$25.5  $84.99
CV0-003 Engine

CV0-003 Testing Engine

$30  $99.99
CV0-003 PDF + Engine

CV0-003 PDF + Testing Engine

$40.5  $134.99