New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-003 Exam Dumps - CompTIA Cloud+ Certification Exam

Go to page:
Question # 17

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Full Access
Question # 18

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Full Access
Question # 19

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

A.

Site-to-site

B.

Client-to-site

C.

Point-to-site

D.

Point-to-point

Full Access
Question # 20

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?

A.

Log monitoring

B.

Patch management

C.

Vulnerability scanning

D.

System hardening

Full Access
Question # 21

A cloud administrator needs to coordinate and automate the management of a company's secrets and keys for all its cloud services with minimal effort and low cost. Which of the following is the BEST option to achieve the goal?

A.

Implement database as a service

B.

Configure Key Vault

C.

Use password as a service

D.

Implement KeePass

Full Access
Question # 22

A systems administrator wants to restrict access to a set of sensitive files to a specific group of users. Which of the following will achieve the objective?

A.

Add audit rules on the server

B.

Configure data loss prevention in the environment

C.

Change tine permissions and ownership of the files

D.

Implement a HIPS solution on the host

Full Access
Question # 23

A product-based company wants to transition to a method that provides the capability to enhance the product seamlessly and keep the development iterations to a shorter time frame. Which of the following would BEST meet these requirements?

A.

Implement a secret management solution.

B.

Create autoscaling capabilities.

C.

Develop CI/CD tools.

D.

Deploy a CMDB tool.

Full Access
Question # 24

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment?

A.

The regional area

B.

Cloud bursting

C.

Lower costs

D.

Scalability

Full Access
Go to page: