Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA Cloud+ (V4)

Last Update 23 hours ago Total Questions : 254

The CompTIA Cloud+ (V4) content is now fully updated, with all current exam questions added 23 hours ago. Deciding to include CV0-004 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CV0-004 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CV0-004 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CompTIA Cloud+ (V4) practice test comfortably within the allotted time.

Question # 11

A cloud infrastructure administrator updated the IP tables to block incoming connections and outgoing responses to 104.225.110.203. Which of the following vulnerability management steps is this an example of?

A.

Scanning scope

B.

Remediation

C.

Identification

D.

Assessment

Question # 12

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to

calculate the severity of the risk from using this component?

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

Question # 13

A customer relationship management application, which is hosted in a public cloud laaS network, is vulnerable to a remote command execution vulnerability. Which of the following is

the best solution for the security engineer to implement to prevent the application from being exploited by basic attacks?

A.

IPS

B.

ACL

C.

DLP

D.

WAF

Question # 14

An administrator used a script that worked in the past to create and tag five virtual machines. All of the virtual machines have been created: however, the administrator sees the following results:

{ tags: [ ] }

Which of the following is the most likely reason for this result?

A.

API throttling

B.

Service quotas

C.

Command deprecation

D.

Compatibility issues

Question # 15

A cloud engineer is provisioning a new application that requires access to the organization ' s public cloud resources. Which of the following is the best way for the cloud engineer to authenticate the application?

A.

Access key

B.

API

C.

MFA token

D.

Username and Password

Question # 16

A company has ten cloud engineers working on different manual cloud deployments. In the past, engineers have had difficulty keeping deployments consistent. Which of the following is the best method to address this issue?

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Question # 17

Which of the following types of releases best describes the update made to a code repository production release when it changes from version 1.0 to version 1.1?

A.

Alpha

B.

Beta

C.

Minor

D.

Major

Question # 18

A cloud engineer hardened the WAF for a company that operates exclusively in North America. The engineer did not make changes to any ports, and all protected applications have

continued to function as expected. Which of the following configuration changes did the engineer most likely apply?

A.

The engineer implemented MFA to access the WAF configurations.

B.

The engineer blocked all traffic originating outside the region.

C.

The engineer installed the latest security patches on the WAF.

D.

The engineer completed an upgrade from TLS version 1.1 to version 1.3.

Question # 19

A company ' s engineering department is conducting a month-long test on the scalability of an in-house-developed software that requires a cluster of 100 or more servers. Which of

the following models is the best to use?

A.

PaaS

B.

SaaS

C.

DBaaS

D.

laaS

Question # 20

A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly experiencing high latency. Which of the following would best help determine the source of the latency?

A.

Configuring centralized logging to analyze HTTP requests

B.

Running a flow log on the network to analyze the packets

C.

Configuring an API gateway to track all incoming requests

D.

Enabling tracing to detect HTTP response times and codes

Go to page: