Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA Cloud+ (V4)

Last Update 23 hours ago Total Questions : 254

The CompTIA Cloud+ (V4) content is now fully updated, with all current exam questions added 23 hours ago. Deciding to include CV0-004 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CV0-004 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CV0-004 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CompTIA Cloud+ (V4) practice test comfortably within the allotted time.

Question # 31

An organization ' s critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of

a software web application:

" 2021/12/18 09:33:12 " " 10. 34. 32.18 " " 104. 224. 123. 119 " " POST / login.php?u=administrator & p=or%201%20=1 "

" 2021/12/18 09:33:13 " " 10.34. 32.18 " " 104. 224. 123.119 " " POST /login. php?u=administrator & p=%27%0A "

" 2021/12/18 09:33:14 " " 10. 34. 32.18 " " 104. 224. 123. 119 " " POST /login. php?u=administrator & p=%26 "

" 2021/12/18 09:33:17 " " 10.34. 32.18 " " 104. 224. 123.119 " " POST / login.php?u=administrator & p=%3B "

" 2021/12/18 09:33:12 " " 10.34. 32. 18 " " 104. 224. 123. 119 " " POST / login. php?u=admin & p=or%201%20=1 "

" 2021/12/18 09:33:19 " " 10.34.32.18 " " 104. 224. 123.119 " " POST / login. php?u=admin & p=%27%0A "

" 2021/12/18 09:33:21 " " 10. 34. 32.18 " " 104.224. 123.119 " " POST / login. php?u=admin & p=%26 "

" 2021/12/18 09:33:23 " " 10. 34. 32.18 " " 104. 224. 123.119 " " POST / login. php?u=admin & p=%3B "

Which of the following types of attacks occurred?

A.

SQL injection

B.

Cross-site scripting

C.

Reuse of leaked credentials

D.

Privilege escalation

Question # 32

An administrator needs to provide a backup solution for a cloud infrastructure that enables the resources to run from another data center in case of a outage. Connectivity to the

backup data center is via a third-party, untrusted network. Which of the following is the most important feature required for this solution?

A.

Deduplication

B.

Replication

C.

Compression

D.

Encryption

E.

Labeling

Question # 33

Which of the following network types allows the addition of new features through the use of network function virtualization?

A.

Local area network

B.

Wide area network

C.

Storage area network

D.

Software-defined network

Question # 34

A company has solid, validated border protection including a next-generation firewall and IPS. However, compromises and breaches continue. Which of the following is the best way to improve the company ' s security controls and reduce the number of incidents?

A.

Assess the border protection assets against a CIS benchmark and apply recommendations.

B.

Execute a network scan on the border protection and close ports that can be used by attackers.

C.

Shift the focus from border protection to a Zero Trust architecture focused on identities.

D.

Include a WAF on the network border, increasing protection and adopting security in layers.

Question # 35

A web server hosted in a PaaS public cloud platform has been the target of DDoS attacks. A cloud engineer needs to protect the server from future volumetric DDoS attacks. Which of the following are the best actions for the engineer to take? (Select two.)

A.

Add a CDN in front of the web server.

B.

Add a DLP on the PaaS platform.

C.

Add a hardened web server instance.

D.

Add an ACL to the web server network.

E.

Add an IDS in-line on the web server network.

F.

Add a WAF in front of the web server.

Question # 36

A system surpasses 75% to 80% of resource consumption. Which of the following scaling approaches is the most appropriate?

A.

Trending

B.

Manual

C.

Load

D.

Scheduled

Question # 37

A company has one cloud-based web server that is prone to downtime during maintenance. Which ot the following should the cloud engineer add to ensure high availability?

A.

A redundant web server behind a load balancer

B.

A backup cloud web server

C.

A secondary network link to the web server

D.

An autoscaling feature on the web server

Question # 38

A CI/CD pipeline is used to deploy VMs to an laaS environment. Which of the following can be used to harden the operating system once the VM is running?

A.

Docker

B.

Kubernetes

C.

Git

D.

Ansible

Question # 39

A cloud deployment uses three different VPCs. The subnets on each VPC need to communicate with the others over private channels. Which of the following will achieve this objective?

A.

Deploying a load balancer to send traffic to the private IP addresses

B.

Creating peering connections between all VPCs

C.

Adding BGP routes using the VPCs ' private IP addresses

D.

Establishing identical routing tables on all VPCs

Question # 40

A government agency in the public sector is considering a migration from on premises to the cloud. Which of the following are the most important considerations for this cloud migration? (Select two).

A.

Compliance

B.

laaS vs. SaaS

C.

Firewall capabilities

D.

Regulatory

E.

Implementation timeline

F.

Service availability

Go to page: