No products in the cart.
CompTIA Cloud+ (CV0-004) Version 2.0.1 Exam Questions
Page 5 of 30
81.
A baseline is a point-in-time snapshot of the resources that are being consumed by cloud services. We compare the current environment against a baseline to understand any differences and changes.
When you want to start budgeting for future cloud purchases, what type of baseline comparison could you do?
-
Resource capacity comparison
-
Anomaly detection
-
Performance comparison
-
Availability comparison
Correct answer: Resource capacity comparison
Comparing the baseline resource utilization against current utilization allows an organization to perform trend analysis and calculate the cloud growth. By examining the growth pattern from the original baseline, they can accurately forecast their capacity needs and calculate the amount of the budget needed.
Anomalies are deviations from a normal baseline that would typically be more closely associated with security events and incidents, rather than a change in long-term resource utilization.
While limited resources could create availability issues, that is not the only possible cause and, in that case, availability decreasing is a symptom of a resource capacity issue.
Similarly, a performance degradation could be created by resource utilization issues, but again, the performance degradation would be a symptom of limited resource capacity or some other problem.
82.
What security authentication method allows a cloud user to use their own on-premises user accounts and passwords to access cloud services from a public cloud provider?
-
Federation
-
Role-based access
-
Authentication
-
Authorization
Correct answer: Federation
Federation is a trusted security relationship that is maintained between organizations. It allows users from each organization to have access to each other's services using a single set of credentials.
83.
What type of encryption requires a single key?
-
Symmetric
-
Asymmetric
-
Isolated
-
ECC
Correct answer: Symmetric
Symmetric encryption requires one key.
Asymmetric encryption requires users to have a public and a private key.
Isolated encryption is not a standard encryption type.
ECC is a type of asymmetric encryption.
84.
Acme Inc. operates a cloud-based file server. Recently, the server became overloaded with requests due to a surge in demand. To avoid similar issues in the future, Acme Inc. deployed an additional server and load balancer to distribute the load across two servers instead of one.
This is an example of what?
-
Horizontal scaling
-
Vertical scaling
-
Blue-green scaling
-
Canary scaling
Correct answer: Horizontal scaling
Horizontal scaling occurs when additional servers or systems are added to a deployment.
Vertical scaling occurs when resources are added to existing systems or servers.
Blue-green and canary are deployment strategies, not scaling techniques.
85.
Which of the following statements about using bind points and volumes for Docker container storage is TRUE?
-
Volumes provide better performance, bind points are better for shared files
-
Bind points provide better performance, volumes are better for shared files
-
Docker containers can only use bind points, volumes are not supported
-
Bind points and volumes are synonymous
Correct answer: Volumes provide better performance, bind points are better for shared files
Docker containers and other containers can mount storage using volumes or bind points. Volumes provide better performance, bind points are better for shared files.
86.
What requirement would drive an organization to implement a dedicated computing environment instead of a shared computing environment?
-
Regulated data privacy
-
Low overcommitment ratio
-
Lower cost of dedicated computing
-
Low amount of customization
Correct answer: Regulated data privacy
Shared computing environments are low-cost because the cloud provider does not customize the resources and can distribute the costs over many tenants. Cloud providers are also increasing their ability to provide strong performance and security solutions in a shared environment. However, regulations do exist (i.e., governmental, contractual, industry-specific) that require that an environment not be shared with any other tenant.
87.
A content delivery network (CDN) is an implementation of what type of secondary data store?
-
Replica
-
Synthetic
-
Differential
-
Cloud NAS
Correct answer: Replica
Replicas improve reliability and fault tolerance because backup copies are replicated to multiple storage devices at different locations. A CDN is an example of replicas in practice. CDNs are commonly used to distribute copies of data such as video and web assets for better performance.
Network attached storage (NAS) is a type of file storage commonly used for sharing files with multiple users. A NAS is not necessarily a secondary data store.
Synthetic is a term that could be part of multiple concepts, such as synthetic testing or synthetic full backups (which are full backups made from an old full backup and incremental backups).
Differential is a backup strategy that involves backing up changes since the last full backup.
88.
Which encryption method uses the same key to encrypt and decrypt data?
-
Symmetric
-
Asymmetric
-
RSA
-
DSA
Correct answer: Symmetric
Symmetric encryption uses the same keys for encryption of plaintext and decryption of ciphertext. The keys are shared and must be known between all participating parties.
DSA and RSA are types of asymmetric encryption.
89.
What type of release comes before a stable build or production release?
-
Beta
-
LTS
-
GA
-
Green
Correct answer: Beta
Beta software releases come before a software's "stable" or generally available version is released. Beta versions will typically have fixes and features not yet available to users of more stable releases.
Long-term support (LTS) versions of software are intended to have high reliability and quality. They can reduce some of the risk associated with being on the latest stable or generally available version of an application or appliance.
Generally available (GA) releases are typically a reference to software that is stable and passes the beta stage.
Green is not a standard software release type. It is a reference to the blue-green deployment model.
90.
Acme Inc.'s DevOps team creates virtual machine backups that take a snapshot of a virtual machine while the virtual machine is shut down.
What is the name for this type of snapshot?
-
Application-consistent snapshot
-
Crash-consistent snapshot
-
Continuous snapshot
-
Integrated snapshot
Correct answer: Application-consistent snapshot
An application-consistent snapshot is taken while a virtual machine is shut down.
A crash-consistent snapshot is taken while a virtual machine is running.
Continuous snapshot and integrated snapshot are distractor answers.
91.
In addition to being alerted when a system condition occurs or a threshold is hit, you would like to execute the next-step actions to take without requiring operator intervention.
How will you accomplish this?
-
Automated event response
-
Programmatic alert remediation
-
Operator-free response
-
Threshold configuration
Correct answer: Automated event response
Automated event responses will trigger a script or orchestration workflow to be executed when a threshold is hit. Automated event responses ensure that issues are handled consistently and on a timely basis.
Programmatic alert remediation and operator-free response are distractor answers.
Threshold configuration is the prerequisite for automated event response in this case.
92.
Which of the following is a prerequisite for detecting an anomaly with cloud infrastructure?
-
Baseline
-
Syslog
-
IaC
-
CPU monitoring
Correct answer: Baseline
Anomalies represent a deviation from a baseline value. Therefore, without a baseline, you cannot have an anomaly.
Syslog is a logging protocol. While it could be used to detect some anomalies, it is not a requirement.
CPU monitoring is required for detecting CPU anomalies, but there are other types of cloud infrastructure anomalies (e.g., RAM, I/O, network utilization, etc.) that do not require CPU monitoring.
Infrastructure as code (IaC) is an approach to maintaining infrastructure configuration like source code.
93.
An SVC helps teams manage what resource?
-
Source code
-
Memory
-
IoT devices
-
Virtual servers
Correct answer: Source code
Source version control (SVC) systems are used to manage source code.
SVCs are not primarily used to manage memory, IoT devices, or virtual servers, although the source code stored in an SVC system could help teams manage resources related to any one of those.
94.
You are a Software as a Service (SaaS) cloud user. Which of the following application components is NOT provided by your SaaS cloud provider?
-
Physical client device
-
User interface
-
Data storage
-
Program
Correct answer: Physical client device
An application consists of a user interface, data, and the program.
Cloud providers do not provide a physical device to gain access to the platform. There could be a wide variety of choices for the end user, including mobile devices and laptops.
95.
Acme Inc. has a legacy accounting application that currently runs on an on-premises server. They are replacing the application by decoupling its components and deploying them across multiple containers in a cluster to create a new application.
What type of architecture is the new application using?
-
Microservices
-
Cloud
-
Monolith
-
MVC
Correct answer: Microservices
Microservices architecture involves breaking an application down into smaller, typically containerized, components that are loosely coupled and serve a specific purpose in a larger application.
Cloud is too generic of a term to be applicable to this question.
Monolith architectures include all the services and components needed to run an application deployed on the same system. The legacy application is an example of a monolith.
Model-view-controller (MVC) is an approach to web application design.
96.
In what standard software environment is an application made available to end users?
-
Production
-
User readiness
-
Blue-green
-
Quality assurance
Correct answer: Production
Production is the environment that users log into to use an application on a regular and operational basis.
97.
You are a developer and need secure access to files in the cloud in order to edit the information in the files and develop applications around them. Your work is sensitive, and you need both the data and commands you are using to be encrypted.
Which protocol would you use?
-
Secure File Transfer Protocol (SFTP)
-
Secure File Developer Protocol (SFDP)
-
Secure Sockets Layer (SSL)
-
Secure Transport Layer Transmission (STLT)
Correct answer: Secure File Transfer Protocol (SFTP)
Secure File Transfer Protocol (SFTP) is designed to provide secure access to files and file management operations over the Internet. It uses a security technique called Secure Shell (SSH), which encrypts both the data and commands being used.
Secure File Developer Protocol (SFDP) and Secure Transport Layer Transmission (STLT) are not standard protocols.
Secure Sockets Layer (SSL) is an encrypted communication protocol that was often used to encrypt data in transit. It does not directly support file transfers as described in the question and has been replaced by Transport Layer Security (TLS) in modern systems.
98.
A user walks up to an automated teller machine (ATM) and inputs their bank card. They then input a personal identification number (PIN) and withdraw money.
Is this an example of multifactor authentication?
-
Yes, because a "something you have" and "something you know" factors were used.
-
Yes, because a "someplace you are" and "something you have" factors were used.
-
No, because only one factor was used.
-
No, because multifactor authentication requires a network.
Correct answer: Yes, because a "something you have" and "something you know" factors were used.
Multifactor authentication (MFA) requires the use of two or more authentication factors. In this case, the bank card was a "something you have" factor, and the PIN was a "something you know" factor.
99.
Which type of storage is attached to the computer and does not require network conductivity to be accessed by the computer?
-
Direct-attached storage (DAS)
-
Network-attached storage (NAS)
-
Object storage
-
Hardware file share (HFS)
Correct answer: Direct-attached storage (DAS)
DAS is physically connected to the host computer through internal hardware.
HFS is not a standard type of storage.
Object storage is a type of storage for unstructured data.
Network-attached storage (NAS) is accessed over a network.
100.
Your team of cloud architects and engineers has deployed a series of applications into cloud infrastructure. They now want to automate maintenance tasks such as applying updates using an in-house automation platform.
What does the team need to create to automate these tasks?
-
Runbooks
-
Technical designs
-
Architecture blueprints
-
Infrastructure-as-code manuals
Correct answer: Runbooks
Runbooks define repeatable tasks to automate activities like software updates or alarm response. Utilizing a runbook for common, routine tasks ensures that the operations team is supporting the environment in a consistent manner.
Technical designs and architecture blueprints are design documentation that would not automate maintenance tasks.
Infrastructure-as-code (IaC) manuals is a generic term that refers to documentation related to IaC.