Win IT Exam with Last Dumps 2024

CompTIA CV0-003 Exam

Page 2/9
Viewing Questions 11 20 out of 88 Questions

Question 11
A company developed a product using a cloud provider's PaaS platform and many of the platform-based components within the application environment. Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider?
A. Licensing
B. Authentication providers
C. Service-level agreement
D. Vendor lock-in

Question 12
A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST?
A. The firewall
B. The subnet
C. The gateway
D. The services

Question 13
Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?
A. A business continuity plan
B. Incident response/disaster recovery documentation
C. A tabletop exercise
D. A root cause analysis

Question 14
A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page. Which of the following is the MOST likely cause of the issue?
A. The local firewall from older OSs is not allowing outbound connections.
B. The local firewall from older OSs is not allowing inbound connections.
C. The cloud web server is using a self-signed certificate that is not supported by older browsers.
D. The cloud web server is using strong ciphers that are not supported by older browsers.

Question 15
A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage. Which of the following RAID types should the administrator choose?
A. 5
B. 6
C. 10
D. 50

Question 16
A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:
- High availability
- Horizontal auto-scaling
- 60 nodes peak capacity per region
- Five reserved network IP addresses per subnet
- /24 rangeWhich of the following would BEST meet the above requirements?
A. Create two /25 subnets in different regions.
B. Create three /25 subnets in different regions.
C. Create two /26 subnets in different regions.
D. Create three /26 subnets in different regions.
E. Create two /27 subnets in different regions.
F. Create three /27 subnets in different regions.

Question 17
A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST?
A. Server power
B. Rack power
C. Switch power
D. SAN power

Question 18
A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers' activity?
A. Patch management
B. Hardening
C. Scaling
D. Log and event monitoring

Question 19
A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would allow for the maximum number of two-core machines with equal memory?
A. 30 VMs, 3GB of memory
B. 40 VMs, 1,5GB of memory
C. 45 VMs, 2 GB of memory
D. 60 VMs, 1 GB of memory

Question 20
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider's environment that do not belong to the company. Which of the following BEST describes this attack?
A. VM escape
B. Directory traversal
C. Buffer overflow
D. Heap spraying