DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Latest CompTIA Cloud+ CV0-003 Exam Questions for Effective Preparation

The CompTIA Cloud+ certification validates your skills in cloud technologies, including cloud deployment, automation, security, and data protection. Our exam questions cover a wide range of topics crucial for Cloud+ certification, such as cloud infrastructure, virtualization, networking, and more. Are you ready to demonstrate your expertise in deploying secure cloud environments and protecting mission-critical applications and data with the CompTIA Cloud+ CV0-003 exam? Our collection of 100% real exam questions and answers is here to support your success. In addition to our exam questions, we provide valuable exam preparation resources such as study materials and exam guides. These resources are meticulously designed to help you deepen your understanding of key concepts and enhance your exam readiness. To further strengthen your preparation, take advantage of our mock exams. These practice tests simulate the exam environment, allowing you to assess your knowledge and readiness before the actual exam day. With our support, passing the CompTIA Cloud+ CV0-003 exam and earning your certification is achievable.
Take other online exams

Question #1
Once a year, a company's private cloud experiences increased activity. The company has a disaster recovery site that is hosted in a public cloud. To avoid investment in additional hardware, which of the following actions would BEST address this issue?
A. onfigure cloud bursting to spin up new VMs automatically and terminate them when usage is back to normal
B. ctivate the disaster recovery site, and deactivate it when usage is back to normal
C. reate a new backup site and decommission it when usage is back to normal
D. anually add memory and CPU to existing VMs, and remove them when usage is back to normal
View answer
Correct Answer: A
Question #2
A cloud administrator is looking at the company's cloud services bill for the previous month. The administrator notices on the billing dashboard that certain resources are not being billed to any particular department. Which of the following actions will help correct this billing issue?
A. heck the utilization of the resources
B. odify the chargeback details of the consumer
C. dd the resources to the consumer monitoring group
D. odify the tags for all the unmapped resources
View answer
Correct Answer: D
Question #3
A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?
A. he IaaS compute configurations, the capacity trend analysis reports, and the storage IOPS
B. he hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor
C. he scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule
D. igrating from IaaS to on premises, the network traffic between on-premises users and the IaaS instance, and the CPU utilization of the hypervisor host
View answer
Correct Answer: A
Question #4
A company is planning to migrate applications to a public cloud, and the Chief Information Officer (CIO) would like to know the cost per business unit for the applications in the cloud. Before the migration, which of the following should the administrator implement FIRST to assist with reporting the cost for each business unit?
A. n SLA report
B. agging
C. uotas
D. howback
View answer
Correct Answer: B
Question #5
An organization requires the following to be achieved between the finance and marketing departments:-Allow HTTPS/HTTP.-Disable FTP and SMB traffic.Which of the following is the MOST suitable method to meet the requirements?
A. mplement an ADC solution to load balance the VLAN traffic
B. onfigure an ACL between the VLANs
C. mplement 802
D. onfigure on-demand routing between the VLANs
View answer
Correct Answer: B
Question #6
A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?
A. SNMPv3
B. Community strings
C. IPSec tunnels
D. ACLs
View answer
Correct Answer: C
Question #7
A company developed a product using a cloud provider's PaaS platform and many of the platform-based components within the application environment. Which of the following would the company MOST likely be concerned about when utilizing a multicloud strategy or migrating to another cloud provider?
A. icensing
B. uthentication providers
C. ervice-level agreement
D. endor lock-in
View answer
Correct Answer: D
Question #8
A systems administrator needs to implement a security control that will prevent unknown malware from infecting a system in case the antivirus solution fails. Which of the following should the administrator implement?
A. software whitelist
B. ile integrity monitoring
C. host-based IDS
D. ardened baselines
View answer
Correct Answer: A
Question #9
A storage array that is used exclusively for datastores is being decommissioned, and a new array has been installed. Now the private cloud administrator needs to migrate the data. Which of the following migration methods would be the BEST to use?
A. onduct a V2V migration
B. erform a storage live migration
C. sync the data between arrays
D. se a storage vendor migration appliance
View answer
Correct Answer: D
Question #10
An organization will be deploying a web application in a public cloud with two web servers, two database servers, and a load balancer that is accessible over a single public IP. Taking into account the gateway for this subnet and the potential to add two more web servers, which of the following will meet the minimum IP requirement?
A. 92
B. 92
C. 92
D. 92
View answer
Correct Answer: C
Question #11
A systems administrator is securing a new email system for a large corporation. The administrator wants to ensure private corporate information is not emailed to external users. Which of the following would be MOST useful to accomplish this task?
A. LP
B. DR
C. NSSEC
D. PF
View answer
Correct Answer: A
Question #12
A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?
A. reate a VPC and peer the networks
B. mplement dynamic routing
C. nable DHCP on the networks
D. btain a new IPAM subscription
View answer
Correct Answer: A
Question #13
A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task. Which of the following ports should the administrator open on the monitoring server's firewall?
A. 3
B. 23
C. 39
D. 61
View answer
Correct Answer: D
Question #14
All of a company's servers are currently hosted in one cloud MSP. The company created a new cloud environment with a different MSP. A cloud engineer is now tasked with preparing for server migrations and establishing connectivity between clouds. Which of the following should the engineer perform FIRST?
A. eer all the networks from each cloud environment
B. igrate the servers
C. reate a VPN tunnel
D. onfigure network access control lists
View answer
Correct Answer: C
Question #15
A systems administrator is analyzing a report of slow performance in a cloud application. This application is working behind a network load balancer with two VMs, and each VM has its own digital certificate configured. Currently, each VM is consuming 85% CPU on average. Due to cost restrictions, the administrator cannot scale vertically or horizontally in the environment. Which of the following actions should the administrator take to decrease the CPU utilization? (Choose two.)
A. PI version incompatibility
B. isconfigured script account
C. rong template selection
D. ncorrect provisioning script indentation
View answer
Correct Answer: BE
Question #16
Which of the following service models would be used for a database in the cloud?
A. aaS
B. aaS
C. aaS
D. aaS
View answer
Correct Answer: A
Question #17
A system administrator supports an application in the cloud, which includes a restful API that receives an encrypted message that is passed to a calculator system. The administrator needs to ensure the proper function of the API using a new automation tool. Which of the following techniques would be BEST for the administrator to use to accomplish this requirement?
A. unctional testing
B. erformance testing
C. ntegration testing
D. nit testing
View answer
Correct Answer: A
Question #18
A media company has made the decision to migrate a physical, internal file server to the cloud and use a web-based interface to access and manage the files.The users must be able to use their current corporate logins. Which of the following is the MOST efficient way to achieve this goal?
A. eploy a VM in a cloud, attach storage, and copy the files across
B. se a SaaS service with a directory service federation
C. eploy a fileshare in a public cloud and copy the files across
D. opy the files to the object storage location in a public cloud
View answer
Correct Answer: B
Question #19
After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)
A. missing static route
B. duplicate IP on the network
C. irewall issues
D. he wrong gateway
View answer
Correct Answer: BD
Question #20
A cloud security analyst is implementing a vulnerability scan of the web server in the DMZ, which is running in an IaaS compute instance. The default inbound firewall settings are as follows:Which of the following will provide the analyst with the MOST accurate report?
A. n agent-based scan
B. network vulnerability scan
C. default and common credentialed scan
D. network credentialed vulnerability scan
View answer
Correct Answer: D
Question #21
A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error. Which of the following will MOST likely solve the issue?
A. hecking user passwords
B. onfiguring QoS rules
C. nforcing TLS authentication
D. pening TCP port 3389
View answer
Correct Answer: D
Question #22
Which of the following definitions of serverless computing BEST explains how it is different from using VMs?
A. erverless computing is a cloud-hosting service that utilizes infrastructure that is fully managed by the CSP
B. erverless computing uses predictable billing and offers lower costs than VM compute services
C. erverless computing is a scalable, highly available cloud service that uses SDN technologies
D. erverless computing allows developers to focus on writing code and organizations to focus on business
View answer
Correct Answer: D
Question #23
A cloud administrator is managing an organization's infrastructure in a public cloud. All servers are currently located in a single virtual network with a single firewall that all traffic must pass through. Per security requirements, production, QA, and development servers should not be able to communicate directly with each other.Which of the following should an administrator perform to comply with the security requirement?
A. Create separate virtual networks for production, QA, and development servers
B. Create separate network security groups for production, QA, and development servers
C. Create separate virtual networks for production, QA, and development servers
D. Create separate network security groups for production, QA, and development servers
View answer
Correct Answer: A
Question #24
A web server has been deployed in a public IaaS provider and has been assigned the public IP address of 72.135.10.100. Users are now reporting that when they browse to the website, they receive a message indicating the service is unavailable. The cloud administrator logs into the server, runs a netstat command, and notices the following relevant output:Which of the following actions should the cloud administrator take to resolve the issue?
A. ssign a new IP address of 192
B. odify the firewall on 72
C. onfigure the WAF to filter requests from 17
D. pdate the gateway on the web server to use 72
View answer
Correct Answer: D
Question #25
A systems administrator needs to configure SSO authentication in a hybrid cloud environment. Which of the following is the BEST technique to use?
A. ccess controls
B. ederation
C. ultifactor authentication
D. ertificate authentication
View answer
Correct Answer: B
Question #26
A company is currently running a website on site. However, because of a business requirement to reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the company is considering operating in a hybrid environment. The website uses mostly static files and a small relational database.Which of the following should the cloud architect implement to achieve the objective at the LOWEST cost possible?
A. mplement a load-balanced environment in the cloud that is equivalent to the current on-premises setup and use DNS to shift the load from on premises to cloud
B. mplement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is down
C. mplement a website replica in the cloud with auto-scaling using the smallest possible footprint
D. mplement a CDN that caches all requests with a higher TTL and deploy the IaaS instances manually in case of disaster
View answer
Correct Answer: C
Question #27
A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage. Which of the following RAID types should the administrator choose?
A.
B.
C. 0
D. 0
View answer
Correct Answer: A
Question #28
A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?
A. NMPv3
B. ommunity strings
C. PSec tunnels
D. CLs
View answer
Correct Answer: A
Question #29
A cloud administrator is setting up a DR site on a different zone of the same CSP. The application servers are replicated using the VM replication, and the database replication is set up using log shipping. Upon testing the DR site, the application servers are unable to access the database servers. The administrator has verified the systems are running and are accessible from the CSP portal. Which of the following should the administrator do to fix this issue?
A. hange the database application IP
B. reate a database cluster between the primary site and the DR site
C. pdate the connection string
D. dit the DNS record at the DR site for the application servers
View answer
Correct Answer: C
Question #30
A systems administrator would like to reduce the network delay between two servers. Which of the following will reduce the network delay without taxing other system resources?
A. ecrease the MTU size on both servers
B. djust the CPU resources on both servers
C. nable compression between the servers
D. onfigure a VPN tunnel between the servers
View answer
Correct Answer: A
Question #31
A cloud administrator is switching hosting companies and using the same script that was previously used to deploy VMs in the new cloud. The script is returning errors that the command was not found. Which of the following is the MOST likely cause of the script failure?
A. Account mismatches
B. IP address changes
C. API version incompatibility
D. Server name changes
View answer
Correct Answer: D
Question #32
A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST?
A. he firewall
B. he subnet
C. he gateway
D. he services
View answer
Correct Answer: A
Question #33
A cloud administrator set up a link between the private and public cloud through a VPN tunnel. As part of the migration, a large set of files will be copied. Which of the following network ports are required from a security perspective?
A. 2, 53, 445
B. 2, 443, 445
C. 5, 123, 443
D. 37, 139, 445
View answer
Correct Answer: B
Question #34
In an existing IaaS instance, it is required to deploy a single application that has different versions. Which of the following should be recommended to meet this requirement?
A. eploy using containers
B. nstall a Type 2 hypervisor
C. nable SR-IOV on the host
D. reate snapshots
View answer
Correct Answer: A
Question #35
A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure this?
A. eduplication
B. hin provisioning
C. oftware-defined storage
D. SCSI storage
View answer
Correct Answer: B
Question #36
A local bank has all of its infrastructure in the cloud. An update was applied to the main database server at 5:00 a.m. on Monday morning, and the database was then corrupted and unusable. It had to be restored from backup. The last backup was taken the night before at 10:00 p.m. The database was then restored successfully, but seven hours' worth of data was lost, which is deemed unacceptable. Which of the following needs to be updated in the DR plan?
A. ecovery point objective
B. tatement of work
C. ervice-level agreement
D. ecovery time objective
View answer
Correct Answer: A
Question #37
A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance. Which of the following licensing models is the application MOST likely using?
A. er device
B. er user
C. ore-based
D. olume-based
View answer
Correct Answer: C
Question #38
A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance has been slow since the images were upgraded from Windows 7 to Windows 10. This VDI environment is used to run simple tasks, such as Microsoft Office. The administrator investigates the virtual machines and finds the following settings:-4 vCPU-16GB RAM-10Gb networking-256MB frame bufferWhich of the following MOST likely needs to be upgraded?
A. RAM
B. CPU
C. GPU
D. NIC
View answer
Correct Answer: C
Question #39
A systems administrator is provisioning VMs in a cloud environment and has been told to select an OS build with the furthest end-of-life date. Which of the following OS builds would be BEST for the systems administrator to use?
A. pen-source
B. TS
C. anary
D. eta
E. table
View answer
Correct Answer: B
Question #40
A systems administrator is building a new visualization cluster. The cluster consists of five virtual hosts, which each have flash and spinning disks. This storage is shared among all the virtual hosts, where a virtual machine running on one host may store data on another host. This is an example of:
A. storage area network
B. network file system
C. yperconverged storage
D. hick-provisioned disks
View answer
Correct Answer: A
Question #41
A company needs to migrate the storage system and batch jobs from the local storage system to a public cloud provider. Which of the following accounts willMOST likely be created to run the batch processes?
A. ser
B. DAP
C. ole-based
D. ervice
View answer
Correct Answer: D
Question #42
Which of the following will provide a systems administrator with the MOST information about potential attacks on a cloud IaaS instance?
A. Network flows
B. FIM
C. Software firewall
D. HIDS
View answer
Correct Answer: A
Question #43
A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies. Which of the following cloud service subscription types would BEST meet these requirements?
A. aaS
B. aaS
C. BaaS
D. aaS
View answer
Correct Answer: D
Question #44
A company still has several dedicated servers and wants to migrate them to its private cloud. Which of the following migration methods would be BEST to accomplish this goal?
A. irtual-to-virtual
B. torage
C. loud-to-cloud
D. hysical-to-virtual
View answer
Correct Answer: D
Question #45
Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?
A. business continuity plan
B. ncident response/disaster recovery documentation
C. tabletop exercise
D. root cause analysis
View answer
Correct Answer: C
Question #46
A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below:The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions. Which of the following solutions would help to company accommodate the new workload in t
A. onfigure auto-scaling within the private cloud
B. et up cloud bursting for the additional resources
C. igrate all workloads to a public cloud provider
D. dd more capacity to the private cloud
View answer
Correct Answer: B
Question #47
An organization suffered a critical failure of its primary datacenter and made the decision to switch to the DR site. After one week of using the DR site, the primary datacenter is now ready to resume operations.Which of the following is the MOST efficient way to bring the block storage in the primary datacenter up to date with the DR site?
A. et up replication
B. opy the data across both sites
C. estore incremental backups
D. estore full backups
View answer
Correct Answer: A
Question #48
A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?
A. LP
B. AF
C. IM
D. DC
View answer
Correct Answer: A
Question #49
A systems administrator is deploying a solution that includes multiple network I/O-intensive VMs. The solution design requires that vNICs of the VMs provide low- latency, near-native performance of a physical NIC and data protection between the VMs. Which of the following would BEST satisfy these requirements?
A. R-IOV
B. ENEVE
C. DN
D. LAN
View answer
Correct Answer: A
Question #50
A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution. Which of the following will provide the data to measure business continuity? (Choose two.)
A. DN
B. NS
C. TP
D. PAM
View answer
Correct Answer: AF
Question #51
A global web-hosting company is concerned about the availability of its platform during an upcoming event. Web traffic is forecasted to increase substantially during the next week. The site contains mainly static content. Which of the following solutions will assist with the increased workload?
A. oH
B. AF
C. PS
D. DN
View answer
Correct Answer: D
Question #52
A systems administrator has migrated a web application to the cloud with a synchronous uplink speed of 100Mbps. After the migration, the administrator receives reports of slow connectivity to the web application. The administrator logs into the firewall and notices the WAN port is transmitting at a constant 12.5MBps. Which of the following BEST explains the reason for the issue?
A. isconfigured subnetting
B. nsufficient compute
C. irewall issues
D. ot enough upload bandwidth
View answer
Correct Answer: D
Question #53
A company is switching from one cloud provider to another and needs to complete the migration as quickly as possible. Which of the following is the MOST important consideration to ensure a seamless migration?
A. isable antivirus/anti-malware software
B. urn off the software firewall
C. stablish a VPN tunnel between the computer and the web server
D. pdate the web browser to the latest version
View answer
Correct Answer: C
Question #54
A company is currently running a website on site. However, because of a business requirement to reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the company is considering operating in a hybrid environment. The website uses mostly static files and a small relational database.Which of the following should the cloud architect implement to achieve the objective at the LOWEST cost possible?
A. Implement a load-balanced environment in the cloud that is equivalent to the current on-premises setup and use DNS to shift the load from on premises to cloud
B. Implement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is down
C. Implement a website replica in the cloud with auto-scaling using the smallest possible footprint
D. Implement a CDN that caches all requests with a higher TTL and deploy the IaaS instances manually in case of disaster
View answer
Correct Answer: B
Question #55
A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations. Which of the following actions should the cloud administrator take FIRST?
A. nitiate a failover
B. estore backups
C. onfigure the network
D. erform a failback
View answer
Correct Answer: D
Question #56
A cloud administrator recently deployed an update to the network drivers of several servers. Following the update, one of the servers no longer responds to remote login requests. The cloud administrator investigates the issue and gathers the following information:? The cloud management console shows the VM is running and the CPU and memory utilization is at or near 0%.? The cloud management console does not show an IP address for that server.? A DNS lookup shows the hostname resolves to an IP address.? The
A. The network driver updates did not apply successfully, and the interface is in a down state
B. The ACL policy for the server was updated as part of the server reboot, preventing login access
C. The server was assigned a new IP address, and DNS entry for the server name was not updated
D. The update caused an increase in the output to the logs, and the server is too busy to respond
View answer
Correct Answer: A
Question #57
A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?
A. lternate location
B. olling
C. torage live migration
D. n-place
View answer
Correct Answer: D
Question #58
A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier. Which of the following access control rules should be changed?
A. iscretionary-based
B. ttribute-based
C. andatory-based
D. ole-based
View answer
Correct Answer: D
Question #59
A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements:* No downtime* Instant switch to a new version using traffic control for all usersWhich of the following deployment strategies would be the BEST solution?
A. ot site
B. lue-green
C. anary
D. olling
View answer
Correct Answer: B
Question #60
After a few new web servers were deployed, the storage team began receiving incidents in their queue about the web servers. The storage administrator wants to verify the incident tickets that should have gone to the web server team. Which of the following is the MOST likely cause of the issue?
A. ncorrect assignment group in service management
B. ncorrect IP address configuration
C. ncorrect syslog configuration on the web servers
D. ncorrect SNMP settings
View answer
Correct Answer: A
Question #61
A systems administrator is working in a globally distributed cloud environment. After a file server VM was moved to another region, all users began reporting slowness when saving files. Which of the following is the FIRST thing the administrator should check while troubleshooting?
A. etwork latency
B. etwork connectivity
C. etwork switch
D. etwork peering
View answer
Correct Answer: A
Question #62
A marketing team is using a SaaS-based service to send emails to large groups of potential customers. The internally managed CRM system is configured to generate a list of target customers automatically on a weekly basis, and then use that list to send emails to each customer as part of a marketing campaign. Last week, the first email campaign sent emails successfully to 3,000 potential customers. This week, the email campaign attempted to send out 50,000 emails, but only 10,000 were sent. Which of the foll
A. PI request limit
B. ncorrect billing account
C. isconfigured auto-scaling
D. andwidth limitation
View answer
Correct Answer: A
Question #63
A cloud administrator is upgrading a cloud environment and needs to update the automation script to use a new feature from the cloud provider. After executing the script, the deployment fails. Which of the following is the MOST likely cause?
A. PI incompatibility
B. ocation changes
C. ccount permissions
D. etwork failure
View answer
Correct Answer: A
Question #64
A user reports a poor-quality remote VDI session. Which of the following should the help desk technician do FIRST to troubleshoot the issue?
A. heck the FAQ section of the vendor's documentation
B. sk the user if the client device or access location has changed
C. eboot the user's virtual desktop
D. equest permission to log in to the device remotely
View answer
Correct Answer: B
Question #65
A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed theseCMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying theCMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to conne
A. odify the deployment script to delete and recreate the database whenever the CMS application is deployed
B. odify the ACL to allow the staging environment to access the database in the sandbox environment
C. odify the CMS application deployment to use the previous version and redeploy the application
D. odify the configuration settings of the CMS application to connect to the database in the current environment
View answer
Correct Answer: D
Question #66
An administrator is securing a private cloud environment and wants to ensure only approved systems can connect to switches. Which of the following would beMOST useful to accomplish this task?
A. LAN
B. IPS
C. AF
D. AC
View answer
Correct Answer: D
Question #67
A systems administrator has received an email from the virtualized environment's alarms indicating the memory was reaching full utilization. When logging in, the administrator notices that one out of a five-host cluster has a utilization of 500GB out of 512GB of RAM. The baseline utilization has been 300GB for that host.Which of the following should the administrator check NEXT?
A. torage array
B. unning applications
C. M integrity
D. llocated guest resources
View answer
Correct Answer: B
Question #68
A systems administrator wants to ensure two VMs remain together on the same host. Which of the following must be set up to enable this functionality?
A. ffinity
B. ones
C. egions
D. cluster
View answer
Correct Answer: A
Question #69
A SAN that holds VM files is running out of storage space. Which of the following will BEST increase the amount of effective storage on the SAN?
A. eploy a new instance using a known-good base image
B. onfigure a firewall rule to block the traffic on the affected instance
C. erform a forensic analysis of the affected instance
D. onduct a tabletop exercise involving developers and systems administrators
View answer
Correct Answer: D
Question #70
A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below:The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions. Which of the following solutions would help to company accommodate the new workload in t
A. onfigure auto-scaling within the private cloud
B. et up cloud bursting for the additional resources
C. igrate all workloads to a public cloud provider
D. dd more capacity to the private cloud
View answer
Correct Answer: B
Question #71
A cloud administrator is reviewing the annual contracts for all hosted solutions. Upon review of the contract for the hosted mail solution, the administrator notes the monthly subscription rate has increased every year. The provider has been in place for ten years, and there is a large amount of data being hosted. Which of the following is a barrier to switching providers?
A. ervice-level agreement
B. endor lock-in
C. emorandum of understanding
D. ncrypted data
View answer
Correct Answer: B
Question #72
A systems administrator wants the VMs on the hypervisor to share CPU resources on the same core when feasible. Which of the following will BEST achieve this goal?
A. onfigure CPU passthrough
B. versubscribe CPU resources
C. witch from a Type 1 to a Type 2 hypervisor
D. ncrease instructions per cycle
E. nable simultaneous multithreading
View answer
Correct Answer: E
Question #73
A systems administrator is configuring updates on a system. Which of the following update branches should the administrator choose to ensure the system receives updates that are maintained for at least four years?
A. TS
B. anary
C. eta
D. table
View answer
Correct Answer: A
Question #74
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider's environment that do not belong to the company. Which of the following BEST describes this attack?
A. M escape
B. irectory traversal
C. uffer overflow
D. eap spraying
View answer
Correct Answer: A
Question #75
An organization is implementing a new requirement to facilitate users with faster downloads of corporate application content. At the same time, the organization is also expanding cloud regions. Which of the following would be suitable to optimize the network for this requirement?
A. mplement CDN for overall cloud application
B. mplement auto-scaling of the compute resources
C. mplement SR-IOV on the server instances
D. mplement an application container solution
View answer
Correct Answer: A
Question #76
A cloud architect is reviewing the design for a new cloud-based ERP solution. The solution consists of eight servers with a single network interface. The allocatedIP range is 172.16.0.0/28. One of the requirements of the solution is that it must be able to handle the potential addition of 16 new servers to the environment.Because of the complexity of the firewall and related ACL requirements, these new servers will need to be in the same network range. Which of the following changes would allow for the pote
A. hange the IP address range to use a 10
B. hange the server template to add network interfaces
C. hange the subnet mask to use a 255
D. hange the server scaling configuration to increase the maximum limit
View answer
Correct Answer: C
Question #77
A systems administrator is troubleshooting an application that is configured to auto-scale with a minimum of two nodes and a maximum of four. The application will scale out if the CPU utilization of one of the nodes exceeds 80% for more than five minutes and will scale in if the CPU utilization of one of the nodes drops under20% for more than ten minutes. There is a reverse proxy in front of the application. The systems administrator notices two of the nodes are often running over 80% for a long period of t
A. isable DNS caching in the reverse proxy
B. educe the minimum node count to one
C. isable TLS tickets
D. educe the scale-out rule to 50%
E. ncrease the scale-in rule to 50%
View answer
Correct Answer: D
Question #78
A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would allow for the maximum number of two-core machines with equal memory?
A. 0 VMs, 3GB of memory
B. 0 VMs, 1,5GB of memory
C. 5 VMs, 2 GB of memory
D. 0 VMs, 1 GB of memory
View answer
Correct Answer: B
Question #79
After analyzing a web server's log, a systems administrator sees that users are connecting to the company's application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message. Which of the following should the administrator verify NEXT?
A. The TLS certificate
B. The firewall rules
C. The concurrent connection limit
D. The folder permissions
View answer
Correct Answer: B
Question #80
An SQL injection vulnerability was reported on a web application, and the cloud platform team needs to mitigate the vulnerability while it is corrected by the development team. Which of the following controls will BEST mitigate the risk of exploitation?
A. LP
B. IDS
C. AC
D. AF
View answer
Correct Answer: D
Question #81
A systems administrator has migrated an internal application to a public cloud. The new web server is running under a TLS connection and has the same TLS certificate as the internal application that is deployed. However, the IT department reports that only internal users who are using new versions of the OSs are able to load the application home page. Which of the following is the MOST likely cause of the issue?
A. he local firewall from older OSs is not allowing outbound connections
B. he local firewall from older OSs is not allowing inbound connections
C. he cloud web server is using a self-signed certificate that is not supported by older browsers
D. he cloud web server is using strong ciphers that are not supported by older browsers
View answer
Correct Answer: D
Question #82
A cloud administrator needs to reduce the cost of cloud services by using the company's off-peak period. Which of the following would be the BEST way to achieve this with minimal effort?
A. reate a separate subscription
B. reate tags
C. reate an auto-shutdown group
D. reate an auto-scaling group
View answer
Correct Answer: C
Question #83
A systems administrator is deploying a VM and would like to minimize storage utilization by ensuring the VM uses only the storage if needs. Which of the following will BEST achieve this goal?
A. ompression
B. eduplication
C. AID
D. hin provisioning
View answer
Correct Answer: D
Question #84
A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled. Which of the following techniques would BEST help the administrator assess these business requirements?
A. sability testing
B. egression testing
C. ulnerability testing
D. enetration testing
View answer
Correct Answer: C
Question #85
A cloud security analyst needs to ensure the web servers in the public subnet allow only secure communications and must remediate any possible issue. The stateful configuration for the public web servers is as follows:Which of the following actions should the analyst take to accomplish the objective?
A. emove rules 1, 2, and 5
B. emove rules 1, 3, and 4
C. emove rules 2, 3, and 4
D. emove rules 3, 4, and 5
View answer
Correct Answer: B
Question #86
A VDI administrator has received reports of poor application performance. Which of the following should the administrator troubleshoot FIRST?
A. he network environment
B. ontainer resources
C. lient devices
D. erver resources
View answer
Correct Answer: D
Question #87
A systems administrator notices that a piece of networking equipment is about to reach its end of support. Which of the following actions should the administrator recommend?
A. pdate the firmware
B. igrate the equipment to the cloud
C. pdate the OS
D. eplace the equipment
View answer
Correct Answer: D
Question #88
Which of the following should be considered for capacity planning?
A. equirements, licensing, and trend analysis
B. aws and regulations
C. egions, clusters, and containers
D. ypervisors and scalability
View answer
Correct Answer: A
Question #89
A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement?
A. reate /25 subnets in two regions and run 80 instances on each one
B. reate /26 subnets in two regions and run 40 instances on each one
C. reate /26 subnets in three regions and run 40 instances on each one
D. reate /26 subnets in three regions and run 80 instances on each one
View answer
Correct Answer: C
Question #90
A systems administrator for an e-commerce company will be migrating the company's main website to a cloud provider. The principal requirement is that the website must be highly available. Which of the following will BEST address this requirement?
A. ertical scaling
B. server cluster
C. edundant switches
D. next-generation firewall
View answer
Correct Answer: B
Question #91
A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed. Which of the following will BEST identify the CPU with more computational power?
A. imultaneous multithreading
B. us speed
C. 3 cache
D. nstructions per cycle
View answer
Correct Answer: D
Question #92
A systems administrator is troubleshooting network throughput issues following a deployment. The network is currently being overwhelmed by the amount of traffic between the database and the web servers in the environment. Which of the following should the administrator do to resolve this issue?
A. et up affinity rules to keep web and database servers on the same hypervisor
B. nable jumbo frames on the gateway
C. ove the web and database servers onto the same VXLAN
D. ove the servers onto thick-provisioned storage
View answer
Correct Answer: A
Question #93
A systems administrator in a large enterprise needs to alter the configuration of one of the finance department's database servers. Which of the following should the administrator perform FIRST?
A. apacity planning
B. hange management
C. ackups
D. atching
View answer
Correct Answer: B
Question #94
An organization is developing a new solution for hosting an external website. The systems administrator needs the ability to manage the OS. Which of the following methods would be MOST suitable to achieve this objective?
A. eploy web servers into an IaaS provider
B. mplement a cloud-based VDI solution
C. rovision web servers in a container environment
D. se PaaS components in the cloud to implement the product
View answer
Correct Answer: C
Question #95
A company is preparing a hypervisor environment to implement a database cluster. One of the requirements is to share the disks between the nodes of the cluster to access the same LUN. Which of the following protocols should the company use? (Choose two.)
A. hut down the server
B. pgrade the OS
C. pdate the risk register
D. aise a problem ticket
View answer
Correct Answer: CF
Question #96
A Chief Information Security Officer (CISO) is evaluating the company's security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?
A. n SLA document
B. DR plan
C. OC procedures
D. risk register
View answer
Correct Answer: D
Question #97
A cloud administrator checked out the deployment scripts used to deploy the sandbox environment to a public cloud provider. The administrator modified the script to add an application load balancer in front of the web-based front-end application. The administrator next used the script to recreate a new sandbox environment successfully, and the application was then using the new load balancer.The following week, a new update was required to add more front-end servers to the sandbox environment. A second admi
A. he license limit on the number of server deployments allowed per month was exceeded
B. he deployment script changes made by the first administrator were not checked in and committed
C. he new server images were incompatible with the application load-balancer configuration
D. he application load balancer exceeded the maximum number of servers it could use
View answer
Correct Answer: B
Question #98
Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization?
A. uto-scaling of compute
B. versubscription
C. ynamic memory allocations on guests
D. ffinity rules in the hypervisor
View answer
Correct Answer: C
Question #99
A system administrator has provisioned a new web server. Which of the following, in combination, form the best practice to secure the server's OS? (Choose three.)
A. aaS
B. aaS
C. aaS
D. aaS
View answer
Correct Answer: AFG
Question #100
A technician just received the lessons learned from some recent data that was lost due to an on-premises file-server crash. The action point is to change the backup strategy to minimize manual intervention. Which of the following is the BEST approach for the technician to implement?
A. ackup as a service
B. AID 1
C. ong-term storage
D. ew backup devices
View answer
Correct Answer: A
Question #101
A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task. Which of the following ports should the administrator open on the monitoring server's firewall?
A. 53
B. 123
C. 139
D. 161
View answer
Correct Answer: D
Question #102
A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections. Which of the following MOST likely needs to be analyzed before rehosting the ERP?
A. oftware
B. icensing
C. ight-sizing
D. he network
View answer
Correct Answer: D
Question #103
A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM?
A. icensing
B. hypervisor
C. lustering
D. calability
View answer
Correct Answer: D
Question #104
A systems administrator is using VMs to deploy a new solution that contains a number of application VMs. Which of the following would provide high availability to the application environment in case of hypervisor failure?
A. nti-affinity rules
B. old migration
C. ive migration
D. ffinity rules
View answer
Correct Answer: A
Question #105
A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST?
A. erver power
B. ack power
C. witch power
D. AN power
View answer
Correct Answer: C
Question #106
A cloud administrator is building a new VM for a network security appliance. The security appliance installer says the CPU clock speed does not meet the requirements. Which of the following will MOST likely solve the issue?
A. ove the VM to a host with a faster CPU
B. dd more vCPUs to the VM
C. nable CPU masking on the VM
D. nable hyperthreading on the virtual host
View answer
Correct Answer: A
Question #107
To save on licensing costs, the on-premises, IaaS-hosted databases need to be migrated to a public DBaaS solution. Which of the following would be the BEST technique?
A. ive migration
B. hysical-to-virtual
C. torage-level mirroring
D. atabase replication
View answer
Correct Answer: D
Question #108
An administrator receives a ticket indicating the accounting application is not working. Which of the following should the administrator check FIRST?
A. HCP
B. ervice-level agreement
C. NS
D. ystem logs
View answer
Correct Answer: D
Question #109
A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.)
A. nable encryption
B. ncrease IOPS
C. onvert the SAN from RAID 50 to RAID 60
D. onfigure deduplication
View answer
Correct Answer: CF

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: