CompTIA CV0-003 CompTIA Cloud+ Certification Exam Practice Test

Page: 1 / 14
Total 406 questions
Question 1

A company plans to publish a new application and must conform with security standards. Which of the following types of testing are most important for the systems administrator to run to assure the security and compliance of the application before publishing? (Select two).



Answer : B, E

Vulnerability testing and penetration testing are two types of security testing that can help to identify and mitigate potential risks in an application before publishing. Vulnerability testing is the process of scanning the application for known weaknesses or flaws that could be exploited by attackers. Penetration testing is the process of simulating real-world attacks on the application to test its defenses and find vulnerabilities that may not be detected by automated scans. Both types of testing can help to assure the security and compliance of the application by revealing and resolving any issues that could compromise the confidentiality, integrity, or availability of the application or its dat

a.Reference: CompTIA Cloud+ CV0-003 Study Guide, Chapter 5: Maintaining a Cloud Environment, page 221.


Question 2
Question 3
Question 4
Question 5

A cloud engineer needs to perform a database migration. The database has a restricted SLA and cannot be offline for more than ten minutes per month. The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps Which of the following is the best option to perform the migration?



Answer : B

The best option to perform the database migration is to create a replica database, synchronize the data, and switch to the new instance. This option can help meet the restricted SLA and avoid offline time for the database. Creating a replica database can help copy the data from the source to the destination without interrupting the database operations. Synchronizing the data can help ensure that the replica database is updated with any changes that occur in the source database during the migration process. Switching to the new instance can help complete the migration and activate the new database in the cloud. This option can also help avoid the network bandwidth limitation and the large size of the dat

a. Reference:CompTIA Cloud+ CV0-003 Certification Study Guide, Chapter 7, Objective 7.1: Given a scenario, migrate applications and data to the cloud.


Question 6

A systems administrator deployed a new web application in a public cloud and would like to test it, but the company's network firewall is only allowing outside connections to the cloud provider network using TCP port 22. While waiting for the network administrator to open the required ports, which of the following actions should the systems administrator take to test the new application? (Select two).



Answer : B, F

To test the new web application in the public cloud, the systems administrator should create a replica database, synchronize the data, and switch to the new instance, and create a SSH tunnel. Creating a replica database can help minimize the downtime and ensure data consistency during the migration. Synchronizing the data can help keep the replica database up to date with the original database. Switching to the new instance can help activate the new web application in the public cloud. Creating a SSH tunnel can help bypass the network firewall and access the web application using TCP port 22. SSH is a secure protocol that can create encrypted tunnels between the local and remote hosts. By creating a SSH tunnel, the systems administrator can forward the web application traffic through the tunnel and test it using a web browser. Reference: [CompTIA Cloud+ CV0-003 Certification Study Guide], Chapter 7, Objective 7.1: Given a scenario, migrate applications and data to the cloud.


Question 7

A VDI provider suspects users are installing prohibited software on the instances. Which of the following must be implemented to prevent the issue?



Answer : D

System hardening is the process of securing a system by reducing its attack surface and eliminating unnecessary services, features, or functions. System hardening can help prevent users from installing prohibited software on the VDI instances by applying policies and restrictions that limit the user privileges and access rights. For example, system hardening can disable the installation of software from unknown sources, enforce the use of strong passwords, enable encryption, and remove default accounts. System hardening can also improve the performance and stability of the VDI instances by removing unwanted or unused components. Reference: [CompTIA Cloud+ CV0-003 Certification Study Guide], Chapter 9, Objective 9.1: Given a scenario, apply security controls and techniques.


Page:    1 / 14   
Total 406 questions