Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA Cloud+ (V4)

Last Update 23 hours ago Total Questions : 254

The CompTIA Cloud+ (V4) content is now fully updated, with all current exam questions added 23 hours ago. Deciding to include CV0-004 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CV0-004 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CV0-004 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CompTIA Cloud+ (V4) practice test comfortably within the allotted time.

Question # 41

Which of the following interfaces is most commonly used for SSDs but not for HDDs?

A.

NVMe

B.

Serial Attached SCSI (SAS)

C.

SATA

D.

iSCSI

Question # 42

An organization is hosting a seminar with eight individuals who need to connect to their own dedicated VM. The technician used the following VM configurations:

IP address: DHCP

NIC: 1Gbps

Network: 10.1.10.0/29

Several users are unable to access their VMs. Which of the following best describes the reason?

A.

Not enough addresses are available.

B.

The routes are misconfigured.

C.

Too much traffic is on the network.

D.

DHCP is not working correctly on the VM.

Question # 43

A cloud engineer wants resource-level visibility for billing reports. Which of the following should the cloud engineer configure?

A.

Rightsizing

B.

Invoicing

C.

Reserve instances

D.

Tagging

Question # 44

A company’s cybersecurity team receives the following alert that a production VM was deleted from the virtual network:

21 September 09:19:08 (GMT-5)

Resource with ID: PROD-WEB001 was deleted by User: Logging Service

The console to manage virtual network resources uses directory authentication. Only users in a particular directory group can interactively access the virtual network management console. The logging service account is not part of this group and requires some local administration privileges to aggregate logs from various resources. The cybersecurity team discovers the logging service account was previously given full directory administrator privileges and sees the following entry:

21 September 09:10:55 (GMT-5)

User with ID: Logging Service was added to the Group: VNet Console Administrators by actor: Logging Service.

The cybersecurity team removes the compromised service account from the directory group. Which of the following should the cybersecurity team do next to prevent repeat instances of this issue?

A.

Enable two-factor authentication on the virtual network console.

B.

Reset the logging service account to use a long and complex password.

C.

Disable RDP on the production virtual machines.

D.

Create a scoped administrative role for the logging service account.

Question # 45

A cloud administrator shortens the amount of time a backup runs. An executive in the company requires a guarantee that the backups can be restored with no data loss. Which of th€ following backup features should the administrator lest for?

A.

Encryption

B.

Retention

C.

Schedule

D.

Integrity

Question # 46

A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the

following migration strategies is best approach for this use case?

A.

Retire

B.

Rearchitect

C.

Refactor

D.

Rehost

Question # 47

A company that has several branches worldwide needs to facilitate full access to a specific cloud resource to a branch in Spain. Other branches will have only read access. Which of

the following is the best way to grant access to the branch in Spain?

A.

Set up MFA for the users working at the branch.

B.

Create a network security group with required permissions for users in Spain.

C.

Apply a rule on the WAF to allow only users in Spain access to the resource.

D.

Implement an IPS/IDS to detect unauthorized users.

Question # 48

Which of the following would allow a cloud engineer to flatten a deeply nested JSON log to improve readability for analysts?

A.

Grafana

B.

Kibana

C.

Elasticsearch

D.

Logstash

Question # 49

Two CVEs are discovered on servers in the company ' s public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which

of the following actions would be the best way to mitigate the vulnerabilities?

A.

Patching the operating systems

B.

Upgrading the operating systems to the latest beta

C.

Encrypting the operating system disks

D.

Disabling unnecessary open ports

Question # 50

A cloud service provider just launched a new serverless service that is compliant with all security regulations. A company deployed its code using the service, and the company ' s application was hacked due to leaked credentials. Which of the following is responsible?

A.

Customer

B.

Cloud service provider

C.

Hacker

D.

Code repository

Go to page: