No products in the cart.
CompTIA Cloud+ (CV0-004) Version 1.0.7 Exam Questions
Page 5 of 30
81.
Acme Inc. has a "five nines" uptime SLA with their customers. Which of the following is the HIGHEST amount of downtime allowed per year that would not breach the SLA?
-
4 minutes
-
40 minutes
-
400 minutes
-
None of the answers are within the SLA
Correct answer: 4 minutes
A "five nines" (99.999%) service level agreement (SLA) for uptime would allow for 5.39 minutes of downtime per year. 4 minutes of downtime per year would not breach a "five nines" SLA.
82.
Which of the following deployment methods is synonymous with continuous delivery?
-
Rolling updates
-
Continuous deployment
-
Patching
-
Continuous integration
Correct answer: Rolling updates
Rolling updates are applied frequently and in small chunks. Rolling updates are considered synonymous with continuous delivery and rolling releases.
Continuous deployment goes beyond continuous delivery because it automatically deploys code all the way to production, whereas continuous delivery is only automated up to preproduction environments like staging.
Continuous integration is an automated build and test process. It is typically coupled with continuous deployment or continuous delivery as part of a CI/CD pipeline.
Patching is a general term that refers to applying updates to fix bugs or security issues.
83.
Which of the following is NOT a benefit of nonrelational databases when compared to relational databases?
-
Data deduplication
-
Flexible data organization
-
Broad data type support
-
Simple design
Correct answer: Data deduplication
Compared to relational databases, nonrelational databases are more likely to be impacted by data duplication that increases storage requirements.
Benefits of nonrelational databases compared to relational databases include flexible data organization, broad data type support, and simpler design.
84.
What security policies establish expectations around how accounts and their associated credentials will be managed?
-
Account management policies
-
WAFs
-
Authorization control policies
-
Approval policy lists
Correct answer: Account management policies
The purpose of account management policies is to establish standards for user IDs and passwords that authenticate entities such as user accounts.
A web application firewall (WAF) is an application-layer security appliance.
Authorization deals with whether an entity is able to access a resource; it does not directly deal with authenticating the entity.
Approval policy lists is a distractor answer.
85.
An Acme Inc. system administrator is configuring updates for Windows servers.
In which patch management mode does the administrator review updates first, then approve them for deployment across the enterprise if they appear stable?
-
Approval
-
Automatic
-
Bypass
-
Centralized
Correct answer: Approval
In approval mode, the administrator reviews the updates, potentially applies them to a test system to verify their stability, and then approves the patches for deployment.
Automatic updates would bypass the manual approval step.
Bypass is a distractor answer.
Centralized is a reference to update tools that allow administrators to manage updates for multiple devices from a single system.
86.
You are a developer building a cross-departmental employee onboarding system.
Which Platform as a Service (PaaS) cloud component allows separate services to communicate and enable user-facing applications?
-
API
-
DBaaS
-
Source code repository
-
IDE
Correct answer: API
An Application Programming Interface (API) is a software component that acts as an intermediary to allow two applications to talk to each other. An API sends a request to the target application and then delivers the response back to the requesting application.
Database as a service (DBaaS) is a type of cloud service that provides users with database access.
Source code repositories are useful for version control and maintaining software projects, but do not directly enable service-to-service communication.
Integrated development environments (IDEs) are used by software developers to write code.
87.
Your corporate cloud wiki supports role-based access control. Users must have a license allocated to them to access pages.
A user complains that they are unable to edit a page in the cloud wiki. The user should be allowed to edit the page based on their job function. During a screen sharing session, you see that the user can load the page and is logged in.
What MOST likely explains the problem?
-
The user has read-only access to the page
-
A firewall is blocking network traffic
-
SAML-related issues
-
The user is not licensed to access the wiki
Correct answer: The user has read-only access to the page
Read-only access prevents a user from updating or deleting data or other resources. Read-only means they can only view the page. The user having a read-only role in the wiki explains the symptoms in the question.
If there was a firewall blocking network traffic, the page would be unlikely to load.
If there were SAML-related issues, the user would be unlikely to log in.
If there were license-related issues, the page would not be accessible based on the information in the question.
88.
Acme Inc. uses a canary deployment model for a cloud-based application running on multiple server clusters.
What will happen if there are no issues after 10% of the servers are updated?
-
Additional servers will be updated
-
The green server will be updated
-
The blue server will be updated
-
The patch will be labeled "prod"
Correct answer: Additional servers will be updated
With canary deployments, a small subset of systems is updated first to see if there are any problems with the changes. If the systems perform as expected, the rest of the updates are applied. If the systems do not work as expected, users can rollback.
"Blue" and "green" server updates are references to a different deployment strategy (blue-green deployments).
A patch being labeled "prod" can happen in multiple different contexts, but the situation described in the question would not necessarily lead to or require a "prod" label to be applied.
89.
.vhdx files are MOST commonly associated with which of the following technologies?
-
Hyper-V virtual machines
-
VMware virtual machines
-
Docker containers
-
Any Kubernetes-compatible container
Correct answer: Hyper-V virtual machines
A .vhdx file is a disk file for Hyper-V virtual machines. The comparable VMware file is a .vmdk.
.vmdk and .vhdx files are not directly related to containers.
90.
Which of the following metrics is related to storage on a virtual machine?
-
Application read IOPS
-
Wait time
-
Peak memory usage
-
SQLi
Correct answer: Application read IOPS
Application read IOPS is a storage-related metric that indicates the amount of storage read operations per second.
Wait time is a CPU-related metric.
Peak memory usage is a memory (e.g., RAM) metric, not a storage (e.g., disk) metric.
SQL injection (SQLi) is a type of cyber attack.
91.
Acme Inc. uses a blue-green deployment model for their production time tracking software. The software is currently running version 4.2.
SERVER-ONE is currently serving production traffic.
SERVER-TWO is an exact copy of SERVER-ONE but is not serving any traffic.
Which of the following statements is TRUE about Acme Inc.'s deployment?
-
SERVER-TWO is a standby system
-
SERVER-ONE is a standby system
-
SERVER-TWO is green
-
SERVER-ONE is blue
Correct answer: SERVER-TWO is a standby system
A blue-green deployment method is one where one system (or set of systems) is serving production users while an identical separate system (or set of systems) is used for updates, changes, and tests. When tests complete, the systems switch roles. This allows the system serving users to remain undisturbed by changes until after they are tested.
The "blue" and "green" labels are arbitrary, and we cannot tell from the question which server corresponds to which color.
We can tell that SERVER-TWO is a standby system because it is not actively serving production traffic.
92.
All the virtual machines in a network have incorrect time configurations. The machines are otherwise functional.
What protocol misconfiguration is the MOST likely cause?
-
NTP
-
MTU
-
MSS
-
L2TP
Correct answer: NTP
The network time protocol (NTP) is commonly used to synchronize time on systems. If time for all the machines on a network is incorrect, an NTP issue is a likely probable cause.
Maximum transmission unit (MTU) and maximum segment size (MSS) issues would likely cause more general network problems and have a different set of symptoms.
L2TP is a tunneling protocol, and nothing in the question talks about tunneling.
93.
Which of the following public cloud service models runs applications that are primarily used by end users?
-
SaaS
-
PaaS
-
IaaS
-
XaaS
Correct answer: SaaS
End users are business users; they use the cloud to access business applications for their daily operations. The Software as a Service (SaaS) cloud model hosts business applications.
Platform as a service (PaaS) and infrastructure as a service (IaaS) are more commonly used by technical staff, such as developers.
XaaS is a generic term that means "anything as a service."
94.
How should sensitive data such as credentials be stored when using Docker containers?
-
Secrets
-
Environment variables
-
OCI (Open Container Initiative) variables
-
Encrypted CSV
Correct answer: Secrets
Secrets provide a secure method for storing sensitive information such as credentials in Docker containers. They are designed to ensure that sensitive data remains protected and is only available to containers with explicit access. Docker's secret management system encrypts this data and makes it accessible to specific services running in the swarm mode.
Environment variables are a common method for storing configuration data, but they are not secure for storing sensitive data because they can be easily exposed in logs or through process inspection.
OCI (Open Container Initiative) variables refer to a specification for container formats and runtimes, but are not specifically intended for secure storage of credentials.
Encrypted CSVs can store data in a secure format, but this method is not practical or recommended for managing credentials within containers, especially compared to the built-in secret management in Docker.
95.
You are debugging an issue related to drivers on a virtual server.
Which type of log file is MOST likely to contain records relevant to this task?
-
Application
-
Security
-
Setup
-
System
Correct answer: Application
Application logs typically contain information related to drivers and applications installed on a system.
Security logs typically contain records related to authentication, privilege escalations, and audited events.
Setup logs typically contain details on patches and installations.
System logs typically contain operating system messages and details on services that have started or stopped.
96.
In what standard software environment is an application made available to end users?
-
Production
-
User readiness
-
Blue-green
-
Quality assurance
Correct answer: Production
Production is the environment that users log into to use an application on a regular and operational basis.
97.
Alex is a server administrator at Acme Inc. After provisioning a virtual server, Alex creates a point-in-time copy of the server and all the data on it.
What term best describes the copy of the server Alex created?
-
Snapshot
-
Init file
-
AMI
-
P2V
Correct answer: Snapshot
A snapshot is a point-in-time copy of a system.
An init file is a generic term for a file a program or system uses for initialization.
AMI (Amazon Machine Image) is a type of system image used to instantiate virtual machines in the AWS cloud.
P2V (physical to virtual) is a type of system migration.
98.
Which of the following is NOT a relational database?
-
MongoDB
-
MySQL
-
Oracle Database
-
IBM DB2
Correct answer: MongoDB
MongoDB is a nonrelational database.
MySQL, Oracle Database, and IBM DB2 are all relational databases.
99.
Acme Inc. wants to reduce the frequency of updates and has high reliability requirements for an application running as a virtual appliance.
What version of the virtual appliance should they run?
-
LTS
-
Semantic
-
Beta
-
QA
Correct answer: LTS
Long-term support (LTS) versions of software are intended to have high reliability and quality. They can reduce some of the risk associated with being on the latest stable or generally available version of an application or appliance.
Semantic versioning is a way of displaying version numbers.
Beta versions may have features or bug fixes unavailable in the latest stable release, but also tend to be less stable than LTS or generally available releases.
Quality assurance (QA) can refer to a practice, team, or development environment. It does not typically refer to a software release version.
100.
study.example.com has a public IP address of 203.0.113.1.
Most users can access study.example.com, but one user complains they cannot.
You run the commands below and get the associated output. The issue is MOST likely related to which protocol?
C:\>ping 203.0.113.1
Pinging 203.0.113.1 with 32 bytes of data:
Reply from 203.0.113.1: bytes=32 time=20ms TTL=57
Reply from 203.0.113.1: bytes=32 time=10ms TTL=57
Reply from 203.0.113.1: bytes=32 time=15ms TTL=57
Reply from 203.0.113.1: bytes=32 time=10ms TTL=57
Ping statistics for 203.0.113.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 10ms, Maximum = 20ms, Average = 13ms
C:\>ping study.example.com
Ping request could not find host cool.example.org. Please check the name and try again.
-
DNS
-
NTP
-
IPv4
-
IPv6
Correct answer: DNS
The ping output shows that the user's machine can ping the public IP address (203.0.113.1), but not the domain name (study.example.com). This suggests there is an issue with the domain name system (DNS) protocol responsible for resolving domain names.
IPv4 connectivity seems to be working, based on the ping output.
IPv6 is not mentioned or shown in the question.
The network time protocol (NTP) is used for time synchronization.