Exam Code | CV0-002 |
Exam Name | CompTIA Cloud+ Certification Exam |
Questions | 234 Questions Answers With Explanation |
Update Date | July 11,2024 |
Price |
Was : |
Are you ready to take your career to the next level with CompTIA Cloud+ Certification Exam? At Prep4Certs, we're dedicated to helping you achieve your goals by providing high-quality CV0-002 Dumps and resources for a wide range of certification exams.
At Prep4Certs, we're committed to your success in the CompTIA CV0-002 exam. Our comprehensive study materials and resources are designed to equip you with the knowledge and skills needed to ace the exam with confidence:
Start Your Certification Journey Today
Whether you're looking to advance your career, expand your skill set, or pursue new opportunities, Prep4Certs is here to support you on your certification journey. Explore our comprehensive study materials, take your exam preparation to the next level, and unlock new possibilities for professional growth and success.
Ready to achieve your certification goals? Begin your journey with Prep4Certs today!
A cloud-based web proxy is blocking key sites that a business requires for operation. After validation, the sites are legitimate, and access is required for end users to complete their work.Which of the following is the BEST solution to allow access to the sites?
A. Instruct users to bypass the cloud-based web proxy.
B. Whitelist the URLs.
C. Blacklist the URLs.
D. Create a security group for those users and enforce MFA.
A cloud administrator wants to apply patches in an isolated copy of the production virtual server to assess the impact. Which of the following activities would BEST achieve this objective?
A. Clustering
B. Snapshot
C. Image backup
D. Cloning
A customer recently provisioned a new server on the IaaS. The IP address assigned from the pool resolves to another hostname. Some user traffic is being dumped or is causing slowness because of this issue. Which of the following maintenance activities does the provider need to perform to prevent this issue?
A. Use cloud provider tools to remove orphaned resources.
B. Initiate resource reclamation.
C. Run a script to remove stale DNS entries.
D. Update outdated security firewall configurations.
A cloud administrator needs to give a new developer access to contents in a directory stored in a public cloud provider. Which of the following is the BEST way to do this?
A. Add the developer to the role that has access to the directory contents.
B. Create a folder for the developer in the public cloud and copy the content to this folder.
C. Copy the contents of the folder to the developer’s local computer.
D. Temporarily give the administrator’s credentials and reset the password.
A customer wants to schedule a backup job that compares and saves changes from the last full backup. Which of the following backup types should be used?
A. Differential
B. Full
C. Clone
D. Incremental
A cloud engineer needs to deploy a new virtual firewall in a private cloud. Which of the following should the engineer do as a FIRST step?
A. Document the deployment in a knowledge base.
B. Create a change for deploying the firewall.
C. Put the hypervisor in maintenance mode.
D. Inform users that the cloud will be momentarily unavailable.
Several state and local law enforcement agencies have decided to share information about traffic violations within their state by using a new search application. The state has policies around limiting the exposure of PII, and each local agency must comply with these policies. Which of the following cloud architecture models would be the BEST approach?
A. Deploy the application to a public cloud and establish connections for each local agencies’ private cloud and use federation.
B. Have each local agency publish its data to an account that has been set up in a public cloud provider and deploy the application there.
C. Deploy the application in each local agency’s private cloud and create accounts for everyone to allow access to publish and search the data.
D. Deploy the application in the state’s shared cloud environment and create federation between the local agencies.
Upon discovery several SaaS applications are being utilized by users, and the InfoSec team needs to update a configuration file on all client machines.Which of the following file types is used to redirect users through a web proxy?
A. .dat
B. .tmp
C. .log
D. .pac
A cloud deployment engineer is modifying versions of the existing template image to instantiate new VMs. The engineer accomplishes this through the cloud self-service portal.After the version is changed and a new VM is successfully started, it does not have any connectivity, and all ping tests to other VMs fail. Which of the following would be the BEST approach to solve the problem?
A. Start the console session to the VM; check network static routes; test the ping to default gateway and next hop; and reconfigure the gateway IP.
B. Delete the VM; create a new flavor; turn on network service; add the new image to the template manager; and reinstantiate the VM using this new image.
C. Delete the VM; check the IP assignment and planning; modify configuration in the deployment template; and instantiate the VM again using the new template.
D. Assign new IPs to the newly created VMs by changing and running the deployment template; and check the connectivity on the cloud self-service portal afterward.
An upgrade to a web application, which supports 400 users at four sites, is being tested. The application runs on four servers behind a load balancer.The following test plan is proposed:Have 50 users from site A connect to server 1 Have 50 users from site B connect to server 2 Have 50 users from site C connect to server 3 Have 50 users from site D connect to server 4Which of the following parameters is being properly tested by this plan?
A. Sizing
B. Connectivity
C. High availability
D. Performance