CompTIA Cloud+ (CV0-004) Version 2.0.1 Exam Questions

Page 8 of 30

141.

Alex is debugging an issue related to software installed on a virtual machine. The application is displaying an error message when certain input is provided to a form. 

Which log type is MOST likely to have relevant information?

  • Application

  • Security

  • Setup

  • System

Correct answer: Application

Common log types include:

  • Application- Contains logs relevant to drivers and applications on a system.
  • Security- Contains information on authentication and privilege escalation attempts. May also contain audited events. 
  • Setup- Contains information on system patches applied to the system. 
  • System log- Contains operating system messages and information about services that have launched or been terminated. 

142.

Your company's ERP system is experiencing slow response time, and you have been asked to troubleshoot the situation. Your theory of probable cause is that disk read/write performance is the issue.

What storage metrics should you gather and compare against an equivalent baseline to either prove or disprove your theory?

  • Input/output operations per second

  • RAM utilization percentage

  • LUN utilization/sec

  • Volume utilization/sec

Correct answer: Input/output operations per second

Input/output operations per second (IOPS) is an indicator of how storage is being utilized and possibly over-consumed.

LUN utilization/sec and volume utilization/sec are distractor answers. 

RAM utilization is related to memory, not disk.

143.

You are a developer at Acme Inc. You want to modify what features are enabled or disabled when a container is running based on the system it is deployed on. 

What can you use to achieve the desired outcome?

  • Environment variables

  • Hardcoding

  • RDP

  • NVRAM

Correct answer: Environment variables

Environment variables can store values that change how a container works depending on what the variable is set to. Different runtime environments can set different environment variables that can cause the same container image to have different functionality when it is instantiated.

Hardcoding is effectively the opposite of using environment variables and involves writing code that includes specific values. 

Remote desktop protocol (RDP) is a remote access protocol. 

NVRAM is a type of memory that can persist its state after being powered off.

144.

Which of the following BEST describes a use case where an organization may use network segmentation?

  • To optimize security and performance

  • To reduce network costs

  • To maximize available network addresses

  • To combine micro networks

Correct answer: To optimize security and performance

Network segmentation divides a network into small pieces called segments. This allows the organization to apply specific policies and rules to the segments. The more segments there are, the harder it is for attackers to spread their malicious code. Segments can also have different levels of resources applied to them, depending on their performance needs.

Combining smaller networks is the opposite of segmenting them. 

Network segmentation does not directly reduce network costs or increase available network addresses.

145.

A developer runs this command from their development environment:

"git push origin DEV"

Assuming there are no errors or misconfigurations, what does this command do?

  • Pushes the commits made on DEV to origin

  • Pushes the commits made on origin to DEV

  • Reverts the changes made on DEV

  • Reverts the changes made on origin and DEV

Correct answer: Pushes the commits made on DEV to origin

The command "git push origin DEV" would push commits from the local DEV branch to the remote DEV origin. 

It would not revert changes or push changes from origin to DEV.

146.

A solid-state drive is connected to a physical server using a SCSI interface. This is an example of which type of storage?

  • DAS

  • NAS

  • SATA

  • iSATA

Correct answer: DAS

Direct-attached storage (DAS) is storage that is corrected via a physical connection to a server such as a SCSI or SATA interface. Cloud providers sometimes use DAS for ephemeral storage. 

Network-attached storage (NAS) is storage that is accessible over a network. NAS typically uses LAN connectivity.

SATA (serial AT attachment) connections are a way storage can be directly attached. 

iSATA is a distractor answer. 

147.

According to the 3-2-1 backup rule, how many copies of a backup should be saved?

  • 3

  • 2

  • 1

  • 6

Correct answer: 3

The 3-2-1 rule calls for three copies of data to be stored on two different types of media and one copy to be kept off-site.

148.

What data security mechanism is implemented as a hierarchy of trusted security certificates?

  • PKI

  • GRE

  • L2TP

  • IPSec

Correct answer: PKI

Public key infrastructure (PKI) is a hierarchy of trusted security certificates that are issued to users, applications, and devices. A certificate authority is at the top of the hierarchy, and it issues, revokes, and renews all security certificates. Underneath it are the specific user, application, and device certificates.

GRE, L2TP, and IPsec are protocols used for tunneling or encapsulation.

149.

What is a major reason scripting languages are used for orchestration?

  • Simple to learn

  • Large footprint

  • Limited support

  • Require many updates

Correct answer: Simple to learn

Scripting languages use commands that are English-like and intuitive, thereby making them easy to learn and also easily maintainable.

None of the other answers are an advantage that would make scripting languages popular for orchestration tasks.

150.

Your organization's repository of audio and video data is running out of storage space. 

What compression technology can you use to reduce the space but not compromise the quality of the audio and video?

  • Lossless compression

  • Lossy compression

  • CDN

  • Caching

Correct answer: Lossless compression

Lossless compression uses formulas to identify portions of a file that can be compressed in a more efficient format while not compromising quality.

A content delivery network (CDN) can cache the data and present it closer to users for increased performance, but CDN and caching are not compression techniques.

151.

A smart sensor that connects to a network and streams humidity data to a public cloud is an example of what type of technology?

  • IoT

  • CSP

  • MTU

  • MQTT

Correct answer: IoT

Internet of Things (IoT) devices are a category of network-connected (typically Internet-connected) devices that serve some primary purpose other than traditional computing. Common examples of IoT devices include "smart" sensors, cameras, lights, and other embedded systems.

A cloud service provider (CSP) provides cloud services to cloud customers. 

Maximum transmission unit (MTU) is a network setting. 

MQTT is a publish/subscribe style messaging protocol often used by IoT devices.

152.

traceroute is MOST useful for which of the following cases?

  • Enumerating network hops to a destination

  • Querying DNS servers for data

  • Configuration of routing tables

  • Displaying the local ARP table

Correct answer: Enumerating network hops to a destination

traceroute is a Linux command-line tool that can help test connectivity and display network hops between source and destination.

"tracert" is the Windows command-line traceroute tool.

Other tools are better for querying DNS servers (nslookup/dig), configuring routing tables (route), and displaying a local ARP table (arp).

153.

Alex is a member of the USERS and DEV security groups. Alex receives an access denied error when attempting to access a cloud fileshare that users in the DEV security group have full control over. 

You have confirmed network connectivity from Alex's endpoint to the share is reliable, and the DEV security group is properly configured. 

Which of the following is the MOST likely explanation for the issue?

  • An explicit DENY rule in the USERS security group

  • Too many users accessing the fileshare at the same time

  • An IPS is blocking Alex's network traffic

  • Alex's SSH key has not been added to the file server

Correct answer: An explicit DENY rule in the USERS security group

On many systems, an explicit DENY rule could override an ALLOW rule. This could explain Alex's issue, given the scenario described. 

None of the other answers are strongly supported by evidence in the question.

154.

What is a release that contains multiple patches into a single update?

  • Rollup

  • Hotfix

  • Superpatch

  • QFE

Correct answer: Rollup

A rollup release combines multiple patches from a related category into a single update. 

A hotfix is a targeted fix for a critical issue. 

A quick fix engineering (QFE) update is another term for a hotfix. 

Superpatch is a distractor term.

155.

You are a developer creating several containers for an application that will run on cloud-based virtual machines. 

Which of the following statements about your deployment is TRUE?

  • The container and host kernels will be shared

  • You are building a monolithic application

  • You cannot use Windows to run your containers

  • The container and host IP addresses must match

Correct answer: The container and host kernels will be shared

A container shares a kernel with its host operating system (OS). 

Containers are not typically associated with monolithic applications. Containers are more commonly associated with microservices architecture. 

Windows systems can run containers in general. There is nothing in the question that says the containers cannot be Windows containers. 

Container and host IP addresses do not need to match.

156.

Acme Cloud LLC. provides consumers with subscription-based access to Postgres databases over the public internet. Acme Cloud LLC. is responsible for all physical infrastructure, hypervisors, operating system, and patching the Postgres version. Consumers are responsible for defining database schemas and the data stored in the Postgres databases. 

This is an example of which cloud service model?

  • PaaS

  • SaaS

  • Hybrid 

  • Public

Correct answer: PaaS

A cloud service model where Postgres database access is provided by a cloud service provider while the consumer is responsible for schemas and data in the database is an example of database as a service, which is a type of platform as a service (PaaS). 

With a SaaS model, consumers are not responsible for database schemas.

Hybrid and public are cloud deployment models, not cloud service models.

157.

Acme Cloud LLC. is a cloud service provider. They provide an accounting software to cloud consumers. The software is accessible to authorized users over the Internet. 

Acme Inc. maintains all the hardware, hypervisors, operating systems, databases, and patching required to deliver the service. Cloud consumers are responsible for user account management. 

What cloud service model is Acme Cloud LLC. using?

  • SaaS

  • IaaS

  • Private

  • Public

Correct answer: SaaS

Software as a service (SaaS) is a cloud service model where the consumer has the least responsibility. The cloud service provider is responsible for hardware, patching, hypervisors, databases, operating systems, and more. The consumer is typically responsible for application data and user account management with SaaS.

In the infrastructure as a service (IaaS) model, the consumer would be responsible for databases and operating systems. 

Public and private cloud are cloud deployment models, not cloud service models.

158.

For multi-factor authentication, what would be an example of the "something you do" factor?

  • Provide a handwriting sample

  • Provide answers to secret questions

  • Provide physical attribute characteristics

  • Provide security codes

Correct answer: Provide a handwriting sample

The "something you do" factor is an activity performed by the user during authentication. Simple tasks like handwriting or counting to 10 are examples of this factor. 

Answers to secret questions and security codes are both "something you know" factors.

Physical attributes like fingerprints or retina scans are "something you are" factors.

159.

You have a server with 64GB of RAM which runs a type 1 hypervisor.

You have 10 virtual machines with requirements for 8 GB of RAM each. The virtual machines typically only use 1-2 GB of RAM in practice. 

What is the most resource-efficient way you can deploy all 10 virtual machines?

  • Use overcommitting and deploy all 10 VMs on the hypervisor

  • Purchase a second server and run 5 VMs on each server

  • Convert the hypervisor to a type 2 hypervisor

  • Purchase a server for each VM

Correct answer: Use overcommitting and deploy all 10 VMs on the hypervisor 

Overcommitting allows virtual machines to have more memory than is physically available allocated to them. Overcommitting memory is typically based on the assumption that VMs will not use all the RAM allocated to them at the same time. 

Purchasing additional servers is less resource-efficient than using overcommitting. 

A type 2 hypervisor is typically less resource-efficient than a type 1 hypervisor.

160.

What type of redundancy allows a cluster to withstand the complete loss of a system?

  • N + 1

  • Blue-Green 

  • Five nines

  • MPLS

Correct answer: N + 1

N + 1 redundancy is used to describe a cluster that can withstand the loss of a single system without failure. 

Blue-Green is a software deployment model. 

Five nines is a term used to describe 99.999% uptime. 

Multiprotocol label switching (MPLS) is a networking technique.