CV0-002 : CompTIA Cloud+ (CV0-002) : Part 06

  1. The following three hosts are being put into a virtualization cluster for a new project initiative:

    CV0-002 Part 06 Q01 021
    CV0-002 Part 06 Q01 021

    As more VMs are deployed to the cluster, which of the following virtualization technologies is MOST likely to report an error with this configuration?

    • High availability
    • Ballooning
    • Memory overcommitment
    • Hyperthreading
  2. A user has submitted a ticket to request additional VMs due to long wait times for online ordering. Given the snapshot of the resources in the table below:

    CV0-002 Part 06 Q02 022
    CV0-002 Part 06 Q02 022

    Which of the following is the BEST option for the administrator to resolve the ticket?

    • Add vCPU to the database server to increase capacity.
    • Add disks to the database server to increase capacity.
    • Add virtual network ports to the web server to increase capacity.
    • Add memory to the web server to increase capacity.
  3. A company is implementing a SaaS solution with a large user base. SaaS solution licensing is user based, and user management is critical to keep the cost in check. Which of the following is the MOST efficient way to meet this requirement?

    • Have the administrator of the SaaS solution keep track of user activities.
    • Have a nightly upload to the SaaS provider of the current user base based on API call.
    • Have users remove their SaaS accounts when they no longer need the service.
    • Have a weekly user management script maintain the SaaS user base.
  4. A cloud administrator updates the syslog forwarder configuration on a local server in production to use a different port. The development team is no longer receiving the audit logs from that server. However, the security team can retrieve and search the logs for the same server. Which of the following is MOST likely the issue?

    • The development team is not looking at the correct server when querying for the logs.
    • The security team has greater permissions than the development team.
    • The audit logging service has been disabled on the server.
    • The development team’s syslog server is configured to listen on the wrong port.
  5. Performance on a new private cloud deployment is not meeting expectations. An engineer has determined the virtualization host is experiencing high ready/wait times. VMs with the following configurations and metrics currently reside on the host:

    CV0-002 Part 06 Q05 023
    CV0-002 Part 06 Q05 023

    Which of the following troubleshooting choices would MOST likely be used to bring the high ready/wait times to meet the expected baseline?

    • Decrease the CPU count for VM1.
    • Increase the memory size for VM2.
    • Decrease the memory size for VM3.
    • Increase the CPU count for VM4.
  6. The CASB report indicates several unsanctioned SaaS applications are being used in an organization. Which of the following is the MOST likely cause?

    • VPN bypass
    • Shadow IT
    • Web proxy bypass
    • CAB approval
  7. A company has been migrating a significant number of its on-premises applications to various SaaS providers. The IT department has noticed the following:

    User account management has become challenging.
    User account compromises have increased.
    Accessing various SaaS applications is challenging.

    Which of the following should the IT security department implement to BEST resolve the issue? (Select THREE).

    • Single sign-on
    • Multifactor authentication
    • Network intrusion prevention system
    • Password synchronization
    • FederationIPSec tunnel to the SaaS providers
    • VPN to SaaS providers
  8. A cloud administrator is securing access to a VM using an IaaS cloud platform. The administrator must perform this task using an automated method, allow administrators to perform any method and expose any property of the VM, deny access for everyone else, and allow only read-only access to everyone else. Given this scenario, which of the following should the administrator use to BEST meet these requirements?

    • jQuery
    • JaJavavaScript
    • Java
    • JSON
  9. A company is deploying a new instant messaging app to allow for communications with external vendors. Each entity will host its own version of the application, but users must be able to talk between the companies. Which of the following security techniques would MOST likely be used to allow this to happen?

    • User synchronization
    • Password synchronization
    • Public federation
    • Multifactor authentication
  10. A cloud administrator wants to apply patches in an isolated copy of the production virtual server to assess the impact. Which of the following activities would BEST achieve this objective?

    • Clustering
    • Snapshot
    • Image backup
    • Cloning
  11. A security and risk team requires a weekly report to detect VM file system changes and validate the integrity of the OS. Which of the following is the BEST solution for this requirement?

    • Configure a FIM agent on the VM and forward syslogs to a central location.
    • Configure debugging on the VM and forward syslogs to a central location.
    • Configure an antivirus agent on the VM and create the report through the web GUI.
    • Configure a FIM agent on the VM and create the report through the web GUI.
  12. IaaS users are reporting longer than expected wait times when accessing the virtual file repository. There are more than 2TB of free disk space, and vCPU and vRAM do not reach more than 75% utilization. In which of the following ways should the cloud systems administrator analyze this issue?

    • Access the cloud services portal and increase the amount of available disk space by 25%.
    • Access the cloud services portal and check the amount of CPU and RAM on the host machine.
    • Access the cloud services portal and look at the historical performance numbers.
    • Access the cloud services portal and check the security log for access denied requests.
  13. A software company recently moved all of its development testing to a public cloud environment. The company primarily uses IaaS to deploy and test its code. The company needs the software developers to be more agile and efficient when testing application code. Which of the following backup types should the developers use to BEST ensure the speedy recovery of a system if it is damaged?

    • Snapshots
    • Full
    • incremental
    • Differential
  14. A cloud administrator works for an online gaming company that is hosting its multiplayer servers in a public IaaS cloud. The following metrics are reported during a controlled beta test:

    RAM usage 80%
    Bandwidth usage 50%
    Average ping 800ms

    The beta test shows poor performance for gamers. Which of the following should the cloud administrator implement FIRST to improve the gamers’ experience?

    • Scale the deployment of multiplayer servers by doubling the number of VMs.
    • Increase network bandwidth on the multiplayer servers.
    • Increase the RAM on the multiplayer servers.
    • Deploy multiplayer servers in public cloud locations closer to the user base.
  15. An administrator defines a backup as follows:

    One weekly full backup
    Daily incremental backup

    Which of the following BEST describes where the administrator would define this?

    • Backup SLA document
    • Backup orchestration workflow
    • Backup schedule
    • Provisioning schedule
  16. In a private cloud environment, which of the following is the BEST way to update 20 VMs with the same patch that has been regression tested and approved for rollout?

    • Automate the distribution of the patch and use an orchestration tool to roll it out.
    • Roll out the patch manually to the 20 VMs and reboot the system.
    • Deploy the patch to ten VMs for testing and then install it on the remaining VMs.
    • Install the patch on as many VMs as possible during the next maintenance window.
  17. A cloud administrator has configured a connection between two virtual private cloud environments at a public cloud provider that are each in different accounts. The administrator has configured the accounts correctly so they can connect to each other’s resources. Both cloud environments have policies that allow anyone from 0.0.0.0/0 on TCP port 22. The following table shows the network configuration information:

    CV0-002 Part 06 Q17 024
    CV0-002 Part 06 Q17 024

    However, the administrator is unable to establish an SSH connection from a server in 10.250.40.100 to 10.250.48.214. Which of the following is the MOST likely issue?

    • The network ACL is not configured to allow SSH access.
    • The IP configuration on one of the servers is incorrect.
    • The administrator does not have sufficient credentials.
    • The routing tables have not been updated correctly.
  18. A company is looking for a hardware feature with the least amount of downtime in terms of firmware upgrades. Which of the following features BEST meet this requirement?

    • In-service upgrades
    • Rolling upgrades
    • Failover upgrades
    • User-mode upgrades
  19. A company uses SaaS and IaaS solutions from multiple cloud providers. Users report that this requires them to manage and remember multiple user accounts and passwords. Which of the following solutions should be implemented to fix this issue?

    • SSO
    • Federation
    • Password synchronization
    • Lowered password complexity
    • Multifactor authentication
  20. A CSA needs to bring a client’s public cloud site online at another location in the same region after a disaster. The RPO is eight hours, and the RTO is four hours. Which of the following is the BEST way to accomplish this goal?

    • Restore the site at the new location within six hours by using backups from the failed public cloud site from eight hours earlier. Switch users from the failed site to the online regional public cloud site.
    • Restore the site at the new location within two hours by using backups from the failed public cloud site from two hours earlier. Switch users from the failed site to the online regional public cloud site.
    • Restore the site at the new location within eight hours by using backups from the failed public cloud site from six hours earlier. Switch users from the failed site to the online regional public cloud site.
    • Restore the site at the new location within four and half hours by using backups from the failed public cloud site from a half hour earlier. Switch users from the failed site to the online regional public cloud site.