Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CV0-004 Exam Dumps - CompTIA Cloud+ (2025)

Go to page:
Question # 41

A cloud service provider just launched a new serverless service that is compliant with all security regulations. A company deployed its code using the service, and the company's application was hacked due to leaked credentials. Which of the following is responsible?

A.

Customer

B.

Cloud service provider

C.

Hacker

D.

Code repository

Full Access
Question # 42

Which of the following requirements are core considerations when migrating a small business's on-premises applications to the cloud? (Select two).

A.

Availability

B.

Hybrid

C.

Testing

D.

Networking

E.

Compute

F.

Logs

Full Access
Question # 43

A company experienced a data leak through its website. A security engineer, who is investigating the issue, runs a vulnerability scan against the website and receives the following output:

Which of the following is the most likely cause of this leak?

A.

RTMP port open

B.

SQL injection

C.

Privilege escalation

D.

Insecure protocol

Full Access
Question # 44

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

A.

Operating system patches

B.

Table-level permissions

C.

Minor database engine updates

D.

Cluster configuration

E.

Row-level encryption

F.

Availability of hardware for scaling

Full Access
Question # 45

A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour. Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

A.

Use laC to deploy the laaS infrastructure.

B.

Convert the containers to VMs.

C.

Deploy the containers over SSH.

D.

Use private repositories for the containers.

Full Access
Question # 46

A cloud consultant needs to modernize a legacy application that can no longer address user demand and is expensive to maintain. Which of the following is the best migration

strategy?

A.

Retain

B.

Rehost

C.

Refactor

D.

Replatform

Full Access
Question # 47

A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to

recommend?

A.

Using CIS-hardened images

B.

Using watermarked images

C.

Using digitally signed images

D.

Using images that have an application firewall

Full Access
Question # 48

A security engineer Identifies a vulnerability m a containerized application. The vulnerability can be exploited by a privileged process to read tie content of the host's memory. The security engineer reviews the following Dockerfile to determine a solution to mitigate similar exploits:

Which of the following is the best solution to prevent similar exploits by privileged processes?

A.

Adding the USER myappuserinstruction

B.

Patching the host running the Docker daemon

C.

Changing FROM alpiner3.17 to FROM alpine:latest

D.

Running the container with the ready-only filesystem configuration

Full Access
Go to page: