Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CV0-004 CompTIA Cloud+ (V4) Questions and Answers

Questions 4

A junior cloud administrator was recently promoted to cloud administrator and has been added to the cloud administrator group. The cloud administrator group is the only one that can access the engineering VM. The new administrator unsuccessfully attempts to access the engineering VM. However, the other administrators can access it without issue. Which of the following is the best way to identify the root cause?

Options:

A.

Rebooting the engineering VM

B.

Reviewing the administrator's permissions to access the engineering VM

C.

Allowing connections from 0.0.0.070 to the engineering VM

D.

Performing a packet capture on the engineering VM

Buy Now
Questions 5

A banking firm's cloud server will be decommissioned after a successful proof of concept using mirrored data. Which of the following is the best action to take regarding the storage used on the decommissioned server?

Options:

A.

Keep it temporarily.

B.

Archive it.

C.

Delete it.

D.

Retain it permanently

Buy Now
Questions 6

An organization's web application experiences penodic bursts of traffic when a new video is launched. Users are reporting poor performance in the middle of the month. Which of the following scaling approaches should the organization use to scale based on forecasted traffic?

Options:

A.

Scheduled

B.

Manual

C.

Event

D.

Load

Buy Now
Questions 7

Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?

Options:

A.

Scanning

B.

Assessment

C.

Remediation

D.

Identification

Buy Now
Questions 8

A cloud engineer wants to replace the current on-premises. unstructured data storage with a solution in the cloud. The new solution needs to be cost-effective and highly scalable. Which of the following types of storage would be best to use?

Options:

A.

File

B.

Block

C.

Object

D.

SAN

Buy Now
Questions 9

Which of the following network protocols is generally used in a NAS environment?

Options:

A.

BGP

B.

RDP

C.

TCP/IP

D.

iSCSI

Buy Now
Questions 10

An administrator used a script that worked in the past to create and tag five virtual machines. All of the virtual machines have been created: however, the administrator sees the following results:

{ tags: [ ] }

Which of the following is the most likely reason for this result?

Options:

A.

API throttling

B.

Service quotas

C.

Command deprecation

D.

Compatibility issues

Buy Now
Questions 11

A newly configured VM fails to run application updates despite having internet access. The updates download automatically from a third-party network. Given the following output:

CV0-004 Question 11

Which of the following troubleshooting steps would be best to take?

Options:

A.

Checking DNS configurations

B.

Reconfiguring routing protocols

C.

Testing the IP address configuration

D.

Running a trace to the router

Buy Now
Questions 12

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

Options:

A.

VPC

B.

Application load balancer

C.

CDN

D.

API gateway

Buy Now
Questions 13

A cloud engineer is concerned about command-and-control (C2) communication out of a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify the type of communication?

Options:

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron listing connections

D.

Traffic mirroring

Buy Now
Questions 14

A cloud server needs to automatically allocate more resources during sudden peak times. This allocation does not need to occur in regular intervals. Which of the following scaling

approaches should be used?

Options:

A.

Event

B.

Manual

C.

Trending

D.

Scheduled

Buy Now
Questions 15

A developer is building a new application version using a CI/CD pipeline. The developer receives the following error message log when the build fails:

CV0-004 Question 15

Which of the following is the most likely cause of this failure?

Options:

A.

Incorrect version

B.

Test case failure

C.

Broken build pipeline

D.

Dependency issue

Buy Now
Questions 16

Which of the following do developers use to keep track of changes made during software development projects?

Options:

A.

Code drifting

B.

Code control

C.

Code testing

D.

Code versioning

Buy Now
Questions 17

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

Options:

A.

Rehost

B.

Rearchitect

C.

Refactor

D.

Retain

Buy Now
Questions 18

A cloud solutions architect needs to design a solution that will collect a report and upload it to an object storage service every time a virtual machine is gracefully or non-gracefully

stopped. Which of the following will best satisfy this requirement?

Options:

A.

An event-driven architecture that will send a message when the VM shuts down to a log-collecting function that extracts and uploads the log directly from the storage volume

B.

Creating a webhook that will trigger on VM shutdown API calls and upload the requested files from the volume attached to the VM into the object-defined storage service

C.

An API of the object-defined storage service that will scrape the stopped VM disk and self-upload the required files as objects

D.

A script embedded on the stopping VM's OS that will upload the logs on system shutdown

Buy Now
Questions 19

A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the

following migration strategies is best approach for this use case?

Options:

A.

Retire

B.

Rearchitect

C.

Refactor

D.

Rehost

Buy Now
Questions 20

Which of the following is an auditing procedure that ensures service providers securely manage the data to protect the interests of the organization and the privacy of its clients?

Options:

A.

CIS

B.

ITIL

C.

SOC2

D.

ISO 27001

Buy Now
Questions 21

A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

CV0-004 Question 21

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

Options:

A.

Modifying the subnet mask to 255 255 254.0 for IT and operations departments

B.

Configuring static routing to allow access from each subnet to 10.1.40.1

C.

Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network

D.

Configuring static routing to allow access from 10.1.30.1 to each subnet

E.

Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee

F.

Modifying the subnet mask to 255.255.255.128 for the IT and operations departments

Buy Now
Questions 22

An organization's security policy states that software applications should not exchange sensitive data in cleartext. The security analyst is concerned about a software application that uses Base64 to encode credit card data. Which of the following would be the best algorithm to replace Base64?

Options:

A.

3DES

B.

AES

C.

RC4

D.

SHA-3

Buy Now
Questions 23

A SaaS provider introduced new software functionality for customers as part of quarterly production enhancements. After an update is implemented, users cannot locate certain transactions from an inbound integration. During the investigation, the application owner finds the following error in the logs:

Error: REST API - Deprecated call is no longer supported in this release.

Which of the following is the best action for the application owner to take to resolve the issue?

Options:

A.

Update the custom integration to use a supported function.

B.

Include the custom integration in the quarterly testing scope.

C.

Ask the users to monitor the quarterly updates.

D.

Revert the application to the last stable quarterly release.

Buy Now
Questions 24

An administrator needs to provide a backup solution for a cloud infrastructure that enables the resources to run from another data center in case of a outage. Connectivity to the

backup data center is via a third-party, untrusted network. Which of the following is the most important feature required for this solution?

Options:

A.

Deduplication

B.

Replication

C.

Compression

D.

Encryption

E.

Labeling

Buy Now
Questions 25

A write-intensive workload is having frequent performance issues. The workload is running on pay-as-you-go VMs. These VMs use SSDs and have appropriate CPU and RAM sizes. The workload writes millions of small files and has a one-year retention requirement. Which of the following actions should be taken?

Options:

A.

Use provisioned IOPS volumes.

B.

Increase the VM size.

C.

Switch to reserved VMs.

D.

Change to ephemeral storage.

Buy Now
Questions 26

A manager wants information about which users signed in to a certain VM during the past month. Which of the following can the cloud administrator use to obtain this information?

Options:

A.

Retention

B.

Alerting

C.

Aggregation

D.

Collection

Buy Now
Questions 27

An organization's internal security team mandated that public cloud resources must be accessible only by a corporate VPN and not by direct public internet access. Which of the

following would achieve this objective?

Options:

A.

WAF

B.

ACL

C.

VPC

D.

SSH

Buy Now
Questions 28

A cloud engineer is concerned about command-and-control (C2) communication leaving a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify this type of communication?

Options:

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron jobs listing connections

D.

Traffic mirroring

Buy Now
Questions 29

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

Options:

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing

Buy Now
Questions 30

A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?

Options:

A.

Analyze

B.

Report

C.

Remediation

D.

identification

Buy Now
Questions 31

An organization uses a cloud provider’s specific features to host applications. The organization planned to move to another cloud provider due to rising costs, but moving was not technically feasible. Which of the following best describes this situation?

Options:

A.

Platform as a service

B.

Oversubscription

C.

Vendor lock-in

D.

Regulatory compliance

Buy Now
Questions 32

A customer's facility is located in an area where natural disasters happen frequently. The customer requires the following:

• Data resiliency due to exposure to frequent natural disasters

• Data localization because of privacy regulations in the country

• High availability

Which of the following cloud resources should be provisioned to meet these requirements?

Options:

A.

Storage in a separate data center located in same region

B.

An on-premises private cloud carrying duplicate data

C.

Storage in an availability zone outside the region

D.

Storage in the same availability zone as the primary data

Buy Now
Questions 33

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to

calculate the severity of the risk from using this component?

Options:

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

Buy Now
Questions 34

Which of the following models will best reduce the cost of running short-term, non-critical workloads?

Options:

A.

Reserved

B.

Spot Instance

C.

Pay-as-you-go

D.

Dedicated host

Buy Now
Questions 35

A cloud administrator is working on the deployment of an e-commerce website. The administrator evaluates the scaling methods to be implemented when seasonal or flash sales are launched. Which of the following scaling approaches should the administrator use to best manage this scenario?

Options:

A.

Manually

B.

Load

C.

Event

D.

Trending

Buy Now
Questions 36

A cloud engineer was deploying the company's payment processing application, but it failed with the following error log:

ERFOR:root: Transaction failed http 429 response, please try again Which of the following are the most likely causes for this error? (Select two).

Options:

A.

API throttling

B.

API gateway outage

C.

Web server outage

D.

Oversubscription

E.

Unauthorized access

F.

Insufficient quota

Buy Now
Questions 37

A company has ten cloud engineers working on different manual cloud deployments. In the past, engineers have had difficulty keeping deployments consistent. Which of the following is the best method to address this issue?

Options:

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Buy Now
Questions 38

A company’s cybersecurity team receives the following alert that a production VM was deleted from the virtual network:

21 September 09:19:08 (GMT-5)

Resource with ID: PROD-WEB001 was deleted by User: Logging Service

The console to manage virtual network resources uses directory authentication. Only users in a particular directory group can interactively access the virtual network management console. The logging service account is not part of this group and requires some local administration privileges to aggregate logs from various resources. The cybersecurity team discovers the logging service account was previously given full directory administrator privileges and sees the following entry:

21 September 09:10:55 (GMT-5)

User with ID: Logging Service was added to the Group: VNet Console Administrators by actor: Logging Service.

The cybersecurity team removes the compromised service account from the directory group. Which of the following should the cybersecurity team do next to prevent repeat instances of this issue?

Options:

A.

Enable two-factor authentication on the virtual network console.

B.

Reset the logging service account to use a long and complex password.

C.

Disable RDP on the production virtual machines.

D.

Create a scoped administrative role for the logging service account.

Buy Now
Questions 39

An engineer wants lo scale several cloud workloads on demand. Which of the following approaches is the most suitable?

Options:

A.

Load

B.

Scheduled

C.

Manual

D.

Trending

Buy Now
Questions 40

An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements:

• Is simple and fast

• Can be performed on two Identical platforms

Which of the following strategies should the engineer use?

Options:

A.

Blue-green

B.

Canary

C.

Rolling

D.

in-place

Buy Now
Questions 41

A DevOps engineer is performing maintenance on the mail servers for a company's web application. Part of this maintenance includes checking core operating system updates. The servers are currently running version 3.2 of the operating system. The engineer has two update options—one to version 4.1 and the other to version 3.7. Both versions are fully supported by the operating system manufacturer. Which of the following best describes the action the engineer should take?

Options:

A.

Upgrade to 3.7 in the development environment.

B.

Upgrade to 4.1 on one production server at a time.

C.

Read the release notes on version 4.1.

D.

Schedule a maintenance window and upgrade to 3.7 in the production environment.

Buy Now
Questions 42

A cloud developer receives a security vulnerability scan report and needs to analyze and record the true positives. Which of the following vulnerability management steps is this an example of?

Options:

A.

Assessment

B.

Identification

C.

Scanning scope

D.

Remediation

Buy Now
Questions 43

Which of the following is used to deliver code quickly and efficiently across the development, test, and production environments?

Options:

A.

Snapshot

B.

Container image

C.

Serverless function

D.

VM template

Buy Now
Questions 44

A company serves customers globally from its website hosted in North America. A cloud engineer recently deployed new instances of the website in the Europe region. Which of the

following is the most likely reason?

Options:

A.

To simplify workflow

B.

To enhance security

C.

To reduce latency

D.

To decrease cost

Buy Now
Questions 45

An administrator is setting up a cloud backup solution that requires the following features:

• Cost effective

• Granular recovery

• Multilocation

Which of the following backup types best meets these requirements?

Options:

A.

Off-site, full, incremental, and differential

B.

Cloud site, full, and differential

C.

On-site. full, and incremental

D.

On-site. full, and differential

Buy Now
Questions 46

A cloud consultant needs to modernize a legacy application that can no longer address user demand and is expensive to maintain. Which of the following is the best migration

strategy?

Options:

A.

Retain

B.

Rehost

C.

Refactor

D.

Replatform

Buy Now
Questions 47

A company's man web application is no longer accessible via the internet. The cloud administrator investigates and discovers the application is accessible locally and only via an IP access. Which of the following was misconfigured?

Options:

A.

IP

B.

DHCP

C.

NAT

D.

DNS

Buy Now
Questions 48

An e-commerce store is preparing for an annual holiday sale. Previously, this sale has increased the number of transactions between two and ten times the normal level of

transactions. A cloud administrator wants to implement a process to scale the web server seamlessly. The goal is to automate changes only when necessary and with minimal cost.

Which of the following scaling approaches should the administrator use?

Options:

A.

Scale horizontally with additional web servers to provide redundancy.

B.

Allow the load to trigger adjustments to the resources.

C.

When traffic increases, adjust the resources using the cloud portal.

D.

Schedule the environment to scale resources before the sale begins.

Buy Now
Questions 49

Which of the following is used to detect signals and measure physical properties, such as the temperature of the human body?

Options:

A.

Beacon

B.

Transmission protocols

C.

Sensors

D.

Gateways

Buy Now
Questions 50

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

Options:

A.

Review the development network routing table.

B.

Change the ciphers on the site-to-site VPN.

C.

Restart the site-to-site VPN tunnel.

D.

Check the ACLS on the development workloads

Buy Now
Questions 51

Which of the transfer when comparing a multiregional to a single-region cloud platform design?

Options:

A.

Storage

B.

Power and cooling

C.

Network

D.

Compliance and regulation

Buy Now
Questions 52

A cloud engineer wants to deploy a new application to the cloud and is writing the following script:

CV0-004 Question 52

Which of the following actions will this script perform?

Options:

A.

Upload a new VM image.

B.

Create a new cloud resource.

C.

Build a local server.

D.

Import a cloud module.

Buy Now
Questions 53

A cloud solutions architect wants to deploy a three-tier web application that requires the minimum amount of operational overhead. Which of the following is the best template given these requirements?

Options:

A.

virtual_machine:

name: front-end vm

size: small

bootstrapping: git

repository: front-end-repo

autoScaling: enabled

object_storage:

name: query-handler

staticWebContent: disabled

versioning: enabled

virtual_machine:

name: db-vm

size: medium

bootstrapping: /bin/bash yum install -y psql

B.

object_storage:

name: front-end

staticWebContent: enabled

versioning: enabled

serverless_function:

name: app

runtime: nodejs

memorySize: 2G

code: git

repository: backend-repo

relational_database:

engine: postgreSQL

clusterNode: enabled

C.

virtual_machine:

name: three tiered app

size: xlarge

bootstrapping: /bin/bash yum install -y nodejs httpd psql && \

git clone three-tiered-app && \

./app.sh --listen 8443

autoScaling: enabled

load_balancer:

name: front-end-lb

target: three-tiered-app

targetPort: 8443

listener: 443

D.

object_storage:

name: front-end

staticWebContent: enabled

versioning: enabled

virtual_machine:

name: app-vm

size: small

bootstrapping: git

repository: backend-repo

autoScaling: enabled

relational_database:

engine: postgreSQL

clusterNode: enabled

Buy Now
Questions 54

A security analyst reviews the daily logs and notices the following suspicious activity:

CV0-004 Question 54

The analyst investigates the firewall logs and identities the following:

CV0-004 Question 54

Which of the following steps should the security analyst take next to resolve this issue? (Select two).

Options:

A.

Submit an IT support ticket and request Kali Linux be uninstalled from John Smith's computer

B.

Block all inbound connections on port 4444 and block the IP address 201.101.25.121.

C.

Contact John Smith and request the Ethernet cable attached to the desktop be unplugged

D.

Check the running processes to confirm if a backdoor connection has been established.

E.

Upgrade the Windows x64 operating system on John Smith's computer to the latest version.

F.

Block all outbound connections from the IP address 10.150.71.151.

Buy Now
Questions 55

An organization is hosting a seminar with eight individuals who need to connect to their own dedicated VM. The technician used the following VM configurations:

IP address: DHCP

NIC: 1Gbps

Network: 10.1.10.0/29

Several users are unable to access their VMs. Which of the following best describes the reason?

Options:

A.

Not enough addresses are available.

B.

The routes are misconfigured.

C.

Too much traffic is on the network.

D.

DHCP is not working correctly on the VM.

Buy Now
Questions 56

Which of the following reduces the chance of introducing a misconfiguration into cloud deployment templates?

Options:

A.

Performing a git fetch after every commit

B.

Opening pull requests for changes

C.

Using the web interface to update files

D.

Committing updates to the main branch

Buy Now
Questions 57

A systems administrator is configuring backups on a VM and needs the process to run as quickly as possible, reducing the bandwidth on the network during all times from Monday through Saturday. In the event of data corruption, the management team expects the mean time to recovery to be as low as possible. Which of the following backup methods can the administrator use to accomplish these goals?

Options:

A.

Incremental backup daily to the cloud

B.

Full backup on Sunday and incremental backups on all other days of the week

C.

Differential backup daily to the cloud

D.

Incremental backups during off-hours on Monday, Wednesday, and Friday

Buy Now
Questions 58

A user's assigned cloud credentials are locked, and the user is unable to access the project's application. The cloud administrator reviews the logs and notices several attempts to log in with the user's account were made to a different application after working hours. Which of the following is the best approach for the administrator to troubleshoot this issue?

Options:

A.

Create new credentials for the user and restrict access to the authorized application.

B.

Track the source of the log-in attempts and block the IP address of the source in the WAR

C.

Reset the user's account and implement a stronger lock-out policy.

D.

Install an IDS on the network to monitor suspicious activity

Buy Now
Questions 59

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

CV0-004 Question 59Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

CV0-004 Question 59Identify the problematic device(s).

Part 2:

CV0-004 Question 59Identify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

CV0-004 Question 59

CV0-004 Question 59

CV0-004 Question 59

CV0-004 Question 59

CV0-004 Question 59

CV0-004 Question 59

CV0-004 Question 59

CV0-004 Question 59

Part 2:

Only select a maximum of TWO options from the multiple choice question

CV0-004 Question 59

Options:

Buy Now
Questions 60

A CI/CD pipeline is used to deploy VMs to an laaS environment. Which of the following can be used to harden the operating system once the VM is running?

Options:

A.

Docker

B.

Kubernetes

C.

Git

D.

Ansible

Buy Now
Questions 61

Given the following command:

Sdocker pull images.comptia.org/user1/myimage:latest

Which of the following correctly identifies images.comptia.org?

Options:

A.

Image registry

B.

Image creator

C.

Image version

D.

Image name

Buy Now
Questions 62

A cloud administrator recently created three servers in the cloud. The goal was to create ACLs so the servers could not communicate with each other. The servers were configured

with the following IP addresses:

CV0-004 Question 62

After implementing the ACLs, the administrator confirmed that some servers are still able to reach the other servers. Which of the following should the administrator change to

prevent the servers from being on the same network?

Options:

A.

The IP address of Server 1 to 172.16.12.36

B.

The IP address of Server 1 to 172.16.12.2

C.

The IP address of Server 2 to 172.16.12.18

D.

The IP address of Server 2 to 172.16.14.14

Buy Now
Questions 63

A cloud engineer needs to integrate a new payment processor with an existing e-commerce website. Which of the following technologies is the best fit for this integration?

Options:

A.

RPC over SSL

B.

Transactional SQL

C.

REST API over HTTPS

D.

Secure web socket

Buy Now
Questions 64

Which of the following is the correct order of the steps to take when a system is suspected of being vulnerable?

Options:

A.

Scanning scope, identification, assessment, and remediation

B.

Assessment, identification, scanning scope, and remediation

C.

Identification, scanning scope, assessment, and remediation

D.

Assessment, scanning scope, identification, and remediation

Buy Now
Questions 65

Which of the following types of storage is read-only and is accessed only when needed?

Options:

A.

Cold

B.

Hot

C.

Warm

D.

Archive

Buy Now
Questions 66

A cloud engineer is receiving multiple alerts from the infrastructure monitoring agent. The alerts state that all the VMs in the public subnet are at 100% CPU utilization. However, when the engineer checks the network utilization of the VMs, the network throughput is at normal levels. Which of the following is the most likely cause of this issue?

Options:

A.

Ransomware

B.

Cryptojacking

C.

DDoS

D.

Zombie instances

Buy Now
Questions 67

A cloud engineer is in charge of deploying a platform in an laaS public cloud. The application tracks the state using session cookies, and there are no affinity restrictions. Which of

the following will help the engineer reduce monthly expenses and allow the application to provide the service?

Options:

A.

Resource metering

B.

Reserved resources

C.

Dedicated host

D.

Pay-as-you-go model

Buy Now
Questions 68

A cloud engineer is reviewing a disaster recovery plan that includes the following requirements:

• System state, files, and configurations must be backed up on a weekly basis.

• The system state, file, and configuration backups must be tested annually.

Which of the following backup methods should the engineer implement for the first week the plan is executed?

Options:

A.

Differential

B.

Incremental

C.

Snapshot

D.

Full

Buy Now
Questions 69

Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year.

Which of the following is this an example of?

Options:

A.

Recoverability

B.

Retention

C.

Encryption

D.

Integrity

Buy Now
Questions 70

An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?

Options:

A.

Warm

B.

Hot

C.

Archive

D.

Cold

Buy Now
Questions 71

A cloud engineer hardened the WAF for a company that operates exclusively in North America. The engineer did not make changes to any ports, and all protected applications have

continued to function as expected. Which of the following configuration changes did the engineer most likely apply?

Options:

A.

The engineer implemented MFA to access the WAF configurations.

B.

The engineer blocked all traffic originating outside the region.

C.

The engineer installed the latest security patches on the WAF.

D.

The engineer completed an upgrade from TLS version 1.1 to version 1.3.

Buy Now
Questions 72

A bank informs an administrator that changes must be made to backups for long-term reporting purposes. Which of the following is the most important change the administrator

should make to satisfy these requirements?

Options:

A.

Location of the backups

B.

Type of the backups

C.

Retention of the backups

D.

Schedule of the backups

Buy Now
Questions 73

A company wants to optimize cloud resources and lower the overhead caused by managing multiple operating systems. Which of the following compute resources would be best to help to achieve this goal?

Options:

A.

VM

B.

Containers

C.

Remote desktops

D.

Bare-metal servers

Buy Now
Questions 74

A company wants to create a few additional VDIs so support vendors and contractors have a secure method to access the company's cloud environment. When a cloud

administrator attempts to create the additional instances in the new locations, the operation is successful in some locations but fails in others. Which of the following is the

most likely reason for this failure?

Options:

A.

Partial service outages

B.

Regional service availability

C.

Service quotas

D.

Deprecation of functionality

Buy Now
Questions 75

Which of the following is a direct effect of cloud migration on an enterprise?

Options:

A.

The enterprise must reorganize the reporting structure.

B.

Compatibility issues must be addressed on premises after migration.

C.

Cloud solutions will require less resources than on-premises installations.

D.

Utility costs will be reduced on premises.

Buy Now
Questions 76

Which of the following describes the main difference between public and private container repositories?

Options:

A.

Private container repository access requires authorization, while public repository access does not require authorization.

B.

Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.

C.

Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.

D.

Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.

Buy Now
Exam Code: CV0-004
Exam Name: CompTIA Cloud+ (V4)
Last Update: Mar 30, 2026
Questions: 254

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CV0-004 testing engine

PDF (Q&A)

$43.57  $124.49
buy now CV0-004 pdf