No products in the cart.
CompTIA Cloud+ (CV0-004) Version 2.0.1 Exam Questions
Page 10 of 30
181.
You would like to deploy your company's workloads into a cloud model that does not require you to maintain any resources. You cannot completely predict how and when the workload will grow in volume, and you need near real-time scalability.
What cloud model is best for your organization?
-
Public
-
Private
-
Hybrid
-
Community
Correct answer: Public
A public cloud model offers the best scalability because its cloud resources are available on demand from a very large pool. For workloads that need to be optimized for fast scalability, a public cloud is typically the best option.
Private and community clouds would typically involve more maintenance and/or be considered less rapidly scalable than public cloud.
Hybrid cloud is a combination of public and private clouds. In this case, the requirements are best addressed by the public cloud instead of combining the two.
182.
The YAML data format is MOST likely to be used in which of the following cases?
-
Ansible playbook
-
Payload data for a RESTful API
-
Payload data for a SOAP API
-
Payload data for a GraphQL API
Correct answer: Ansible playbook
Ansible playbooks are written in YAML.
RESTful API payloads are typically in XML or JSON data formats.
SOAP APIs use XML.
GraphQL APIs typically use JSON.
183.
A Windows virtual server cannot access any cloud resources. You suspect that the IP address and default gateway are misconfigured.
Which command-line tool can you use to check the current IP address and default gateway?
-
ipconfig
-
Ifconfig
-
nslookup
-
eth0
Correct answer: ipconfig
ipconfig is a Windows command line tool for displaying and modifying network interface-related settings, including IP address and default gateway.
ifconfig is a Linux command that serves a similar purpose.
nslookup is used for DNS-related queries.
eth0 is a popular label for network interfaces on many Linux systems.
184.
When an organization makes the end users responsible for their own software updates, where are the new versions typically published and made available for download?
-
Update server
-
Code repository
-
Commit database
-
Continuous deployment server
Correct answer: Update server
An update server is accessible by end users when and if the point in time arises when they choose to update their software.
End users would not typically access code repositories, a continuous deployment server, or a database that stored code commits.
185.
What password guideline does NIST recommend in its special publication (SP) 800-63B that strengthens password complexity?
-
Two-factor authentication
-
Passwords with letters only
-
Password length of at least 12 characters
-
No spaces
Correct answer: Two-factor authentication
NIST SP 800-63B recommends practices such as a minimum password length of 64 characters and using two-factor authentication.
NIST SP 800-63B does not recommend passwords with letters only or no spaces.
186.
Alex, a systems administrator at Acme Inc., needs to troubleshoot why an application is not responding to HTTP POST requests from a Windows client on a different subnet.
Alex wants to begin troubleshooting by determining how many network hops are between the Linux virtual server running the application and the Windows client.
What Linux command can Alex use to enumerate the network path from the Linux virtual machine client to the Windows client?
-
traceroute
-
tracert
-
tcpdump
-
route
Correct answer: traceroute
traceroute and tracert enumerate the network "hops" between devices. tracert is the Windows version of the command. traceroute is the Linux version of the command.
route allows users to print and manipulate the local routing table.
tcpdump is a packet capture utility that allows users to "sniff" traffic on a network interface.
187.
A virtual machine created a swap file. Where will the swap file be stored?
-
On disk
-
In RAM
-
In CPU
-
On a NAS
Correct answer: On disk
A swap file is a special type of file machines use as virtual RAM. When all of a machine's RAM is allocated, it can move some memory to disk in a swap file.
CPU resources are compute resources and are not primarily used for data or swap file storage.
A network attached storage (NAS) system is a specific type of storage system with disks, but it is not the only type of storage a swap file could be saved to. Because there is nothing to suggest a NAS is in use, on disk is the better answer.
188.
When analyzing the effectiveness of cloud documentation, what is the MOST important aspect in the documentation to look for?
-
Up-to-date and accurate configuration information
-
Listing of log files
-
Where the documentation is stored
-
Certifications
Correct answer: Up-to-date and accurate configuration information
When issues arise, cloud professionals turn to the documentation. Cloud set-up and configuration information is required to troubleshoot the problem quickly. This includes details about which applications are running on which host computer or virtual machine and how it is all set up. Even more critical is that this information is updated every time a change is made. Out-of-date and incomplete set-up and configuration information will hinder efficient problem-solving.
Documentation should be stored in a place where it is properly secured and accessible to authorized parties, but that is not as relevant to the question as up-to-date and accurate configuration information.
Documentation may or may not include log information or require specific certifications. Therefore, these answers are not the best choice.
189.
You deployed a new global cloud-based e-commerce system over Labor Day for a new line of products your company is selling. During the after-Thanksgiving sale, customers on the U.S. West Coast were calling Customer Support, complaining that they could not access the system for over four hours. When they were finally able to log in, performance was very poor. However, customers in the rest of the U.S., as well as other countries, were not reporting any incidents. You have been asked to troubleshoot this deployment issue.
What is the MOST likely cause of this type of issue?
-
Regional cloud service provider outage
-
End user internet connectivity issues
-
Licensing issues
-
Integration issues relating to different cloud platforms
Correct answer: Regional cloud service provider outage
Cloud-based global deployments typically span multiple cloud data centers. This is done so that users in different countries have optimum network connectivity and a good response time.
In this example, the likely cause is that there was an outage in one of the data centers since they were not able to access the system for several hours. The fact that they could log in after four hours but with poor performance indicates that the cloud provider re-directed the traffic to another one of their data centers, which caused latency.
190.
What CPU virtualization technology allows you to assign more vCPUs to virtual machines on physical CPUs than is typically configured?
-
Overcommitment
-
Over-virtualization
-
Ballooning
-
Memory bursting
Correct answer: Overcommitment
Overcommitment allows the hypervisor to present more virtual resources to virtual machines than are physically available. For example, a hypervisor could present 4 vCPUs to a virtual machine when there are only 2 physical CPUs.
Overcommitment is based on the idea that machines will not use all allocated resources. The amount of assigned vCPUs to actual CPUs is known as the CPU oversubscription ratio
Over-virtualization is not a standard term.
Ballooning and memory busting are related to memory (e.g., RAM), not compute (e.g., CPU) resources.
191.
What logging-related capability would enable related events to be combined to provide a more holistic view of an incident or event and indication of root cause?
-
Event correlation
-
Event patterning
-
Event trending
-
Event analysis
Correct answer: Event correlation
Event correlation is a technique for synthesizing large amounts of event data, analyzing relationships between events, and identifying patterns to determine the root cause.
Event patterning and event trending are distractor terms.
Event analysis is a generic term for reviewing and analyzing events.
192.
Which of the following statements about CI/CD is TRUE?
-
CD goes beyond CI
-
CI goes beyond CD
-
CI does not include testing
-
CD does not include testing
Correct answer: CD goes beyond CI
Continuous deployment (or delivery) goes beyond the continuous integration (CI) process.
CI involves building and testing software automatically. Continuous deployment takes the additional step of automatically deploying to production. Continuous delivery deploys to a preproduction environment.
193.
Acme Inc. follows an update process that involves upgrading 10% of their cloud servers and monitoring for issues before proceeding with the rest of the updates.
What term BEST describes this process?
-
Canary deployment
-
Hotfix
-
Blue-green
-
Rolling updates
Correct answer: Canary deployment
A canary deployment is applied to a small number of systems to see if there are any issues with the build before proceeding with more updates.
A hotfix is a specific update to address an urgent software issue.
Rolling updates are updates that are applied frequently and in small chunks. The continuous delivery model is a good example of rolling updates in practice.
Blue-green development involves having a secondary instance that can be updated and tested while a primary instance serves production users.
194.
How are permissions to view, change, or delete resources such as files, folders, and applications managed in the cloud?
-
Access control
-
Authentication
-
Load balancing
-
Discretionary denial of service
Correct answer: Access control
Access control is the process of authenticating and authorizing users and hosts that wish to access resources in the cloud.
Authentication is the process of validating that a claim to an identity is legitimate.
Load balancing is used to distribute requests across multiple systems.
Discretionary denial of service is a distractor answer.
195.
Which method, used by both an IDS and an IPS, looks for patterns that appear malicious by comparing them to a baseline of normal network behavior?
-
Heuristics
-
Signatures
-
Algorithms
-
Spoofing
Correct answer: Heuristics
An organization will establish and configure a network baseline for normal traffic and operations. The IDS and IPS inspect the traffic and continuously map it against the baseline to search for potential malicious activities.
Signatures are used to match specific known malicious data.
Algorithms applies broadly to a wide range of rule-based data processing. While the heuristics an IDS/IPS uses may use algorithms, heuristics are the more specific answer.
Spoofing is the act of falsifying data, typically with the intent of tricking a person or system.
196.
An organization's employees need to access the Internet from their internal devices through the company firewall.
What technique can the organization use to map multiple internal IP addresses to a single public IP address?
-
Port Address Translation (PAT)
-
Media access control (MAC)
-
Router Address Translation (RAT)
-
Internet Address Translation (IAT)
Correct answer: Port Address Translation (PAT)
PAT is used to translate private IP addresses into a public IP address via port numbers. Translating addresses from multiple devices to a single public IP address is a common use case for PAT.
Media access control (MAC) is a layer 2 networking concept that does not deal with mapping private and public IP addresses.
Internet Address Translation (IAT) and Router Address Translation (RAT) are distractor answers.
197.
You are the cloud engineer for a small company and set up the network connection between your organization and the public cloud, where your systems run. Recently, all your users have begun complaining of increasingly slower network performance at all times of the day and, in some cases, they cannot connect to the network at all.
Which cloud performance variable would you test for FIRST?
-
Bandwidth
-
RAM utilization
-
Input/output operations per second (IOPS)
-
Virtual machine allocation
Correct answer: Bandwidth
Bandwidth refers to the maximum amount of data that can be transferred throughout the network. It is bound by an organization's Internet connection and the capabilities of the network devices. In this scenario, since all employees are experiencing slow performance, and some are not even able to acquire a network connection, the first step is to determine if the overall network bandwidth/capacity can serve the user population.
RAM utilization is relevant to memory consumption, and IOPS is relevant to disk read/writes. While these may come up in troubleshooting, checking bandwidth consumption is the best first step.
Virtual machine allocation is not a descriptive enough response to be viable in this case.
198.
Alex, a systems administrator at Acme Inc., needs to troubleshoot why an application is not responding to HTTP POST requests from a Windows client on a different subnet.
Alex wants to begin troubleshooting by viewing the local routing table on the Windows client.
What Windows command can Alex use to view the Windows machine's local routing table?
-
route
-
tcpdump
-
traceroute
-
tracert
Correct answer: route
tcpdump is a packet capture utility that allows users to "sniff" traffic on a network interface.
traceroute (Linux) and tracert (Windows) enumerate the network "hops" between devices.
199.
What metric is used to measure how long a process waits to use a CPU for processing?
-
CPU wait time
-
CPU idle time
-
Process wait time
-
Process idle time
Correct answer: CPU wait time
CPU wait time is a metric that measures how long a process or thread waits for a CPU before it performs processing functions.
CPU idle time is time when a CPU is not being utilized.
Process wait time and process idle time are distractor answers and are not standard metrics.
200.
In which layer of the OSI networking model does a top-down troubleshooting approach start?
-
Application
-
Dara link
-
Physical
-
Network
Correct answer: Application
The Open Systems Interconnection (OSI) model is a seven-layer model. The layers are:
- Physical
- Data link
- Network
- Transport
- Session
- Presentation
- Application
A "top-down" troubleshooting approach starts at the application layer and works "down" the layers. A "bottom-up" troubleshooting approach starts at the physical layer and works up.