Spring Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

CV0-004 CompTIA Cloud+ (V4) Questions and Answers

Questions 4

A company wants to combine solutions in a central and scalable environment to achieve the following goals:

• Control

• Visibility

• Automation

• Cost efficiency

Which of the following best describes what the company should implement?

Options:

A.

Batch processing

B.

Workload orchestration

C.

Containerization

D.

Application modernization

Buy Now
Questions 5

A security analyst reviews the daily logs and notices the following suspicious activity:

CV0-004 Question 5

The analyst investigates the firewall logs and identities the following:

CV0-004 Question 5

Which of the following steps should the security analyst take next to resolve this issue? (Select two).

Options:

A.

Submit an IT support ticket and request Kali Linux be uninstalled from John Smith's computer

B.

Block all inbound connections on port 4444 and block the IP address 201.101.25.121.

C.

Contact John Smith and request the Ethernet cable attached to the desktop be unplugged

D.

Check the running processes to confirm if a backdoor connection has been established.

E.

Upgrade the Windows x64 operating system on John Smith's computer to the latest version.

F.

Block all outbound connections from the IP address 10.150.71.151.

Buy Now
Questions 6

A company's content management system (CMS) service runs on an laaS cluster on a public cloud. The CMS service is frequently targeted by a malicious threat actor using DDoS.

Which of the following should a cloud engineer monitor to identify attacks?

Options:

A.

Network flow logs

B.

Endpoint detection and response logs

C.

Cloud provider event logs

D.

Instance syslog

Buy Now
Questions 7

A CI/CD pipeline is used to deploy VMs to an laaS environment. Which of the following can be used to harden the operating system once the VM is running?

Options:

A.

Docker

B.

Kubernetes

C.

Git

D.

Ansible

Buy Now
Questions 8

A company is required to save historical data for seven years. A cloud administrator implements a script that automatically deletes data older than seven years. Which of the following concepts best describes why the historical data is being deleted?

Options:

A.

End of life

B.

Data loss prevention

C.

Cost implications

D.

Tiered storage for archiving

Buy Now
Questions 9

A company implements a web farm with 100 servers behind an application load balancer. Dunng scaling events, new web servers that are placed in service have not loaded all their modules, which causes some requests to the web farm to fail. Which of the following should the cloud engineer implement to address the scaling issue?

Options:

A.

Instance warm-up

B.

Scheduled scaling

C.

Event-based scaling

D.

Load balancer passthrough

Buy Now
Questions 10

A manager wants information about which users signed in to a certain VM during the past month. Which of the following can the cloud administrator use to obtain this information?

Options:

A.

Retention

B.

Alerting

C.

Aggregation

D.

Collection

Buy Now
Questions 11

Which of the following would allow a cloud engineer to flatten a deeply nested JSON log to improve readability for analysts?

Options:

A.

Grafana

B.

Kibana

C.

Elasticsearch

D.

Logstash

Buy Now
Questions 12

Two CVEs are discovered on servers in the company's public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which

of the following actions would be the best way to mitigate the vulnerabilities?

Options:

A.

Patching the operating systems

B.

Upgrading the operating systems to the latest beta

C.

Encrypting the operating system disks

D.

Disabling unnecessary open ports

Buy Now
Questions 13

A cloud deployment uses three different VPCs. The subnets on each VPC need to communicate with the others over private channels. Which of the following will achieve this objective?

Options:

A.

Deploying a load balancer to send traffic to the private IP addresses

B.

Creating peering connections between all VPCs

C.

Adding BGP routes using the VPCs' private IP addresses

D.

Establishing identical routing tables on all VPCs

Buy Now
Questions 14

A cloud engineer is exploring options to reduce the management overhead of the servers and network. Which of the following cloud service models should the engineer implement?

Options:

A.

SaaS

B.

XaaS

C.

PaaS

D.

laaS

Buy Now
Questions 15

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

Options:

A.

VPC

B.

Application load balancer

C.

CDN

D.

API gateway

Buy Now
Questions 16

Once a change has been made to templates, which of the following commands should a cloud architect use next to deploy an laaS platform?

Options:

A.

git pull

B.

git fetch

C.

git commit

D.

git push

Buy Now
Questions 17

An e-commerce store is preparing for an annual holiday sale. Previously, this sale has increased the number of transactions between two and ten times the normal level of

transactions. A cloud administrator wants to implement a process to scale the web server seamlessly. The goal is to automate changes only when necessary and with minimal cost.

Which of the following scaling approaches should the administrator use?

Options:

A.

Scale horizontally with additional web servers to provide redundancy.

B.

Allow the load to trigger adjustments to the resources.

C.

When traffic increases, adjust the resources using the cloud portal.

D.

Schedule the environment to scale resources before the sale begins.

Buy Now
Questions 18

A cloud administrator needs to distribute workloads across remote data centers for redundancy reasons. Which of the following deployment strategies would eliminate downtime, accelerate deployment, and remain cost efficient?

Options:

A.

In-place

B.

Rolling

C.

Blue-green

D.

Canary

Buy Now
Questions 19

A cloud engineer is designing a high-performance computing cluster for proprietary software. The software requires low network latency and high throughput between cluster nodes.

Which of the following would have the greatest impact on latency and throughput when designing the HPC infrastructure?

Options:

A.

Node placement

B.

Node size

C.

Node NIC

D.

Node OS

Buy Now
Questions 20

A system surpasses 75% to 80% of resource consumption. Which of the following scaling approaches is the most appropriate?

Options:

A.

Trending

B.

Manual

C.

Load

D.

Scheduled

Buy Now
Questions 21

A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

Options:

A.

Log retention

B.

Tracing

C.

Log aggregation

D.

Log rotation

E.

Hashing

F.

Encryption

Buy Now
Questions 22

A list of CVEs was identified on a web server. The systems administrator decides to close the ports and disable weak TLS ciphers. Which of the following describes this vulnerability management stage?

Options:

A.

Scanning

B.

Identification

C.

Assessment

D.

Remediation

Buy Now
Questions 23

An administrator attempts to use a script to deploy a cloud-based virtual machine with five data disks. After running the script, the administrator sees the following message:

ERROR: Response 403, storage API provisioning error.

Which of the following is the reason the deployment failed?

Options:

A.

Permission issues

B.

Partial outage

C.

Functionality deprecation

D.

Sizing issues

Buy Now
Questions 24

Which of the following models will best reduce the cost of running short-term, non-critical workloads?

Options:

A.

Reserved

B.

Spot Instance

C.

Pay-as-you-go

D.

Dedicated host

Buy Now
Questions 25

A company that has several branches worldwide needs to facilitate full access to a specific cloud resource to a branch in Spain. Other branches will have only read access. Which of

the following is the best way to grant access to the branch in Spain?

Options:

A.

Set up MFA for the users working at the branch.

B.

Create a network security group with required permissions for users in Spain.

C.

Apply a rule on the WAF to allow only users in Spain access to the resource.

D.

Implement an IPS/IDS to detect unauthorized users.

Buy Now
Questions 26

Users report being unable to access an application that uses TLS 1.1. The users are able to access other applications on the internet. Which of the following is the most likely

reason for this issue?

Options:

A.

The security team modified user permissions.

B.

Changes were made on the web server to address vulnerabilities.

C.

Privileged access was implemented.

D.

The firewall was modified.

Buy Now
Questions 27

Which of the following reduces the chance of introducing a misconfiguration into cloud deployment templates?

Options:

A.

Performing a git fetch after every commit

B.

Opening pull requests for changes

C.

Using the web interface to update files

D.

Committing updates to the main branch

Buy Now
Questions 28

A company experienced a data leak through its website. A security engineer, who is investigating the issue, runs a vulnerability scan against the website and receives the following output:

CV0-004 Question 28

Which of the following is the most likely cause of this leak?

Options:

A.

RTMP port open

B.

SQL injection

C.

Privilege escalation

D.

Insecure protocol

Buy Now
Questions 29

A company has one cloud-based web server that is prone to downtime during maintenance. Which ot the following should the cloud engineer add to ensure high availability?

Options:

A.

A redundant web server behind a load balancer

B.

A backup cloud web server

C.

A secondary network link to the web server

D.

An autoscaling feature on the web server

Buy Now
Questions 30

A cloud engineer is reviewing a disaster recovery plan that includes the following requirements:

• System state, files, and configurations must be backed up on a weekly basis.

• The system state, file, and configuration backups must be tested annually.

Which of the following backup methods should the engineer implement for the first week the plan is executed?

Options:

A.

Differential

B.

Incremental

C.

Snapshot

D.

Full

Buy Now
Questions 31

A cloud engineer wants containers to run the latest version of a container base image to reduce the number of vulnerabilities. The applications in use requite Python 3.10 and ate not compatible with any other version. The containers' images are created every time a new version is released from the source image. Given the container Dockerfile below:

CV0-004 Question 31

Which of the following actions will achieve the objectives with the least effort?

Options:

A.

Perform docker pull before executing docker run.

B.

Execute docker update using a local cron to get the latest container version.

C.

Change the image to use python:latest on the image build process.

D.

Update the Dockerfile to pin the source image version.

Buy Now
Questions 32

A SaaS provider introduced new software functionality for customers as part of quarterly production enhancements. After an update is implemented, users cannot locate certain transactions from an inbound integration. During the investigation, the application owner finds the following error in the logs:

Error: REST API - Deprecated call is no longer supported in this release.

Which of the following is the best action for the application owner to take to resolve the issue?

Options:

A.

Update the custom integration to use a supported function.

B.

Include the custom integration in the quarterly testing scope.

C.

Ask the users to monitor the quarterly updates.

D.

Revert the application to the last stable quarterly release.

Buy Now
Questions 33

A log-parsing application requires significant processing power to ingest the logs streaming from web servers. The engineering team presents the cloud architect with four proposals

using the same underlying hardware. Which of the following should the cloud architect select in order to minimize the impact of an instance failure while keeping the cost as low as

possible?

Options:

A.

Four instances of 4vCPU, 8GB RAM, 80GB SSD

B.

Four instances of 4vCPU, 8GB RAM, 80GB HDD

C.

Two instances of 8vCPU, 16GB RAM, 80GB SSD

D.

Two instances of 8vCPU, 16GB RAM, 80GB HDD

Buy Now
Questions 34

Which of the following storage resources provides higher availability and speed for currently used files?

Options:

A.

Warm/HDD

B.

Cold/SSD

C.

Hot/SSD

D.

Archive/HDD

Buy Now
Questions 35

You are a cloud engineer working for a cloud service provider that is responsible for an

IaaS offering.

Your customer, who creates VMs and manages virtual storage, has noticed I/O bandwidth issues and low IOPS (under 9000).

Your manager wants you to verify the proper storage configuration as dictated by your service level agreement (SLA).

The SLA specifies:

. Each SFP on the hypervisor host must be set to the maximum link speed

allowed by the SAN array. . All SAN array disk groups must be configured in a RAID 5.

. The SAN array must be fully configured for redundant fabric paths. . IOPS should not fall below 14000

INSTRUCTIONS

Click on each service processor to review the displayed information. Then click on the drop-down menus to change the settings of each device as necessary to conform to the SLA requirements.

CV0-004 Question 35

CV0-004 Question 35

CV0-004 Question 35

CV0-004 Question 35

Options:

Buy Now
Questions 36

A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned. Which of the following

scripts should the systems administrator use to achieve this goal?

Options:

A.

RESPONSE_CODE }string APP_URLbool RESPONSE_CODEstring VMhealth checker (APP_URL, VM) {if [ http_probe (APP_URL) == 200] {echo RESPONSE_CODE }else{stop (VM)echo

B.

else{echostring APP_URLfloat RESPONSE_CODEstring VMhealth_checker (APP_URL, VM) {if [ http_probe (APP_URL) == 200] {stop (RESPONSE_CODE)echo VM }stop (VM)RESPONSE CODE }

C.

else{echostring APP_URLint RESPONSE CODEstring VMhealth checker (APP_URL, VM) {if [ http_probe (APP_URL) == 200] {echo RESPONSE_CODE }stop (VM)RESPONSE_CODE }

D.

else{echostring APP_URLint RESPONSE_CODEstring VMhealth_checker (APP_URL, VM) {if [ http_probe (VM) == 200] {stop (VM)echo RESPONSE_CODE }RESPONSE CODE }

Buy Now
Questions 37

A cloud engineer wants to implement a disaster recovery strategy that:

. Is cost-effective.

. Reduces the amount of data loss in case of a disaster.

. Enables recovery with the least amount of downtime.

Which of the following disaster recovery strategies best describes what the cloud engineer wants to achieve?

Options:

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

Buy Now
Questions 38

A developer is sending requests to a SaaS application. The developer becomes unable to send more requests after sending a number of them, but other developers can still send requests. Which of the following is most likely causing the issue?

Options:

A.

Partial outage

B.

API throttling

C.

Rate limiting

D.

Service quota

Buy Now
Questions 39

Which of the following strategies requires the development of new code before an application can be successfully migrated to a cloud provider?

Options:

A.

Refactor

B.

Rearchitect

C.

Rehost

D.

Replatform

Buy Now
Questions 40

Which of the following is the best tool to deploy template-based, containerized workloads on premises and on the cloud?

Options:

A.

Docker

B.

Terraform

C.

Jenkins

D.

Git

Buy Now
Questions 41

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

Options:

A.

Operating system patches

B.

Table-level permissions

C.

Minor database engine updates

D.

Cluster configuration

E.

Row-level encryption

F.

Availability of hardware for scaling

Buy Now
Questions 42

A cloud engineer is deploying a cloud solution that will be used on premises with need-to-know access. Which of the following cloud deployment models best meets this

requirement?

Options:

A.

Community

B.

Public

C.

Private

D.

Hybrid

Buy Now
Questions 43

A cloud engineer needs to deploy a new version of a web application to 100 servers. In the past, new version deployments have caused outages. Which of the following deployment types should the cloud engineer implement to prevent the outages from happening this time?

Options:

A.

Rolling

B.

Blue-green

C.

Canary

D.

Round-robin

Buy Now
Questions 44

Which of the following is the most cost-effective way to store data that is infrequently accessed?

Options:

A.

Cold site

B.

Hot site

C.

Off-site

D.

Warm site

Buy Now
Questions 45

A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following

delivery mechanisms would best support this integration?

Options:

A.

Enterprise service bus

B.

Socket

C.

RPC

D.

Queue

Buy Now
Questions 46

A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the

following migration strategies is best approach for this use case?

Options:

A.

Retire

B.

Rearchitect

C.

Refactor

D.

Rehost

Buy Now
Questions 47

A company has been using a CRM application that was developed in-house and is hosted on local servers. Due to internal changes, the company wants to migrate the application to the cloud without having to manage the infrastructure. Which of the following services should the company consider?

Options:

A.

SaaS

B.

PaaS

C.

XaaS

D.

laaS

Buy Now
Questions 48

An organization is concerned that its IT help desk is receiving too many calls about password resets for various internal and external applications. The organization implements a single sign-on (SSO) solution. Which of the following technologies should the cloud architect at the organization recommend implementing?

Options:

A.

SAML

B.

LDAP

C.

Kerberos

D.

MFA

Buy Now
Questions 49

Which of the following is a field of computer science that enables computers to identify and understand objects and people in images and videos?

Options:

A.

Image reconstruction

B.

Facial recognition

C.

Natural language processing

D.

Computer vision

Buy Now
Questions 50

A developer is testing code that will be used to deploy a web farm in a public cloud. The main code block is a function to create a load balancer and a loop to create 1.000 web servers, as shown below:

CV0-004 Question 50

The developer runs the code against the company's cloud account and observes that the load balancer is successfully created, but only 100 web servers have been created. Which of the following should the developer do to fix this issue?

Options:

A.

Request an increase of Instance quota.

B.

Run the code multiple times until all servers are created.

C.

Check the my_web_server () function to ensure it is using the right credentials.

D.

Place the my_load_balancer () function after the loop.

Buy Now
Questions 51

Which of the following can reduce the risk of CI/CD pipelines leaking secrets?

Options:

A.

Protected Git branches

B.

Use of a VM instead of containers

C.

Private image repositories

D.

Canary tests

Buy Now
Questions 52

A cloud engineer wants to run a script that increases the volume storage size if it is below 100GB. Which of the following should the engineer run?

CV0-004 Question 52

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 53

Which of the following cloud-native architecture designs is the most easily maintained, decentralized, and decoupled?

Options:

A.

Monolithic

B.

Hybrid cloud

C.

Mainframe

D.

Microservices

Buy Now
Questions 54

Which of the following describes the main difference between public and private container repositories?

Options:

A.

Private container repository access requires authorization, while public repository access does not require authorization.

B.

Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.

C.

Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.

D.

Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.

Buy Now
Questions 55

An organization's critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of

a software web application:

"2021/12/18 09:33:12" "10. 34. 32.18" "104. 224. 123. 119" "POST / login.php?u=administrator&p=or%201%20=1"

"2021/12/18 09:33:13" "10.34. 32.18" "104. 224. 123.119" "POST /login. php?u=administrator&p=%27%0A"

"2021/12/18 09:33:14" "10. 34. 32.18" "104. 224. 123. 119" "POST /login. php?u=administrator&p=%26"

"2021/12/18 09:33:17" "10.34. 32.18" "104. 224. 123.119" "POST / login.php?u=administrator&p=%3B"

"2021/12/18 09:33:12" "10.34. 32. 18" "104. 224. 123. 119" "POST / login. php?u=admin&p=or%201%20=1"

"2021/12/18 09:33:19" "10.34.32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%27%0A"

"2021/12/18 09:33:21" "10. 34. 32.18" "104.224. 123.119" "POST / login. php?u=admin&p=%26"

"2021/12/18 09:33:23" "10. 34. 32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%3B"

Which of the following types of attacks occurred?

Options:

A.

SQL injection

B.

Cross-site scripting

C.

Reuse of leaked credentials

D.

Privilege escalation

Buy Now
Questions 56

The performance of an e-commerce website decreases dramatically during random periods. The IT team is evaluating available resources to mitigate the situation. Which of the following is the best approach to effectively manage this scenario'?

Options:

A.

Migrating to a dedicated host

B.

Purchasing additional servers

C.

Scheduling resource allocation

D.

Configuring automatic elasticity

Buy Now
Questions 57

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

Options:

A.

Setting up private development, public development, and testing environments

B.

Segregating environments for internal and external teams

C.

Configuring DDoS protection to mitigate the risk of downtime

D.

Using IAM and ACL in order to bolster DLP

Buy Now
Questions 58

A cross-site request forgery vulnerability exploited a web application that was hosted in a public laaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?

Options:

A.

Configure the DDoS protection on the CDN.

B.

Install endpoint protection software on the VMs

C.

Add an ACL to the VM subnet.

D.

Deploy an IDS on the laaS network.

Buy Now
Questions 59

A company serves customers globally from its website hosted in North America. A cloud engineer recently deployed new instances of the website in the Europe region. Which of the

following is the most likely reason?

Options:

A.

To simplify workflow

B.

To enhance security

C.

To reduce latency

D.

To decrease cost

Buy Now
Questions 60

A company's VMs that are created using the noncritical application tag are automatically shut down at 5:00 p.m. using a cronjob. Which of the following actions would allow a cloud engineer to stop all unresponsive instances with the least effort in case the automation fails?

Options:

A.

Using the cloud audit logs for tagging and stopping events

B.

Using the cloud provider web console to check and stop the instances

C.

Using the cloud provider command line to stop the Instances based on tags

D.

Using a Bash script to shut down all instances

Buy Now
Questions 61

Which of the following provides secure, private communication between cloud environments without provisioning additional hardware or appliances?

Options:

A.

VPN

B.

VPC peering

C.

BGP

D.

Transit gateway

Buy Now
Questions 62

A web server hosted in a PaaS public cloud platform has been the target of DDoS attacks. A cloud engineer needs to protect the server from future volumetric DDoS attacks. Which of the following are the best actions for the engineer to take? (Select two.)

Options:

A.

Add a CDN in front of the web server.

B.

Add a DLP on the PaaS platform.

C.

Add a hardened web server instance.

D.

Add an ACL to the web server network.

E.

Add an IDS in-line on the web server network.

F.

Add a WAF in front of the web server.

Buy Now
Questions 63

A security analyst confirms a zero-day vulnerability was exploited by hackers who gained access to confidential customer data and installed ransomware on the server Which of the following steps should the security analyst take? (Select two).

Options:

A.

Contact the customers to inform them about the data breach.

B.

Contact the hackers to negotiate payment lo unlock the server.

C.

Send a global communication to inform all impacted users.

D.

Inform the management and legal teams about the data breach

E.

Delete confidential data used on other servers that might be compromised.

F.

Modify the firewall rules to block the IP addresses and update the ports.

Buy Now
Questions 64

A cloud administrator shortens the amount of time a backup runs. An executive in the company requires a guarantee that the backups can be restored with no data loss. Which of th€ following backup features should the administrator lest for?

Options:

A.

Encryption

B.

Retention

C.

Schedule

D.

Integrity

Buy Now
Questions 65

An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements:

• Is simple and fast

• Can be performed on two Identical platforms

Which of the following strategies should the engineer use?

Options:

A.

Blue-green

B.

Canary

C.

Rolling

D.

in-place

Buy Now
Questions 66

A company has ten cloud engineers working on different manual cloud deployments. In the past, engineers have had difficulty keeping deployments consistent. Which of the following is the best method to address this issue?

Options:

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Buy Now
Questions 67

An administrator needs to adhere to the following requirements when moving a customer's data to the cloud:

• The new service must be geographically dispersed.

• The customer should have local access to data

• Legacy applications should be accessible.

Which of the following cloud deployment models is most suitable?

Options:

A.

On-premises

B.

Private

C.

Hybrid

D.

Public

Buy Now
Questions 68

Which of the following is true of SSDs?

Options:

A.

SSDs do not have self-encrypting capabilities.

B.

SSDs have small storage capacities.

C.

SSDs can be used for high-IOP applications.

D.

SSDs are used mostly in cold storage.

Buy Now
Questions 69

A developer at a small startup company deployed some code for a new feature to its public repository. A few days later, a data breach occurred. A security team investigated the

incident and found that the database was hacked. Which of the following is the most likely cause of this breach?

Options:

A.

Database core dump

B.

Hard-coded credentials

C.

Compromised deployment agent

D.

Unpatched web servers

Buy Now
Questions 70

Which of the following communication methods between on-premises and cloud environments would ensure minimal-to-low latency and overhead?

Options:

A.

Site-to-site VPN

B.

Peer-to-peer VPN

C.

Direct connection

D.

peering

Buy Now
Questions 71

A bank informs an administrator that changes must be made to backups for long-term reporting purposes. Which of the following is the most important change the administrator

should make to satisfy these requirements?

Options:

A.

Location of the backups

B.

Type of the backups

C.

Retention of the backups

D.

Schedule of the backups

Buy Now
Questions 72

A cloud engineer needs to determine a scaling approach for a payroll-processing solution that runs on a biweekly basis. Given the complexity of the process, the deployment to each

new VM takes about 25 minutes to get ready. Which of the following would be the best strategy?

Options:

A.

Horizontal

B.

Scheduled

C.

Trending

D.

Event

Buy Now
Questions 73

A company migrated its CRM system to a SaaS solution. The security team is updating the RAG matrix for the newly migrated CRM. Given the following table:

CV0-004 Question 73

Which of the following responsibility assignments best aligns with the shared responsibility model for the new CRM?

Options:

A.

Data-center security

B.

CRM software security

C.

CRM server patching

D.

CRM development life cycle

Buy Now
Questions 74

Which of the following cloud deployment models is the best way to replicate a workload non-disruptively between on-premises servers and a public cloud?

Options:

A.

Public

B.

Community

C.

Private

D.

Hybrid

Buy Now
Questions 75

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

Options:

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing

Buy Now
Questions 76

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

Options:

A.

Disk I/O

B.

Network packets

C.

Average memory utilization

D.

Percent of CPU utilization

Buy Now
Exam Code: CV0-004
Exam Name: CompTIA Cloud+ (V4)
Last Update: Apr 7, 2026
Questions: 254

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now CV0-004 testing engine

PDF (Q&A)

$31.5  $104.99
buy now CV0-004 pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 07 Apr 2026