No products in the cart.
CompTIA Cloud+ (CV0-004) Version 2.0.1 Exam Questions
Page 9 of 30
161.
Which of the following is NOT a type of usability testing?
-
Unit
-
Productivity
-
Performance
-
Precision
Correct answer: Unit
The four types of usability tests are:
- Productivity
- Precision
- Pleasantness
- Performance
Unit testing is performed by developers and performed on chunks (units) of code. It is not a type of usability testing.
162.
You are a technology consultant for Acme Inc. Acme Inc. wants to determine which use cases for AI/ML make the most sense for their organization.
Which of the following use cases is LEAST likely to benefit from AI/ML?
-
A text editor for Windows users
-
A system to predict delivery arrival times
-
A facial recognition application
-
A fraud detection system
Correct answer: A text editor for Windows users
Artificial intelligence (AI) and machine learning (ML) are useful for use cases that involve making predictions, pattern recognition (e.g., facial recognition), and anomaly recognition (e.g., fraud detection).
Because a text editor is a straightforward and deterministic application, it is less likely to benefit from AI/ML than a prediction system, facial recognition system, or fraud detection system.
163.
What switch or suffix can be used with the traceroute command to specify the maximum number of hops to trace?
-
-h
-
-d
-
-j
-
-w
Correct answer: -h
The traceroute utility's -h switch allows the operator who is troubleshooting to limit the number of hops returned in the result. This option is used when troubleshooting is only done for a particular portion of the network or subnet.
164.
What is the name of the group of stakeholders that provide input to the change manager regarding proposed Requests For Change (RFC)?
-
Change advisory board
-
Change approval committee
-
Change analysis board
-
Change stakeholder board
Correct answer: Change advisory board
A change advisory board is a collection of stakeholders who can advise on the risks and benefits of a given change and provide input to allow the change manager to make the right decision.
The other answers are distractor answers.
165.
Acme Inc. has copies of their application code in their code repository. They are:
- Dev- Where developers are making changes for the day
- Feature- Where a new feature is being worked on
- Main- The primary source for the production application
What are these copies of the code called?
-
Branches
-
Commits
-
CI
-
CD
Correct answer: Branches
Code branches help teams work on different portions of a program at the same time.
Commits are changes to code in a code repository.
CI (continuous integration) is the practice of regularly and automatically building and testing code.
CD (continuous delivery or deployment) goes a step (or two) further than CI and automatically deploys the changes to a test or production environment.
166.
How does a virtual private network (VPN) provide a secure connection to the cloud?
-
By sending traffic through an encrypted tunnel
-
By sending encapsulated traffic across the LAN
-
By only sending data to trusted endpoints
-
By using onion routing
Correct answer: By sending traffic through an encrypted tunnel
A VPN connection establishes a secure connection between the user and a public communications channel such as the Internet. All data traffic transmitted by the user through the Internet to the cloud is sent through an encrypted virtual tunnel. The user's IP address is masked, making its identity anonymous to others on the network.
VPNs do not necessarily only connect to trusted endpoints.
Sending encapsulated traffic across a LAN would not enable the outbound connections over an untrusted network (like the Internet) VPN connections typically facilitate.
Onion routing is a routing technique that sends traffic through a network of decentralized routers.
167.
Acme Inc. wants to replicate data between two datacenters in different regions. To connect the datacenters, they want to use a high-speed fiber optic connection that is not owned or operated by a telco.
What connectivity solution is the BEST choice for Acme Inc.'s requirements?
-
Dark fiber
-
MPLS
-
VPN
-
EIA/TIA 568
Correct answer: Dark fiber
Dark fiber is fiber optic cable connections that are not owned or operated by the telcos that maintain many of the connection mediums modern enterprises lease.
MPLS lines are often operated by telcos. MPLS networks are not necessarily connected using fiber.
VPNs are encrypted network tunnels that connect network endpoints.
EIA/TIA 568 is a structured cabling standard.
168.
What do routers use to determine the most efficient path to send packets to their destination?
-
Routing tables
-
DMZ
-
Port tables
-
Load tables
Correct answer: Routing tables
A routing table is a data table stored in a router that contains information about the topology of the network immediately around it and the next appropriate "hop" for network traffic.
A demilitarized zone (DMZ) is a specific portion of a network that sits between a trusted internal network and the public Internet.
Port tables and load tables are distractor answers.
169.
You are purchasing physical servers that will act as hypervisors in your organization's private cloud. The servers have x86 Intel processors.
What technology will enable enhanced hardware virtualization support for these servers?
-
VT-x
-
AMD-V
-
EIA
-
vNIC
Correct answer: VT-x
VT-x is an Intel technology that enables enhanced hardware virtualization support for select Intel processors.
AMD-V is a similar technology for AMD processors.
EIA standards are commonly associated with cabling.
vNICs are virtualized network interface cards.
170.
Ansible is primarily used for what purpose?
-
Configuration management
-
Software patching
-
Vulnerability detection
-
Code linting
Correct answer: Configuration management
Ansible is a popular configuration management tool.
None of the other answers describe Ansible's primary use case.
171.
A Linux administrator regularly runs a set of diagnostic commands to capture data from a virtual server. To automate the task, the administrator puts the commands and associated parameters into a plaintext file and makes it executable. They plan to schedule execution of the file using the CRON utility.
This is an example of what practice?
-
Scripting
-
CI/CD
-
Python programming
-
Task Scheduler
Correct answer: Scripting
Scripting is the automation of commands using a scripting language such as bash, PowerShell, or Python.
While Python is a scripting language, nothing in the question says that Python programming specifically was used.
CI/CD is a practice of automating the building, testing, and deployment of code.
Task Scheduler is a Windows tool for scheduling tasks on a system to execute.
172.
What metric describes the maximum end-to-end network bandwidth available?
-
Capacity
-
Throughput
-
Cost
-
Idle time
Correct answer: Capacity
Capacity is a metric that is used to measure the end-to-end network bandwidth in an environment. It accounts for the cloud provider's connectivity and other connections in line with a system.
Cost is how much a user pays.
Idle time is time a resource is unused.
Throughput is a speed measurement often associated with networking. For example, a system may transmit a certain number of bits per second. That number would be its network throughput.
173.
Your users are complaining of performance issues. What type of testing can you use to isolate the specific location of their application performance issues?
-
Remote transactional monitoring
-
Stress testing
-
Load testing
-
Load balance
Correct answer: Remote transactional monitoring
Remote transactional monitoring can isolate individual transactions inside a broader system. This information can be used to focus on the components contributing to the performance issue and address those issues at a more granular level.
Stress testing is used to test a system under peak loads.
Load testing is used to test systems at different load levels.
"Load balance" is a distractor term based on the "load balancer" network appliance.
174.
In which cloud deployment model is a CSP responsible for all infrastructure support and maintenance?
-
Public
-
Private
-
Hybrid
-
Community
Correct answer: Public
In the public cloud model, the cloud service provider (CSP) acquires all resources and provides them to the cloud consumer. The CSP is responsible for infrastructure support and maintenance in this model.
In private, hybrid, and community cloud models, the responsibility for infrastructure can vary.
175.
Integer, date, and decimal are examples of what type of database element?
-
Data types
-
Schemas
-
Functions
-
Views
Correct answer: Data types
Integer, date, and decimal are all examples of data types.
Database schemas define how a database is structured.
Database functions are computations such as count or sum.
Database views are alternative ways to view the data in a database table(s).
176.
Acme Inc. uses Acme Cloud LLC.'s API to retrieve information about cloud resources. Acme Inc. has a set of well-tested scripts that have worked using Acme Cloud LLC's API for the last month.
Acme Cloud LLC updated their cloud platform yesterday and now, all of Acme Inc.'s API calls are failing.
Acme Inc. has not made any changes and there are no network connectivity issues.
What is MOST likely to be the problem?
-
Version mismatch
-
Router misconfiguration
-
Rate limit
-
Malware
Correct answer: Version mismatch
Given that Acme Cloud LLC. just made an update to their system, a version mismatch is reasonably possible. API version mismatches can cause old, functioning API calls to fail with the newer version.
Router misconfiguration is incorrect because the question says that there are no network issues.
Nothing in the question directly suggests malware or rate limiting is involved.
177.
Amal, a QA engineer at Acme Inc., is tasked with testing a cloud application against a specification that details the business logic the application must follow.
What type of testing will Amal perform?
-
Functional
-
Usability
-
Performance
-
Regression
Correct answer: Functional
Functional testing focuses on testing how an application should (or should not) perform. It is typically based on a specification that defines the expected behavior.
Usability testing focuses on how easy to use ("usable") a system is.
Performance testing focuses on a system's ability to perform under load.
Regression testing focuses on testing for issues created by changes or updates.
In this case, Amal is tasked with conducting functional tests to validate that the cloud application is working as expected.
178.
Networked computer systems rely on time synchronization to communicate.
Which of the following is a common method administrators use to ensure that system clocks on virtual machines are properly synchronized?
-
Synchronizing the time between the hypervisor and guest machines
-
Running the Sysprep utility on the virtual machines daily
-
Synchronizing the time between a guest machine with a reference guest machine
-
Virtual machine clocks do not need to be synchronized
Correct answer: Synchronizing the time between the hypervisor and guest machines
The hypervisor is the governing component over the guest virtual machines. "Guest tools" on the virtual machines sync with the hypervisor clock to ensure consistency.
Using the network time protocol (NTP) is another common way to maintain time synchronization, but is not one of the listed options.
Sysprep is a tool for preparing Windows images.
Using a reference guest machine to synchronize time is atypical.
179.
Acme Inc.'s time-tracking application uses rolling updates, and their DevOps team is responsible for delivering those updates to production.
How many code bases is Acme Inc. likely maintaining for the time-tracking application?
-
1
-
2
-
3
-
4
Correct answer: 1
DevOps teams that implement rolling updates typically work from a single code base.
180.
What type of packet inspection considers whether a session related to a packet exists before it will accept the packet?
-
Stateful
-
Stateless
-
HIDS
-
XSS
Correct answer: Stateful
Stateful packet inspection considers whether a session exists before accepting a packet. Stateless packet inspection does not consider whether a session exists.
HIDS (host intrusion detection system) is a type of security tool.
Cross-site scripting (XSS) is a type of web application attack.