New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-003 Exam Dumps - CompTIA Cloud+ Certification Exam

Go to page:
Question # 49

During a security incident on an laaS platform, which of the following actions will a systems administrator most likely take as part of the containment procedure?

A.

Connect to an instance for triage.

B.

Add a deny rule to the network ACL.

C.

Mirror the traffic to perform a traffic capture.

D.

Perform a memory acquisition.

Full Access
Question # 50

Following the deployment of a new VM, a cloud engineer notices the backup platform has not added the machine to the appropriate job. The backup platform uses a text-based variable for job configuration. This variable is based on the RPO requirements for the workload. Which of the following did the cloud engineer forget to configure when deploying the virtual machine?

    Tags

A.

RPO

B.

RTO

C.

Server name

D.

Template

Full Access
Question # 51

An environment has a dual-stack infrastructure in an active-active configuration in two separate data centers. Which of the following best describes replication between the two sites?

A.

Data is moved constantly from the hot site to the warm site.

B.

Data is replicated every 15 minutes from one site to the other.

C.

Data is moved from one site to the other once per day.

D.

Data is synchronized in real time across the sites.

E.

Data is moved twice a day from Site A to Site B, and then from Site B to Site A.

Full Access
Question # 52

Which of the following types of incidents requires users to be informed post-incident?

A.

Data breaches.

B.

Brute-force attacks.

C.

Website hijacking.

D.

DDoS attacks.

Full Access
Question # 53

A cloud administrator is performing automated deployment of cloud infrastructure for clients. The administrator notices discrepancies from the baseline in the configuration of infrastructure that was deployed to a new client. Which of the following is most likely the cause?

A.

The deployment user account changed

B.

The deployment was done to a different resource group.

C.

The deployment was done by a different cloud administrator.

D.

The deployment template was modified.

Full Access
Question # 54

A cloud architect is reviewing the design for a new cloud-based ERP solution. The solution consists of eight servers with a single network interface. The allocated IP range is 172.16.0.0/28. One of the requirements of the solution is that it must be able to handle the potential addition of 16 new servers to the environment. Because of the complexity of the firewall and related ACL requirements, these new servers will need to be in the same network range. Which of the following changes

would allow for the potential server addition?

A.

Change the IP address range to use a 10.0.0.0 address.

B.

Change the server template to add network interfaces.

C.

Change the subnet mask to use a 255.255.255.128 range.

D.

Change the server scaling configuration to increase the maximum limit.

Full Access
Question # 55

A systems administrator automates a series of tasks in a playbook and receives the following error during testing:

"Unable to find any of pip2, pip to use. pip needs to be installed."

The administrator verifies that pip is installed correctly. Which of the following actions will most likely resolve this issue?

A.

Ensure pip is up to date.

B.

Create a firewall rule to allow pip.

C.

Refactor the automation code.

D.

Update the system path.

Full Access
Question # 56

A cloud administrator is troubleshooting an issue regarding users at one location who are reporting that their API access tokens have become invalid. The users are issued tokens based on their credentials in a federated cluster. Which of the following should the administrator check to determine the cause of this issue?

A.

SAML

B.

DNS

C.

SSL

D.

NTP

Full Access
Go to page: