Month End Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

CV0-003 Sample Questions Answers

Questions 4

Different healthcare organizations have agreed to collaborate and build a cloud infrastructure that should minimize compliance costs and provide a high degree of security and privacy, as per regulatory requirements. This is an example of a:

Options:

A.

private cloud.

B.

community cloud.

C.

hybrid cloud.

D.

public cloud.

Buy Now
Questions 5

A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution.

Which of the following will provide the data to measure business continuity? (Choose two.)

Options:

A.

A service-level agreement

B.

Automation scripts

C.

Playbooks

D.

A network diagram

E.

A backup and restore

F.

A recovery time objective

Buy Now
Questions 6

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections.

Which of the following MOST likely needs to be analyzed before rehosting the ERP?

Options:

A.

Software

B.

Licensing

C.

Right-sizing

D.

The network

Buy Now
Questions 7

A systems administrator notices the host filesystem is running out of storage space. Which of the following will best reduce the storage space on the system?

Options:

A.

Deduplication

B.

Compression

C.

Adaptive optimization

D.

Thin provisioning

Buy Now
Questions 8

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

Options:

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Buy Now
Questions 9

An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources.

Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?

Options:

A.

Dedicated

B.

Shared

C.

Passthrough

D.

vGPU

Buy Now
Questions 10

A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data.

Which of the following migration methods would be the BEST to use?

Options:

A.

Conduct a V2V migration

B.

Perform a storage live migration

C.

Rsync the data between arrays

D.

Use a storage vendor migration appliance

Buy Now
Questions 11

A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations.

Which of the following actions should the cloud administrator take FIRST?

Options:

A.

Initiate a failover

B.

Restore backups

C.

Configure the network

D.

Perform a failback

Buy Now
Questions 12

A database system is causing performance issues due to an increase in the number of transactions. Which of the following is the best way to solve these performance issues?

Options:

A.

Changing to object storage.

B.

Adding more volume storage.

C.

Increasing storage IOPS.

D.

Configuring RAID.

Buy Now
Questions 13

A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information:

    The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.

    The cloud management console does not show an IP address for that server.

    A DNS lookup shows the hostname resolves to an IP address.

    The server is a member of the same security group as the others.

    The cloud administrator is able to log in remotely to the other servers without issue.

Which of the following is the MOST likely cause of the server being unavailable?

Options:

A.

The network driver updates did not apply successfully, and the interface is in a down state.

B.

The ACL policy for the server was updated as part of the server reboot, preventing login access.

C.

The server was assigned a new IP address, and DNS entry for the server name was not updated.

D.

The update caused an increase in the output to the logs, and the server is too busy to respond.

Buy Now
Questions 14

A cloud administrator received a request to provision a set of cloud resources in an effort to switch to infrastructure as code to automate and optimize operations. The administrator decides to try to run some tests with the following definition:

Which of the following is the most likely cause of the issue?

Options:

A.

The cloud provider is expecting the private key.

B.

The incorrect resource name was used.

C.

The environment variable for the public key path has not been set.

D.

An unexpected variable was provided.

Buy Now
Questions 15

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance.

Which of the following licensing models is the application MOST likely using?

Options:

A.

Per device

B.

Per user

C.

Core-based

D.

Volume-based

Buy Now
Questions 16

A systems administrator is analyzing a report of slow performance in a cloud application. This application is working behind a network load balancer with two VMs, and each VM has its own digital certificate configured. Currently, each VM is consuming 85% CPU on average. Due to cost restrictions, the administrator cannot scale vertically or horizontally in the environment. Which of the following actions should the administrator take to decrease the CPU utilization? (Choose two.)

Options:

A.

Configure the communication between the load balancer and the VMs to use a VPN.

B.

Move the digital certificate to the load balancer.

C.

Configure the communication between the load balancer and the VMs to use HTTP.

D.

Reissue digital certificates on the VMs.

E.

Configure the communication between the load balancer and the VMs to use HTTPS.

F.

Keep the digital certificates on the VMs.

Buy Now
Questions 17

A company developed a product using a cloud provider’s PaaS platform and many of the platform-based components within the application environment.

Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider?

Options:

A.

Licensing

B.

Authentication providers

C.

Service-level agreement

D.

Vendor lock-in

Buy Now
Questions 18

An IaaS application has a two-hour RTO and a four-hour RPO. The application takes one hour to back up its data or restore from a local backup file. A systems administrator is tasked with configuring the backup policy.

Which of the following should the administrator configure to achieve the application requirements with the LEAST cost?

Options:

A.

Back up to long-term storage every night

B.

Back up to object storage every three hours

C.

Back up to long-term storage every four hours

D.

Back up to object storage every hour

Buy Now
Questions 19

In an existing IaaS instance, it is required to deploy a single application that has different versions.

Which of the following should be recommended to meet this requirement?

Options:

A.

Deploy using containers

B.

Install a Type 2 hypervisor

C.

Enable SR-IOV on the host

D.

Create snapshots

Buy Now
Questions 20

A company has deployed a new cloud solution and is required to meet security compliance.

Which of the following will MOST likely be executed in the cloud solution to meet security requirements?

Options:

A.

Performance testing

B.

Regression testing

C.

Vulnerability testing

D.

Usability testing

Buy Now
Questions 21

A cloud engineer is deploying a server in a cloud platform. The engineer reviews a security scan report. Which of the following recommended services should be disabled? (Select TWO).

Options:

A.

Telnet

B.

FTP

C.

Remote login

D.

DNS

E.

DHCP

F.

LDAP

Buy Now
Questions 22

A VDI administrator has received reports of poor application performance.

Which of the following should the administrator troubleshoot FIRST?

Options:

A.

The network environment

B.

Container resources

C.

Client devices

D.

Server resources

Buy Now
Questions 23

A systems administrator is deploying a solution that requires a virtual network in a private cloud environment. The solution design requires the virtual network to transport multiple payload types.

Which of the following network virtualization options would BEST satisfy the requirement?

Options:

A.

VXLAN

B.

STT

C.

NVGRE

D.

GENEVE

Buy Now
Questions 24

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

Options:

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Buy Now
Questions 25

After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)

Options:

A.

Identify the resources that are accessible to the affected IAM user

B.

Remove the published plain-text password

C.

Notify users that a data breach has occurred

D.

Change the affected IAM user’s password

E.

Delete the affected IAM user

Buy Now
Questions 26

Which of the following is relevant to capacity planning in a SaaS environment?

Options:

A.

Licensing

B.

A hypervisor

C.

Clustering

D.

Scalability

Buy Now
Questions 27

A systems administrator is troubleshooting network throughput issues following a deployment. The network is currently being overwhelmed by the amount of traffic between the database and the web servers in the environment.

Which of the following should the administrator do to resolve this issue?

Options:

A.

Set up affinity rules to keep web and database servers on the same hypervisor

B.

Enable jumbo frames on the gateway

C.

Move the web and database servers onto the same VXLAN

D.

Move the servers onto thick-provisioned storage

Buy Now
Questions 28

A cloud architect wants to minimize the risk of having systems administrators in an IaaS compute instance perform application code changes. The development group should be the only group allowed to modify files in the directory.

Which of the following will accomplish the desired objective?

Options:

A.

Remove the file write permissions for the application service account.

B.

Restrict the file write permissions to the development group only.

C.

Add access to the fileshare for the systems administrator’s group.

D.

Deny access to all development user accounts

Buy Now
Questions 29

Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?

Options:

A.

Using only open-source technologies

B.

Keeping all resources up to date

C.

Creating a standby environment with a different cloud provider

D.

Having a detailed incident response plan

Buy Now
Questions 30

A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times.

Which of the following actions will MOST likely solve this issue?

Options:

A.

Update the quest graphics drivers from the official repository

B.

Add more vGPU licenses to the host

C.

Instruct users to access virtual workstations only on the VLAN

D.

Select vGPU profiles with higher video RAM

Buy Now
Questions 31

A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet.

Which of the following should the systems administrator implement to achieve this objective?

Options:

A.

A stateful firewall

B.

DLP

C.

DNSSEC

D.

Network flows

Buy Now
Questions 32

A systems administrator is deploying a new storage array for backups. The array provides 1PB of raw disk space and uses 14TB nearline SAS drives. The solution must tolerate at least two failed drives in a single RAID set.

Which of the following RAID levels satisfies this requirement?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Buy Now
Questions 33

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance has been slow since the images were upgraded from Windows 7 to Windows 10.

This VDI environment is used to run simple tasks, such as Microsoft Office. The administrator investigates the virtual machines and finds the following settings:

    4 vCPU

    16GB RAM

    10Gb networking

    256MB frame buffer

Which of the following MOST likely needs to be upgraded?

Options:

A.

vRAM

B.

vCPU

C.

vGPU

D.

vNIC

Buy Now
Questions 34

An organization has a web-server farm. Which of the following solutions should be implemented to obtain efficient distribution of requests to theservers?

Options:

A.

A clustered web server infrastructure

B.

A load-balancing appliance

C.

A containerized application

D.

Distribution of web servers across different regions and zones

Buy Now
Questions 35

A cloud architect is designing a solution to handle unstructured data with high scalability requirements. Which of the following storage options would be the best fit?

Options:

A.

Block storage.

B.

Object storage.

C.

File storage.

D.

Tiered storage.

Buy Now
Questions 36

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the best action to correct the latency issue?

Options:

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Buy Now
Questions 37

An organization that currently stores a set of documents in the cloud is concerned about potential loss if these documents are accidentally deleted. Which of the following is the best way for the organization to quickly recover a lost file?

Options:

A.

Enabling deduplication on the cloud storage.

B.

Enabling versioning for the underlying cloud storage.

C.

Creating an identity and access management policy.

D.

Creating a single snapshot of the cloud storage.

Buy Now
Questions 38

A cloud engineer gathered the following requirements for a factory automation system:

    Assembly line systems are latency-sensitive.

    Internet connectivity issues are common and can be prolonged.

    Services must support a 99.999% system uptime.

Which of the following components would be useful in implementing a hybrid model? (Select two).

Options:

A.

Cloud-based orchestration.

B.

Cloud edge devices.

C.

Local services.

D.

Cloud-managed services.

E.

Centralized logging and alerting.

F.

CDN provider.

Buy Now
Questions 39

A company recently acquired another company, and the human resources staff expects to see a 50% increase in usage for the employee benefits web portal once the employees from the acquired company receive access. The cloud administrator needs to assess whether the current web portal can handle the increased load. Which of the following should the cloud administrator do first?

Options:

A.

Increase CPU resources by 50% on the web portal.

B.

Review current monitoring logs to determine resource usage on the web portal.

C.

Create an autoscaling policy to expand the web portal environment dynamically.

D.

Provision additional servers to handle the expected increased usage.

Buy Now
Questions 40

An IaaS provider has numerous devices and services that are commissioned and decommissioned automatically on an ongoing basis. The cloud administrator needs to implement a solution that will help reduce administrative overhead.

Which of the following will accomplish this task?

Options:

A.

IPAM

B.

NAC

C.

NTP

D.

DNS

Buy Now
Questions 41

A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal.

Which of the following should the administrator do to fix this issue?

Options:

A.

Change the database application IP

B.

Create a database cluster between the primary site and the DR site

C.

Update the connection string

D.

Edit the DNS record at the DR site for the application servers

Buy Now
Questions 42

A systems administrator would like to reduce the network delay between two servers.

Which of the following will reduce the network delay without taxing other system resources?

Options:

A.

Decrease the MTU size on both servers

B.

Adjust the CPU resources on both servers

C.

Enable compression between the servers

D.

Configure a VPN tunnel between the servers

Buy Now
Questions 43

A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found.

Which of the following is the MOST likely cause of the script failure?

Options:

A.

Account mismatches

B.

IP address changes

C.

API version incompatibility

D.

Server name changes

Buy Now
Questions 44

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

Options:

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Buy Now
Questions 45

A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.

This is an example of:

Options:

A.

a storage area network

B.

a network file system

C.

hyperconverged storage

D.

thick-provisioned disks

Buy Now
Questions 46

An administrator is performing an in-place upgrade on a quest VM operating system.

Which of the following can be performed as a quick method to roll back to an earlier state, if necessary?

Options:

A.

A configuration file backup

B.

A full backup of the database

C.

A differential backup

D.

A VM-level snapshot

Buy Now
Questions 47

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

Options:

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPU resources

F.

License issues

Buy Now
Questions 48

A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?

Options:

A.

The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS

B.

The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor

C.

The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule

D.

Migrating from laaS to on premises, the network traffic between on-premises users and the laaS instance, and the CPU utilization of the hypervisor host

Buy Now
Questions 49

A systems administrator wants to ensure two VMs remain together on the same host. Which of the following must be set up to enable this functionality?

Options:

A.

Affinity

B.

Zones

C.

Regions

D.

A cluster

Buy Now
Questions 50

A cloud security analyst is implementing a vulnerability scan of the web server in the DMZ, which is running in an IaaS compute instance. The default inbound firewall settings are as follows:

Which of the following will provide the analyst with the MOST accurate report?

Options:

A.

An agent-based scan

B.

A network vulnerability scan

C.

A default and common credentialed scan

D.

A network credentialed vulnerability scan

Buy Now
Questions 51

A technician just received the lessons learned from some recent data that was lost due to an on-premises file-server crash. The action point is to change the backup strategy to minimize manual intervention. Which of the following is the BEST approach for the technician to implement?

Options:

A.

Backup as a service

B.

RAID 1

C.

Long-term storage

D.

New backup devices

Buy Now
Questions 52

All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST?

Options:

A.

Peer all the networks from each cloud environment.

B.

Migrate the servers.

C.

Create a VPN tunnel.

D.

Configure network access control lists.

Buy Now
Questions 53

A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.)

Options:

A.

Install TLS certificates on the server.

B.

Forward port 80 traffic to port 443.

C.

Disable TLS 1.0/1.1 and SSL.

D.

Disable password authentication.

E.

Enable SSH key access only.

F.

Provision the server in a separate VPC.

G.

Disable the superuser/administrator account.

Buy Now
Questions 54

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it.

Which of the following configuration options would BEST meet this requirement?

Options:

A.

Virtual GPU

B.

External GPU

C.

Passthrough GPU

D.

Shared GPU

Buy Now
Questions 55

An administrator recently provisioned a file server in the cloud. Based on financial considerations, the administrator has a limited amount of disk space. Which of the following will help control the amount of space that is being used?

Options:

A.

Thick provisioning

B.

Software-defined storage

C.

User quotas

D.

Network file system

Buy Now
Questions 56

An organization is implementing a new requirement to facilitate faster downloads for users of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?

Options:

A.

Implement CDN for overall cloud application.

B.

Implement autoscaling of the compute resources.

C.

Implement SR-IOV on the server instances.

D.

Implement an application container solution.

Buy Now
Questions 57

A cloud architect is reviewing four deployment options for a new application that will be hosted by a public cloud provider. The application must meet an SLA that allows for no more than five hours of downtime annually. The cloud architect is reviewing the SLAs for the services each option will use:

Based on the information above, which of the following minimally complies with the SLA requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 58

An update is being deployed to a web application, and a systems administrator notices the cloud SQL database has stopped running. The VM is responding to pings, and there were not any configuration changes scheduled for the VM. Which of the following should the administrator check NEXT?

Options:

A.

Logs on the VM

B.

Firewall on the VM

C.

Memory on the VM

D.

vGPU performance on the VM

Buy Now
Questions 59

A disaster situation has occurred, and the entire team needs to be informed about the situation. Which of the following documents will help the administrator find the details of the relevant team members for escalation?

Options:

A.

Chain of custody

B.

Root cause analysis

C.

Playbook

D.

Call tree

Buy Now
Questions 60

An organization is currently deploying a private cloud model. All devices should receive the time from the local environment with the least administrative effort. Which of the following ports needs to be opened to fulfill this requirement?

Options:

A.

53

B.

67

C.

123

D.

161

Buy Now
Questions 61

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

Options:

A.

Service-level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Buy Now
Questions 62

A systems administrator is using a configuration management tool to perform maintenance tasks in a system. The tool is leveraging the target system's API to perform these maintenance tasks After a number of features and security updates are applied to the target system, the configuration management tool no longer works as expected. Which of the following is the MOST likely cause of the issue?

Options:

A.

The target system's API functionality has been deprecated

B.

The password for the service account has expired

C.

The IP addresses of the target system have changed

D.

The target system has failed after the updates

Buy Now
Questions 63

Which of the following definitions of serverless computing BEST explains how it is different from using VMs?

Options:

A.

Serverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP.

B.

Serverless computing uses predictable billing and offers lower costs than VM compute services.

C.

Serverless computing is a scalable, highly available cloud service that uses SDN technologies.

D.

Serverless computing allows developers to focus on writing code and organizations to focus on business.

Buy Now
Questions 64

A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?

Options:

A.

V2V

B.

V2P

C.

P2P

D.

P2V

Buy Now
Questions 65

A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?

Options:

A.

A service availability scan

B.

An agent-based vulnerability scan

C.

A default and common credentialed scan

D.

A network port scan

Buy Now
Questions 66

A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?

Options:

A.

SNMPv3

B.

Community strings

C.

IPSec tunnels

D.

ACLs

Buy Now
Questions 67

A cloud administrator is working in a secure government environment. The administrator needs to implement corrective action due to recently identified security issue on the OS of a VM that is running a facility-management application in a cloud environment. The administrator needs to consult the application vendor, so it might take some time to resolve the issue. Which of the following is the FIRST action the administrator should take while working on the resolution?

Options:

A.

Shut down the server.

B.

Upgrade the OS

C.

Update the risk register.

D.

Raise a problem ticket.

Buy Now
Questions 68

A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring the VM uses only the storage if needs. Which of the following will BEST achieve this goal?

Options:

A.

Compression

B.

Deduplication

C.

RAID

D.

Thin provisioning

Buy Now
Questions 69

A company's marketing department is running a rendering application on virtual desktops. Currently, the application runs slowly, and it takes a long time to refresh the screen. The virtualization administrator is tasked with resolving this issue. Which of the following is the BEST solution?

Options:

A.

GPU passthrough

B.

Increased memory

C.

Converged infrastructure

D.

An additional CPU core

Buy Now
Questions 70

A private IaaS administrator is receiving reports that all newly provisioned Linux VMs are running an earlier version of the OS than they should be. The administrator reviews the automation scripts to troubleshoot the issue and determines the scripts ran successfully. Which of the following is the MOST likely cause of the issue?

Options:

A.

API version incompatibility

B.

Misconfigured script account

C.

Wrong template selection

D.

Incorrect provisioning script indentation

Buy Now
Questions 71

A company needs a solution to find content in images. Which of the following technologies, when used in conjunction with cloud services, would facilitate the BEST solution?

Options:

A.

Internet of Things

B.

Digital transformation

C.

Artificial intelligence

D.

DNS over TLS

Buy Now
Questions 72

A company is considering consolidating a number of physical machines into a virtual infrastructure that will be located at its main office. The company has the following requirements:

High-performance VMs

More secure

Has system independence

Which of the following is the BEST platform for the company to use?

Options:

A.

Type 1 hypervisor

B.

Type 2 hypervisor

C.

Software application virtualization

D.

Remote dedicated hosting

Buy Now
Questions 73

A systems administrator receives an alert that VDI performance on the cluster is poor. Opening any application takes one to two minutes. The administrator investigates and finds the following conditions:

    Cluster memory utilization: 65%

    Cluster SSD utilization: 70%

    Average VM CPU wait time: 14%

    Cluster CPU utilization: 75%

Which of the following actions should the administrator take to improve VDI performance?

Options:

A.

Add CPU resources to the cluster.

B.

Increase the number of vCPUs per VM.

C.

Add memory to the nodes in the cluster.

D.

Increase the amount of SSD storage in the cluster.

Buy Now
Questions 74

A systems administrator audits a cloud application and discovers one of the key regulatory requirements has not been addressed. The requirement states that if

a physical breach occurs and hard drives are stolen, the contents of the drives should not be readable. Which of the following should be used to address the requirement?

Options:

A.

Obfuscation

B.

Encryption

C.

EDR

D.

HIPS

Buy Now
Questions 75

A systems administrator is configuring updates on a system. Which of the following update branches should the administrator choose to ensure the system receives updates that are maintained for at least four years?

Options:

A.

LTS

B.

Canary

C.

Beta

D.

Stable

Buy Now
Questions 76

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly.

Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?

Options:

A.

Tier pricing

B.

Licensing

C.

Estimated consumption

D.

Feature compatibility

Buy Now
Questions 77

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

Options:

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Buy Now
Questions 78

A cloud administrator is reviewing the current private cloud and public laaS environment, and is building an optimization plan. Portability is of great concern for the administrator so resources can be easily moved from one environment to another.

Which of the following should the administrator implement?

Options:

A.

Serverless

B.

CDN

C.

Containers

D.

Deduplication

Buy Now
Questions 79

Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue?

Options:

A.

Perform a memory dump of the OS.

Analyze the memory dump.

Upgrade the host CPU to a higher clock speed CPU.

B.

Perform a packet capture during authentication.

Validate the load-balancing configuration.

Analyze the network throughput of the load balancer.

C.

Analyze the storage system IOPS.

Increase the storage system capacity.

Replace the storage system disks to SSD.

D.

Evaluate the OS ACLs.

Upgrade the router firmware.

Increase the memory of the router.

Buy Now
Questions 80

A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective?

Options:

A.

22, 53, 445

B.

22, 443, 445

C.

25, 123, 443

D.

137, 139, 445

Buy Now
Questions 81

A system administrator supports an application in the cloud, which includes a restful API that receives an encrypted message that is passed to a calculator system. The administrator needs to ensure the proper function of the API using a new automation tool. Which of the following techniques would be BEST for the administrator to use to accomplish this requirement?

Options:

A.

Functional testing

B.

Performance testing

C.

Integration testing

D.

Unit testing

Buy Now
Questions 82

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols should the company use? (Choose two.)

Options:

A.

CIFS

B.

FTP

C.

iSCSI

D.

RAID 10

E.

NFS

F.

FC

Buy Now
Questions 83

An engineer is responsible for configuring a new firewall solution that will be deployed in a new public cloud environment. All traffic must pass through the firewall. The SLA for the firewall is 99.999%. Which of the following should be deployed?

Options:

A.

Two load balancers behind a single firewall

B.

Firewalls in a blue-green configuration

C.

Two firewalls in a HA configuration

D.

A web application firewall

Buy Now
Questions 84

A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?

Options:

A.

Deduplication

B.

Thin provisioning

C.

Software-defined storage

D.

iSCSI storage

Buy Now
Questions 85

A cloud administrator recently misconfigured the permission policy on a credential vault by granting public access to it. Which of the following should the administrator do? (Select two).

Options:

A.

Reduce the system resources.

B.

Delete the affected users.

C.

Revoke the misconfigured permission policy.

D.

Scan the systems for vulnerabilities.

E.

Change the affected credentials.

F.

Block public access to the application.

Buy Now
Questions 86

A cloud administrator must ensure all servers are in compliance with the company's security policy Which of the following should the administrator check FIRST?

Options:

A.

The application version

B.

The OS version

C.

Hardened baselines

D.

Password policies

Buy Now
Questions 87

A systems administrator is attempting to gather information about services and resource utilization on VMs in a cloud environment. Which of the following will best accomplish this objective?

Options:

A.

Syslog

B.

SNMP

C.

CMDB

D.

Service management

E.

Performance monitoring

Buy Now
Questions 88

A company that performs passive vulnerability scanning at its transit VPC has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the use to verify if this is a true positive with the LEAST effort and cost? (Select TWO).

Options:

A.

A network-based scan

B.

An agent-based scan

C.

A port scan

D.

A red-team exercise

E.

A credentialed scan

F.

A blue-team exercise

G.

Unknown environment penetration testing

Buy Now
Questions 89

A cloud engineer is required to move legacy systems to a public cloud. The system configuration is provided below:

Server Name

Cores

OS Disk (Used)

Data Disk (Used)

Encryption

Web1

2

500GB (45%)

1TB (20%)

OS

Web2

2

500GB (40%)

1TB (90%)

OS

App1

4

250GB (90%)

2TB (65%)

No

App2

4

250GB (70%)

2TB (95%)

No

DB1

16

250GB (25%)

4TB (65%)

Data

The public cloud provider VMs support a maximum OS disk size of 250GB and a data disk size of 2TB. Which of the following tasks will contribute to a successful migration to the cloud environment? (Select two).

Options:

A.

Clean up Web1's OS disk.

B.

Shrink the OS disk for Web1 and Web2.

C.

Migrate DB1 to DBaaS.

D.

Clean up App1's OS Disk.

E.

Decrypt DB1.

F.

Convert DB1 to a clustered database.

Buy Now
Questions 90

An IT professional is selecting the appropriate cloud storage solution for an application that has the following requirements:

. The owner of the objects should be the object writer.

· The storage system must enforce TLS encryption.

Which of the following should the IT professional configure?

Options:

A.

A bucket

B.

A CIFS endpoint

C.

A SAN

D.

An NFS mount

Buy Now
Questions 91

A cloud administrator used a deployment script to recreate a number of servers hosted in a public-cloud provider_ However, after the script completes, the administrator receives the following error when attempting to connect to one of the servers Via SSH from the administrators workstation: CHANGED. Which of the following IS the MOST likely cause of the issue?

Options:

A.

The DNS records need to be updated

B.

The cloud provider assigned a new IP address to the server.

C.

The fingerprint on the server's RSA key is different

D.

The administrator has not copied the public key to the server.

Buy Now
Questions 92

A systems administrator is troubleshooting issues with audio lag during phone conferences. When looking at the core switch, the administrator notices its buffers are consistently full, and packets are being dropped due to the large number being sent and received. There is no room in the budget for new hardware, but it is critical that the audio lag be fixed immediately. Which of the following will most likely resolve the issue?

Options:

A.

Enable compression of audio traffic.

B.

Configure QoS rules for VolP traffic.

C.

Verify that the gateway uplink is not saturated.

D.

Add an exception to IPS for voice traffic.

Buy Now
Questions 93

An organization located in Asia connects to a cloud infrastructure hosted in North America and Europe. Sporadic slowness has been observed when using the PaaS and laaS components. A diagnostic using the following commands was run, and the following results were collected:

Which of the following is the most likely reason for the latency?

Options:

A.

Service degradation on the ISP

B.

A DDoS attack on the organization's infrastructure

C.

Misconfiguration of the network security groups

D.

Switch failure at the organization

Buy Now
Questions 94

A company uses multiple SaaS-based cloud applications. All the applications require authentication upon access. An administrator has been asked to address this issue and enhance security. Which of the following technologies would be the BEST solution?

Options:

A.

Single sign-on

B.

Certificate authentication

C.

Federation

D.

Multifactor authentication

Buy Now
Questions 95

A cloud engineer is responsible for a legacy web application that runs on an on-premises VM environment. The VM environment is approaching end of life. The engineer needs to migrate the web application to the cloud as quickly as possible because the VM environment has the following limitations:

• The VM environment has a single IOGB disk.

• The VM environment still uses 10Mbps, which leaves a 100Mbps WAN connection underutilized.

• No installation media is available.

Which of the following is the best way to migrate the web application to the cloud?

Options:

A.

Use the VM import connector to import the VM into the cloud.

B.

Use import/export to import the VM as a snapshot and attach it to a cloud instance.

C.

Use REST APIs to import an image of the VM into the cloud.

D.

Use object storage to create a backup of the VM and restore data into the cloud instance.

Buy Now
Questions 96

A company is using a hybrid cloud environment. The private cloud is hosting the business applications, and the cloud services are being used to replicate for availability purposes.

The cloud services are also being used to accommodate the additional resource requirements to provide continued services. Which of the following scalability models is the company utilizing?

Options:

A.

Vertical scaling

B.

Autoscaling

C.

Cloud bursting

D.

Horizontal scaling

Buy Now
Questions 97

A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.)

Options:

A.

The fabric interconnects

B.

The virtual appliances

C.

The firmware

D.

The virtual machines

E.

The baselines

F.

The operating system

Buy Now
Questions 98

A cloud administrator is assessing the scaling of an infrastructure stack. When viewing the configuration, the cloud administrator notices that the servers have a maximum limit of three. Which of the following is a way to increase throughput for the three servers without adjusting the maximum scaling limits?

Options:

A.

Selecting a machine with more resources.

B.

Reducing the size of the image being deployed.

C.

Using faster block storage on the machines.

D.

Increasing the scaling minimum to three.

Buy Now
Questions 99

A cloud engineer recently set up a container image repository. The engineer wants to ensure that downloaded images are not modified in transit. Which of the following is the best method to achieve this goal?

Options:

A.

SHA-256

B.

IPSec

C.

AES-256

D.

MD5

E.

serpent-256

Buy Now
Questions 100

One of the web applications in a public subnet is vulnerable to a newly discovered zero-day vulnerability. Which of the following actions can a security engineer perform to reduce the risk of exploitation and application downtime?

Options:

A.

Stop the web server in the affected host.

B.

Insert a deny rule in the host firewall.

C.

Add a new signature in the network IDS.

D.

Implement a virtual patch in the WAF.

Buy Now
Questions 101

A cloud architect is reviewing the design for a new cloud-based ERP solution. The solution consists of eight servers with a single network interface. The allocated IP range is 172.16.0.0/28. One of the requirements of the solution is that it must be able to handle the potential addition of 16 new servers to the environment. Because of the complexity of the firewall and related ACL requirements, these new servers will need to be in the same network range. Which of the following changes

would allow for the potential server addition?

Options:

A.

Change the IP address range to use a 10.0.0.0 address.

B.

Change the server template to add network interfaces.

C.

Change the subnet mask to use a 255.255.255.128 range.

D.

Change the server scaling configuration to increase the maximum limit.

Buy Now
Questions 102

A systems administrator receives a ticket stating the following:

“The programming team received an error during the process deploying applications to the container platform. The error after the containerized applications were created”

Which the following should the administrator Check FIRST?

Options:

A.

The containers

B.

The application

C.

The Scripts

D.

The templates

Buy Now
Questions 103

A VDI administrator is deploying 512 desktops for remote workers. Which of the following would meet the minimum number of IP addresses needed for the desktops?

Options:

A.

/22

B.

/23

C.

/24

D.

/25

Buy Now
Questions 104

A company has two identical environments (X and Y) running its core business application. As part of an upgrade, the X environment is patched/upgraded and tested while the Y environment is still serving the consumer workloads. Upon successful testing of the X environment, all workload is sent to this environment, and the Y environment is then upgraded before both environments start to manage the workloads. Which of the following upgrade methods is being used?

Options:

A.

Active-passive

B.

Canary

C.

Development/production

D.

Blue-green

Buy Now
Questions 105

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

Options:

A.

RPO

B.

MTTR

C.

SLA

D.

RTO

Buy Now
Questions 106

A company is planning its cloud architecture and wants to use a VPC for each of its three products per environment in two regions, totaling 18 VPCs. The products have interdependences, consuming services between VPCs. Which of the following should the cloud architect use to connect all the VPCs?

Options:

A.

MPLS connections

B.

VPC peering

C.

Hub and spoke

D.

VPN connections

Buy Now
Questions 107

A security team is conducting an audit of the security group configurations for the Linux servers that are hosted in a public laaS. The team identifies the following rule as a potential

A cloud administrator, who is working remotely, logs in to the cloud management console and modifies the rule to set the source to "My IR" Shortly after deploying the rule, an internal developer receives the following error message when attempting to log in to the server using SSH: Network error: connection timed out. However, the administrator is able to connect successfully to the same server using SSH. Which of the following is the BEST option for both the developer and the administrator to access the

server from their locations?

Options:

A.

Modify the outbound rule to allow the company's external IP address as a source.

B.

Add an inbound rule to use the IP address for the company's main office as a source.

C.

Modify the inbound rule to allow the company's external IP address as a source.

D.

Delete the inbound rule to allow the company's external IP address as a source.

Buy Now
Questions 108

A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?

Options:

A.

A CDN solution

B.

An MPLS connection between data centers

C.

A DNS round robin

D.

A site-to-site VPN between data centers

Buy Now
Questions 109

A cloud engineer recently used a deployment script template to implement changes on a cloud-hosted web application. The web application communicates with a managed database on the back end. The engineer later notices the web application is no longer receiving data from the managed database. Which of the following is the MOST likely cause of the issue?

Options:

A.

Misconfiguration in the user permissions

B.

Misconfiguration in the routing traffic

C.

Misconfiguration in the network ACL

D.

Misconfiguration in the firewall

Buy Now
Questions 110

A company wants to move to a multicloud environment and utilize the technology that provides the most portability. Which of the following technology solutions would BEST meet the company's needs?

Options:

A.

Bootstrap

B.

Virtual machines

C.

Clusters

D.

Containers

Buy Now
Questions 111

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

Options:

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Buy Now
Questions 112

A cloud engineer is performing updates to an application and needs to gracefully stop any new transactions from processing before the updates can be applied. Which of the following steps should the engineer take?

Options:

A.

Enable maintenance mode from the application dashboard

B.

Wait until after business hours to conduct the change when the system is not in use

C.

Run a kill command on the system to stop the application services

D.

Use a load balancer to redirect traffic to other systems serving the application

Buy Now
Questions 113

A cloud administrator is responsible for managing a VDI environment that provides end users with access to limited applications. Which of the following should the administrator make changes to when a new application needs to be provided?

Options:

A.

Application security policy

B.

Application whitelisting policy

C.

Application hardening policy

D.

Application testing policy

Buy Now
Questions 114

An organization recently deployed a private cloud on a cluster of systems that delivers compute, network, and storage resources in a single hardware, managed by an intelligent software. Which of the following BEST describes this type of deployment?

Options:

A.

High-performance computing

B.

Hyperconverged infrastructure

C.

Stand-alone computing

D.

Dynamic allocations

Buy Now
Questions 115

Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment. Which of the following should a systems administration team implement as an appropriate solution to simplify management?

Options:

A.

IPAM

B.

DoH

C.

VLAN

D.

SDN

Buy Now
Questions 116

An administrator needs to back up all the data from each VM daily while also saving space. Which of the following backup types will BEST fit this scenario?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Full

Buy Now
Questions 117

A security analyst is investigating incidents in which attackers are able to access sensitive data from a corporate application's database. The attacks occur periodically and usually

after the release of a new application's version. The following log confirms the compromise:

USER: WebApp access—key accepted

WebApp user assumed DBA role

GetData API call executed

The following actions are made after every incident occurrence:

• Validation of firewall rules

• Scripted rebuild of the database and web instances

• Application deployment from a cloud code repository

Which of the following actions will MOST likely prevent future compromises?

Options:

A.

Rotating the account credentials

B.

Migrating the database to be on premises

C.

Forbidding the use of API calls to retrieve data

D.

Implementing a new database service account

Buy Now
Questions 118

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?

Options:

A.

Insufficient guest bandwidth

B.

Overwhelmed vCPU

C.

A storage error on the guest

D.

Incorrect VLAN assignment

E.

Inadequate memory allocation

Buy Now
Questions 119

An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection?

Options:

A.

WAF

B.

EDR

C.

IDS

D.

HIPS

E.

SSL

Buy Now
Questions 120

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment?

Options:

A.

The regional area

B.

Cloud bursting

C.

Lower costs

D.

Scalability

Buy Now
Questions 121

A startup online gaming company is designing the optimal graphical user experience for multiplayer scenarios. However, online players have reported latency issues. Which of the following should the company configure as a remediation?

Options:

A.

Additional GPU memory

B.

Faster clock speed

C.

Additional CPU cores

D.

Dynamic allocations

Buy Now
Questions 122

A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement?

Options:

A.

Create /25 subnets in two regions and run 80 instances on each one.

B.

Create /26 subnets in two regions and run 40 instances on each one.

C.

Create /26 subnets in three regions and run 40 instances on each one.

D.

Create /26 subnets in three regions and run 80 instances on each one.

Buy Now
Questions 123

A cloud administrator has deployed a website and needs to improve the site security to meet requirements. The website architecture is designed to have a DBaaS in the back end and autoscaling instances in the front end using a load balancer to distribute the request. Which of the following will the cloud administrator MOST likely use?

Options:

A.

An API gateway

B.

An IPS/IDS

C.

A reverse proxy

D.

A WAF

Buy Now
Questions 124

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

Options:

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Buy Now
Questions 125

A systems administrator deployed a new application release to the green stack of a blue-green infrastructure model and made the green stack primary. Immediately afterward, users began reporting application issues. The systems administrator must take action to bring the service online as quickly as possible. Which of the following is the FASTEST way to restore the service?

Options:

A.

Reboot all the servers in the green stack

B.

Failback to the blue stack

C.

Restore from backups

D.

Troubleshoot and resolve the application issues

Buy Now
Questions 126

A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows:

Options:

A.

• Three public cloud hosts with four cores

• 120GB of RAM

• 100GB of storage

• 1Gbps

B.

• Three public cloud hosts with six cores

• 80GB of RAM

• 180GB of storage

• 150Mbps

C.

• Three public cloud hosts with six cores

• 80GB of RAM

• 1TB of storage

• 200Mbps

D.

• Four public cloud hosts with four cores

• 140GB of RAM

• 200GB of storage

Buy Now
Questions 127

A systems administrator is securing a new email system for a large corporation. The administrator wants to ensure private corporate information is not emailed to external users. Which of the following would be MOST useful to accomplish this task?

Options:

A.

DLP

B.

EDR

C.

DNSSEC

D.

SPF

Buy Now
Questions 128

A cloud administrator would like to maintain file integrity checks through hashing on a cloud object store. Which of the following is MOST suitable from a performance perspective?

Options:

A.

SHA-256

B.

SHA-512

C.

MD5

D.

AES

Buy Now
Questions 129

A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?

Options:

A.

Service_level agreement

B.

Vendor lock-in

C.

Memorandum of understanding

D.

Encrypted data

Buy Now
Questions 130

A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?

Options:

A.

Store the credentials in a variable on every worker node

B.

Store the credentials on a shared volume using whole-disk encryption

C.

Store the credentials in a configuration file using SHA-256 inside the container image

D.

Store the credentials using the orchestrator secret manager

Buy Now
Questions 131

A security audit related to confidentiality controls found the following transactions occurring in the system:

GET http://gateway.securetransaction.com/privileged/api/v1/changeResource?id=123 &user=277

Which of the following solutions will solve the audit finding?

Options:

A.

Using a TLS-protected API endpoint

B.

Implementing a software firewall

C.

Deploying a HIDS on each system

D.

Implementing a Layer 4 load balancer

Buy Now
Questions 132

A systems administrator is planning a penetration test for company resources that are hosted in a public cloud. Which of the following must the systems administrator do FIRST?

Options:

A.

Consult the law for the country where the company’s headquarters is located

B.

Consult the regulatory requirements for the company’s industry

C.

Consult the law for the country where the cloud services provider is located

D.

Consult the cloud services provider's policies and guidelines

Buy Now
Questions 133

Users currently access SaaS email with five-character passwords that use only letters and numbers. An administrator needs to make access more secure without changing the password policy. Which of the following will provide a more secure way of accessing email at the lowest cost?

Options:

A.

Change the email service provider.

B.

Enable MFA with a one-time password.

C.

Implement SSO for all users.

D.

Institute certificate-based authentication

Buy Now
Questions 134

An organization is hosting its dedicated email infrastructure with unlimited mailbox creation capability. The management team would like to migrate to a SaaS-based solution. Which of the following must be considered before the migration?

Options:

A.

The SaaS provider's licensing model

B.

The SaaS provider's reputation

C.

The number of servers the SaaS provider has

D.

The number of network links the SaaS provider has

Buy Now
Questions 135

A cloud administrator needs to establish a secure connection between two different locations. Which of the following is the BEST option to implement the secure connection?

Options:

A.

HTTPS

B.

IPSec

C.

TLS

D.

SSH

Buy Now
Questions 136

A systems administrator needs to migrate email services to the cloud model that requires the least amount of administrative effort. Which of the following should the administrator select?

Options:

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Buy Now
Exam Code: CV0-003
Exam Name: CompTIA Cloud+ Certification Exam
Last Update: Jan 24, 2025
Questions: 456
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now CV0-003