No products in the cart.
CompTIA Cloud+ (CV0-004) Version 1.0.7 Exam Questions
Page 9 of 30
161.
What type of performance testing should you do to evaluate a system at its peak load?
-
Stress testing
-
Load testing
-
A/B testing
-
Configuration testing
Correct answer: Stress testing
Stress testing consists of running a peak workload to evaluate how the system behaves under maximum conditions.
Load testing simulates expected system use.
A/B testing and configuration testing are not performance testing techniques.
162.
Acme Inc.'s development team deploys updates to an application running on a PaaS platform at least once per day. The updates are small and incrementally fix bugs and add new features. There are five instances of the application running, and the team updates each one sequentially.
What term BEST describes this approach to maintaining the application?
-
Rolling updates
-
Point-in-time updates
-
Update backlog
-
Blue-green updates
Correct answer: Rolling updates
Rolling updates are applied in segments, avoiding downtime and preventing performance impacts on users while the update is taking place.
Blue-green is a deployment model where one instance is the active production instance and another is a standby production instance used for testing and upgrades.
An update backlog is a generic term for a list or group of updates that need to be performed.
Point-in-time updates is a distractor answer based on point-in-time snapshots and backups, which are copies of systems and data from a specific point in time.
163.
Cruz is a cloud administrator at Acme Inc. Cruz is investigating an issue where an unauthorized user may have escalated their privileges on a Windows virtual server.
What log should Cruz check to confirm if the user did escalate their privileges?
-
Security
-
Application
-
Setup
-
System
Correct answer: Security
Common Windows log types include:
- Application- Contains logs relevant to drivers and applications on a system.
- Security- Contains information on authentication and privilege escalation attempts. May also contain audited events.
- Setup- Contains information on system patches applied to the system.
- System log- Contains operating system messages and information about services that have launched or been terminated.
164.
What encryption method involves a user having exactly two keys?
-
Asymmetric
-
Symmetric
-
DES 128
-
AES 256
Correct answer: Asymmetric
Asymmetric encryption uses a public key and a private key, called a key pair. The public key is shared and is used to encrypt data. The private key is only accessible by the owner and is used to decrypt the data.
Symmetric encryption typically involves the use of one key.
DES and AES are examples of symmetric encryption algorithms.
165.
Acme Inc.'s cloud-based file sharing application has a critical severity security vulnerability that was just identified. The Acme Inc. development team writes a targeted fix that is quickly deployed to production to address this issue.
What term BEST describes this type of update?
-
Hotfix
-
Rollup
-
Service pack
-
Minor update
Correct answer: Hotfix
A hotfix is a targeted fix for a critical issue. A quick fix engineering (QFE) update is another term for a hotfix.
A rollup is a type of update that includes multiple patches.
A service pack contains all the patches for a system since the last main release or service pack.
A minor update is a generic term that often refers to releases that add features but do not introduce breaking changes.
166.
What are the mathematical algorithms that are used to encrypt and secure plaintext?
-
Ciphers
-
Scramblers
-
Keys
-
Obfuscators
Correct answer: Ciphers
A cipher is a step-by-step process for encrypting. The goal is to conceal the meaning of the data.
Scramblers are used in telecommunications to encode or distort a signal.
There are a variety of keys used in computer security. For example, public keys can be used to encrypt data. Keys are not mathematical algorithms.
Obfuscators are used to obfuscate, but not encrypt, data. Obfuscators are sometimes used in software development to make code more difficult to reverse engineer.
167.
Acme Inc. uses Acme Cloud LLC.'s API to retrieve information about cloud resources. Acme Inc. has a set of well-tested scripts that have worked using Acme Cloud LLC's API for the last month.
Acme Cloud LLC updated their cloud platform yesterday and now, all of Acme Inc.'s API calls are failing.
Acme Inc. has not made any changes and there are no network connectivity issues.
What is MOST likely to be the problem?
-
Version mismatch
-
Router misconfiguration
-
Rate limit
-
Malware
Correct answer: Version mismatch
Given that Acme Cloud LLC. just made an update to their system, a version mismatch is reasonably possible. API version mismatches can cause old, functioning API calls to fail with the newer version.
Router misconfiguration is incorrect because the question says that there are no network issues.
Nothing in the question directly suggests malware or rate limiting is involved.
168.
What git command is used to propagate changes from a local code branch to a remote repository?
-
push
-
pull
-
move
-
prop
Correct answer: push
The command "git push" is used to propagate changes from a local code branch to a remote repository.
The command "git pull" does the reverse and propagates changes from a remote repository to a local repository.
"move" and "prop" are not standard git commands.
169.
Users report that the company's newly acquired e-commerce website is showing security errors that are resulting in customers being afraid to place online orders. You have been asked to troubleshoot this issue.
You visit the site and see that it is displaying a certificate error. Upon further investigation, you verify that the certificate has not expired. It was revoked because the owner of the certificate sold the domain and e-commerce site to your company.
What is the appropriate plan of action to resolve the problem?
-
Request a new certificate from the CA or RA
-
Request a new certificate from the previous owner
-
Request a certificate transfer from the previous owner
-
Request a certificate transfer from the CA or RA
Correct answer: Request a new certificate from the CA or RA
In this case, a new certificate is needed, not a transfer.
To acquire a digital certificate, submit the request to the certificate authority (CA) or registration authority (RA). The CA or RA will verify the organization and site's identity and send a new digital certificate.
The previous owner is not the right entity to issue a new certificate.
170.
Acme Cloud LLC. provides consumers with subscription-based access to a word processing application over the internet. Acme Cloud LLC. is responsible for all infrastructure and databases. Consumers are responsible for their data inputs into the program.
This is an example of which cloud service model?
-
SaaS
-
Public
-
Private
-
Hybrid
Correct answer: SaaS
SaaS is a cloud service model where the cloud service provider (CSP) has the most responsibility. CSPs are responsible for all infrastructure and databases in a SaaS model. Consumers are responsible for the data input into SaaS applications.
Public, private, and hybrid are cloud deployment models, not cloud service models.
171.
Which of the following public cloud service models can be described as providing operating system as a service, meaning the cloud provider is responsible for everything from underlying hardware to operating system, and the users build applications on top of the cloud service?
-
PaaS
-
IaaS
-
SaaS
-
XaaS
Correct answer: PaaS
Platform-as-a-service (PaaS) is a cloud service model designed for developers to build applications. PaaS can be described as operating system as a service because the cloud provider is responsible for everything up to the operating system level. That means users do not need to worry about maintenance tasks like patching virtual machines.
SaaS goes beyond PaaS and makes the cloud provider responsible for the application level as well.
IaaS leaves the operating system level the responsibility of the user.
XaaS is a generic term meaning anything as a service.
172.
Kalani is a server administrator at Acme Inc. They take a full backup of a cloud virtual machine and then:
- Store two copies of the backup on a hard drive in their local datacenter
- Store one copy of the backup on a tape drive at an offsite location
This is an example of what practice?
-
3-2-1 rule
-
Vertical scaling
-
Horizontal backup
-
Snapshot scaling
Correct answer: 3-2-1 rule
The 3-2-1 rule calls for three copies of data to be stored on two different types of media, and one copy to be kept off site. In the question, all three of those criteria were met.
- 3 copies of the data total
- 2 on hard drives in the local datacenter
- 1 offsite on a tape drive
Vertical scaling adds resources to an existing server or system.
Horizontal backup and snapshot scaling are not the names of standard practices.
173.
Acme Inc. is looking for low-cost connectivity to public cloud providers. They are willing to accept some unpredictability in performance to keep costs low.
What solution is the BEST fit for these requirements?
-
Public internet
-
Using a dedicated connection
-
Renting bandwidth from other organizations using the same public cloud
-
Building their own global network
Correct answer: Public internet
The Internet is a shared global network with enormous bandwidth and capacity. Organizations can implement their own connections to a public cloud provider, but that is more expensive.
Organizations typically do not allow other organizations to use their bandwidth for security reasons.
174.
What type of encryption requires a single key?
-
Symmetric
-
Asymmetric
-
Isolated
-
ECC
Correct answer: Symmetric
Symmetric encryption requires one key.
Asymmetric encryption requires users to have a public and a private key.
Isolated encryption is not a standard encryption type.
ECC is a type of asymmetric encryption.
175.
Acme Inc. wants to replicate data between two datacenters in different regions. To connect the datacenters, they want to use a high-speed fiber optic connection that is not owned or operated by a telco.
What connectivity solution is the BEST choice for Acme Inc.'s requirements?
-
Dark fiber
-
MPLS
-
VPN
-
EIA/TIA 568
Correct answer: Dark fiber
Dark fiber is fiber optic cable connections that are not owned or operated by the telcos that maintain many of the connection mediums modern enterprises lease.
MPLS lines are often operated by telcos. MPLS networks are not necessarily connected using fiber.
VPNs are encrypted network tunnels that connect network endpoints.
EIA/TIA 568 is a structured cabling standard.
176.
Which of the following statements about availability zones (AZs) and regions is TRUE?
-
Regions typically consist of multiple AZs
-
AZs and regions typically have a 1:1 relationship
-
AZs typically consist of multiple regions
-
AWS supports regions but not availability zones
Correct answer: Regions typically consist of multiple AZs
A region typically consists of two or more availability zones (AZs).
AWS recognizes both the AZ and region concepts.
177.
Your organization's repository of audio and video data is running out of storage space.
What compression technology can you use to reduce the space but not compromise the quality of the audio and video?
-
Lossless compression
-
Lossy compression
-
CDN
-
Caching
Correct answer: Lossless compression
Lossless compression uses formulas to identify portions of a file that can be compressed in a more efficient format while not compromising quality.
A content delivery network (CDN) can cache the data and present it closer to users for increased performance, but CDN and caching are not compression techniques.
178.
You wrote a script that provisions resources on Linux servers for a medium-sized retail business. You are going to automate the execution of the script. The script does not require administrative access to any resources.
What credentials should you use for the script execution?
-
Service account
-
Your own credentials
-
root
-
superuser
Correct answer: Service account
Generally, automated scripts should be executed using a service account or other identity dedicated for the purpose.
You should avoid using your own user credentials or providing privileged (e.g., root or superuser) privileges where practical.
179.
What type of data would be a good candidate for object storage?
-
Image libraries
-
A database with frequent writes
-
Active access logs
-
Active system logs
Correct answer: Image libraries
Object storage is useful for storing infrequently edited files and objects. Common use cases are storing video, image, and PDF files.
All the other options are likely to be written to frequently and are therefore not good candidates for object storage.
180.
traceroute is MOST useful for which of the following cases?
-
Enumerating network hops to a destination
-
Querying DNS servers for data
-
Configuration of routing tables
-
Displaying the local ARP table
Correct answer: Enumerating network hops to a destination
traceroute is a Linux command-line tool that can help test connectivity and display network hops between source and destination.
"tracert" is the Windows command-line traceroute tool.
Other tools are better for querying DNS servers (nslookup/dig), configuring routing tables (route), and displaying a local ARP table (arp).