CompTIA CV0-004 Practice Exams
Last updated on Mar 31,2025- Exam Code: CV0-004
- Exam Name: CompTIA Cloud+ (2024)
- Certification Provider: CompTIA
- Latest update: Mar 31,2025
A security engineer recently discovered a vulnerability in the operating system of the company VMs. The operations team reviews the issue and decides all VMs need to be updated from version 3.4.0 to 3.4.1.
Which of the following best describes the type of update that will be applied?
- A . Consistent
- B . Major
- C . Minor
- D . Ephemeral
A cloud server needs to automatically allocate more resources during sudden peak times. This allocation does not need to occur in regular intervals.
Which of the following scaling approaches should be used?
- A . Event
- B . Manual
- C . Trending
- D . Scheduled
A security team recently hired multiple interns who all need the same level of access.
Which of the following controls should the security team implement to provide access to the cloud environment with the least amount of overhead?
- A . MFA
- B . Discretionary access
- C . Local user access
- D . Group-based access control
Which of the following is a customer be responsible for in a provider-managed database service? (Select two).
- A . Operating system patches
- B . Table-level permissions
- C . Minor database engine updates
- D . Cluster configuration
- E . Row-level encryption
- F . Availability of hardware for scaling
Which of the following is a customer be responsible for in a provider-managed database service? (Select two).
- A . Operating system patches
- B . Table-level permissions
- C . Minor database engine updates
- D . Cluster configuration
- E . Row-level encryption
- F . Availability of hardware for scaling
A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system.
Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).
- A . Resource tagging
- B . Discretionary access control
- C . Multifactor authentication
- D . Role-based access control
- E . Token-based authentication
- F . Bastion host
The company’s IDS has reported an anomaly.
The cloud engineer remotely accesses the cloud instance, runs a command, and receives the following information:
Which of the following is the most likely root cause of this anomaly?
- A . Privilege escalation
- B . Leaked credentials
- C . Cryptojacking
- D . Defaced website
A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.
The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.
The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.
During testing, the company discovers that only 20% of connections completed successfully.
INSTRUCTIONS
Review the network architecture and supporting documents and fulfill these requirements:
Part 1:
– Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.
– Identify the problematic device(s).
Part 2:
– Identify the correct options to provide adequate configuration for hybrid cloud architecture.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Part 1:
Cloud Hybrid Network Diagram
Part 2:
Only select a maximum of TWO options from the multiple choice question
A cloud solutions architect needs to have consistency between production, staging, and development environments.
Which of the following options will best achieve this goal?
- A . Using Terraform templates with environment variables
- B . Using Grafana in each environment
- C . Using the ELK stack in each environment
- D . Using Jenkins agents in different environments
HOTSPOT
An e-commerce company is migrating from an on-premises private cloud environment to a public cloud IaaS environment. You are tasked with right-sizing the environment to save costs after the migration. The company’s requirements are to provide a 20% overhead above the average resource consumption, rounded up.
INSTRUCTIONS
Review the specifications and graphs showing resource usage for the web and database servers. Determine the average resource usage and select the correct specifications from the available drop-down options.