Month End Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CV0-004 CompTIA Cloud+ (2025) Questions and Answers

Questions 4

A developer is sending requests to a SaaS application. The developer becomes unable to send more requests after sending a number of them, but other developers can still send requests. Which of the following is most likely causing the issue?

Options:

A.

Partial outage

B.

API throttling

C.

Rate limiting

D.

Service quota

Buy Now
Questions 5

Which of the following refers to the idea that data should stay within certain borders or territories?

Options:

A.

Data classification

B.

Data retention

C.

Data sovereignty

D.

Data ownership

Buy Now
Questions 6

A systems engineer is migrating a batch of 25 VMs from an on-premises compute cluster to a public cloud using the public cloud's migration agent. The migration job shows data

copies at a rate of 250Mbps. After five servers migrate, the data copies at a rate of 25Mbps. Which of the following should the engineer review first to troubleshoot?

Options:

A.

The on-premises VM host hardware utilization

B.

The on-premises ISP throttling rate

C.

The IOPS on the SAN backing the on-premises cluster

D.

The compute utilization of the VMs being migrated

Buy Now
Questions 7

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

Options:

A.

Disk I/O

B.

Network packets

C.

Average memory utilization

D.

Percent of CPU utilization

Buy Now
Questions 8

Which of the following is an auditing procedure that ensures service providers securely manage the data to protect the interests of the organization and the privacy of its clients?

Options:

A.

CIS

B.

ITIL

C.

SOC2

D.

ISO 27001

Buy Now
Questions 9

A high-usage cloud resource needs to be monitored in real time on specific events to guarantee its availability. Which of the following actions should be used to meet this requirement?

Options:

A.

Configure a ping command to identify when the cloud instance is out of service.

B.

Create a dashboard with visualizations to filter the status of critical activities.

C.

Collect all the daily activity from the cloud instance and create a dump file for analysis.

D.

Schedule an hourly scan of the network to check for the availability of the resource.

Buy Now
Questions 10

A SaaS provider introduced new software functionality for customers as part of quarterly production enhancements. After an update is implemented, users cannot locate certain transactions from an inbound integration. During the investigation, the application owner finds the following error in the logs:

Error: REST API - Deprecated call is no longer supported in this release.

Which of the following is the best action for the application owner to take to resolve the issue?

Options:

A.

Update the custom integration to use a supported function.

B.

Include the custom integration in the quarterly testing scope.

C.

Ask the users to monitor the quarterly updates.

D.

Revert the application to the last stable quarterly release.

Buy Now
Questions 11

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

Options:

A.

Operating system patches

B.

Table-level permissions

C.

Minor database engine updates

D.

Cluster configuration

E.

Row-level encryption

F.

Availability of hardware for scaling

Buy Now
Questions 12

A cloud deployment uses three different VPCs. The subnets on each VPC need to communicate with the others over private channels. Which of the following will achieve this objective?

Options:

A.

Deploying a load balancer to send traffic to the private IP addresses

B.

Creating peering connections between all VPCs

C.

Adding BGP routes using the VPCs' private IP addresses

D.

Establishing identical routing tables on all VPCs

Buy Now
Questions 13

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these

requirements?

Options:

A.

Cloning

B.

Clustering

C.

Hardware passthrough

D.

Stand-alone container

Buy Now
Questions 14

A company has decided to adopt a microservices architecture for its applications that are deployed to the cloud. Which of the following is a major advantage of this type of architecture?

Options:

A.

Increased security

B.

Simplified communication

C.

Reduced server cost

D.

Rapid feature deployment

Buy Now
Questions 15

You are a cloud engineer working for a cloud service provider that is responsible for an

IaaS offering.

Your customer, who creates VMs and manages virtual storage, has noticed I/O bandwidth issues and low IOPS (under 9000).

Your manager wants you to verify the proper storage configuration as dictated by your service level agreement (SLA).

The SLA specifies:

. Each SFP on the hypervisor host must be set to the maximum link speed

allowed by the SAN array. . All SAN array disk groups must be configured in a RAID 5.

. The SAN array must be fully configured for redundant fabric paths. . IOPS should not fall below 14000

INSTRUCTIONS

Click on each service processor to review the displayed information. Then click on the drop-down menus to change the settings of each device as necessary to conform to the SLA requirements.

Options:

Buy Now
Questions 16

Which of the following communication methods between on-premises and cloud environments would ensure minimal-to-low latency and overhead?

Options:

A.

Site-to-site VPN

B.

Peer-to-peer VPN

C.

Direct connection

D.

peering

Buy Now
Questions 17

An DevOps engineer is receiving reports that users can no longer access the company's web application after hardening of a web server. The users are receiving the following error:

ERR_SSLJ/ERSION_OR_CIPHER_MISMATCH.

Which of the following actions should the engineer take to resolve the issue?

Options:

A.

Restart the web server.

B.

Configure TLS 1.2 or newer.

C.

Update the web server.

D.

Review logs on the WAF

Buy Now
Questions 18

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

Options:

A.

Setting up private development, public development, and testing environments

B.

Segregating environments for internal and external teams

C.

Configuring DDoS protection to mitigate the risk of downtime

D.

Using IAM and ACL in order to bolster DLP

Buy Now
Questions 19

An organization's web application experiences penodic bursts of traffic when a new video is launched. Users are reporting poor performance in the middle of the month. Which of the following scaling approaches should the organization use to scale based on forecasted traffic?

Options:

A.

Scheduled

B.

Manual

C.

Event

D.

Load

Buy Now
Questions 20

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A – The end user accesses the application through a web browser to enter and view clinical data.

2A – The CTM application server reads/writes data to/from the database server.

1B – The end user accesses the application through a web browser to run reports on clinical data.

2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B – The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 21

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

Options:

A.

Review the development network routing table.

B.

Change the ciphers on the site-to-site VPN.

C.

Restart the site-to-site VPN tunnel.

D.

Check the ACLS on the development workloads

Buy Now
Questions 22

A cloud administrator wants to provision a host with two VMs. The VMs require the following:

After configuring the servers, the administrator notices that during certain hours of the day, the performance heavily degrades. Which of the following is the best explanation?

Options:

A.

The host requires additional physical CPUs.

B.

A higher number of processes occur at those times.

C.

The RAM on each VM is insufficient.

D.

The storage is overutilized.

Buy Now
Questions 23

Which of the following cloud deployment strategies is best for an organization that wants to run open-source workloads with other organizations that are sharing the cost?

Options:

A.

Community

B.

Public

C.

Hybrid

D.

Private

Buy Now
Questions 24

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

Options:

A.

Rehost

B.

Rearchitect

C.

Refactor

D.

Retain

Buy Now
Questions 25

A cloud solutions architect is designing a VM-based solution that requires reducing the cost as much as possible. Which of the following solutions will best satisfy this requirement?

Options:

A.

Using ephemeral storage on replicated VMs

B.

Creating Spot VMs in one availability zone

C.

Spreading the VMs across different regions

D.

Using provisioned IOPS storage

Buy Now
Questions 26

Which of the following do developers use to keep track of changes made during software development projects?

Options:

A.

Code drifting

B.

Code control

C.

Code testing

D.

Code versioning

Buy Now
Questions 27

A cloud engineer is receiving multiple alerts from the infrastructure monitoring agent. The alerts state that all the VMs in the public subnet are at 100% CPU utilization. However, when the engineer checks the network utilization of the VMs, the network throughput is at normal levels. Which of the following is the most likely cause of this issue?

Options:

A.

Ransomware

B.

Cryptojacking

C.

DDoS

D.

Zombie instances

Buy Now
Questions 28

An IT security team wants to ensure that the correct parties are informed when a specific user account is signed in. Which of the following would most likely allow an administrator to address this concern?

Options:

A.

Creating an alert based on user sign-in criteria

B.

Aggregating user sign-in logs from all systems

C.

Enabling the collection of user sign-in logs

D.

Configuring the retention of all sign-in logs

Buy Now
Questions 29

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

Options:

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing

Buy Now
Questions 30

An administrator is creating a cron job that shuts down the virtual machines at night to save on costs. Which of the following is the best way to achieve this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 31

A cloud developer needs to update a REST API endpoint to resolve a defect. When too many users attempt to call the API simultaneously, the following message is displayed:

Error: Request Timeout - Please Try Again Later

Which of the following concepts should the developer consider to resolve this error?

Options:

A.

Server patch

B.

TLS encryption

C.

Rate limiting

D.

Permission issues

Buy Now
Questions 32

A manager wants information about which users signed in to a certain VM during the past month. Which of the following can the cloud administrator use to obtain this information?

Options:

A.

Retention

B.

Alerting

C.

Aggregation

D.

Collection

Buy Now
Questions 33

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

Options:

A.

Splicing

B.

Rotation

C.

Sampling

D.

Inspection

Buy Now
Questions 34

Which of the following types of releases best describes the update made to a code repository production release when it changes from version 1.0 to version 1.1?

Options:

A.

Alpha

B.

Beta

C.

Minor

D.

Major

Buy Now
Questions 35

A banking firm's cloud server will be decommissioned after a successful proof of concept using mirrored data. Which of the following is the best action to take regarding the storage used on the decommissioned server?

Options:

A.

Keep it temporarily.

B.

Archive it.

C.

Delete it.

D.

Retain it permanently

Buy Now
Questions 36

A customer's facility is located in an area where natural disasters happen frequently. The customer requires the following:

• Data resiliency due to exposure to frequent natural disasters

• Data localization because of privacy regulations in the country

• High availability

Which of the following cloud resources should be provisioned to meet these requirements?

Options:

A.

Storage in a separate data center located in same region

B.

An on-premises private cloud carrying duplicate data

C.

Storage in an availability zone outside the region

D.

Storage in the same availability zone as the primary data

Buy Now
Questions 37

Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?

Options:

A.

Scanning

B.

Assessment

C.

Remediation

D.

Identification

Buy Now
Questions 38

A video surveillance system records road incidents and stores the videos locally before uploading them to the cloud and deleting them from local storage. Which of the following

best describes the nature of the local storage?

Options:

A.

Persistent

B.

Ephemeral

C.

Differential

D.

Incremental

Buy Now
Questions 39

A security engineer Identifies a vulnerability m a containerized application. The vulnerability can be exploited by a privileged process to read tie content of the host's memory. The security engineer reviews the following Dockerfile to determine a solution to mitigate similar exploits:

Which of the following is the best solution to prevent similar exploits by privileged processes?

Options:

A.

Adding the USER myappuserinstruction

B.

Patching the host running the Docker daemon

C.

Changing FROM alpiner3.17 to FROM alpine:latest

D.

Running the container with the ready-only filesystem configuration

Buy Now
Questions 40

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production

environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

Options:

A.

Canary

B.

Blue-green

C.

Rolling

D.

In-place

Buy Now
Questions 41

A company migrated its CRM system to a SaaS solution. The security team is updating the RAG matrix for the newly migrated CRM. Given the following table:

Which of the following responsibility assignments best aligns with the shared responsibility model for the new CRM?

Options:

A.

Data-center security

B.

CRM software security

C.

CRM server patching

D.

CRM development life cycle

Buy Now
Questions 42

A cloud engineer is developing an operating expense report that will be used to purchase various cloud billing models for virtual machine instances. The cloud billing model must meet the following requirements:

• The instance cannot be ephemeral.

• The minimum life cycle of the instance is expected to be five years.

• The software license is charged per physical CPU count.

Which of the following models would best meet these requirements?

Options:

A.

Dedicated host

B.

Spot instance

C.

Pay-as-you-go

D.

Reserved resources

Buy Now
Questions 43

A company is required to save historical data for seven years. A cloud administrator implements a script that automatically deletes data older than seven years. Which of the following concepts best describes why the historical data is being deleted?

Options:

A.

End of life

B.

Data loss prevention

C.

Cost implications

D.

Tiered storage for archiving

Buy Now
Questions 44

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to

calculate the severity of the risk from using this component?

Options:

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

Buy Now
Questions 45

Which of the following requirements are core considerations when migrating a small business's on-premises applications to the cloud? (Select two).

Options:

A.

Availability

B.

Hybrid

C.

Testing

D.

Networking

E.

Compute

F.

Logs

Buy Now
Questions 46

A cloud administrator needs to collect process-level, memory-usage tracking for the virtual machines that are part of an autoscaling group. Which of the following is the best way to

accomplish the goal by using cloud-native monitoring services?

Options:

A.

Configuring page file/swap metrics

B.

Deploying the cloud-monitoring agent software

C.

Scheduling a script to collect the data

D.

Enabling memory monitoring in the VM configuration

Buy Now
Questions 47

A systems administrator is configuring backups on a VM and needs the process to run as quickly as possible, reducing the bandwidth on the network during all times from Monday through Saturday. In the event of data corruption, the management team expects the mean time to recovery to be as low as possible. Which of the following backup methods can the administrator use to accomplish these goals?

Options:

A.

Incremental backup daily to the cloud

B.

Full backup on Sunday and incremental backups on all other days of the week

C.

Differential backup daily to the cloud

D.

Incremental backups during off-hours on Monday, Wednesday, and Friday

Buy Now
Questions 48

A cloud architect attempts to modify a protected branch but is unable to do so. The architect receives an error indicating the action cannot be completed. Which of the following should the architect try instead''

Options:

A.

Adding a new remote

B.

Creating a pull request

C.

Merging the branch

D.

Rebasing the branch

Buy Now
Questions 49

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

INSTRUCTIONS

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

Web app 1

Web app 2

Web app 3

Web app 4

Client app

Options:

Buy Now
Questions 50

Which of the following is a direct effect of cloud migration on an enterprise?

Options:

A.

The enterprise must reorganize the reporting structure.

B.

Compatibility issues must be addressed on premises after migration.

C.

Cloud solutions will require less resources than on-premises installations.

D.

Utility costs will be reduced on premises.

Buy Now
Questions 51

A cloud engineer needs to deploy a new version of a web application to 100 servers. In the past, new version deployments have caused outages. Which of the following deployment types should the cloud engineer implement to prevent the outages from happening this time?

Options:

A.

Rolling

B.

Blue-green

C.

Canary

D.

Round-robin

Buy Now
Questions 52

A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly experiencing high latency. Which of the following would best help determine the source of the latency?

Options:

A.

Configuring centralized logging to analyze HTTP requests

B.

Running a flow log on the network to analyze the packets

C.

Configuring an API gateway to track all incoming requests

D.

Enabling tracing to detect HTTP response times and codes

Buy Now
Questions 53

Which of the following industry standards mentions that credit card data must not be exchanged or stored in cleartext?

Options:

A.

CSA

B.

GDPR

C.

SOC2

D.

PCI-DSS

Buy Now
Questions 54

A cloud engineer was deploying the company's payment processing application, but it failed with the following error log:

ERFOR:root: Transaction failed http 429 response, please try again Which of the following are the most likely causes for this error? (Select two).

Options:

A.

API throttling

B.

API gateway outage

C.

Web server outage

D.

Oversubscription

E.

Unauthorized access

F.

Insufficient quota

Buy Now
Questions 55

Which of the following network protocols is generally used in a NAS environment?

Options:

A.

BGP

B.

RDP

C.

TCP/IP

D.

iSCSI

Buy Now
Questions 56

A company operates a website that allows customers to upload, share, and retain full ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

Options:

A.

Sovereignty

B.

Data classification

C.

Litigation holds

D.

Retention

Buy Now
Questions 57

A cloud engineer wants to deploy a new application to the cloud and is writing the following script:

Which of the following actions will this script perform?

Options:

A.

Upload a new VM image.

B.

Create a new cloud resource.

C.

Build a local server.

D.

Import a cloud module.

Buy Now
Questions 58

A company developed an online trading platform. The engineering team selected event-based scaling for the platform's underlying resources. The platform resources scale up with every 2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains why this is the case?

Options:

A.

Event-based scaling does not scale down resources.

B.

Event-based scaling should not be triggered at the 2,000-user frequency.

C.

Event-based scaling should not track user subscriptions.

D.

Event-based scaling does not take resource load into account.

Buy Now
Questions 59

Which of the following technologies should be used by a person who is visually impaired to access data from the cloud?

Options:

A.

Object character recognition

B.

Text-to-voice

C.

Sentiment analysis

D.

Visual recognition

Buy Now
Questions 60

A cloud engineer is exploring options to reduce the management overhead of the servers and network. Which of the following cloud service models should the engineer implement?

Options:

A.

SaaS

B.

XaaS

C.

PaaS

D.

laaS

Buy Now
Questions 61

Which of the following container storage types loses data after a restart?

Options:

A.

Object

B.

Persistent volume

C.

Ephemeral

D.

Block

Buy Now
Questions 62

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to calculate the severity of the risk from using this component?

Options:

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

Buy Now
Questions 63

A CI/CD pipeline is used to deploy VMs to an laaS environment. Which of the following can be used to harden the operating system once the VM is running?

Options:

A.

Docker

B.

Kubernetes

C.

Git

D.

Ansible

Buy Now
Questions 64

A cloud solutions architect needs to design a solution that will collect a report and upload it to an object storage service every time a virtual machine is gracefully or non-gracefully

stopped. Which of the following will best satisfy this requirement?

Options:

A.

An event-driven architecture that will send a message when the VM shuts down to a log-collecting function that extracts and uploads the log directly from the storage volume

B.

Creating a webhook that will trigger on VM shutdown API calls and upload the requested files from the volume attached to the VM into the object-defined storage service

C.

An API of the object-defined storage service that will scrape the stopped VM disk and self-upload the required files as objects

D.

A script embedded on the stopping VM's OS that will upload the logs on system shutdown

Buy Now
Questions 65

A developer is building an application that has multiple microservices that need to communicate with each other. The developer currently manually updates the IP address of each service. Which of the following best resolves the communication issue and automates the process?

Options:

A.

Service discovery

B.

Fan-out

C.

Managed container services

D.

DNS

Buy Now
Questions 66

A company has ten cloud engineers working on different manual cloud deployments. In the past, engineers have had difficulty keeping deployments consistent. Which of the following is the best method to address this issue?

Options:

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Buy Now
Questions 67

A security team recently hired multiple interns who all need the same level of access. Which of the following controls should the security team implement to provide access to the

cloud environment with the least amount of overhead?

Options:

A.

MFA

B.

Discretionary access

C.

Local user access

D.

Group-based access control

Buy Now
Questions 68

A cloud administrator needs to distribute workloads across remote data centers for redundancy reasons. Which of the following deployment strategies would eliminate downtime, accelerate deployment, and remain cost efficient?

Options:

A.

In-place

B.

Rolling

C.

Blue-green

D.

Canary

Buy Now
Exam Code: CV0-004
Exam Name: CompTIA Cloud+ (2025)
Last Update: Feb 28, 2025
Questions: 229
CV0-004 pdf

CV0-004 PDF

$25.5  $84.99
CV0-004 Engine

CV0-004 Testing Engine

$30  $99.99
CV0-004 PDF + Engine

CV0-004 PDF + Testing Engine

$40.5  $134.99