No products in the cart.
CompTIA Cloud+ (CV0-004) Version 1.0.7 Exam Questions
Page 7 of 30
121.
You have configured a Linux virtual server to act as an FTPS server on a virtual private network. You configured the server to use the default FTPS port.
Client devices cannot connect to the FTPS server. During troubleshooting, you confirm that the client requests are not reaching the FTPS server.
Unblocking which of the following ports is MOST likely to solve the problem?
-
989 and 990
-
53 and 68
-
20 and 21
-
25 and 123
Correct answer: 989 and 990
989 and 990 are the default FTPS ports.
- 20 and 21 and default FTP (not FTPS) ports.
- 123 is the default NTP port.
- 53 is the default DNS port.
- 25 is the default SMTP port.
- 68 is the default DHCP port.
122.
Acme Inc. management wants to understand the usage of each of their private cloud services so they can make budgeting decisions.
What can Acme Inc. use to achieve this goal?
-
Showbacks
-
SLAs
-
MTTR
-
MTBF
Correct answer: Showbacks
Showbacks track usage of IT services to enable decision-making about value relative to cost. Services that are rarely used may not be worth further investment.
A service level agreement (SLA) is a contractual agreement to meet a specific standard for a service. For example, SLAs often define availability and uptime requirements.
Mean time between failures (MTBF) and mean time to repair (MTTR) are common system health and reliability metrics.
123.
Acme Media Services LLC. provides video-on-demand services to customers around the globe. Currently, Acme Inc. only hosts the videos on virtual servers that reside in the United States East region on a public cloud service provider.
Customers in Australia are experiencing high latency and poor performance when streaming video.
What solution could Acme Media Services LLC. implement that would be MOST likely to improve performance for the customers in Australia?
-
CDN
-
VPN
-
DMZ
-
VT-x
Correct answer: CDN
A content delivery network (CDN) stores copies of data such as video, pictures, and static website content at edge locations that are typically closer to end users than origin servers. This can reduce latency and improve performance.
VPN creates an encrypted tunnel over another network. It would not typically reduce latency and improve performance.
A demilitarized zone (DMZ) is a specific network segment that sits between an untrusted network (typically the Internet) and a trusted network.
VT-x is a CPU virtualization technology.
124.
Users Are Us LLC is just beginning to use cloud computing. They want their first project to be the cloud service model that gives the consumer the most control and responsibility.
Which cloud service model is BEST for these requirements?
-
IaaS
-
SaaS
-
Public
-
Private
Correct answer: IaaS
Using the shared responsibility model, IaaS provides consumers with more responsibility and control than PaaS or SaaS.
Public and private are cloud deployment models, not cloud service models.
125.
What type of data would NOT be a good candidate for object storage?
-
Frequently edited wiki pages
-
Image libraries
-
Large video libraries
-
Corporate email archives
Correct answer: Frequently edited wiki pages
Object storage is best for files that don't change frequently and can be useful for large data set storage (e.g., images, videos, and emails). It allows large data sets to be grouped together and processed closer to the storage device versus on the servers.
Small reference files are typically stored in block storage.
126.
Dana is a cloud administrator at Acme Inc. Dana is investigating an issue related to patches applied to a Windows virtual server.
What log should Dana check to review information about recently applied patches?
-
Setup
-
Application
-
System
-
Security
Correct answer: Setup
Common Windows log types include:
- Application- Contains logs relevant to drivers and applications on a system.
- Security- Contains information on authentication and privilege escalation attempts. May also contain audited events.
- Setup- Contains information on system patches applied to the system.
- System- Contains operating system messages and information about services that have launched or been terminated.
127.
Cruz is a database administrator at Acme Inc. who regularly searches a MySQL database to provide insights to management and internal stakeholders.
Cruz wants to improve the performance of commonly searched data in the database. This data is not frequently written.
What should Cruz do to achieve his goal?
-
Index the data
-
Change the datatypes
-
Migrate to a Redis database
-
Use functions
Correct answer: Index the data
Indexing data in a relational database can significantly improve search performance. Indexing can negatively impact write speeds because additional data is associated with indexed data.
The datatypes are not given in the question, and, generally, changing datatypes alone does not meaningfully improve search speed.
Migrating a relational MySQL database to a nonrelational Redis database is a complex task that may not improve search performance at all.
Functions are database operations such as sum or count. Nothing in the question suggests they would directly impact search performance.
128.
Which virtualization technique creates two vCPUs from a physical CPU so that the system can run parallel processes and increase performance?
-
Hyperthreading
-
Hypervising
-
Meta-virtualization
-
Ballooning
Correct answer: Hyperthreading
Hyperthreading creates two virtual CPU cores (vCPUs) from a single physical CPU and allows the system to run processes on both of those vCPUs. The vCPUs share the physical CPU's memory, cache, and system bus.
Ballooning is a technique that enables unused memory to be reclaimed.
Meta-virtualization is a niche concept typically referenced related to virtualization on embedded systems.
Hypervising is not a standard term related to virtualization. A hypervisor is a system that virtualizes physical resources for use by virtual machines.
129.
For multi-factor authentication, what would be an example of the "something you have" factor?
-
Credit card
-
Password
-
Location
-
Fingerprint
Correct answer: Credit card
"Something you have" is a factor that is something in the user's physical possession at the time of authentication.
Password is a "something you know" factor.
Location is a "somewhere you are" factor.
Fingerprint is a "something you are" factor.
130.
What type of cloud cost management model tracks cloud usage metrics in order to bill individual departments for their actual cloud usage?
-
Chargeback
-
Showback
-
Usage-based
-
Depreciation
Correct answer: Chargeback
A chargeback model tracks cloud usage by departments, organizations, or other entities and bills them for their actual usage.
Showback is a distractor answer.
Usage-based is a generic term that can describe any billing model based on usage.
Depreciation is an asset's loss of value over time.
131.
You are running five Java-based applications on the same server. End users are reporting that three of the applications work, but two of the applications are failing. You have verified that the Java Runtime Environment (JRE) is installed on the server.
What is the MOST likely cause of this issue, given the information available?
-
Incompatible JRE
-
Missing JRE
-
Discontinued infrastructure firmware
-
Network service
Correct answer: Incompatible JRE
Any runtime environment has multiple versions, including the Java Runtime Environment (JRE). If JRE is installed but only some applications are functioning, your troubleshooting approach should start with potential incompatibility issues.
JRE is not missing because the question made it clear it is installed.
Nothing in the question directly implies a firmware or network service issue.
132.
You are supporting a global application in the cloud that is accessed by employees across 20 countries. The application has a service level agreement (SLA) mandating a user response time of less than one second. Results of a recent connectivity test show that all users were able to access the application; however, users in three countries experienced average response times of five to ten seconds.
Would this be considered a successful connectivity test?
-
No, because successful connectivity also means latency objectives must be met, especially if there are SLAs.
-
Yes, because all users were able to connect to the application successfully.
-
Yes, because the majority of users were able to connect to the application and experienced a good response time.
-
Yes, because the organization did not experience any downtime.
Correct answer: No, because successful connectivity also means latency objectives must be met, especially if there are SLAs.
Connectivity to a cloud service is defined as both the physical connection to cloud resources and acceptable latency (delay). Slow cloud performance due to connectivity issues can have business impacts on organizations. In this example, there was a published SLA for a sub-second response time. Because a population of users did not experience sub-second response times, this would be considered an unsuccessful connectivity test.
133.
According to the 3-2-1 backup rule, how many copies of a backup should be saved?
-
3
-
2
-
1
-
6
Correct answer: 3
The 3-2-1 rule calls for three copies of data to be stored on two different types of media and one copy to be kept off-site.
134.
What level of drive redundancy does RAID 0 provide?
-
None
-
N+1
-
N+N
-
N+2
Correct answer: None
Redundant array of independent disks (RAID) 0 does not provide redundancy. If a drive fails in a RAID 0 configuration, data will be lost.
Therefore, all the "N+" answers are incorrect.
135.
The DevOps team at Acme Inc. needs to create an automation that preserves a virtual machine's (VM's) current state.
What process should the DevOps team automate?
-
Creating a VM snapshot
-
Creating a VM clone
-
Creating a VM flat file
-
Creating a VM RPM
Correct answer: Creating a VM snapshot
A VM snapshot should be used to preserve the current state of a VM.
A VM clone should be used to create a template for new VMs.
RPM is a Linux package manager.
A flat file is a simple plaintext database-like file, such as a CSV file.
136.
Acme Inc. wants to bill each department in the organization for its share of private cloud utilization.
What can they implement to achieve this goal?
-
Chargebacks
-
KPIs
-
OKRs
-
Smart billing
Correct answer: Chargebacks
Chargebacks enable organizations to bill specific entities (e.g., people, teams, business units, departments, etc.) for their share of resource utilization.
Key performance indicators (KPIs) are metrics that can be measured which track performance related to a specific goal or set of goals.
Objectives and key results (OKRs) are specific goals, typically in an organization or team.
Smart billing is a generic term that is often used in the electrical power industry.
137.
Kim, a security engineer at Acme Inc., is going to run a vulnerability scan on a subnet in Acme Inc.'s private cloud. Kim is unfamiliar with the subnet.
What step should Kim take FIRST?
-
Gather intelligence about the subnet
-
Add credentials to the scanner
-
Run their preferred scanning tool
-
Validate vulnerabilities are legitimate
Correct answer: Gather intelligence about the subnet
The three phases of the vulnerability scanning process, from first to last, are:
- Intelligence gathering- Capturing information about scan targets. If the target is known, this phase may not be required.
- Vulnerability assessment- Use of tools and techniques to enumerate vulnerabilities
- Vulnerability validation- Validating that vulnerability assessment findings are legitimate
In this case, since Kim is unfamiliar with the subnet, they should begin with the first phase and gather intelligence.
138.
A cloud server exposes a REST API so users can read and modify data.
Data returned from the server is MOST likely to be in which of the following formats?
-
JSON
-
YAML
-
SSL
-
TLS
Correct answer: JSON
XML and JSON are the two most common formats used with REST APIs.
SSL and TLS are encryption protocols.
YAML is a data format, but it is not used to send and receive data with REST APIs as commonly as XML and JSON.
139.
Which of the following is a scripting language for SAP reporting that can be used to help automate SAP-related tasks?
-
Advanced Business Application Programming
-
SAP Script
-
Application and Reporting System Programming
-
SAP Shell
Correct answer: Advanced Business Application Programming
Advanced Business Application Programming (ABAP) is a scripting language for SAP reporting.
The other answers are scripting distractor answers.
140.
Your global customers require a 24 x 7 x 365 availability service-level agreement (SLA). That means none of your data centers can afford to experience any failure.
What is the BEST replication strategy for your business requirements?
-
Multi-regional replication
-
Statewide replication
-
Caching replication
-
Semi-regional replication
Correct answer: Multi-regional replication
Multi-regional replication duplicates data across multiple geographies. This strategy offers the highest availability because if there is a failure in one site, there are several other sites that are configured to immediately take over the workload with no interruption.
Statewide replication and semi-regional replication are both distractor answers that would not be as fault tolerant as multi-regional replication.
Caching replication is a distractor answer that would only address availability for cached resources (for example, data stored on a cloud delivery network).