New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CV0-004 Exam Dumps - CompTIA Cloud+ (2024)

Go to page:
Question # 25

Users have been reporting that a remotely hosted application is not accessible following a recent migration. However, the cloud administrator is able to access the application from

the same site as the users. Which of the following should the administrator update?

A.

Cipher suite

B.

Network ACL

C.

Routing table

D.

Permissions

Full Access
Question # 26

An administrator used a script that worked in the past to create and tag five virtual machines. All of the virtual machines have been created: however, the administrator sees the following results:

{ tags: [ ] }

Which of the following is the most likely reason for this result?

A.

API throttling

B.

Service quotas

C.

Command deprecation

D.

Compatibility issues

Full Access
Question # 27

Which of the following technologies should be used by a person who is visually impaired to access data from the cloud?

A.

Object character recognition

B.

Text-to-voice

C.

Sentiment analysis

D.

Visual recognition

Full Access
Question # 28

Servers in the hot site are clustered with the main site.

A.

Network traffic is balanced between the main site and hot site servers.

B.

Offline server backups are replicated hourly from the main site.

C.

All servers are replicated from the main site in an online status.

D.

Which of the following best describes a characteristic of a hot site?

Full Access
Question # 29

An on-premises data center is located in an earthquake-prone location. The workload consists of real-time, online transaction processing. Which ot the following data protection strategies should be used to back up on-premises data to the cloud while also being cost effective?

A.

Remote replication for failover

B.

A copy that is RAID 1 protected on spinning drives in an on-premises private cloud

C.

A full backup to on-site tape libraries in a private cloud

D.

Air-gapped protection to provide cyber resiliency

Full Access
Question # 30

A cloud engineer was deploying the company's payment processing application, but it failed with the following error log:

ERFOR:root: Transaction failed http 429 response, please try again Which of the following are the most likely causes for this error? (Select two).

A.

API throttling

B.

API gateway outage

C.

Web server outage

D.

Oversubscription

E.

Unauthorized access

F.

Insufficient quota

Full Access
Question # 31

A list of CVEs was identified on a web server. The systems administrator decides to close the ports and disable weak TLS ciphers. Which of the following describes this vulnerability management stage?

A.

Scanning

B.

Identification

C.

Assessment

D.

Remediation

Full Access
Question # 32

Which of the following can reduce the risk of CI/CD pipelines leaking secrets?

A.

Protected Git branches

B.

Use of a VM instead of containers

C.

Private image repositories

D.

Canary tests

Full Access
Go to page: