Spring Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free CV0-004 CompTIA Cloud+ (V4) Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CompTIA CV0-004 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA Cloud+ (V4) exam materials available for free to everyone. You can take the Free CV0-004 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Which of the following is true of SSDs?

A.

SSDs do not have self-encrypting capabilities.

B.

SSDs have small storage capacities.

C.

SSDs can be used for high-IOP applications.

D.

SSDs are used mostly in cold storage.

Question # 7

A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly experiencing high latency. Which of the following would best help determine the source of the latency?

A.

Configuring centralized logging to analyze HTTP requests

B.

Running a flow log on the network to analyze the packets

C.

Configuring an API gateway to track all incoming requests

D.

Enabling tracing to detect HTTP response times and codes

Question # 8

A cloud administrator deploys new VMs in a cluster and discovers they are getting IP addresses in the range of 169.254.0.0/16. Which of the following is the most likely cause?

A.

The scope has been exhausted.

B.

The network is overlapping.

C.

The VLAN is missing.

D.

The NAT is Improperly configured.

Question # 9

A cloud engineer has provisioned a VM for a high-frequency trading application. After the VM is put into production, users report high latency in trades. The engineer checks the last six hours of VM metrics and sees the following:

• CPU utilization is between 30% to 60%.

• Networkln is between 50Kbps and 70Kbps.

• NetworkOut is between 3.000Kpbs and 5.000Kbps.

• DiskReadOps is at 30.

• DiskWriteOps is at 70

• Memory utilization is between 50% and 70%.

Which of the following steps should the engineer take next to solve the latency issue?

A.

Move to a network-optimized instance type as the network throughput is not enough.

B.

Modify the disk IOPS to a higher value as the disk IO is being bottlenecked at 100 IOPS.

C.

Increase the memory of the instance as the high-frequency trading application requires more RAM.

D.

Increase the instance size to allocate more vCPUs as the CPU utilization is very high.

Question # 10

Which of the following models will best reduce the cost of running short-term, non-critical workloads?

A.

Reserved

B.

Spot Instance

C.

Pay-as-you-go

D.

Dedicated host

Question # 11

Which of the following describes the main difference between public and private container repositories?

A.

Private container repository access requires authorization, while public repository access does not require authorization.

B.

Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.

C.

Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.

D.

Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.

Question # 12

A cloud engineer was deploying the company's payment processing application, but it failed with the following error log:

ERFOR:root: Transaction failed http 429 response, please try again Which of the following are the most likely causes for this error? (Select two).

A.

API throttling

B.

API gateway outage

C.

Web server outage

D.

Oversubscription

E.

Unauthorized access

F.

Insufficient quota

Question # 13

A company implements a web farm with 100 servers behind an application load balancer. Dunng scaling events, new web servers that are placed in service have not loaded all their modules, which causes some requests to the web farm to fail. Which of the following should the cloud engineer implement to address the scaling issue?

A.

Instance warm-up

B.

Scheduled scaling

C.

Event-based scaling

D.

Load balancer passthrough

Question # 14

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

A.

Resource tagging

B.

Discretionary access control

C.

Multifactor authentication

D.

Role-based access control

E.

Token-based authentication

F.

Bastion host

Question # 15

An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?

A.

Warm

B.

Hot

C.

Archive

D.

Cold

Question # 16

Which of the following cloud deployment strategies is best for an organization that wants to run open-source workloads with other organizations that are sharing the cost?

A.

Community

B.

Public

C.

Hybrid

D.

Private

Question # 17

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

A.

Rehost

B.

Rearchitect

C.

Refactor

D.

Retain

Question # 18

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

A.

Disk I/O

B.

Network packets

C.

Average memory utilization

D.

Percent of CPU utilization

Question # 19

A user's assigned cloud credentials are locked, and the user is unable to access the project's application. The cloud administrator reviews the logs and notices several attempts to log in with the user's account were made to a different application after working hours. Which of the following is the best approach for the administrator to troubleshoot this issue?

A.

Create new credentials for the user and restrict access to the authorized application.

B.

Track the source of the log-in attempts and block the IP address of the source in the WAR

C.

Reset the user's account and implement a stronger lock-out policy.

D.

Install an IDS on the network to monitor suspicious activity

Question # 20

Which of the following is the most cost-effective way to store data that is infrequently accessed?

A.

Cold site

B.

Hot site

C.

Off-site

D.

Warm site

Question # 21

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing

Question # 22

An on-call cloud engineer receives a critical alert about an e-commerce web server being unresponsive. Which of the following steps should the engineer take first?

A.

Triage

B.

Remediation

C.

Escalation

D.

Monitoring

Question # 23

A manager wants information about which users signed in to a certain VM during the past month. Which of the following can the cloud administrator use to obtain this information?

A.

Retention

B.

Alerting

C.

Aggregation

D.

Collection

Question # 24

A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following

delivery mechanisms would best support this integration?

A.

Enterprise service bus

B.

Socket

C.

RPC

D.

Queue

Question # 25

Which of the following refers to the idea that data should stay within certain borders or territories?

A.

Data classification

B.

Data retention

C.

Data sovereignty

D.

Data ownership

Question # 26

A newly configured VM fails to run application updates despite having internet access. The updates download automatically from a third-party network. Given the following output:

CV0-004 question answer

Which of the following troubleshooting steps would be best to take?

A.

Checking DNS configurations

B.

Reconfiguring routing protocols

C.

Testing the IP address configuration

D.

Running a trace to the router

Question # 27

A cross-site request forgery vulnerability exploited a web application that was hosted in a public laaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?

A.

Configure the DDoS protection on the CDN.

B.

Install endpoint protection software on the VMs

C.

Add an ACL to the VM subnet.

D.

Deploy an IDS on the laaS network.

Question # 28

A cloud administrator needs to distribute workloads across remote data centers for redundancy reasons. Which of the following deployment strategies would eliminate downtime, accelerate deployment, and remain cost efficient?

A.

In-place

B.

Rolling

C.

Blue-green

D.

Canary

Question # 29

A company's man web application is no longer accessible via the internet. The cloud administrator investigates and discovers the application is accessible locally and only via an IP access. Which of the following was misconfigured?

A.

IP

B.

DHCP

C.

NAT

D.

DNS

Question # 30

An administrator needs to adhere to the following requirements when moving a customer's data to the cloud:

• The new service must be geographically dispersed.

• The customer should have local access to data

• Legacy applications should be accessible.

Which of the following cloud deployment models is most suitable?

A.

On-premises

B.

Private

C.

Hybrid

D.

Public

Question # 31

Which of the following is the correct order of the steps to take when a system is suspected of being vulnerable?

A.

Scanning scope, identification, assessment, and remediation

B.

Assessment, identification, scanning scope, and remediation

C.

Identification, scanning scope, assessment, and remediation

D.

Assessment, scanning scope, identification, and remediation

Question # 32

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

CV0-004 question answer

CV0-004 question answer

CV0-004 question answer

CV0-004 question answer

CV0-004 question answer

CV0-004 question answer

Question # 33

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production

environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

A.

Canary

B.

Blue-green

C.

Rolling

D.

In-place

Question # 34

Servers in the hot site are clustered with the main site.

A.

Network traffic is balanced between the main site and hot site servers.

B.

Offline server backups are replicated hourly from the main site.

C.

All servers are replicated from the main site in an online status.

D.

Which of the following best describes a characteristic of a hot site?

Question # 35

A company runs a discussion forum that caters to global users. The company's monitoring system reports that the home page suddenly is seeing elevated response times, even

though internal monitoring has reported no issues or changes. Which of the following is the most likely cause of this issue?

A.

Cryptojacking

B.

Human error

C.

DDoS

D.

Phishing

Question # 36

A company wants to create a few additional VDIs so support vendors and contractors have a secure method to access the company's cloud environment. When a cloud

administrator attempts to create the additional instances in the new locations, the operation is successful in some locations but fails in others. Which of the following is the

most likely reason for this failure?

A.

Partial service outages

B.

Regional service availability

C.

Service quotas

D.

Deprecation of functionality

Question # 37

Which of the following is a field of computer science that enables computers to identify and understand objects and people in images and videos?

A.

Image reconstruction

B.

Facial recognition

C.

Natural language processing

D.

Computer vision

Question # 38

Department supervisors have requested a report that will help them understand the utilization of cloud resources, make decisions about budgeting for the following year, and reduce

costs. Which of the following are the most important requisite steps to create the report? (Select two).

A.

Set the desired retention of resource logs.

B.

Configure application tracing.

C.

Integrate email alerts with ticketing software.

D.

Enable resource tagging.

E.

Configure the collection of performance/utilization logs.

F.

Configure metric threshold alerts.

Question # 39

A company has ten cloud engineers working on different manual cloud deployments. In the past, engineers have had difficulty keeping deployments consistent. Which of the following is the best method to address this issue?

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Question # 40

A developer is building a new application version using a CI/CD pipeline. The developer receives the following error message log when the build fails:

CV0-004 question answer

Which of the following is the most likely cause of this failure?

A.

Incorrect version

B.

Test case failure

C.

Broken build pipeline

D.

Dependency issue

Question # 41

A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?

A.

Analyze

B.

Report

C.

Remediation

D.

identification

Question # 42

Which of the following technologies should be used by a person who is visually impaired to access data from the cloud?

A.

Object character recognition

B.

Text-to-voice

C.

Sentiment analysis

D.

Visual recognition

Question # 43

A DevOps engineer is performing maintenance on the mail servers for a company's web application. Part of this maintenance includes checking core operating system updates. The servers are currently running version 3.2 of the operating system. The engineer has two update options—one to version 4.1 and the other to version 3.7. Both versions are fully supported by the operating system manufacturer. Which of the following best describes the action the engineer should take?

A.

Upgrade to 3.7 in the development environment.

B.

Upgrade to 4.1 on one production server at a time.

C.

Read the release notes on version 4.1.

D.

Schedule a maintenance window and upgrade to 3.7 in the production environment.

Question # 44

A cloud solutions architect needs to have consistency between production, staging, and development environments. Which of the following options will best achieve this goal?

A.

Using Terraform templates with environment variables

B.

Using Grafana in each environment

C.

Using the ELK stack in each environment

D.

Using Jenkins agents in different environments

Question # 45

A cloud administrator is building a company-standard VM image, which will be based on a public image. Which of the following should the administrator implement to secure the image?

A.

ACLs

B.

Least privilege

C.

Hardening

D.

Vulnerability scanning

Question # 46

A company needs to deploy its own code directly in the cloud without provisioning additional infrastructure. Which of the following is the best cloud service model for the company to use?

A.

PaaS

B.

SaaS

C.

laaS

D.

XaaS

Question # 47

A systems administrator is configuring backups on a VM and needs the process to run as quickly as possible, reducing the bandwidth on the network during all times from Monday through Saturday. In the event of data corruption, the management team expects the mean time to recovery to be as low as possible. Which of the following backup methods can the administrator use to accomplish these goals?

A.

Incremental backup daily to the cloud

B.

Full backup on Sunday and incremental backups on all other days of the week

C.

Differential backup daily to the cloud

D.

Incremental backups during off-hours on Monday, Wednesday, and Friday

Question # 48

The performance of an e-commerce website decreases dramatically during random periods. The IT team is evaluating available resources to mitigate the situation. Which of the following is the best approach to effectively manage this scenario'?

A.

Migrating to a dedicated host

B.

Purchasing additional servers

C.

Scheduling resource allocation

D.

Configuring automatic elasticity

Question # 49

An organization's security policy states that software applications should not exchange sensitive data in cleartext. The security analyst is concerned about a software application that uses Base64 to encode credit card data. Which of the following would be the best algorithm to replace Base64?

A.

3DES

B.

AES

C.

RC4

D.

SHA-3

Question # 50

A cloud engineer wants to run a script that increases the volume storage size if it is below 100GB. Which of the following should the engineer run?

CV0-004 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question # 51

A CI/CD pipeline is used to deploy VMs to an laaS environment. Which of the following can be used to harden the operating system once the VM is running?

A.

Docker

B.

Kubernetes

C.

Git

D.

Ansible

Question # 52

An administrator is creating a cron job that shuts down the virtual machines at night to save on costs. Which of the following is the best way to achieve this task?

A)

CV0-004 question answer

B)

CV0-004 question answer

C)

CV0-004 question answer

D)

CV0-004 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question # 53

A company's website suddenly crashed. A cloud engineer investigates the following logs:

CV0-004 question answer

Which of the following is the most likely cause of the issue?

A.

SQL injection

B.

Cross-site scripting

C.

Leaked credentials

D.

DDoS

Question # 54

A cloud engineer is exploring options to reduce the management overhead of the servers and network. Which of the following cloud service models should the engineer implement?

A.

SaaS

B.

XaaS

C.

PaaS

D.

laaS

Question # 55

An on-premises data center is located in an earthquake-prone location. The workload consists of real-time, online transaction processing. Which ot the following data protection strategies should be used to back up on-premises data to the cloud while also being cost effective?

A.

Remote replication for failover

B.

A copy that is RAID 1 protected on spinning drives in an on-premises private cloud

C.

A full backup to on-site tape libraries in a private cloud

D.

Air-gapped protection to provide cyber resiliency

Question # 56

A log-parsing application requires significant processing power to ingest the logs streaming from web servers. The engineering team presents the cloud architect with four proposals

using the same underlying hardware. Which of the following should the cloud architect select in order to minimize the impact of an instance failure while keeping the cost as low as

possible?

A.

Four instances of 4vCPU, 8GB RAM, 80GB SSD

B.

Four instances of 4vCPU, 8GB RAM, 80GB HDD

C.

Two instances of 8vCPU, 16GB RAM, 80GB SSD

D.

Two instances of 8vCPU, 16GB RAM, 80GB HDD

Question # 57

An organization's web application experiences penodic bursts of traffic when a new video is launched. Users are reporting poor performance in the middle of the month. Which of the following scaling approaches should the organization use to scale based on forecasted traffic?

A.

Scheduled

B.

Manual

C.

Event

D.

Load

Question # 58

A company hosts various containerized applications for business uses. A client reports that one of its routine business applications fails to load the web-based login prompt hosted in the company cloud.

CV0-004 question answer

INSTRUCTIONS

Click on each device and resource. Review the configurations, logs, and characteristics of each node in the architecture to diagnose the issue. Then, make the necessary changes to the WAF configuration to remediate the issue.

Web app 1

CV0-004 question answer

Web app 2

CV0-004 question answer

Web app 3

CV0-004 question answer

Web app 4

CV0-004 question answer

Client app

CV0-004 question answer

CV0-004 question answer

CV0-004 question answer

CV0-004 question answer

Question # 59

A developer is testing code that will be used to deploy a web farm in a public cloud. The main code block is a function to create a load balancer and a loop to create 1.000 web servers, as shown below:

CV0-004 question answer

The developer runs the code against the company's cloud account and observes that the load balancer is successfully created, but only 100 web servers have been created. Which of the following should the developer do to fix this issue?

A.

Request an increase of Instance quota.

B.

Run the code multiple times until all servers are created.

C.

Check the my_web_server () function to ensure it is using the right credentials.

D.

Place the my_load_balancer () function after the loop.

Question # 60

A security engineer recently discovered a vulnerability in the operating system of the company VMs. The operations team reviews the issue and decides all VMs need to be updated

from version 3.4.0 to 3.5. Which of the following best describes the type of update that will be applied?

A.

Consistent

B.

Major

C.

Minor

D.

Ephemeral

Question # 61

A systems engineer tries to mount an iSCSI LUN to a VM host in a data center, but the host does not discover any iSCSI targets. A sample of the switch configuration is shown in the following image:

CV0-004 question answer

Which of the following configuration changes would most likely resolve the discovery issues?

A.

Disabling GigabitEthernet 1/0/7

B.

Changing the MTU on GigabitEthernet 1/0/2

C.

Changing the access VLAN for GigabitEthernet 1/0/2 to 25

D.

Enabling jumbo frames on GigabitEthernet 1/0/6 and GigabitEthernet 1/0/7

Question # 62

A cloud engineer is concerned about command-and-control (C2) communication leaving a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify this type of communication?

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron jobs listing connections

D.

Traffic mirroring

Question # 63

A cloud administrator learns that a major version update. 4.6.0. is available for a business-critical application. The application is currently on version 4.5.2. with additional minor versions 3, 4, and 5 available. The administrator needs to perform the update while minimizing downtime. Which of the following should the administrator do first?

A.

Apply the minor updates and then restart the machine before applying the major update.

B.

During off hours, decommission the machine and create a new one directly on major update 4.6.0.

C.

Stop the service and apply the major updates directly.

D.

Create a test environment and apply the major update

Question # 64

A company’s cybersecurity team receives the following alert that a production VM was deleted from the virtual network:

21 September 09:19:08 (GMT-5)

Resource with ID: PROD-WEB001 was deleted by User: Logging Service

The console to manage virtual network resources uses directory authentication. Only users in a particular directory group can interactively access the virtual network management console. The logging service account is not part of this group and requires some local administration privileges to aggregate logs from various resources. The cybersecurity team discovers the logging service account was previously given full directory administrator privileges and sees the following entry:

21 September 09:10:55 (GMT-5)

User with ID: Logging Service was added to the Group: VNet Console Administrators by actor: Logging Service.

The cybersecurity team removes the compromised service account from the directory group. Which of the following should the cybersecurity team do next to prevent repeat instances of this issue?

A.

Enable two-factor authentication on the virtual network console.

B.

Reset the logging service account to use a long and complex password.

C.

Disable RDP on the production virtual machines.

D.

Create a scoped administrative role for the logging service account.

Question # 65

A software engineer at a cybersecurity company wants to access the cloud environment. Per company policy, the cloud environment should not be directly accessible via the internet. Which of the following options best describes how the software engineer can access the cloud resources?

A.

SSH

B.

Bastion host

C.

Token-based access

D.

Web portal

Question # 66

Which of the following storage resources provides higher availability and speed for currently used files?

A.

Warm/HDD

B.

Cold/SSD

C.

Hot/SSD

D.

Archive/HDD

Question # 67

Which of the following should be used on containers to process data and keep the output in files for later review?

A.

Standard output

B.

Optical disk mount

C.

Ephemeral storage

D.

Persistent volumes

Question # 68

Which of the following strategies requires the development of new code before an application can be successfully migrated to a cloud provider?

A.

Refactor

B.

Rearchitect

C.

Rehost

D.

Replatform

Question # 69

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to

calculate the severity of the risk from using this component?

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

Question # 70

Which of the following describes what CRUD is typically used for?

A.

Relational databases

B.

Time series databases

C.

Graph databases

D.

NoSQL databases

Question # 71

A cloud service provider requires users to migrate to a new type of VM within three months. Which of the following is the best justification for this requirement?

A.

Security flaws need to be patched.

B.

Updates could affect the current state of the VMs.

C.

The cloud provider will be performing maintenance of the infrastructure.

D.

The equipment is reaching end of life and end of support.

Question # 72

A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

A.

Log retention

B.

Tracing

C.

Log aggregation

D.

Log rotation

E.

Hashing

F.

Encryption

Question # 73

A cloud engineer wants containers to run the latest version of a container base image to reduce the number of vulnerabilities. The applications in use requite Python 3.10 and ate not compatible with any other version. The containers' images are created every time a new version is released from the source image. Given the container Dockerfile below:

CV0-004 question answer

Which of the following actions will achieve the objectives with the least effort?

A.

Perform docker pull before executing docker run.

B.

Execute docker update using a local cron to get the latest container version.

C.

Change the image to use python:latest on the image build process.

D.

Update the Dockerfile to pin the source image version.

Question # 74

A high-usage cloud resource needs to be monitored in real time on specific events to guarantee its availability. Which of the following actions should be used to meet this requirement?

A.

Configure a ping command to identify when the cloud instance is out of service.

B.

Create a dashboard with visualizations to filter the status of critical activities.

C.

Collect all the daily activity from the cloud instance and create a dump file for analysis.

D.

Schedule an hourly scan of the network to check for the availability of the resource.

Question # 75

A systems engineer is migrating a batch of 25 VMs from an on-premises compute cluster to a public cloud using the public cloud's migration agent. The migration job shows data

copies at a rate of 250Mbps. After five servers migrate, the data copies at a rate of 25Mbps. Which of the following should the engineer review first to troubleshoot?

A.

The on-premises VM host hardware utilization

B.

The on-premises ISP throttling rate

C.

The IOPS on the SAN backing the on-premises cluster

D.

The compute utilization of the VMs being migrated

Question # 76

A cloud solution needs to be replaced without interruptions. The replacement process can be completed in phases, but the cost should be kept as low as possible. Which of the

following is the best strategy to implement?

A.

Blue-green

B.

Rolling

C.

In-place

D.

Canary

CV0-004 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CV0-004 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CompTIA Cloud+ (V4)
  • Last Update: Mar 15, 2026
  • Questions and Answers: 254
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CV0-004 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included