Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA Cloud+ (V4)

Last Update 23 hours ago Total Questions : 254

The CompTIA Cloud+ (V4) content is now fully updated, with all current exam questions added 23 hours ago. Deciding to include CV0-004 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CV0-004 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CV0-004 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CompTIA Cloud+ (V4) practice test comfortably within the allotted time.

Question # 61

A security analyst confirms a zero-day vulnerability was exploited by hackers who gained access to confidential customer data and installed ransomware on the server Which of the following steps should the security analyst take? (Select two).

A.

Contact the customers to inform them about the data breach.

B.

Contact the hackers to negotiate payment lo unlock the server.

C.

Send a global communication to inform all impacted users.

D.

Inform the management and legal teams about the data breach

E.

Delete confidential data used on other servers that might be compromised.

F.

Modify the firewall rules to block the IP addresses and update the ports.

Question # 62

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A – The end user accesses the application through a web browser to enter and view clinical data.

2A – The CTM application server reads/writes data to/from the database server.

1B – The end user accesses the application through a web browser to run reports on clinical data.

2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B – The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 63

An IT manager is migrating the production environment to the cloud but needs to keep control of the operating systems, patches, and settings of all resources. Which of the following deployment models will best meet the requirements?

A.

FaaS

B.

PaaS

C.

laaS

D.

SaaS

Question # 64

A cloud engineer is receiving multiple alerts from the infrastructure monitoring agent. The alerts state that all the VMs in the public subnet are at 100% CPU utilization. However, when the engineer checks the network utilization of the VMs, the network throughput is at normal levels. Which of the following is the most likely cause of this issue?

A.

Ransomware

B.

Cryptojacking

C.

DDoS

D.

Zombie instances

Question # 65

A cloud engineer wants to run a script that increases the volume storage size if it is below 100GB. Which of the following should the engineer run?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question # 66

Which of the following migration types is best to use when migrating a highly available application, which is normally hosted on a local VM cluster, for usage with an external user population?

A.

Cloud to on-premises

B.

Cloud to cloud

C.

On-premises to cloud

D.

On-premises to on-premises

Question # 67

A cloud engineer is exploring options to reduce the management overhead of the servers and network. Which of the following cloud service models should the engineer implement?

A.

SaaS

B.

XaaS

C.

PaaS

D.

laaS

Question # 68

A cloud administrator wants to provision a host with two VMs. The VMs require the following:

After configuring the servers, the administrator notices that during certain hours of the day, the performance heavily degrades. Which of the following is the best explanation?

A.

The host requires additional physical CPUs.

B.

A higher number of processes occur at those times.

C.

The RAM on each VM is insufficient.

D.

The storage is overutilized.

Question # 69

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

A.

Disk I/O

B.

Network packets

C.

Average memory utilization

D.

Percent of CPU utilization

Question # 70

A log-parsing application requires significant processing power to ingest the logs streaming from web servers. The engineering team presents the cloud architect with four proposals

using the same underlying hardware. Which of the following should the cloud architect select in order to minimize the impact of an instance failure while keeping the cost as low as

possible?

A.

Four instances of 4vCPU, 8GB RAM, 80GB SSD

B.

Four instances of 4vCPU, 8GB RAM, 80GB HDD

C.

Two instances of 8vCPU, 16GB RAM, 80GB SSD

D.

Two instances of 8vCPU, 16GB RAM, 80GB HDD

Go to page: