Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-004 Exam Dumps - CompTIA Cloud+ (2025)

Go to page:
Question # 9

A project stakeholder has asked the project manager to provide the performance data of a project. Which of the following should the project manager send to the stakeholder?

A.

Issue log

B.

Dashboard

C.

WBS

D.

Milestone chart

Full Access
Question # 10

Which of the following best describes a program in the context of project management?

A.

It is a group of unrelated projects within an organization

B.

It is used to represent the daily activities of multiple projects

C.

It is a consolidation of related projects with a common goal

D.

It provides the definition of a project workload

Full Access
Question # 11

Department supervisors have requested a report that will help them understand the utilization of cloud resources, make decisions about budgeting for the following year, and reduce

costs. Which of the following are the most important requisite steps to create the report? (Select two).

A.

Set the desired retention of resource logs.

B.

Configure application tracing.

C.

Integrate email alerts with ticketing software.

D.

Enable resource tagging.

E.

Configure the collection of performance/utilization logs.

F.

Configure metric threshold alerts.

Full Access
Question # 12

During a project kickoff meeting, the project manager wants to set expectations for all of the team members. Which of the following actions should the project manager take to accomplish this goal?

A.

Assign tasks and responsibilities to the team members

B.

Provide an overview of the project objectives and timeline

C.

Develop a project communication plan

D.

Set a meeting cadence for the rest of the project

Full Access
Question # 13

The company's IDS has reported an anomaly. The cloud engineer remotely accesses the cloud instance, runs a command, and receives the following information:

Which of the following is the most likely root cause of this anomaly?

A.

Privilege escalation

B.

Leaked credentials

C.

Cryptojacking

D.

Defaced website

Full Access
Question # 14

A cloud solutions architect is designing a VM-based solution that requires reducing the cost as much as possible. Which of the following solutions will best satisfy this requirement?

A.

Using ephemeral storage on replicated VMs

B.

Creating Spot VMs in one availability zone

C.

Spreading the VMs across different regions

D.

Using provisioned IOPS storage

Full Access
Question # 15

Which of the following is true of SSDs?

A.

SSDs do not have self-encrypting capabilities.

B.

SSDs have small storage capacities.

C.

SSDs can be used for high-IOP applications.

D.

SSDs are used mostly in cold storage.

Full Access
Question # 16

A developer is building an application that has multiple microservices that need to communicate with each other. The developer currently manually updates the IP address of each service. Which of the following best resolves the communication issue and automates the process?

A.

Service discovery

B.

Fan-out

C.

Managed container services

D.

DNS

Full Access
Go to page: