New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! CV0-003 has been withdrawn. The new exam code is CV0-004

Practice Free CV0-003 CompTIA Cloud+ Certification Exam Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CompTIA CV0-003 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA Cloud+ Certification Exam exam materials available for free to everyone. You can take the Free CV0-003 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities.

Which of the following testing techniques would be BEST to use?

A.

Usability testing

B.

Regression testing

C.

Vulnerability testing

D.

Penetration testing

Question # 7

A company has a cloud infrastructure service, and the cloud architect needs to set up a DR site.

Which of the following should be configured in between the cloud environment and the DR site?

A.

Failback

B.

Playbook

C.

Zoning

D.

Replication

Question # 8

A systems administrator for an e-commerce company will be migrating the company’s main website to a cloud provider. The principal requirement is that the website must be highly available.

Which of the following will BEST address this requirement?

A.

Vertical scaling

B.

A server cluster

C.

Redundant switches

D.

A next-generation firewall

Question # 9

A systems administrator recently deployed a VDI solution in a cloud environment; however, users are now experiencing poor rendering performance when trying to display 3-D content on their virtual desktops, especially at peak times.

Which of the following actions will MOST likely solve this issue?

A.

Update the quest graphics drivers from the official repository

B.

Add more vGPU licenses to the host

C.

Instruct users to access virtual workstations only on the VLAN

D.

Select vGPU profiles with higher video RAM

Question # 10

A newly deployed public cloud tenant has been billed five times the forecasted amount. Which of the following is the most likely cause of the issue?

A.

Incorrect billing by the cloud provider.

B.

Incorrect responsibility model.

C.

Incorrect tenant allocation.

D.

Incorrect resource selection.

Question # 11

An organization has two businesses that are developing different software products. They are using a single cloud provider with multiple IaaS instances. The organization identifies that the tracking of costs for each

business are inaccurate.

Which of the following is the BEST method for resolving this issue?

A.

Perform segregation of the VLAN and capture egress and ingress values of each network interface

B.

Tag each server with a dedicated cost and sum them based on the businesses

C.

Split the total monthly invoice equally between the businesses

D.

Create a dedicated subscription for the businesses to manage the costs

Question # 12

After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message.

Which of the following should the administrator verify NEXT?

A.

The TLS certificate

B.

The firewall rules

C.

The concurrent connection limit

D.

The folder permissions

Question # 13

A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier.

Which of the following access control rules should be changed?

A.

Discretionary-based

B.

Attribute-based

C.

Mandatory-based

D.

Role-based

Question # 14

A systems administrator is configuring a storage system for maximum performance and redundancy. Which of the following storage technologies should the administrator use to achieve this?

A.

RAID 5

B.

RAID 6

C.

RAID 10

D.

RAID 50

Question # 15

A systems administrator is working on the backup schedule for a critical business application that is running in a private cloud. Which of the following would help the administrator schedule the frequency of the backup job?

A.

RPO

B.

MTTR

C.

SLA

D.

RTO

Question # 16

A cloud administrator who is troubleshooting DNS issues discovers zone transfers are not occurring between the primary and secondary name servers due to an error in the serial numbers. Which of the following records should the administrator query for the serial number?

A.

PTR

B.

TXT

C.

SOA

D.

SRV

Question # 17

An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?

A.

Insufficient memory on the hypervisor

B.

Operating system memory limit

C.

Memory mismatch error

D.

Dynamic memory allocation

Question # 18

Which of the following should a cloud architect consider for a containerized cluster in a cloud environment?

A.

The regional area

B.

Cloud bursting

C.

Lower costs

D.

Scalability

Question # 19

An organization recently deployed a private cloud on a cluster of systems that delivers compute, network, and storage resources in a single hardware, managed by an intelligent software. Which of the following BEST describes this type of deployment?

A.

High-performance computing

B.

Hyperconverged infrastructure

C.

Stand-alone computing

D.

Dynamic allocations

Question # 20

A systems administrator needs to modify the replication factors of an automated application container from 3 to 5. Which of the following file types should the systems administrator modify on the master controller?

A.

.yaml

B.

. txt

C.

.conf

D.

.etcd

Question # 21

Which of the following best describes a Type 1 hypervisor?

A.

Non-embedded.

B.

Software-driven.

C.

Bare-metal.

D.

Simple native.

Question # 22

A cloud administrator is troubleshooting an issue regarding users at one location who are reporting that their API access tokens have become invalid. The users are issued tokens based on their credentials in a federated cluster. Which of the following should the administrator check to determine the cause of this issue?

A.

SAML

B.

DNS

C.

SSL

D.

NTP

Question # 23

A systems administrator notices that a piece of networking equipment is about to reach its end of support.

Which of the following actions should the administrator recommend?

A.

Update the firmware

B.

Migrate the equipment to the cloud

C.

Update the OS

D.

Replace the equipment

Question # 24

A systems administrator is selecting the appropriate RAID level to support a private cloud with the following requirements:

. The storage array must withstand the failure of up to two drives.

. The storage array must maximize the storage capacity of its drives.

Which of the following RAID levels should the administrator implement?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Question # 25

A business is looking at extending the platform for an internally developed application using microservices from various cloud vendors. The cloud architect is responsible for reviewing the proposed solution design, which covers critical requirements for the business to fulfill its requirements. Which of the following is the most likely requirement the cloud architect needs to fulfill?

A.

Software

B.

Budgetary

C.

Security

D.

Integration

Question # 26

A SaaS provider wants to maintain maximum availability for its service.

Which of the following should be implemented to attain the maximum SLA?

A.

A hot site

B.

An active-active site

C.

A warm site

D.

A cold site

Question # 27

An organization will be deploying a web application in a public cloud with two web servers, two database servers, and a load balancer that is accessible over a single public IP.

Taking into account the gateway for this subnet and the potential to add two more web servers, which of the following will meet the minimum IP requirement?

A.

192.168.1.0/26

B.

192.168.1.0/27

C.

192.168.1.0/28

D.

192.168.1.0/29

Question # 28

A systems administrator needs to configure an email client to ensure data integrity of the email messages.

Which of the following provides the BEST mechanism to achieve this goal?

A.

Cyclic redundancy check

B.

SHA-1 hashes

C.

SHA-256 hashes

D.

Digital signature

Question # 29

A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page.

Which of the following is the MOST likely cause of the issue?

A.

The local firewall from older OSs is not allowing outbound connections

B.

The local firewall from older OSs is not allowing inbound connections

C.

The cloud web server is using a self-signed certificate that is not supported by older browsers

D.

The cloud web server is using strong ciphers that are not supported by older browsers

Question # 30

A systems administrator is creating a playbook to run tasks against a server on a set schedule.

Which of the following authentication techniques should the systems administrator use within the playbook?

A.

Use the server’s root credentials

B.

Hard-code the password within the playbook

C.

Create a service account on the server

D.

Use the administrator’s SSO credentials

Question # 31

Lateral-moving malware has infected the server infrastructure.

Which of the following network changes would MOST effectively prevent lateral movement in the future?

A.

Implement DNSSEC in all DNS servers

B.

Segment the physical network using a VLAN

C.

Implement microsegmentation on the network

D.

Implement 802.1X in the network infrastructure

Question # 32

A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior.

Which of the following is MOST likely the cause?

A.

API provider rate limiting

B.

Invalid API token

C.

Depleted network bandwidth

D.

Invalid API request

Question # 33

Which of the following cloud deployment models allows a company to have full control over its IT infrastructure?

A.

Private

B.

Cloud within a cloud

C.

Hybrid

D.

Public

Question # 34

A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution.

Which of the following will provide the data to measure business continuity? (Choose two.)

A.

A service-level agreement

B.

Automation scripts

C.

Playbooks

D.

A network diagram

E.

A backup and restore

F.

A recovery time objective

Question # 35

A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal.

Which of the following should the administrator do to fix this issue?

A.

Change the database application IP

B.

Create a database cluster between the primary site and the DR site

C.

Update the connection string

D.

Edit the DNS record at the DR site for the application servers

Question # 36

A company is deploying a public cloud solution for an existing application using lift and shift. The requirements for the applications are scalability and external access. Which of the following should the company implement? (Select TWO).

A.

A load balancer

B.

SON

C.

A firewall

D.

SR-IOV

E.

Storage replication

F.

A VPN

Question # 37

A web application has been configured to use autoscaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new CI/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now. the autoscaling configuration is creating a new VM ever\ five minutes. Which of the following actions will MOS I like y resolve the issue?

A.

Reducing the maximum threshold in the autoscaling configuration

B.

Debugging the script and redeploying it

C.

Changing the automation tool because it is incompatible

D.

Modifying the script to shut down the VM after five minutes

Question # 38

A company is migrating workloads from on premises to the cloud and would like to establish a connection between the entire data center and the cloud environment. Which of the following VPN configurations would accomplish this task?

A.

Site-to-site

B.

Client-to-site

C.

Point-to-site

D.

Point-to-point

Question # 39

A cloud engineer has deployed a virtual storage appliance into a public cloud environment. The storage appliance has a NAT to a public IP address. An administrator later notices there are some strange files on the storage appliance and a large spike in network traffic on the machine. Which of the following is the MOST likely cause?

A.

The default password is still configured on the appliance.

B.

The appliance's certificate has expired.

C.

The storage appliance has no firewall.

D.

Data encryption is enabled, and the files are hashed.

Question # 40

A company has developed a cloud-ready application. Before deployment, an administrator needs to select a deployment technology that provides a high level of portability and is lightweight in terms of footprint and resource requirements.

Which of the following solutions will be BEST to help the administrator achieve the requirements?

A.

Containers

B.

Infrastructure as code

C.

Desktop virtualization

D.

Virtual machines

Question # 41

After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)

A.

Identify the resources that are accessible to the affected IAM user

B.

Remove the published plain-text password

C.

Notify users that a data breach has occurred

D.

Change the affected IAM user’s password

E.

Delete the affected IAM user

Question # 42

An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources.

Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?

A.

Dedicated

B.

Shared

C.

Passthrough

D.

vGPU

Question # 43

A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage.

Which of the following RAID types should the administrator choose?

A.

5

B.

6

C.

10

D.

50

Question # 44

A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?

A.

NIPS

B.

Network overlay using GENEVE

C.

DDoS protection

D.

DoH

Question # 45

A company wants to utilize its private cloud for a new application. The private cloud resources can meet 75% of the application's resource requirements. Which of the following

scaling techniques can the cloud administrator implement to accommodate 100% of the application's requirements?

A.

Horizontal

B.

Vertical

C.

Cloud bursting

D.

Autoscaling

Question # 46

An administrator needs to back up all the data from each VM daily while also saving space. Which of the following backup types will BEST fit this scenario?

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Full

Question # 47

A systems administrator is deploying a new virtualized environment. The setup is a three-server cluster with 12 VMs running on each server. While executing a vertical-scaling test of the vCPU on the VMs, the administrator gets an error. Which of the following issues is MOST likely occurring?

A.

Compute

B.

Storage

C.

Licensing

D.

Scripts

Question # 48

A cloud administrator is configuring several security appliances hosted in the private laaS environment to forward the logs to a central log aggregation solution using syslog. Which of the following firewall rules should the administrator add to allow the web servers to connect to the central log collector?

A.

Allow UDP 161 outbound from the web servers to the log collector .

B.

Allow TCP 514 outbound from the web servers to the log collector.

C.

Allow UDP 161 inbound from the log collector to the web servers .

D.

Allow TCP 514 inbound from the log collector to the web servers .

Question # 49

A company is planning its cloud architecture and wants to use a VPC for each of its three products per environment in two regions, totaling 18 VPCs. The products have interdependences, consuming services between VPCs. Which of the following should the cloud architect use to connect all the VPCs?

A.

MPLS connections

B.

VPC peering

C.

Hub and spoke

D.

VPN connections

Question # 50

A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement?

A.

Create /25 subnets in two regions and run 80 instances on each one.

B.

Create /26 subnets in two regions and run 40 instances on each one.

C.

Create /26 subnets in three regions and run 40 instances on each one.

D.

Create /26 subnets in three regions and run 80 instances on each one.

Question # 51

A technician deployed a VM with NL-SAS storage to host a critical application. Two weeks later, users have begun to report high application latency. Which of the following is the BEST action to correct the latency issue?

A.

Increase the capacity of the data storage.

B.

Migrate the data to SAS storage.

C.

Increase the CPU of the VM.

D.

Migrate the data to flash storage.

Question # 52

A systems administrator is concerned about having two virtual database servers on the same host. Which of the following should be configured?

A.

Regions

B.

Anti-affinity

C.

Oversubscription

D.

Container

Question # 53

A company has two primary offices, one in the United States and one in Europe. The company uses a public laaS service that has a global data center presence to host its marketing materials. The marketing team, which is primarily based in Europe, has reported latency issues when retrieving these materials. Which of the following is the BEST option to reduce the latency issues?

A.

Add an application load balancer to the applications to spread workloads.

B.

Integrate a CDN solution to distribute web content globally.

C.

Upgrade the bandwidth of the dedicated connection to the laaS provider.

D.

Migrate the applications to a region hosted in Europe.

Question # 54

A systems administrator is troubleshooting issues with network slowness. Traffic analysis shows that uplink bandwidth on the core switch is often sustained at 125Mbps due to a

combination of production traffic from other sources. Which of the following would BEST resolve the issue?

A.

Turn off the servers that use the most bandwidth.

B.

Enable QoS to prioritize production traffic.

C.

Increase the buffer size on the core switch.

D.

Reboot the core switch.

Question # 55

A piece of software applies licensing fees on a socket-based model. Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?

A.

The amount of memory in the server

B.

The number of CPUs in the server

C.

The type of cloud in which the software is deployed

D.

The number of customers who will be using the software

Question # 56

A local bank has all of its infrastructure in the cloud. An update was applied to the main database server at 5:00 a.m. on Monday morning, and the database was then corrupted and unusable. It had to be restored from backup. The last backup was taken the night before at 10:00 p.m. The database was then restored successfully, but seven hours' worth of data was lost, which is deemed unacceptable. Which of the following needs to be updated in the DR plan?

A.

Recovery point objective

B.

Statement of work

C.

Service-level agreement

D.

Recovery time objective

Question # 57

A company with a worldwide presence wants to improve the user experience for its website. Which of the following can a systems administrator implement to improve download speeds and latency for the end users?

A.

A CDN solution

B.

An MPLS connection between data centers

C.

A DNS round robin

D.

A site-to-site VPN between data centers

Question # 58

A company is using an laaS environment. Which of the following licensing models would BEST suit the organization from a financial perspective to implement scaling?

A.

Subscription

B.

Volume-based

C.

per user

D.

Socket-based

Question # 59

A company is performing a DR drill and is looking to validate its documentation. Which of the following metrics will determine the service recovery duration?

A.

MTTF

B.

SLA

C.

RTO

D.

RPO

Question # 60

A cloud administrator configured a local cloud-resource pool lo offer 64GB of memory, 64 cores, and 640GB of storage. Thirty-two machines with identical resource allocations are started. but one machine is unable to handle requests. Which of the following is the MOST likely cause?

A.

Insufficient guest bandwidth

B.

Overwhelmed vCPU

C.

A storage error on the guest

D.

Incorrect VLAN assignment

E.

Inadequate memory allocation

Question # 61

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?

A.

Hardening

B.

IAM

C.

Encryption

D.

IPSec

Question # 62

A cloud administrator needs to coordinate and automate the management of a company's secrets and keys for all its cloud services with minimal effort and low cost. Which of the following is the BEST option to achieve the goal?

A.

Implement database as a service

B.

Configure Key Vault

C.

Use password as a service

D.

Implement KeePass

Question # 63

An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations.

Which of the following is the MOST efficient way to bring the block storage in the primary datacenter up to date with the DR site?

A.

Set up replication.

B.

Copy the data across both sites.

C.

Restore incremental backups.

D.

Restore full backups.

Question # 64

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it.

Which of the following configuration options would BEST meet this requirement?

A.

Virtual GPU

B.

External GPU

C.

Passthrough GPU

D.

Shared GPU

Question # 65

A systems administrator has received an email from the virtualized environment's alarms indicating the memory was reaching full utilization. When logging in, the administrator notices that one out of a five-host cluster has a utilization of 500GB out of 512GB of RAM. The baseline utilization has been 300GB for that host. Which of the following should the administrator check NEXT?

A.

Storage array

B.

Running applications

C.

VM integrity

D.

Allocated guest resources

Question # 66

To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public DBaaS solution. Which of the following would be the BEST technique?

A.

Live migration

B.

Physical-to-virtual

C.

Storage-level mirroring

D.

Database replication

Question # 67

A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure?

A.

GPU

B.

CPU

C.

Storage

D.

Memory

Question # 68

A systems administrator is deploying a new cloud application and needs to provision cloud services with minimal effort. The administrator wants to reduce the tasks required for maintenance, such as OS patching, VM and volume provisioning, and autoscaling configurations. Which of the following would be the BEST option to deploy the new application?

A.

A VM cluster

B.

Containers

C.

OS templates

D.

Serverless

Question # 69

A cloud administrator is setting up a new coworker for API access to a public cloud environment. The administrator creates a new user and gives the coworker access to a collection of automation scripts. When the coworker attempts to use a deployment script, a 403 error is returned. Which of the following is the MOST likely cause of the error?

A.

Connectivity to the public cloud is down.

B.

User permissions are not correct.

C.

The script has a configuration error.

D.

Oversubscription limits have been exceeded.

Question # 70

A cloud administrator is responsible for managing a cloud-based content management solution. According to the security policy, any data that is hosted in the cloud must be protected against data exfiltration. Which of the following solutions should the administrator implement?

A.

HIDS

B.

FIM

C.

DLP

D.

WAF

Question # 71

A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols should the company use? (Choose two.)

A.

CIFS

B.

FTP

C.

iSCSI

D.

RAID 10

E.

NFS

F.

FC

Question # 72

A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?

A.

Create a VPC and peer the networks.

B.

Implement dynamic routing.

C.

Enable DHCP on the networks.

D.

Obtain a new IPAM subscription.

Question # 73

All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST?

A.

Peer all the networks from each cloud environment.

B.

Migrate the servers.

C.

Create a VPN tunnel.

D.

Configure network access control lists.

Question # 74

A cloud engineer is responsible for managing two cloud environments from different MSPs. The security department would like to inspect all traffic from the two cloud environments.

Which of the following network topology solutions should the cloud engineer implement to reduce long-term maintenance?

A.

Chain

B.

Star

C.

Mesh

D.

Hub and spoke

Question # 75

A systems administrator is setting up a backup solution to follow the 3-2-1 policy. Currently, the solution is set to back up from the servers to an on-site storage server. Which of the following should the administrator configure to comply with the 3-2-1 policy?

A.

Weekly lull backups, with daily incremental backups

B.

A second on-site storage server for backups

C.

Storage snapshots

D.

An off-site storage server for backups

Question # 76

A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found.

Which of the following is the MOST likely cause of the script failure?

A.

Account mismatches

B.

IP address changes

C.

API version incompatibility

D.

Server name changes

Question # 77

An organization is hosting a cloud-based web server infrastructure that provides web-hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.

Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

A.

Solutions to perform NAC and DLP

B.

DDoS protection

C.

QoS on the network

D.

A solution to achieve microsegmentation

Question # 78

An organization requires the following to be achieved between the finance and marketing departments:

    Allow HTTPS/HTTP.

    Disable FTP and SMB traffic.

Which of the following is the MOST suitable method to meet the requirements?

A.

Implement an ADC solution to load balance the VLAN traffic

B.

Configure an ACL between the VLANs

C.

Implement 802.1X in these VLANs

D.

Configure on-demand routing between the VLANs

Question # 79

Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue?

A.

Perform a memory dump of the OS.Analyze the memory dump.Upgrade the host CPU to a higher clock speed CPU.

B.

Perform a packet capture during authentication.Validate the load-balancing configuration.Analyze the network throughput of the load balancer.

C.

Analyze the storage system IOPS.Increase the storage system capacity.Replace the storage system disks to SSD.

D.

Evaluate the OS ACLs.Upgrade the router firmware.Increase the memory of the router.

Question # 80

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed.

Which of the following actions will make the server fully operational?

A.

Restart the RAID resynchronization process

B.

Perform a P2V migration of the server

C.

Swap the failed hard drive with a fresh one

D.

Restore the server from backup

Question # 81

Which of the following will provide a systems administrator with the MOST information about potential attacks on a cloud IaaS instance?

A.

Network flows

B.

FIM

C.

Software firewall

D.

HIDS

Question # 82

A cloud administrator has been using a custom VM deployment script. After three months of use, the script no longer joins the LDAP domain. The cloud administrator verifies the account has the correct permissions. Which of the following is the MOST likely cause of the failure?

A.

Incorrect encryption ciphers

B.

Broken trust relationship

C.

Invalid certificates

D.

Expired password

Question # 83

Users are experiencing slow response times from an intranet website that is hosted on a cloud platform. There is a site-to-site VPN connection to the cloud provider over a link of 100Mbps.

Which of the following solutions will resolve the issue the FASTEST?

A.

Change the connection to point-to-site VPN

B.

Order a direct link to the provider

C.

Enable quality of service

D.

Upgrade the link to 200Mbps

Question # 84

A company is doing a cloud-to-cloud migration to lower costs. A systems administrator has to plan the migration accordingly.

Which of the following considerations is MOST important for a successful, future-proof, and low-cost migration?

A.

Tier pricing

B.

Licensing

C.

Estimated consumption

D.

Feature compatibility

Question # 85

A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?

A.

Virtual machines

B.

Software as a service

C.

Serverless computing

D.

Containers

Question # 86

A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed.

Which of the following will BEST identify the CPU with more computational power?

A.

Simultaneous multithreading

B.

Bus speed

C.

L3 cache

D.

Instructions per cycle

Question # 87

A cloud administrator is building a new VM for a network security appliance. The security appliance installer says the CPU clock speed does not meet the requirements.

Which of the following will MOST likely solve the issue?

A.

Move the VM to a host with a faster CPU

B.

Add more vCPUs to the VM

C.

Enable CPU masking on the VM

D.

Enable hyperthreading on the virtual host

Question # 88

A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective?

A.

22, 53, 445

B.

22, 443, 445

C.

25, 123, 443

D.

137, 139, 445

Question # 89

A cloud administrator needs to reduce the cost of cloud services by using the company's off-peak period. Which of the following would be the BEST way to achieve this with minimal effort?

A.

Create a separate subscription.

B.

Create tags.

C.

Create an auto-shutdown group.

D.

Create an auto-scaling group.

Question # 90

A company needs to migrate the storage system and batch jobs from the local storage system to a public cloud provider. Which of the following accounts will MOST likely be created to run the batch processes?

A.

User

B.

LDAP

C.

Role-based

D.

Service

Question # 91

An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?

A.

Deploy web servers into an laaS provider.

B.

Implement a cloud-based VDI solution.

C.

Provision web servers in a container environment.

D.

Use PaaS components in the cloud to implement the product.

Question # 92

A system administrator supports an application in the cloud, which includes a restful API that receives an encrypted message that is passed to a calculator system. The administrator needs to ensure the proper function of the API using a new automation tool. Which of the following techniques would be BEST for the administrator to use to accomplish this requirement?

A.

Functional testing

B.

Performance testing

C.

Integration testing

D.

Unit testing

Question # 93

A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies.

Which of the following cloud service subscription types would BEST meet these requirements?

A.

PaaS

B.

SaaS

C.

DBaaS

D.

IaaS

Question # 94

A company wants to move its environment from on premises to the cloud without vendor lock-in. Which of the following would BEST meet this requirement?

A.

DBaaS

B.

SaaS

C.

IaaS

D.

PaaS

Question # 95

A cloud administrator is assigned to establish a connection between the on-premises data center and the new CSP infrastructure. The connection between the two locations must be secure at all times and provide service for all users inside the organization. Low latency is also required to improve performance during data transfer operations. Which of the following would BEST meet these requirements?

A.

A VPC peering configuration

B.

An IPSec tunnel

C.

An MPLS connection

D.

A point-to-site VPN

Question # 96

A cloud administrator wants to have a central repository for all the logs in the company’s private cloud. Which of the following should be implemented to BEST meet this requirement?

A.

SNMP

B.

Log scrubbing

C.

CMDB

D.

A syslog server

Question # 97

Which of the following service models would be used for a database in the cloud?

A.

PaaS

B.

laaS

C.

CaaS

D.

SaaS

Question # 98

A systems administrator is building a new virtualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host.

This is an example of:

A.

a storage area network

B.

a network file system

C.

hyperconverged storage

D.

thick-provisioned disks

Question # 99

The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other’s work.

Which of the following did the team MOST likely forget to implement?

A.

Incident type categories

B.

A calling tree

C.

Change management

D.

Roles and responsibilities

Question # 100

A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:

    High availability

    Horizontal auto-scaling

    60 nodes peak capacity per region

    Five reserved network IP addresses per subnet

    /24 range

Which of the following would BEST meet the above requirements?

A.

Create two /25 subnets in different regions

B.

Create three /25 subnets in different regions

C.

Create two /26 subnets in different regions

D.

Create three /26 subnets in different regions

E.

Create two /27 subnets in different regions

F.

Create three /27 subnets in different regions

Question # 101

A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)

A.

Disk I/O limits

B.

Affinity rule

C.

CPU oversubscription

D.

RAM usage

E.

Insufficient GPU resources

F.

License issues

Question # 102

A systems administrator wants to ensure two VMs remain together on the same host. Which of the following must be set up to enable this functionality?

A.

Affinity

B.

Zones

C.

Regions

D.

A cluster

Question # 103

Which of the following definitions of serverless computing BEST explains how it is different from using VMs?

A.

Serverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP.

B.

Serverless computing uses predictable billing and offers lower costs than VM compute services.

C.

Serverless computing is a scalable, highly available cloud service that uses SDN technologies.

D.

Serverless computing allows developers to focus on writing code and organizations to focus on business.

Question # 104

In an IaaS platform, which of the following actions would a systems administrator take FIRST to identify the scope of an incident?

A.

Conduct a memory acquisition.

B.

Snapshot all volumes attached to an instance.

C.

Retrieve data from a backup.

D.

Perform a traffic capture.

Question # 105

A cloud administrator is working in a secure government environment. The administrator needs to implement corrective action due to recently identified security issue on the OS of a VM that is running a facility-management application in a cloud environment. The administrator needs to consult the application vendor, so it might take some time to resolve the issue. Which of the following is the FIRST action the administrator should take while working on the resolution?

A.

Shut down the server.

B.

Upgrade the OS

C.

Update the risk register.

D.

Raise a problem ticket.

Question # 106

A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?

A.

Network latency

B.

Network connectivity

C.

Network switch

D.

Network peering

Question # 107

An organization is using multiple SaaS-based business applications, and the systems administrator is unable to monitor and control the use of these subscriptions. The administrator needs to implement a solution that will help the organization apply security policies and monitor each individual SaaS subscription. Which of the following should be deployed to achieve these requirements?

A.

DLP

B.

CASB

C.

IPS

D.

HIDS

Question # 108

A systems administrator is analyzing a report of slow performance in a cloud application. This application is working behind a network load balancer with two VMs, and each VM has its own digital certificate configured. Currently, each VM is consuming 85% CPU on average. Due to cost restrictions, the administrator cannot scale vertically or horizontally in the environment. Which of the following actions should the administrator take to decrease the CPU utilization? (Choose two.)

A.

Configure the communication between the load balancer and the VMs to use a VPN.

B.

Move the digital certificate to the load balancer.

C.

Configure the communication between the load balancer and the VMs to use HTTP.

D.

Reissue digital certificates on the VMs.

E.

Configure the communication between the load balancer and the VMs to use HTTPS.

F.

Keep the digital certificates on the VMs.

Question # 109

A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows:

CV0-003 question answer

A.

• Three public cloud hosts with four cores• 120GB of RAM• 100GB of storage• 1Gbps

B.

• Three public cloud hosts with six cores• 80GB of RAM• 180GB of storage• 150Mbps

C.

• Three public cloud hosts with six cores• 80GB of RAM• 1TB of storage• 200Mbps

D.

• Four public cloud hosts with four cores• 140GB of RAM• 200GB of storage

Question # 110

A cloud administrator needs to control the connections between a group of web servers and database servers as part of the financial application security review. Which of the following would be the BEST way to achieve this objective?

A.

Create a directory security group.

B.

Create a resource group.

C.

Create separate VLANs.

D.

Create a network security group.

Question # 111

A systems administrator wants to restrict access to a set of sensitive files to a specific group of users. Which of the following will achieve the objective?

A.

Add audit rules on the server

B.

Configure data loss prevention in the environment

C.

Change tine permissions and ownership of the files

D.

Implement a HIPS solution on the host

Question # 112

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?

A.

Log monitoring

B.

Patch management

C.

Vulnerability scanning

D.

System hardening

Question # 113

A cloud engineer is troubleshooting a performance issue for a high-traffic, cloud-based application that provides static content to its geographically distributed users. The engineer needs to:

    Improve the performance of an application.

    Implement a static content caching mechanism.

    Protect against DDoS attacks.

    Maintain low cost.

Which of the following strategies would best accomplish this task?

A.

Implementing a site-to-site VPN tunnel between multiple availability zones of a cloud provider by intelligently routing network traffic through global networks and edge locations

B.

Implementing a server-based caching mechanism to store and provide faster delivery of static content across multiple availability zones within the cloud network close to the end-user locations

C.

Implementing a CDN that allows caching and quick transfer of an application's assets needed to load on a browser of the end-user based on the location

D.

Implementing a cross-region, DNS-based load balancing and caching mechanism in the cloud DNS system that can provide faster delivery of static content based on end-user locations

Question # 114

An environment has a dual-stack infrastructure in an active-active configuration in two separate data centers. Which of the following best describes replication between the two sites?

A.

Data is moved constantly from the hot site to the warm site.

B.

Data is replicated every 15 minutes from one site to the other.

C.

Data is moved from one site to the other once per day.

D.

Data is synchronized in real time across the sites.

E.

Data is moved twice a day from Site A to Site B, and then from Site B to Site A.

Question # 115

When designing a three-node. load-balanced application, a systems administrator must ensure each node runs on a different physical server for HA purposes. Which of the following does the systems administrator need to configure?

A.

Round-robin methods

B.

Live migration

C.

Anti-affinity rule

D.

Priority queues

Question # 116

A systems administrator is writing a script for provisioning nodes in the environment. Which of the following would be best for the administrator to use to provision the authentication credentials to the script?

A.

password='curl https://10.2.3.4/api/sytemops?op=provision

B.

password=$env_password

C.

password=$ (cat /opt/app/credentials)

D.

password="MyS3cretP4sswordIsVeryLong"

Question # 117

A systems administrator is configuring a cloud solution for a vulnerability assessment to test the company's resources that are hosted in a public cloud. The solution must test the company's resources from an external user's perspective. Which of the following should the systems administrator configure?

A.

An agent-based scan

B.

A network-based scan

C.

A port scan

D.

A credentialed scan

Question # 118

A cloud architect is reviewing the design for a new cloud-based ERP solution. The solution consists of eight servers with a single network interface. The allocated IP range is 172.16.0.0/28. One of the requirements of the solution is that it must be able to handle the potential addition of 16 new servers to the environment. Because of the complexity of the firewall and related ACL requirements, these new servers will need to be in the same network range. Which of the following changes

would allow for the potential server addition?

A.

Change the IP address range to use a 10.0.0.0 address.

B.

Change the server template to add network interfaces.

C.

Change the subnet mask to use a 255.255.255.128 range.

D.

Change the server scaling configuration to increase the maximum limit.

Question # 119

A company plans to publish a new application and must conform with security standards. Which of the following types of testing are most important for the systems administrator to run to assure the security and compliance of the application before publishing? (Select two).

A.

Regression testing

B.

Vulnerability testing

C.

Usability testing

D.

Functional testing

E.

Penetration testing

F.

Load testing

Question # 120

A company has a web application running in an on-premises environment that needs to be migrated to the cloud. The company wants to implement a solution that maximizes scalability, availability, and security, while requiring no infrastructure administration. Which of the following services would be BEST to meet this goal?

A.

A PaaS solution

B.

A hybrid solution

C.

An laaS solution

D.

A SaaS solution

Question # 121

A cloud administrator is investigating slow VM performance. The administrator has checked the physical server performance and has identified the host is under stress due to a peak usage workload. Which of the following is the NEXT step the administrator should complete?

A.

Perform a root cause analysis

B.

Migrate the VM to a different host.

C.

Document the findings.

D.

Perform a system restart.

Question # 122

A web consultancy group currently works in an isolated development environment. The group uses this environment for the creation of the final solution, but also for showcasing it to customers, before commissioning the sites in production. Recently, customers of newly commissioned sites have reported they are not receiving the final product shown by the group, and

the website is performing in unexpected ways. Which of the following additional environments should the group adopt and include in its process?

A.

Provide each web consultant a local environment on their device.

B.

Require each customer to have a blue-green environment.

C.

Leverage a staging environment that is tightly controlled for showcasing.

D.

Initiate a disaster recovery environment to fail to in the event of reported issues.

Question # 123

A cloud administrator is looking at the company's cloud services bill for the previous month. The administrator notices on the billing dashboard that certain resources are not being billed to any particular department. Which of the following actions will help correct this billing issue?

A.

Check the utilization of the resources.

B.

Modify the chargeback details of the consumer.

C.

Add the resources to the consumer monitoring group.

D.

Modify the tags for all the unmapped resources.

Question # 124

A systems administrator is planning to migrate to a cloud solution with volume-based licensing. Which of the following is most important when considering licensing costs?

A.

The number of cores

B.

The number of threads

C.

The number of machines

D.

The number of sockets

Question # 125

A cloud administrator is supporting an application that has several reliability issues. The administrator needs visibility into the performance characteristics of the application. Which of the following will MOST likely be used in a reporting dashboard?

A.

Data from files containing error messages from the application

B.

Results from the last performance and workload testing

C.

Detail log data from syslog files of the application

D.

Metrics and time-series data measuring key performance indicators

Question # 126

A cloud administrator receives a billing report and notices the IT department billing has been the same for the last few months, despite the deployment of ten new instances for the SIEM solution. Which of the following is the most likely cause of the issue?

A.

Inconsistent hostnames.

B.

Misconfigured VM names.

C.

Incomplete provisioning tasks.

D.

Incorrect tagging.

Question # 127

A cloud administrator received a request to provision a set of cloud resources in an effort to switch to infrastructure as code to automate and optimize operations. The administrator decides to try to run some tests with the following definition:

CV0-003 question answer

Which of the following is the most likely cause of the issue?

A.

The cloud provider is expecting the private key.

B.

The incorrect resource name was used.

C.

The environment variable for the public key path has not been set.

D.

An unexpected variable was provided.

Question # 128

A company migrated its entire retail marketplace system to the cloud. The company is currently running a three-tier architecture on a Virtual Private Cloud (VPC) with web, database, and application servers on separate segments using virtual servers as compute resources. After the migration, users reported the following issues:

    Slow-loading web pages

    Connection timeouts that are resolved after retries

Given the following statistics:

[root@ApplicationServer]* traceroute DBserver

traceroute to DBserver (192.168.10.2), 30 hops max, 60 by packets

1 gateway (192.168.11.1) 2.341 ms 3.77 ms 3.716 ms

2 nexthop (192.168.10.1) 2.5 ms 2.80 ms 2.36 ms

...

3 nexthop (192.168.10.2) 95 ms 97 ms 98 ms

Which of the following is the best explanation for these issues?

A.

VPC firewall configuration

B.

Router table mismatch

C.

Load balancer

D.

Database server virtual networking interface

Question # 129

A cloud administrator is reviewing the performance of a database cluster hosted in a public cloud and sees that the CPU and memory utilization is high during periods of non-peak usage. The administrator wants to proactively prevent any performance issues during periods of high-peak usage. The database software is using an instance-based licensing model. Which of the following scaling strategies should the administrator consider?

A.

Horizontal scaling

B.

Affinity-based scaling

C.

Vertical scaling

D.

Cloud bursting

Question # 130

A database system is causing performance issues due to an increase in the number of transactions. Which of the following is the best way to solve these performance issues?

A.

Changing to object storage.

B.

Adding more volume storage.

C.

Increasing storage IOPS.

D.

Configuring RAID.

Question # 131

A company is comparing an application environment to be hosted on site versus a SaaS model of the same application. Which of the following SaaS-based licensing models should the administrator consider?

A.

Per core

B.

Per socket

C.

Per instance

D.

Per user

Question # 132

A cloud solutions architect is working on a private cloud environment in which storage consumption is increasing daily, resulting in high costs. Which of the following can the architect use to provide more space without adding more capacity? (Select two).

A.

Tiering

B.

Deduplication

C.

RAID provisioning

D.

Compression

E.

Flash optimization

F.

NVMe

Question # 133

After a virtualized host is rebooted, ten guest VMs take a long time to start, and extensive memory utilization is observed. Which of the following should be done to optimize the host?

A.

Reduce the host memory assignment.

B.

Configure the virtual/swap memory configuration on the guest VMs.

C.

Increase the allocated vCPUs per VM.

D.

Reduce the allocated memory and enable dynamic memory.

Question # 134

A cloud engineer needs to perform a database migration_ The database has a restricted SLA and cannot be offline for more than ten minutes per month The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps. Which of the following is the BEST option to perform the migration?

A.

Copy the database to an external device and ship the device to the CSP

B.

Create a replica database, synchronize the data, and switch to the new instance.

C.

Utilize a third-patty tool to back up and restore the data to the new database

D.

use the database import/export method and copy the exported file.

Question # 135

The Chief Information Officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud. The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information. Which of the following should be configured during the migration?

A.

ACL

B.

VPN

C.

P2V

D.

VDI