최신 CV0-004 무료덤프 - CompTIA Cloud+ (2024)
A company has decided to adopt a microservices architecture for its applications that are deployed to the cloud. Which of the following is a major advantage of this type of architecture?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A security engineer recently discovered a vulnerability in the operating system of the company VMs. The operations team reviews the issue and decides all VMs need to be updated from version 3.4.0 to 3.4.1. Which of the following best describes the type of update that will be applied?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A user's assigned cloud credentials are locked, and the user is unable to access the project's application. The cloud administrator reviews the logs and notices several attempts to log in with the user's account were made to a different application after working hours. Which of the following is the best approach for the administrator to troubleshoot this issue?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following network protocols is generally used in a NAS environment?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A government agency in the public sector is considering a migration from on premises to the cloud. Which of the following are the most important considerations for this cloud migration? (Select two).
정답: B,C
설명: (DumpTOP 회원만 볼 수 있음)
A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to recommend?
정답: D
A cloud architect attempts to modify a protected branch but is unable to do so. The architect receives an error indicating the action cannot be completed. Which of the following should the architect try instead''
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An IT manager is migrating the production environment to the cloud but needs to keep control of the operating systems, patches, and settings of all resources. Which of the following deployment models will best meet the requirements?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A cloud engineer has provisioned a VM for a high-frequency trading application. After the VM is put into production, users report high latency in trades. The engineer checks the last six hours of VM metrics and sees the following:
* CPU utilization is between 30% to 60%.
* Networkln is between 50Kbps and 70Kbps.
* NetworkOut is between 3.000Kpbs and 5.000Kbps.
* DiskReadOps is at 30.
* DiskWriteOps is at 70
* Memory utilization is between 50% and 70%.
Which of the following steps should the engineer take next to solve the latency issue?
* CPU utilization is between 30% to 60%.
* Networkln is between 50Kbps and 70Kbps.
* NetworkOut is between 3.000Kpbs and 5.000Kbps.
* DiskReadOps is at 30.
* DiskWriteOps is at 70
* Memory utilization is between 50% and 70%.
Which of the following steps should the engineer take next to solve the latency issue?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).
정답: C,E
설명: (DumpTOP 회원만 볼 수 있음)
A cloud engineer is concerned about command-and-control (C2) communication out of a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify the type of communication?
정답: A