A cloud service provider just launched a new serverless service that is compliant with all security regulations. A company deployed its code using the service, and the company's application was hacked due to leaked credentials. Which of the following is responsible?
Answer : A
Comprehensive and Detailed Step-by-Step
A . Customer: Under the shared responsibility model, customers are responsible for securing their code and credentials in cloud environments.
B . Cloud service provider: Responsible for securing the underlying infrastructure, not customer-deployed applications or credentials.
C . Hacker: Exploited the breach but isn't directly responsible for security lapses.
D . Code repository: Doesn't inherently cause the issue unless mismanaged by the customer.
CompTIA Cloud+ CV0-004 Study Guide, Objective 4.2: Understand the shared responsibility model in cloud security.
A company wants to implement a work environment that will have low operational overhead and highly accessible enterprise resource planning, email, and data resources. Which of
the following cloud service models should the company implement?
Answer : D
A company that requires low operational overhead and highly accessible enterprise resources would benefit from implementing Software as a Service (SaaS). SaaS provides access to applications hosted in the cloud, eliminating the need for internal infrastructure or application development, which aligns with the requirement of having low operational overhead. Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson
A cloud service provider requires users to migrate to a new type of VM within three months. Which of the following is the best justification for this requirement?
Answer : D
The best justification for a cloud service provider requiring users to migrate to a new type of VM within a specific time frame is that the equipment is reaching end of life and end of support (EOL/EOS). This means that the older type of VM will no longer receive updates or support, which could include important security patches, so it is necessary to move to newer VM types to maintain security and performance. Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson
Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year.
Which of the following is this an example of?
Answer : B
The instruction by the legal department to store data from the affected virtual machines for a minimum of one year is an example of data Retention. Retention policies are often driven by regulatory compliance requirements and dictate how long certain types of data must be kept before they can be securely disposed of. Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson
A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following
delivery mechanisms would best support this integration?
Answer : A
An Enterprise Service Bus (ESB) is designed to facilitate application integration by providing a centralized architecture for high-level, message-based, and event-driven communication between different systems. It is particularly well-suited for integrating multiple systems with their own APIs because it can handle various data formats and protocols, enabling different applications to communicate with each other seamlessly. Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg
Which of the following storage resources provides higher availability and speed for currently used files?
Answer : C
Hot storage using Solid State Drives (SSD) is designed for data that needs to be accessed frequently and quickly. SSDs provide faster access times compared to HDDs, making them suitable for high-availability and speed-critical files, such as those currently in use or requiring rapid access.
A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?
Answer : D
Encrypting the data at rest is a crucial security measure to make the data unusable to unauthorized parties. If the object storage data was accessed by an unauthorized party, having the data encrypted would ensure that the data remains confidential and inaccessible without the proper encryption keys, thus mitigating the impact of the breach.