New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-003 Exam Dumps - CompTIA Cloud+ Certification Exam

Go to page:
Question # 25

A web-application company recently released some new marketing promotions without notifying the IT staff. The systems administrator has since been noticing twice the normal traffic consumption every two hours for the last three hours in the container environment. Which of the following should the company implement to accommodate the new traffic?

A.

A firewall

B.

Switches

C.

Ballooning

D.

Autoscaling

Full Access
Question # 26

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Full Access
Question # 27

A systems administrator needs to implement a service to protect a web application from external attacks. The administrator must have session-based granular control of all HTTP traffic. Which of the following should the administrator configure?

A.

IDS

B.

WAF

C.

DLP

D.

NAC

Full Access
Question # 28

A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?

A.

Compute

B.

Storage

C.

Licensing

D.

Scripts

Full Access
Question # 29

Users currently access SaaS email with five-character passwords that use only letters and numbers. An administrator needs to make access more secure without changing the password policy. Which of the following will provide a more secure way of accessing email at the lowest cost?

A.

Change the email service provider.

B.

Enable MFA with a one-time password.

C.

Implement SSO for all users.

D.

Institute certificate-based authentication

Full Access
Question # 30

In an IaaS platform, which of the following actions would a systems administrator take FIRST to identify the scope of an incident?

A.

Conduct a memory acquisition.

B.

Snapshot all volumes attached to an instance.

C.

Retrieve data from a backup.

D.

Perform a traffic capture.

Full Access
Question # 31

During a security incident, an laaS compute instance is detected to send traffic to a host related to cryptocurrency mining. The security analyst handling the incident determines the scope of the incident is limited to that particular instance. Which of the following should the security analyst do NEXT?

A.

Isolate the instance from the network into quarantine.

B.

Perform a memory acquisition in the affected instance.

C.

Create a snapshot of the volumes attached to the instance.

D.

Replace the instance with another from the baseline.

Full Access
Question # 32

A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured?

A.

Regions

B.

Anti-affinity

C.

Oversubscription

D.

Container

Full Access
Go to page: