Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Cloud+ > CV0-004

CV0-004 CompTIA Cloud+ (V4) Question and Answers

Question # 4

Department supervisors have requested a report that will help them understand the utilization of cloud resources, make decisions about budgeting for the following year, and reduce

costs. Which of the following are the most important requisite steps to create the report? (Select two).

A.

Set the desired retention of resource logs.

B.

Configure application tracing.

C.

Integrate email alerts with ticketing software.

D.

Enable resource tagging.

E.

Configure the collection of performance/utilization logs.

F.

Configure metric threshold alerts.

Full Access
Question # 5

An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?

A.

Warm

B.

Hot

C.

Archive

D.

Cold

Full Access
Question # 6

A company experienced a data leak through its website. A security engineer, who is investigating the issue, runs a vulnerability scan against the website and receives the following output:

Which of the following is the most likely cause of this leak?

A.

RTMP port open

B.

SQL injection

C.

Privilege escalation

D.

Insecure protocol

Full Access
Question # 7

Which of the following types of storage provides the greatest performance advantage for a traditional relational database?

A.

File

B.

Object

C.

Block

D.

Ephemeral

Full Access
Question # 8

A cloud developer receives a security vulnerability scan report and needs to analyze and record the true positives. Which of the following vulnerability management steps is this an example of?

A.

Assessment

B.

Identification

C.

Scanning scope

D.

Remediation

Full Access
Question # 9

A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:

secure connectivity that minimizes user login

tracks user activity and monitors for anomalous activity

requires secondary authentication

INSTRUCTIONS

Select controls and servers for the proper control points.

Full Access
Question # 10

An administrator configures three subnets to the corporate network. All servers should communicate with the main corporate network and access the internet. The administrator creates the following configurations:

After configuring the networks, the administrator recognizes an issue with the configuration. Which of the following can the administrator change in one step to accomplish the goal?

A.

Remove source 192.168.12.0/24 and destination 192.168.1.0/24 from the routing table.

B.

Replace destination 192.168.1.0/24 with destination 192.168.0.0/24.

C.

Add source 192.168.12.0/24 and destination 192.168.0.0/24 to the routing table.

D.

Reconfigure Network 4 to 192.168.13.0/24.

Full Access
Question # 11

A company wants to optimize cloud resources and lower the overhead caused by managing multiple operating systems. Which of the following compute resources would be best to help to achieve this goal?

A.

VM

B.

Containers

C.

Remote desktops

D.

Bare-metal servers

Full Access
Question # 12

Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year.

Which of the following is this an example of?

A.

Recoverability

B.

Retention

C.

Encryption

D.

Integrity

Full Access
Question # 13

The performance of an e-commerce website decreases dramatically during random periods. The IT team is evaluating available resources to mitigate the situation. Which of the following is the best approach to effectively manage this scenario'?

A.

Migrating to a dedicated host

B.

Purchasing additional servers

C.

Scheduling resource allocation

D.

Configuring automatic elasticity

Full Access
Question # 14

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

A.

Disk I/O

B.

Network packets

C.

Average memory utilization

D.

Percent of CPU utilization

Full Access
Question # 15

Which of the following should be used on containers to process data and keep the output in files for later review?

A.

Standard output

B.

Optical disk mount

C.

Ephemeral storage

D.

Persistent volumes

Full Access
Question # 16

A systems engineer is migrating a batch of 25 VMs from an on-premises compute cluster to a public cloud using the public cloud's migration agent. The migration job shows data

copies at a rate of 250Mbps. After five servers migrate, the data copies at a rate of 25Mbps. Which of the following should the engineer review first to troubleshoot?

A.

The on-premises VM host hardware utilization

B.

The on-premises ISP throttling rate

C.

The IOPS on the SAN backing the on-premises cluster

D.

The compute utilization of the VMs being migrated

Full Access
Question # 17

A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

A.

Log retention

B.

Tracing

C.

Log aggregation

D.

Log rotation

E.

Hashing

F.

Encryption

Full Access
Question # 18

A security engineer Identifies a vulnerability m a containerized application. The vulnerability can be exploited by a privileged process to read tie content of the host's memory. The security engineer reviews the following Dockerfile to determine a solution to mitigate similar exploits:

Which of the following is the best solution to prevent similar exploits by privileged processes?

A.

Adding the USER myappuserinstruction

B.

Patching the host running the Docker daemon

C.

Changing FROM alpiner3.17 to FROM alpine:latest

D.

Running the container with the ready-only filesystem configuration

Full Access
Question # 19

An administrator needs to adhere to the following requirements when moving a customer's data to the cloud:

• The new service must be geographically dispersed.

• The customer should have local access to data

• Legacy applications should be accessible.

Which of the following cloud deployment models is most suitable?

A.

On-premises

B.

Private

C.

Hybrid

D.

Public

Full Access
Question # 20

Which of the following cloud deployment models is the best way to replicate a workload non-disruptively between on-premises servers and a public cloud?

A.

Public

B.

Community

C.

Private

D.

Hybrid

Full Access
Question # 21

Servers in the hot site are clustered with the main site.

A.

Network traffic is balanced between the main site and hot site servers.

B.

Offline server backups are replicated hourly from the main site.

C.

All servers are replicated from the main site in an online status.

D.

Which of the following best describes a characteristic of a hot site?

Full Access
Question # 22

A log-parsing application requires significant processing power to ingest the logs streaming from web servers. The engineering team presents the cloud architect with four proposals

using the same underlying hardware. Which of the following should the cloud architect select in order to minimize the impact of an instance failure while keeping the cost as low as

possible?

A.

Four instances of 4vCPU, 8GB RAM, 80GB SSD

B.

Four instances of 4vCPU, 8GB RAM, 80GB HDD

C.

Two instances of 8vCPU, 16GB RAM, 80GB SSD

D.

Two instances of 8vCPU, 16GB RAM, 80GB HDD

Full Access
Question # 23

An organization is preparing for seasonal sales on its storefront web application. Which of the following approaches is best suited to meet this requirement with the minimal cost?

A.

Configuring a load balancer with a least-connections load-balancing method

B.

Enabling a scaling configuration for the identified timeline

C.

Reconfiguring the application to have more resources

D.

Deploying additional compute resources in advance to the web application pool

Full Access
Question # 24

A bank informs an administrator that changes must be made to backups for long-term reporting purposes. Which of the following is the most important change the administrator

should make to satisfy these requirements?

A.

Location of the backups

B.

Type of the backups

C.

Retention of the backups

D.

Schedule of the backups

Full Access
Question # 25

A company’s cybersecurity team receives the following alert that a production VM was deleted from the virtual network:

21 September 09:19:08 (GMT-5)

Resource with ID: PROD-WEB001 was deleted by User: Logging Service

The console to manage virtual network resources uses directory authentication. Only users in a particular directory group can interactively access the virtual network management console. The logging service account is not part of this group and requires some local administration privileges to aggregate logs from various resources. The cybersecurity team discovers the logging service account was previously given full directory administrator privileges and sees the following entry:

21 September 09:10:55 (GMT-5)

User with ID: Logging Service was added to the Group: VNet Console Administrators by actor: Logging Service.

The cybersecurity team removes the compromised service account from the directory group. Which of the following should the cybersecurity team do next to prevent repeat instances of this issue?

A.

Enable two-factor authentication on the virtual network console.

B.

Reset the logging service account to use a long and complex password.

C.

Disable RDP on the production virtual machines.

D.

Create a scoped administrative role for the logging service account.

Full Access
Question # 26

An organization is concerned that its IT help desk is receiving too many calls about password resets for various internal and external applications. The organization implements a single sign-on (SSO) solution. Which of the following technologies should the cloud architect at the organization recommend implementing?

A.

SAML

B.

LDAP

C.

Kerberos

D.

MFA

Full Access
Question # 27

A newly configured VM fails to run application updates despite having internet access. The updates download automatically from a third-party network. Given the following output:

Which of the following troubleshooting steps would be best to take?

A.

Checking DNS configurations

B.

Reconfiguring routing protocols

C.

Testing the IP address configuration

D.

Running a trace to the router

Full Access
Question # 28

A company requests that its cloud administrator provision virtual desktops for every user. Given the following information:

• One hundred users are at the company.

• A maximum of 30 users work at the same time.

• Users cannot be interrupted while working on the desktop.

Which of the following strategies will reduce costs the most?

A.

Provisioning VMs of varying sizes to match user needs

B.

Configuring a group of VMs to share with multiple users

C.

Using VMs that have spot availability

D.

Setting up the VMs to turn off outside of business hours at night

Full Access
Question # 29

Five thousand employees always access the company's public cloud-hosted web application on a daily basis during the same time frame. Some users have been reporting performance issues while attempting to connect to the web application Which of the following is the best configuration approach to resolve this issue?

A.

Scale vertically based on a trend.

B.

Scale horizontally based on a schedule

C.

Scale vertically based on a load.

D.

Scale horizontally based on an event

Full Access
Question # 30

A cloud engineer wants resource-level visibility for billing reports. Which of the following should the cloud engineer configure?

A.

Rightsizing

B.

Invoicing

C.

Reserve instances

D.

Tagging

Full Access
Question # 31

A company receives files daily from a bank. The company requires that the files must be copied from the cloud storage resource to another cloud storage resource for further

processing. Which of the following methods requires the least amount of effort to achieve the task?

A.

Remote procedure call

B.

SOAP

C.

Event-driven architecture

D.

REST

Full Access
Question # 32

A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the

following migration strategies is best approach for this use case?

A.

Retire

B.

Rearchitect

C.

Refactor

D.

Rehost

Full Access
Question # 33

Two CVEs are discovered on servers in the company's public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which

of the following actions would be the best way to mitigate the vulnerabilities?

A.

Patching the operating systems

B.

Upgrading the operating systems to the latest beta

C.

Encrypting the operating system disks

D.

Disabling unnecessary open ports

Full Access
Question # 34

A company developed an online trading platform. The engineering team selected event-based scaling for the platform's underlying resources. The platform resources scale up with every 2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains why this is the case?

A.

Event-based scaling does not scale down resources.

B.

Event-based scaling should not be triggered at the 2,000-user frequency.

C.

Event-based scaling should not track user subscriptions.

D.

Event-based scaling does not take resource load into account.

Full Access
Question # 35

A CI/CD pipeline is used to deploy VMs to an laaS environment. Which of the following can be used to harden the operating system once the VM is running?

A.

Docker

B.

Kubernetes

C.

Git

D.

Ansible

Full Access
Question # 36

A cloud administrator learns that a major version update. 4.6.0. is available for a business-critical application. The application is currently on version 4.5.2. with additional minor versions 3, 4, and 5 available. The administrator needs to perform the update while minimizing downtime. Which of the following should the administrator do first?

A.

Apply the minor updates and then restart the machine before applying the major update.

B.

During off hours, decommission the machine and create a new one directly on major update 4.6.0.

C.

Stop the service and apply the major updates directly.

D.

Create a test environment and apply the major update

Full Access
Question # 37

A cloud administrator needs to collect process-level, memory-usage tracking for the virtual machines that are part of an autoscaling group. Which of the following is the best way to

accomplish the goal by using cloud-native monitoring services?

A.

Configuring page file/swap metrics

B.

Deploying the cloud-monitoring agent software

C.

Scheduling a script to collect the data

D.

Enabling memory monitoring in the VM configuration

Full Access
Question # 38

Which of the transfer when comparing a multiregional to a single-region cloud platform design?

A.

Storage

B.

Power and cooling

C.

Network

D.

Compliance and regulation

Full Access
Question # 39

A company implements a web farm with 100 servers behind an application load balancer. Dunng scaling events, new web servers that are placed in service have not loaded all their modules, which causes some requests to the web farm to fail. Which of the following should the cloud engineer implement to address the scaling issue?

A.

Instance warm-up

B.

Scheduled scaling

C.

Event-based scaling

D.

Load balancer passthrough

Full Access
Question # 40

Which of the following industry standards mentions that credit card data must not be exchanged or stored in cleartext?

A.

CSA

B.

GDPR

C.

SOC2

D.

PCI-DSS

Full Access
Question # 41

A company has one cloud-based web server that is prone to downtime during maintenance. Which ot the following should the cloud engineer add to ensure high availability?

A.

A redundant web server behind a load balancer

B.

A backup cloud web server

C.

A secondary network link to the web server

D.

An autoscaling feature on the web server

Full Access
Question # 42

A cloud engineer is deploying a cloud solution that will be used on premises with need-to-know access. Which of the following cloud deployment models best meets this

requirement?

A.

Community

B.

Public

C.

Private

D.

Hybrid

Full Access
Question # 43

A systems administrator needs to configure backups for the company's on-premises VM cluster. The storage used for backups will be constrained on free space until the company

can implement cloud backups. Which of the following backup types will save the most space, assuming the frequency of backups is kept the same?

A.

Snapshot

B.

Ful

C.

Differential

D.

Incremental

Full Access
Question # 44

A software development team must manage changes to source code for different clients who utilize the same product with different features. Which of the following meets this requirement?

A.

Branch

B.

Commit

C.

Push

D.

Merge

Full Access
Question # 45

A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to

recommend?

A.

Using CIS-hardened images

B.

Using watermarked images

C.

Using digitally signed images

D.

Using images that have an application firewall

Full Access
Question # 46

A systems engineer tries to mount an iSCSI LUN to a VM host in a data center, but the host does not discover any iSCSI targets. A sample of the switch configuration is shown in the following image:

Which of the following configuration changes would most likely resolve the discovery issues?

A.

Disabling GigabitEthernet 1/0/7

B.

Changing the MTU on GigabitEthernet 1/0/2

C.

Changing the access VLAN for GigabitEthernet 1/0/2 to 25

D.

Enabling jumbo frames on GigabitEthernet 1/0/6 and GigabitEthernet 1/0/7

Full Access
Question # 47

A cloud solutions architect wants to deploy a three-tier web application that requires the minimum amount of operational overhead. Which of the following is the best template given these requirements?

A.

virtual_machine:

name: front-end vm

size: small

bootstrapping: git

repository: front-end-repo

autoScaling: enabled

object_storage:

name: query-handler

staticWebContent: disabled

versioning: enabled

virtual_machine:

name: db-vm

size: medium

bootstrapping: /bin/bash yum install -y psql

B.

object_storage:

name: front-end

staticWebContent: enabled

versioning: enabled

serverless_function:

name: app

runtime: nodejs

memorySize: 2G

code: git

repository: backend-repo

relational_database:

engine: postgreSQL

clusterNode: enabled

C.

virtual_machine:

name: three tiered app

size: xlarge

bootstrapping: /bin/bash yum install -y nodejs httpd psql && \

git clone three-tiered-app && \

./app.sh --listen 8443

autoScaling: enabled

load_balancer:

name: front-end-lb

target: three-tiered-app

targetPort: 8443

listener: 443

D.

object_storage:

name: front-end

staticWebContent: enabled

versioning: enabled

virtual_machine:

name: app-vm

size: small

bootstrapping: git

repository: backend-repo

autoScaling: enabled

relational_database:

engine: postgreSQL

clusterNode: enabled

Full Access
Question # 48

A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following

delivery mechanisms would best support this integration?

A.

Enterprise service bus

B.

Socket

C.

RPC

D.

Queue

Full Access
Question # 49

A company wants to create a few additional VDIs so support vendors and contractors have a secure method to access the company's cloud environment. When a cloud

administrator attempts to create the additional instances in the new locations, the operation is successful in some locations but fails in others. Which of the following is the

most likely reason for this failure?

A.

Partial service outages

B.

Regional service availability

C.

Service quotas

D.

Deprecation of functionality

Full Access
Question # 50

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing

Full Access
Question # 51

Which of the following is the best tool to deploy template-based, containerized workloads on premises and on the cloud?

A.

Docker

B.

Terraform

C.

Jenkins

D.

Git

Full Access
Question # 52

An organization uses a cloud provider’s specific features to host applications. The organization planned to move to another cloud provider due to rising costs, but moving was not technically feasible. Which of the following best describes this situation?

A.

Platform as a service

B.

Oversubscription

C.

Vendor lock-in

D.

Regulatory compliance

Full Access
Question # 53

A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

A.

Modifying the subnet mask to 255 255 254.0 for IT and operations departments

B.

Configuring static routing to allow access from each subnet to 10.1.40.1

C.

Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network

D.

Configuring static routing to allow access from 10.1.30.1 to each subnet

E.

Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee

F.

Modifying the subnet mask to 255.255.255.128 for the IT and operations departments

Full Access
Question # 54

A company serves customers globally from its website hosted in North America. A cloud engineer recently deployed new instances of the website in the Europe region. Which of the

following is the most likely reason?

A.

To simplify workflow

B.

To enhance security

C.

To reduce latency

D.

To decrease cost

Full Access
Question # 55

A company wants to use a solution that will allow for quick recovery from ransomware attacks, as well as intentional and unintentional attacks on data integrity and availability. Which of the following should the company implement that will minimize administrative overhead?

A.

Object versioning

B.

Data replication

C.

Off-site backups

D.

Volume snapshots

Full Access
Question # 56

A company wants to build its new platform using a public cloud. The workload requirements include the following:

• Implementation of custom CIS compliance

• Patch for vulnerabilities within 24 hours

• Warrant at least 1,800 IOPS per volume

Which of the following meets the requirements?

A.

SaaS

B.

laaS

C.

FaaS

D.

PaaS

Full Access
Question # 57

A company's man web application is no longer accessible via the internet. The cloud administrator investigates and discovers the application is accessible locally and only via an IP access. Which of the following was misconfigured?

A.

IP

B.

DHCP

C.

NAT

D.

DNS

Full Access
Question # 58

Which of the following storage resources provides higher availability and speed for currently used files?

A.

Warm/HDD

B.

Cold/SSD

C.

Hot/SSD

D.

Archive/HDD

Full Access
Question # 59

A cloud engineer is concerned about command-and-control (C2) communication leaving a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify this type of communication?

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron jobs listing connections

D.

Traffic mirroring

Full Access
Question # 60

A cloud engineer is exploring options to reduce the management overhead of the servers and network. Which of the following cloud service models should the engineer implement?

A.

SaaS

B.

XaaS

C.

PaaS

D.

laaS

Full Access
Question # 61

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

A.

Operating system patches

B.

Table-level permissions

C.

Minor database engine updates

D.

Cluster configuration

E.

Row-level encryption

F.

Availability of hardware for scaling

Full Access
Question # 62

A cloud engineer needs to deploy a new version of a web application to 100 servers. In the past, new version deployments have caused outages. Which of the following deployment types should the cloud engineer implement to prevent the outages from happening this time?

A.

Rolling

B.

Blue-green

C.

Canary

D.

Round-robin

Full Access
Question # 63

A cloud deployment uses three different VPCs. The subnets on each VPC need to communicate with the others over private channels. Which of the following will achieve this objective?

A.

Deploying a load balancer to send traffic to the private IP addresses

B.

Creating peering connections between all VPCs

C.

Adding BGP routes using the VPCs' private IP addresses

D.

Establishing identical routing tables on all VPCs

Full Access
Question # 64

An organization's critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of

a software web application:

"2021/12/18 09:33:12" "10. 34. 32.18" "104. 224. 123. 119" "POST / login.php?u=administrator&p=or%201%20=1"

"2021/12/18 09:33:13" "10.34. 32.18" "104. 224. 123.119" "POST /login. php?u=administrator&p=%27%0A"

"2021/12/18 09:33:14" "10. 34. 32.18" "104. 224. 123. 119" "POST /login. php?u=administrator&p=%26"

"2021/12/18 09:33:17" "10.34. 32.18" "104. 224. 123.119" "POST / login.php?u=administrator&p=%3B"

"2021/12/18 09:33:12" "10.34. 32. 18" "104. 224. 123. 119" "POST / login. php?u=admin&p=or%201%20=1"

"2021/12/18 09:33:19" "10.34.32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%27%0A"

"2021/12/18 09:33:21" "10. 34. 32.18" "104.224. 123.119" "POST / login. php?u=admin&p=%26"

"2021/12/18 09:33:23" "10. 34. 32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%3B"

Which of the following types of attacks occurred?

A.

SQL injection

B.

Cross-site scripting

C.

Reuse of leaked credentials

D.

Privilege escalation

Full Access
Question # 65

A cloud administrator deploys new VMs in a cluster and discovers they are getting IP addresses in the range of 169.254.0.0/16. Which of the following is the most likely cause?

A.

The scope has been exhausted.

B.

The network is overlapping.

C.

The VLAN is missing.

D.

The NAT is Improperly configured.

Full Access
Question # 66

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

A.

Splicing

B.

Rotation

C.

Sampling

D.

Inspection

Full Access
Question # 67

A company needs to deploy its own code directly in the cloud without provisioning additional infrastructure. Which of the following is the best cloud service model for the company to use?

A.

PaaS

B.

SaaS

C.

laaS

D.

XaaS

Full Access
Question # 68

Which of the following cloud-native architecture designs is the most easily maintained, decentralized, and decoupled?

A.

Monolithic

B.

Hybrid cloud

C.

Mainframe

D.

Microservices

Full Access
Question # 69

For compliance purposes, a cloud developer at an insurance company needs to save all customer policies for more than ten years. Which of the following options is the most cost-

efficient tier to save the data in the cloud?

A.

Archive

B.

Hot

C.

Cold

D.

Warm

Full Access
Question # 70

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

INSTRUCTIONS

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

Web app 1

Web app 2

Web app 3

Web app 4

Client app

Full Access
Question # 71

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

Full Access
Question # 72

A cloud service provider just launched a new serverless service that is compliant with all security regulations. A company deployed its code using the service, and the company's application was hacked due to leaked credentials. Which of the following is responsible?

A.

Customer

B.

Cloud service provider

C.

Hacker

D.

Code repository

Full Access
Question # 73

A write-intensive workload is having frequent performance issues. The workload is running on pay-as-you-go VMs. These VMs use SSDs and have appropriate CPU and RAM sizes. The workload writes millions of small files and has a one-year retention requirement. Which of the following actions should be taken?

A.

Use provisioned IOPS volumes.

B.

Increase the VM size.

C.

Switch to reserved VMs.

D.

Change to ephemeral storage.

Full Access
Question # 74

A user's assigned cloud credentials are locked, and the user is unable to access the project's application. The cloud administrator reviews the logs and notices several attempts to log in with the user's account were made to a different application after working hours. Which of the following is the best approach for the administrator to troubleshoot this issue?

A.

Create new credentials for the user and restrict access to the authorized application.

B.

Track the source of the log-in attempts and block the IP address of the source in the WAR

C.

Reset the user's account and implement a stronger lock-out policy.

D.

Install an IDS on the network to monitor suspicious activity

Full Access
Question # 75

A video surveillance system records road incidents and stores the videos locally before uploading them to the cloud and deleting them from local storage. Which of the following

best describes the nature of the local storage?

A.

Persistent

B.

Ephemeral

C.

Differential

D.

Incremental

Full Access
Question # 76

A systems administrator notices a surge of network traffic is coming from the monitoring server. The administrator discovers that large amounts of data are being downloaded to an external source. While investigating, the administrator reviews the following logs:

Which of the following ports has been compromised?

A.

Port 20

B.

Port 22

C.

Port 443

D.

Port 4443

E.

Port 8048

Full Access