No products in the cart.
CompTIA Cloud+ (CV0-004) Version 1.0.7 Exam Questions
Page 6 of 30
101.
What category of metrics does your organization need to capture and analyze for budgeting, chargeback, and showback purposes?
-
Cost
-
Capacity
-
Connectivity
-
Latency
Correct answer: Cost
Cost metrics allow organizations to correlate consumption with the amount billed by the cloud provider.
Capacity, connectivity, and latency metrics are all important and may influence business decisions, but none of those adequately describe the category of metrics described in the question.
102.
Your system requires high availability. What type of storage protection technology should you put in place?
-
RAID
-
RAM
-
Cache
-
Virtualization
Correct answer: RAID
Redundant array of independent disks (RAID) is a technology that is used to increase the reliability of data storage by striping or copying the data across multiple physical disks. If one disk fails, there is another copy of the data on another disk and the system can continue processing.
RAM (random access memory) is a type of volatile memory.
Cache is a temporary storage location. Typically, cache is used to improve performance.
Virtualization involves a broad set of techniques and technologies used to abstract physical resources as virtual resources.
103.
You are a systems administrator at Acme Inc. You want to receive an alert when disk utilization on your cloud servers exceeds 80%.
What type of configuration should you make to specify the 80% value?
-
Threshold
-
Baseline
-
Template
-
IO
Correct answer: Threshold
A threshold defines a limit of some sort for alerts and notifications.
A baseline captures normal behavior over a period of time.
A template is a standardized configuration.
IO (input/output) is an acronym commonly used to describe read/write operations.
104.
What does an HTTP POST operation do?
-
Create a resource
-
Modify a resource
-
Copy a resource
-
Move a resource
Correct answer: Create a resource
Common HTTP operations used with RESTful APIs include:
- GET- Reads data or retrieves a resource
- POST- Creates a resource
- PUT- Modifies a resource
- DELETE- Deletes a resource
105.
Which of the following is NOT a detail outlined in a workflow task?
-
Budget required to complete the task
-
Personnel required to complete the task
-
Technology required to complete the task
-
Tools required to complete the task
Correct answer: Budget required to complete the task
The goal of a workflow is to identify what needs to be done, who is going to do it, and how they will do it. The task details in a workflow explain the what, who, and how, as well as the dependencies.
Budget information is not required to inform employees how to do their work most efficiently and effectively.
106.
Which of the following is MOST likely to be used by a software program or service to communicate with another service?
-
API
-
GUI
-
CLI
-
SEiM
Correct answer: API
An application programming interface (API) is a software interface that enables programmatic communications between different systems. For example, many modern web services expose a RESTful API that can be accessed using HTTP methods.
A graphical user interface (GUI) and command line interface (CLI) are more typically used by humans.
A security information and event management (SIEM) is used to aggregate logs and other security information.
107.
Acme Inc. provides a SaaS billing software to Users R Us LLC. Using the shared responsibility model, who is responsible for user and service account management?
-
Users R Us LLC
-
Acme Inc.
-
The CASB
-
The CSP
Correct answer: Users R Us LLC
In this case, User R Us LLC is the consumer. Acme Inc. is the cloud service provider (CSP).
In the shared responsibility model, consumers are responsible for data, end-user systems, and user and service account management for SaaS, IaaS, and PaaS platforms. Therefore, Users R Us LLC. is the correct answer.
A cloud access security broker (CASB) is a cloud security solution for access policy enforcement.
108.
What password guideline does NIST recommend in its special publication (SP) 800-63B that strengthens password complexity?
-
Two-factor authentication
-
Passwords with letters only
-
Password length of at least 12 characters
-
No spaces
Correct answer: Two-factor authentication
NIST SP 800-63B recommends practices such as a minimum password length of 64 characters and using two-factor authentication.
NIST SP 800-63B does not recommend passwords with letters only or no spaces.
109.
Acme Inc. is migrating 120 physical rackmount servers to virtual machines. After the migration, they will have 8 physical servers running hypervisor software that will support the 120 servers as virtual machines.
Which of the following statements about Acme Inc.'s resource utilization after the migration is likely to be TRUE?
-
Cooling costs will decrease
-
Performance will decrease
-
Power costs will increase
-
Physical space utilization will increase
Correct answer: Cooling costs will decrease
Because resources are shared, and less overall hardware is used, virtualization of physical resources typically results in lower cooling and power costs, as well as lower utilization of physical space.
While virtualization may impact performance, the question does not give enough information to make a clear decision. If the physical servers are older or poorly configured, virtualization may increase performance.
110.
What stage comes after "deploy" in the continuous delivery process?
-
Maintain
-
Merge
-
Test
-
Build
Correct answer: Maintain
In order, the combined continuous integration and continuous delivery process is:
- Plan
- Build
- Test
- Merge
- Deploy
- Maintain
- Monitor
111.
Which of the following statements about PPTP is TRUE?
-
It is deprecated
-
It provides TLS encryption natively
-
It provides SSL encryption natively
-
It cannot encapsulate layer 2 PPP frames
Correct answer: It is deprecated
The point-to-point tunneling protocol (PPTP) is a deprecated protocol that encapsulates layer 2 point-to-point (PPP) frames. It does not provide encryption natively.
112.
What is another name for a quick fix engineering (QFE) update?
-
Hotfix
-
Rollup
-
Service pack
-
Firmware update
Correct answer: Hotfix
Hotfix and quick fix engineering (QFE) update are synonymous. A hotfix or QFE is a small patch that typically addresses an urgent issue (e.g., a critical security flaw or serious application bug).
Rollups and service pack updates are typically larger updates than a targeted hotfix.
A firmware update is specific to devices that run firmware (e.g., embedded systems).
113.
A systems administrator wants to restrict, deny, or allow access to a cloud storage resource and define specific permission levels such as read-only, read-write, or no access for different user identities that may attempt to access the resource.
What should the systems administrator configure?
-
Access control list
-
Firewall rules
-
Permissions wallet
-
Password vault
Correct answer: Access control list
An access control list (ACL) defines who has access to a cloud resource and what level of access they have, such as read-only, modified, or full control.
A password vault is used to securely store credentials.
Permissions wallet is a distractor term and is not a standard technology Cloud+ candidates need to be familiar with.
Firewall rules would enable the administrator to configure allow or deny rules, but typically do not allow the granularity required in the question.
114.
A solid-state drive is connected to a physical server using a SCSI interface. This is an example of which type of storage?
-
DAS
-
NAS
-
SATA
-
iSATA
Correct answer: DAS
Direct-attached storage (DAS) is storage that is corrected via a physical connection to a server such as a SCSI or SATA interface. Cloud providers sometimes use DAS for ephemeral storage.
Network-attached storage (NAS) is storage that is accessible over a network. NAS typically uses LAN connectivity.
SATA (serial AT attachment) connections are a way storage can be directly attached.
iSATA is a distractor answer.
115.
The "time-memory trade-off" concept from computer science is BEST summarized by which of the following statements?
-
Processing time and storage utilization have an inverse relationship
-
RAM utilization and storage utilization must be balanced
-
Read speed is proportional to write speed
-
Throughput and processing scale exponentially
Correct answer: Processing time and storage utilization have an inverse relationship
The "time-memory trade-off" explains that processing time and storage utilization have an inverse relationship. That is, as storage utilization goes down, processing time goes up (assuming all other variables remain the same).
This concept is important to remember when working with compression and deduplication techniques that can help optimize storage utilization.
All the other answers are distractor answers.
116.
You have deployed four applications on the same physical server. The underlying dependent prerequisite versions change frequently, and when you upgrade for one application, it causes the other three applications to have errors.
What is the MOST straightforward approach to addressing this issue?
-
Deploy four virtual machines
-
Ask the software vendors to agree on the same prerequisite versions
-
Upgrade the physical server operating system
-
Deploy four separate physical machines
Correct answer: Deploy four virtual machines
By deploying virtual machines, each virtual machine guest can have its own version of the underlying prerequisite software without impacting the others.
Upgrading the physical server operating system is unlikely to address the fundamental problem of the programs conflicting with one another.
Getting agreement across multiple software vendors to align on the same prerequisites is typically impractical.
Four separate physical machines come with more operational and cost overhead than four virtual machines.
117.
Acme Inc. wants to detect and prevent intrusions on VDI endpoints. Which security technology should you recommend?
-
HIPS
-
HIDS
-
NIPS
-
NIDS
Correct answer: HIPS
Intrusion prevention systems (IPS) can detect and prevent intrusions. Intrusion detection systems (IDS) only perform detection.
IPS and IDS can be host-based (HIPS/HIDS) or network-based (NIPS/NIDS). A virtual desktop infrastructure (VDI) endpoint is a common installation point for HIDS/HIPS.
In this case, because of the prevention requirement, a HIPS is the best answer.
118.
Acme Inc. has deployed a perimeter firewall and now needs to define what traffic will be allowed or denied.
What needs to be configured on the firewall to meet this requirement?
-
Access control list
-
Load balancer configuration
-
Network translation table
-
Routing registry
Correct answer: Access control list
Access control lists (ACLs) describe what access rights users have for specific resources. Firewalls use this information to reject, pass through, and direct traffic.
A load balancer configuration would not help in this specific case as a load balancer is a separate type of network device.
Network translation table is a reference to network address translation (NAT) which deals with mapping internal and external IP addresses.
Routing registry is a reference to the Internet Routing Registry (IRR), which is a database of information used to help with routing on the public internet.
119.
You are a developer at Acme Inc. You want to modify what features are enabled or disabled when a container is running based on the system it is deployed on.
What can you use to achieve the desired outcome?
-
Environment variables
-
Hardcoding
-
RDP
-
NVRAM
Correct answer: Environment variables
Environment variables can store values that change how a container works depending on what the variable is set to. Different runtime environments can set different environment variables that can cause the same container image to have different functionality when it is instantiated.
Hardcoding is effectively the opposite of using environment variables and involves writing code that includes specific values.
Remote desktop protocol (RDP) is a remote access protocol.
NVRAM is a type of memory that can persist its state after being powered off.
120.
The virtual machines running on a host have a 1.5:1 memory oversubscription ratio. What is MOST likely to happen if the virtual machines consume all the available memory?
-
The host will page memory to disk
-
The host will reboot
-
The virtual machines will reboot
-
The virtual machines cannot consume all available memory with a 1.5:1 memory oversubscription ratio
Correct answer: The host will page memory to disk
When memory resources are overcommitted, the memory oversubscription ratio will be higher than 1:1. That is true in this question as there is a 1.5:1 ratio.
When memory resources are overcommitted, there is a risk of the guest virtual machines consuming all available RAM and the host paging memory to disk. This can negatively impact performance.
It is unlikely that the host and virtual machines will reboot as a result of memory oversubscription being too high.