Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-003 Exam Dumps - CompTIA Cloud+ Certification Exam

Go to page:
Question # 129

A company is using a hybrid cloud environment. The private cloud is hosting the business applications, and the cloud services are being used to replicate for availability purposes.

The cloud services are also being used to accommodate the additional resource requirements to provide continued services. Which of the following scalability models is the company utilizing?

A.

Vertical scaling

B.

Autoscaling

C.

Cloud bursting

D.

Horizontal scaling

Full Access
Question # 130

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols Should the company use? (Select TWO)

A.

CIFS

B.

FTP

C.

Iscsi

D.

Raid 10

E.

Nfs

F.

fc

Full Access
Question # 131

A security analyst is investigating a recurring alert. The alert is reporting an insecure firewall configuration state after every cloud application deployment. The process of identifying the issue, requesting a fix, and waiting for the developers to manually patch the environment is being repeated multiple times. In an effort to identify the root issue, the following logs were collected:

Deploying template app prod. •yaml

Instance DB successfully created

DB keys successfully stored on vault

Instance WebApp successfully created

Access rules successfully applied

Access—keys successfully created

Which of the following options will provide a permanent fix for the issue?

A.

Validate the Iac code used during the deployment.

B.

Avoid the use of a vault to store database passwords.

C.

Rotate the access keys that were created during deployment.

D.

Recommend that the developers do not create multiple resources at once.

Full Access
Question # 132

A systems administrator is responsible for upgrading operating systems on VMs that are hosted in a cloud environment. The systems administrator wants to ensure the VMs receive updates for as long as possible. Which of the following should the systems administrator choose?

A.

Stable

B.

Nightly

C.

LTS

D.

Canary

E.

EDR

Full Access
Question # 133

A systems administrator is planning to deploy a database cluster in a virtualization environment. The administrator needs to ensure the database nodes do not exist on the same physical host. Which of the following would best meet this requirement?

A.

Oversubscription

B.

Anti-affinity

C.

A firewall

D.

A separate cluster

Full Access
Question # 134

A systems administrator is writing a script for provisioning nodes in the environment. Which of the following would be best for the administrator to use to provision the authentication credentials to the script?

A.

password='curl https://10.2.3.4/api/sytemops?op=provision

B.

password=$env_password

C.

password=$ (cat /opt/app/credentials)

D.

password="MyS3cretP4sswordIsVeryLong"

Full Access
Question # 135

A company is moving its entire infrastructure to the cloud. The infrastructure consists of:

    100 virtual desktops

    10 database servers

    10 web servers

    15 application servers

    15 development servers

    7 VDI servers

Each server, except for web, application, and database servers, needs to be on an isolated subnet. The CSP has allocated a /24 subnet. Which of the following would best divide the IP space to meet these requirements?

Options:

A.

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

B.

VDI: /25Web, application, and database: /26Development: /27VDI servers: /28

C.

VDI: /25Web, application, and database: /27Development: /27VDI servers: /28

D.

VDI: /26Web, application, and database: /26Development: /26VDI servers: /28

Full Access
Go to page: