CompTIA Cloud+ (CV0-004) Version 2.0.1 Exam Questions

Page 7 of 30

121.

Assuming a full backup is available but not up to date, how many backups are needed to restore from a differential backup?

  • Exactly 2

  • At least 2

  • At least 3

  • Exactly 3

Correct answer: Exactly 2

When using differential backups, the last full backup and most recent differential backup are required for restoration. Therefore, "exactly 2" is the correct answer.

122.

study.example.com has a public IP address of 203.0.113.1. 

Most users can access study.example.com, but one user complains they cannot. 

You run the commands below and get the associated output. The issue is MOST likely related to which protocol? 

C:\>ping 203.0.113.1

Pinging 203.0.113.1 with 32 bytes of data:
Reply from 203.0.113.1: bytes=32 time=20ms TTL=57
Reply from 203.0.113.1: bytes=32 time=10ms TTL=57
Reply from 203.0.113.1: bytes=32 time=15ms TTL=57
Reply from 203.0.113.1: bytes=32 time=10ms TTL=57

Ping statistics for 203.0.113.1:
   Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
   Minimum = 10ms, Maximum = 20ms, Average = 13ms

C:\>ping study.example.com
Ping request could not find host cool.example.org. Please check the name and try again. 

  • DNS

  • NTP

  • IPv4

  • IPv6

Correct answer: DNS

The ping output shows that the user's machine can ping the public IP address (203.0.113.1), but not the domain name (study.example.com). This suggests there is an issue with the domain name system (DNS) protocol responsible for resolving domain names.

IPv4 connectivity seems to be working, based on the ping output.

IPv6 is not mentioned or shown in the question.

The network time protocol (NTP) is used for time synchronization.

123.

You have monitored and collected resource metrics for the last 12 months. Your budget request for next year's cloud capacity requirements is due in the next 60 days. 

How can you BEST use the resource information you currently have to make the budget request?

  • Forecast capacity requirements

  • Run a regression test on the data

  • Request maximum capacity as a buffer

  • You cannot use this information

Correct answer: Forecast capacity requirements

Since you have 12 months' worth of resource utilization and performance information, you will be able to trend and calculate your requirements for the next 12 months with accuracy.

Regression testing is about testing software for issues after an update or upgrade.

Requesting maximum capacity as a buffer would not make the best use of the data.

124.

You would like your cloud operators to automatically receive an email when a monitored event occurs. 

What protocol should you configure on the monitoring system sending the alerts so it can send emails?

  • SMTP

  • WAP

  • SMS

  • SNMP

Correct answer: SMTP

Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for email. 

A wireless access point (WAP) is a device used for Wi-Fi connectivity. 

Simple messaging service (SMS) is used for text messaging. 

Simple network management protocol (SNMP) is a network protocol used for monitoring and managing network devices. It does not send email directly.

125.

A baseline is a point-in-time snapshot of the resources that are being consumed by cloud services. We compare the current environment against a baseline to understand any differences and changes. 

When you want to determine if events that have occurred are outside the norm, what type of baseline comparison are you doing?

  • Anomaly testing

  • Performance testing

  • Capacity testing

  • Component testing

Correct answer: Anomaly testing

Anomalies are events that deviate from what is standard or expected. The baseline shows the expected behavior. An anomaly can indicate that a problem has occurred or can highlight a pattern that predicts that a problem may be in the works. This type of comparison allows an organization to quickly ascertain that what they are seeing is out of the ordinary and needs to be addressed.

Performance testing focuses on system performance (e.g., speed, load times, etc.) under various conditions. 

Capacity testing focuses on how much load a system can handle. 

Component testing focuses on a specific component in a system.

126.

What type of resource quota can be defined such that users and applications are barred from exceeding it?

  • Hard

  • Soft

  • Preemptive

  • Throttled

Correct answer: Hard

If a hard quota is set and a user or application attempts to access resources beyond the set quota, the request is rejected, and an alert is logged with the system management tool. 

Soft quotas allow the request and only perform the alerting.

Preemptive and throttled are distractor answers.

127.

How many keys are used by a single user in asymmetric encryption?

  • 2

  • 0

  • 1

  • 3

Correct answer: 2

With asymmetric encryption, each user typically has a public key and a private key.

128.

Your organization is running out of storage because users have stored many redundant copies of their data. 

What technology would you use to free up space?

  • Deduplication

  • Caching

  • Garbage collection

  • Compression

Correct answer: Deduplication

Deduplication removes redundant data from a storage system by finding the location of the copies and placing a pointer to those copies instead of storing the physical data multiple times.

Compression could decrease the size of the pieces of redundant data, which would improve storage utilization. However, deduplication is the better answer because it removes the redundant copies completely. 

Caching can improve read performance on stored data, but would not directly address duplicate data and storage space challenges. 

Garbage collection is a memory management technique used by many programming languages.

129.

A DevOps engineer wants to allocate a specific directory tree, not an entire logical disk, to a Docker container. 

What should the DevOps engineer use to allocate the storage to the container?

  • Bind point

  • Volume

  • OCI specification

  • RDP

Correct answer: Bind point

Bind points are used to allocate specific directory trees to a Docker container or other container. 

Volumes allocate the entire logical disk. 

RDP is a remote access protocol.

OCI specification is a distractor answer. There are OCI specifications for container runtimes and formatting.

130.

Batch jobs execute during a fixed, specific window of time that is usually scheduled so as not to impact production, performance-oriented systems. 

If you are troubleshooting a daily batch job that was meeting its scheduled window of completion last week but is not this week, which of these potential causes is MOST likely?

  • New resource-intensive batch jobs have been added to the fixed window

  • Batch jobs have been removed from the fixed window

  • Storage utilization on data volumes for the batch jobs has decreased

  • Batch server utilization has decreased

Correct answer: New resource-intensive batch jobs have been added to the fixed window

 Adding additional batch jobs to a fixed window of time can cause one or more to not be able to complete. 

All the other answers are about removing load, which would not be as likely to cause delays in completion of a previously working job.

131.

What configuration management tool uses playbooks written in YAML?

  • Ansible

  • ELK

  • Grafana

  • GraphQL

Correct answer: Ansible

Ansible is a configuration management tool that uses YAML playbooks. 

ELK is a technology stack consisting of Elasticsearch, Logstash, and Kibana. 

Grafana is a graphing and data visualization tool. 

GraphQL is a type of API.

132.

You have configured a Linux virtual server to act as a DHCP server on a virtual private network. You configured the server to use the default DHCP port. 

Client devices cannot receive the DHCP addresses from the server. During troubleshooting, you confirm that the client requests are not reaching the DHCP server. 

Unblocking which of the following ports is MOST likely to solve the problem?

  • 68

  • 53

  • 123

  • 989

Correct answer: 68

68 is the default DHCP port.

989 and 990 are the default FTPS ports.

123 is the default NTP port.

53 is the default DNS port.

133.

Acme Inc.'s development team deploys updates to an application running on a PaaS platform at least once per day. The updates are small and incrementally fix bugs and add new features. There are five instances of the application running, and the team updates each one sequentially. 

What term BEST describes this approach to maintaining the application?

  • Rolling updates

  • Point-in-time updates

  • Update backlog

  • Blue-green updates

Correct answer: Rolling updates

Rolling updates are applied in segments, avoiding downtime and preventing performance impacts on users while the update is taking place.

Blue-green is a deployment model where one instance is the active production instance and another is a standby production instance used for testing and upgrades. 

An update backlog is a generic term for a list or group of updates that need to be performed. 

Point-in-time updates is a distractor answer based on point-in-time snapshots and backups, which are copies of systems and data from a specific point in time.

134.

Alex wants to use PKI to digitally sign an email before sending it to Cruz. Alex signs the email with their private key. 

How should Cruz validate that Alex's email signature is valid?

  • With Alex's public key

  • With Alex's private key

  • With Cruz's public key

  • With a random number

Correct answer: With Alex's public key

Signing the email with Alex's private key will allow Cruz to validate the signature with Alex's public key. 

Cruz's public key and/or a random number are not required in this case.

135.

Luka is a security engineer at Acme Inc. While analyzing email traffic, Luka notices that an email address has a FROM address that is different from its actual source address.

This FROM address mismatch is a likely example of what?

  • Spoofing

  • MiTM

  • DNS poisoning

  • Reflection

Correct answer: Spoofing

Spoofing occurs when an attacker presents an address or identity that is modified to look like it comes from one (usually legitimate) source, but it is actually from another.

Man-in-the-middle (MiTM) attacks occur when an attacker places themselves between a sender and recipient of information so the attacker can read and/or modify information. 

DNS poisoning involves injecting incorrect or malicious information into the DNS cache. 

A reflection attack is a type of denial of service (DoS) attack.

136.

The representational state transfer standard uses operations from what network protocol?

  • HTTP

  • SSH

  • SNMP

  • SOAP

Correct answer: HTTP

The representational state transfer (REST) standard uses HTTP operations. 

It does not use SSH or SNMP operations. 

SOAP is different standard for exchanging and modifying data using APIs.

137.

MTTR measures what?

  • Average time to repair a failed component

  • Average backup creation time

  • Mean backup recovery time response

  • Mean initialization time for containers

Correct answer: Average time to repair a failed component

Mean time to repair (MTTR) is a metric that measures the average time it takes to repair a failed hardware component. 

It does not measure backup times or container initialization times.

138.

You are a cloud network administrator at Acme Inc. You enable support for jumbo frames on several network appliances. 

Which of the following will likely happen as a result?

  • Less processor utilization on the networking appliances

  • Increased TTLs on the networking appliances

  • Decreased TTLs on the networking appliances

  • Increased hop counts on the networking appliances

Correct answer: Less processor utilization on the networking appliances

Jumbo frames allow network devices to support packet payloads up to 9,000 bytes. Supporting larger packet payloads leads to less network-related processor utilization than with smaller payload sizes.

Enabling jumbo frames would not directly change network TTLs or hops.

139.

What type of update typically includes all the bug and security fixes since the last main application update?

  • Service pack

  • QFE update

  • Hotfix

  • Patch

Correct answer: Service pack

A service pack contains all the patches and rollups for a system since the last main release or service pack.

A hotfix is a targeted fix for a critical issue. 

A quick fix engineering (QFE) update is another term for a hotfix. 

A patch is a general term for a bug or security fix.

140.

Acme Inc. has deployed a perimeter firewall and now needs to define what traffic will be allowed or denied. 

What needs to be configured on the firewall to meet this requirement?

  • Access control list

  • Load balancer configuration

  • Network translation table

  • Routing registry

Correct answer: Access control list

Access control lists (ACLs) describe what access rights users have for specific resources. Firewalls use this information to reject, pass through, and direct traffic.

A load balancer configuration would not help in this specific case as a load balancer is a separate type of network device. 

Network translation table is a reference to network address translation (NAT) which deals with mapping internal and external IP addresses. 

Routing registry is a reference to the Internet Routing Registry (IRR), which is a database of information used to help with routing on the public internet.