Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CV0-004 Questions and Answers

Question # 6

A cloud engineer is extending on-premises services to a public cloud. The following design requirements must be considered in the overall solution:

" The ability to remotely connect systems from both environments

• No IP address conflicts or overlap

• Cost-effectiveness

Which of the following cloud network concepts best meets these requirements?

A.

Dedicated connection

B.

VPN

C.

VLAN

D.

ACL

Full Access
Question # 7

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

INSTRUCTIONS

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

Web app 1

Web app 2

Web app 3

Web app 4

Client app

Full Access
Question # 8

Which of the transfer when comparing a multiregional to a single-region cloud platform design?

A.

Storage

B.

Power and cooling

C.

Network

D.

Compliance and regulation

Full Access
Question # 9

Which of the following describes the main difference between public and private container repositories?

A.

Private container repository access requires authorization, while public repository access does not require authorization.

B.

Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.

C.

Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.

D.

Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.

Full Access
Question # 10

A company needs to deploy its own code directly in the cloud without provisioning additional infrastructure. Which of the following is the best cloud service model for the company to use?

A.

PaaS

B.

SaaS

C.

laaS

D.

XaaS

Full Access
Question # 11

Which of the following is true of SSDs?

A.

SSDs do not have self-encrypting capabilities.

B.

SSDs have small storage capacities.

C.

SSDs can be used for high-IOP applications.

D.

SSDs are used mostly in cold storage.

Full Access
Question # 12

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

A.

Setting up private development, public development, and testing environments

B.

Segregating environments for internal and external teams

C.

Configuring DDoS protection to mitigate the risk of downtime

D.

Using IAM and ACL in order to bolster DLP

Full Access
Question # 13

An organization's critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of

a software web application:

"2021/12/18 09:33:12" "10. 34. 32.18" "104. 224. 123. 119" "POST / login.php?u=administrator&p=or%201%20=1"

"2021/12/18 09:33:13" "10.34. 32.18" "104. 224. 123.119" "POST /login. php?u=administrator&p=%27%0A"

"2021/12/18 09:33:14" "10. 34. 32.18" "104. 224. 123. 119" "POST /login. php?u=administrator&p=%26"

"2021/12/18 09:33:17" "10.34. 32.18" "104. 224. 123.119" "POST / login.php?u=administrator&p=%3B"

"2021/12/18 09:33:12" "10.34. 32. 18" "104. 224. 123. 119" "POST / login. php?u=admin&p=or%201%20=1"

"2021/12/18 09:33:19" "10.34.32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%27%0A"

"2021/12/18 09:33:21" "10. 34. 32.18" "104.224. 123.119" "POST / login. php?u=admin&p=%26"

"2021/12/18 09:33:23" "10. 34. 32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%3B"

Which of the following types of attacks occurred?

A.

SQL injection

B.

Cross-site scripting

C.

Reuse of leaked credentials

D.

Privilege escalation

Full Access
Question # 14

A customer's facility is located in an area where natural disasters happen frequently. The customer requires the following:

• Data resiliency due to exposure to frequent natural disasters

• Data localization because of privacy regulations in the country

• High availability

Which of the following cloud resources should be provisioned to meet these requirements?

A.

Storage in a separate data center located in same region

B.

An on-premises private cloud carrying duplicate data

C.

Storage in an availability zone outside the region

D.

Storage in the same availability zone as the primary data

Full Access
Question # 15

An organization's internal security team mandated that public cloud resources must be accessible only by a corporate VPN and not by direct public internet access. Which of the

following would achieve this objective?

A.

WAF

B.

ACL

C.

VPC

D.

SSH

Full Access
Question # 16

A company has developed an online trading platform. The engineering team selected event-based scaling for the platform's underlying resources. The platform resources scale up

with every 2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains

why this is the case?

A.

Event-based scaling does not scale down resources.

B.

Event-based scaling should not be triggered at the 2,000-user frequency.

C.

Event-based scaling should not track user subscriptions.

D.

Event-based scaling does not take resource load into account.

Full Access
Question # 17

A cloud deployment uses three different VPCs. The subnets on each VPC need to communicate with the others over private channels. Which of the following will achieve this objective?

A.

Deploying a load balancer to send traffic to the private IP addresses

B.

Creating peering connections between all VPCs

C.

Adding BGP routes using the VPCs' private IP addresses

D.

Establishing identical routing tables on all VPCs

Full Access
Question # 18

A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour. Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

A.

Use laC to deploy the laaS infrastructure.

B.

Convert the containers to VMs.

C.

Deploy the containers over SSH.

D.

Use private repositories for the containers.

Full Access
Question # 19

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

A.

Splicing

B.

Rotation

C.

Sampling

D.

Inspection

Full Access
Question # 20

A company has ten cloud engineers working on different manual following is the best method to address this issue?

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Full Access
Question # 21

A cloud developer needs to update a REST API endpoint to resolve a defect. When too many users attempt to call the API simultaneously, the following message is displayed:

Error: Request Timeout - Please Try Again Later

Which of the following concepts should the developer consider to resolve this error?

A.

Server patch

B.

TLS encryption

C.

Rate limiting

D.

Permission issues

Full Access
Question # 22

A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:

    secure connectivity that minimizes user login

    tracks user activity and monitors for anomalous activity

    requires secondary authentication

INSTRUCTIONS

Select controls and servers for the proper control points.

Full Access
Question # 23

An administrator used a script that worked in the past to create and tag five virtual machines. All of the virtual machines have been created: however, the administrator sees the following results:

{ tags: [ ] }

Which of the following is the most likely reason for this result?

A.

API throttling

B.

Service quotas

C.

Command deprecation

D.

Compatibility issues

Full Access
Question # 24

A systems engineer is migrating a batch of 25 VMs from an on-premises compute cluster to a public cloud using the public cloud's migration agent. The migration job shows data

copies at a rate of 250Mbps. After five servers migrate, the data copies at a rate of 25Mbps. Which of the following should the engineer review first to troubleshoot?

A.

The on-premises VM host hardware utilization

B.

The on-premises ISP throttling rate

C.

The IOPS on the SAN backing the on-premises cluster

D.

The compute utilization of the VMs being migrated

Full Access
Question # 25

An IT manager needs to deploy a cloud solution that meets the following requirements:

. Users must use two authentication methods to access resources.

· Each user must have 10GB of storage space by default.

Which of the following combinations should the manager use to provision these requirements?

A.

OAuth 2.0 and ephemeral storage

B.

OIDC and persistent storage

C.

MFA and storage quotas

D.

SSO and external storage

Full Access
Question # 26

A company operates a website that allows customers to upload, share, and retain full ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

A.

Sovereignty

B.

Data classification

C.

Litigation holds

D.

Retention

Full Access
Question # 27

A cloud administrator learns that a major version update. 4.6.0. is available for a business-critical application. The application is currently on version 4.5.2. with additional minor versions 3, 4, and 5 available. The administrator needs to perform the update while minimizing downtime. Which of the following should the administrator do first?

A.

Apply the minor updates and then restart the machine before applying the major update.

B.

During off hours, decommission the machine and create a new one directly on major update 4.6.0.

C.

Stop the service and apply the major updates directly.

D.

Create a test environment and apply the major update

Full Access
Question # 28

A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

A.

Modifying the subnet mask to 255 255 254.0 for IT and operations departments

B.

Configuring static routing to allow access from each subnet to 10.1.40.1

C.

Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network

D.

Configuring static routing to allow access from 10.1.30.1 to each subnet

E.

Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee

F.

Modifying the subnet mask to 255.255.255.128 for the IT and operations departments

Full Access
Question # 29

Which of the following would allow a cloud engineer to flatten a deeply nested JSON log to improve readability for analysts?

A.

Grafana

B.

Kibana

C.

Elasticsearch

D.

Logstash

Full Access
Question # 30

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production

environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

A.

Canary

B.

Blue-green

C.

Rolling

D.

In-place

Full Access
Question # 31

Which of the following Al/ML technologies consumes text input to discern tone?

A.

Text recognition

B.

Computer vision

C.

Visual recognition

D.

Sentiment analysis

Full Access
Question # 32

Which of the following integration systems would best reduce unnecessary network traffic by allowing data to travel bidirectionally and facilitating real-time results for developers who need to display critical information within applications?

A.

REST API

B.

RPC

C.

GraphQL

D.

Web sockets

Full Access
Question # 33

An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements:

• Is simple and fast

• Can be performed on two Identical platforms

Which of the following strategies should the engineer use?

A.

Blue-green

B.

Canary

C.

Rolling

D.

in-place

Full Access
Question # 34

A cloud administrator needs to distribute workloads across remote data centers for redundancy reasons. Which of the following deployment strategies would eliminate downtime, accelerate deployment, and remain cost efficient?

A.

In-place

B.

Rolling

C.

Blue-green

D.

Canary

Full Access
Question # 35

A cloud solutions architect needs to design a solution that will collect a report and upload it to an object storage service every time a virtual machine is gracefully or non-gracefully

stopped. Which of the following will best satisfy this requirement?

A.

An event-driven architecture that will send a message when the VM shuts down to a log-collecting function that extracts and uploads the log directly from the storage volume

B.

Creating a webhook that will trigger on VM shutdown API calls and upload the requested files from the volume attached to the VM into the object-defined storage service

C.

An API of the object-defined storage service that will scrape the stopped VM disk and self-upload the required files as objects

D.

A script embedded on the stopping VM's OS that will upload the logs on system shutdown

Full Access
Question # 36

An engineer wants lo scale several cloud workloads on demand. Which of the following approaches is the most suitable?

A.

Load

B.

Scheduled

C.

Manual

D.

Trending

Full Access
Question # 37

A systems administrator notices a surge of network traffic is coming from the monitoring server. The administrator discovers that large amounts of data are being downloaded to an external source. While investigating, the administrator reviews the following logs:

Which of the following ports has been compromised?

A.

Port 20

B.

Port 22

C.

Port 443

D.

Port 4443

E.

Port 8048

Full Access
Question # 38

A SaaS provider introduced new software functionality for customers as part of quarterly production enhancements. After an update is implemented, users cannot locate certain transactions from an inbound integration. During the investigation, the application owner finds the following error in the logs:

Error: REST API - Deprecated call is no longer supported in this release.

Which of the following is the best action for the application owner to take to resolve the issue?

A.

Update the custom integration to use a supported function.

B.

Include the custom integration in the quarterly testing scope.

C.

Ask the users to monitor the quarterly updates.

D.

Revert the application to the last stable quarterly release.

Full Access
Question # 39

A cloud engineer is concerned about command-and-control (C2) communication out of a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify the type of communication?

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron listing connections

D.

Traffic mirroring

Full Access
Question # 40

For compliance purposes, a cloud developer at an insurance company needs to save all customer policies for more than ten years. Which of the following options is the most cost-

efficient tier to save the data in the cloud?

A.

Archive

B.

Hot

C.

Cold

D.

Warm

Full Access
Question # 41

Which of the following cloud deployment models is the best way to replicate a workload non-disruptively between on-premises servers and a public cloud?

A.

Public

B.

Community

C.

Private

D.

Hybrid

Full Access
Question # 42

A cloud administrator is building a company-standard VM image, which will be based on a public image. Which of the following should the administrator implement to secure the image?

A.

ACLs

B.

Least privilege

C.

Hardening

D.

Vulnerability scanning

Full Access
Question # 43

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

Full Access
Question # 44

An administrator needs to adhere to the following requirements when moving a customer's data to the cloud:

• The new service must be geographically dispersed.

• The customer should have local access to data

• Legacy applications should be accessible.

Which of the following cloud deployment models is most suitable?

A.

On-premises

B.

Private

C.

Hybrid

D.

Public

Full Access
Question # 45

Which of the following strategies requires the development of new code before an application can be successfully migrated to a cloud provider?

A.

Refactor

B.

Rearchitect

C.

Rehost

D.

Replatform

Full Access
Question # 46

A developer is building an application that has multiple microservices that need to communicate with each other. The developer currently manually updates the IP address of each service. Which of the following best resolves the communication issue and automates the process?

A.

Service discovery

B.

Fan-out

C.

Managed container services

D.

DNS

Full Access
Question # 47

A company wants to optimize cloud resources and lower the overhead caused by managing multiple operating systems. Which of the following compute resources would be best to help to achieve this goal?

A.

VM

B.

Containers

C.

Remote desktops

D.

Bare-metal servers

Full Access
Question # 48

A company's man web application is no longer accessible via the internet. The cloud administrator investigates and discovers the application is accessible locally and only via an IP access. Which of the following was misconfigured?

A.

IP

B.

DHCP

C.

NAT

D.

DNS

Full Access
Question # 49

Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year.

Which of the following is this an example of?

A.

Recoverability

B.

Retention

C.

Encryption

D.

Integrity

Full Access
Question # 50

A company migrated its CRM system to a SaaS solution. The security team is updating the RAG matrix for the newly migrated CRM. Given the following table:

Which of the following responsibility assignments best aligns with the shared responsibility model for the new CRM?

A.

Data-center security

B.

CRM software security

C.

CRM server patching

D.

CRM development life cycle

Full Access
Question # 51

An organization wants to ensure its data is protected in the event of a natural disaster. To support this effort, the company has rented a colocation space in another part of the

country. Which of the following disaster recovery practices can be used to best protect the data?

A.

On-site

B.

Replication

C.

Retention

D.

Off-site

Full Access
Question # 52

A cloud administrator is working on the deployment of an e-commerce website. The administrator evaluates the scaling methods to be implemented when seasonal or flash sales are launched. Which of the following scaling approaches should the administrator use to best manage this scenario?

A.

Scheduled

B.

Load

C.

Event

D.

Trending

Full Access
Question # 53

Which of the following cloud deployment strategies is best for an organization that wants to run open-source workloads with other organizations that are sharing the cost?

A.

Community

B.

Public

C.

Hybrid

D.

Private

Full Access
Question # 54

A newly configured VM fails to run application updates despite having internet access. The updates download automatically from a third-party network. Given the following output:

Which of the following troubleshooting steps would be best to take?

A.

Checking DNS configurations

B.

Reconfiguring routing protocols

C.

Testing the IP address configuration

D.

Running a trace to the router

Full Access
Question # 55

A cloud security analyst is investigating the impact of a recent cyberattack. The analyst is reviewing the following information:

Web server access log:

104.210.233.225 - - [21/10/2022:11:17: 40] "POST /uploadfile.html?f=myfile.php" 200 1638674

45.32.10.66 - - [21/10/2022:11:19:12] "GET /welcome.html" 200 5812

104.210.233.225 - - [21/10/2022:11:21:19] "GET / .. / .. / .. / .. /conf/server.xml HTTP/1.1" 200 74458

45.32.10.66 - - [21/10/22:11:22:32] "GET /admin.html HTTP/1.1" 200 9518

Web application firewall log:

"2022/10/21 11:17:33" "10.25.2.35" "104. 210.233.225" "userl" "File transfer completed successfully."

"2022/10/21 11:21:05" "10. 25.2. 35" "104. 210.233.225" "userl" "Accessed application page."

"2022/10/21 11:22:13" "10.25.2.35" "45. 32. 10. 66" "user2" "Accessing admin page. "

Which of the following has occurred?

A.

The corporate administration page was defaced by the attacker.

B.

A denial-of-service attack was successfully performed on the web server.

C.

A new user was created on the web server by the attacker.

D.

Sensitive information from the corporate web server was leaked.

Full Access
Question # 56

A company requests that its cloud administrator provision virtual desktops for every user. Given the following information:

• One hundred users are at the company.

• A maximum of 30 users work at the same time.

• Users cannot be interrupted while working on the desktop.

Which of the following strategies will reduce costs the most?

A.

Provisioning VMs of varying sizes to match user needs

B.

Configuring a group of VMs to share with multiple users

C.

Using VMs that have spot availability

D.

Setting up the VMs to turn off outside of business hours at night

Full Access
Question # 57

An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?

A.

Warm

B.

Hot

C.

Archive

D.

Cold

Full Access
Question # 58

Which of the following network protocols is generally used in a NAS environment?

A.

BGP

B.

RDP

C.

TCP/IP

D.

iSCSI

Full Access
Question # 59

A cloud solutions architect is designing a VM-based solution that requires reducing the cost as much as possible. Which of the following solutions will best satisfy this requirement?

A.

Using ephemeral storage on replicated VMs

B.

Creating Spot VMs in one availability zone

C.

Spreading the VMs across different regions

D.

Using provisioned IOPS storage

Full Access
Question # 60

A cloud engineer wants containers to run the latest version of a container base image to reduce the number of vulnerabilities. The applications in use requite Python 3.10 and ate not compatible with any other version. The containers' images are created every time a new version is released from the source image. Given the container Dockerfile below:

Which of the following actions will achieve the objectives with the least effort?

A.

Perform docker pull before executing docker run.

B.

Execute docker update using a local cron to get the latest container version.

C.

Change the image to use python:latest on the image build process.

D.

Update the Dockerfile to pin the source image version.

Full Access
Question # 61

An administrator received a report that company data has been compromised. The compromise occurred on a holiday, and no one in the organization was working. While reviewing

the logs from the holiday, the administrator noted the following details:

The most appropriate action for the cloud security analyst to recommend is using CIS-hardened images. These images are pre-configured by the Center for Internet Security to provide security benchmark standards that help in mitigating vulnerabilities in publicly available container images. References: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Security Posture

Which of the following accounts should the administrator disable to prevent a further breach?

A.

Cloud administrator

B.

Human resources manager

C.

Security engineer

D.

Software developer

Full Access
Question # 62

A systems administrator is configuring backups on a VM and needs the process to run as quickly as possible, reducing the bandwidth on the network during all times from Monday through Saturday. In the event of data corruption, the management team expects the mean time to recovery to be as low as possible. Which of the following backup methods can the administrator use to accomplish these goals?

A.

Incremental backup daily to the cloud

B.

Full backup on Sunday and incremental backups on all other days of the week

C.

Differential backup daily to the cloud

D.

Incremental backups during off-hours on Monday, Wednesday, and Friday

Full Access
Question # 63

A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to

recommend?

A.

Using CIS-hardened images

B.

Using watermarked images

C.

Using digitally signed images

D.

Using images that have an application firewall

Full Access
Question # 64

A cloud developer receives a security vulnerability scan report and needs to analyze and record the true positives. Which of the following vulnerability management steps is this an example of?

A.

Assessment

B.

Identification

C.

Scanning scope

D.

Remediation

Full Access
Question # 65

A cloud engineer wants to implement a disaster recovery strategy that:

. Is cost-effective.

. Reduces the amount of data loss in case of a disaster.

. Enables recovery with the least amount of downtime.

Which of the following disaster recovery strategies best describes what the cloud engineer wants to achieve?

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Full Access
Question # 66

A developer is sending requests to a SaaS application. The developer becomes unable to send more requests after sending a number of them, but other developers can still send requests. Which of the following is most likely causing the issue?

A.

Partial outage

B.

API throttling

C.

Rate limiting

D.

Service quota

Full Access
Question # 67

A group of cloud administrators frequently uses the same deployment template to recreate a cloud-based development environment. The administrators are unable to go back and

review the history of changes they have made to the template. Which of the following cloud resource deployment concepts should the administrator start using?

A.

Drift detection

B.

Repeatability

C.

Documentation

D.

Versioning

Full Access
Question # 68

An organization is hosting a seminar with eight individuals who need to connect to their own dedicated VM. The technician used the following VM configurations:

IP address: DHCP

NIC: 1Gbps

Network: 10.1.10.0/29

Several users are unable to access their VMs. Which of the following best describes the reason?

A.

Not enough addresses are available.

B.

The routes are misconfigured.

C.

Too much traffic is on the network.

D.

DHCP is not working correctly on the VM.

Full Access