Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-003 Exam Dumps - CompTIA Cloud+ Certification Exam

Go to page:
Question # 113

A security analyst is investigating incidents in which attackers are able to access sensitive data from a corporate application's database. The attacks occur periodically and usually

after the release of a new application's version. The following log confirms the compromise:

USER: WebApp access—key accepted

WebApp user assumed DBA role

GetData API call executed

The following actions are made after every incident occurrence:

• Validation of firewall rules

• Scripted rebuild of the database and web instances

• Application deployment from a cloud code repository

Which of the following actions will MOST likely prevent future compromises?

A.

Rotating the account credentials

B.

Migrating the database to be on premises

C.

Forbidding the use of API calls to retrieve data

D.

Implementing a new database service account

Full Access
Question # 114

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following

scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?

A.

Horizontal

B.

Vertical

C.

Cloud bursting

D.

Autoscaling

Full Access
Question # 115

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public laaS. The team identifies the following rule as a potential

A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IR" Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the

server from their locations?

A.

Modify the outbound rule to allow the company's external IP address as a source.

B.

Add an inbound rule to use the IP address for the company's main office as a source.

C.

Modify the inbound rule to allow the company's external IP address as a source.

D.

Delete the inbound rule to allow the company's external IP address as a source.

Full Access
Question # 116

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Full Access
Question # 117

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Full Access
Question # 118

A company is using an laaS environment. Which of the following licensing models would BEST suit the organization from a financial perspective to implement scaling?

A.

Subscription

B.

Volume-based

C.

per user

D.

Socket-based

Full Access
Question # 119

An organization is hosting its dedicated email infrastructure with unlimited mailbox creation capability. The management team would like to migrate to a SaaS-based solution. Which of the following must be considered before the migration?

A.

The SaaS provider's licensing model

B.

The SaaS provider's reputation

C.

The number of servers the SaaS provider has

D.

The number of network links the SaaS provider has

Full Access
Question # 120

A financial industry services firm was the victim of an internal data breach, and the perpetrator was a member of the company's development team. During the investigation, one of the security administrators accidentally deleted the perpetrator's user data. Even though the data is recoverable, which of the following has been violated?

A.

Chain of custody

B.

Evidence acquisition

C.

Containment

D.

Root cause analysis

Full Access
Go to page: