Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-003 Exam Dumps - CompTIA Cloud+ Certification Exam

Go to page:
Question # 25

A company that requires full administrative control at the OS level is considering the use of public cloud services. Which of the following service models would BEST fit the company's requirements?

A.

SaaS

B.

DBaaS

C.

PaaS

D.

laaS

Full Access
Question # 26

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

A.

Site-to-site

B.

Client-to-site

C.

Point-to-site

D.

Point-to-point

Full Access
Question # 27

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Select TWO).

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPI-J resources

F.

License issues

Full Access
Question # 28

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Full Access
Question # 29

A piece of software applies licensing fees on a socket-based model. Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?

A.

The amount of memory in the server

B.

The number of CPUs in the server

C.

The type of cloud in which the software is deployed

D.

The number of customers who will be using the software

Full Access
Question # 30

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?

A.

Store the credentials in a variable on every worker node

B.

Store the credentials on a shared volume using whole-disk encryption

C.

Store the credentials in a configuration file using SHA-256 inside the container image

D.

Store the credentials using the orchestrator secret manager

Full Access
Question # 31

An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used?

A.

Thick provisioning

B.

Software-defined storage

C.

User quotas

D.

Network file system

Full Access
Question # 32

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?

A.

Consult the law for the country where the company’s headquarters is located

B.

Consult the regulatory requirements for the company’s industry

C.

Consult the law for the country where the cloud services provider is located

D.

Consult the cloud services provider's policies and guidelines

Full Access
Go to page: