Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA CV0-004 CompTIA Cloud+ (V4) Exam Practice Test

Demo: 76 questions
Total 254 questions

CompTIA Cloud+ (V4) Questions and Answers

Question 1

Between 11:00 a.m. and 1:00 p.m. on workdays, users report that the sales database is either not accessible, sluggish, or difficult to connect to. A cloud administrator discovers that during the impacted time, all hypervisors are at capacity. However, when 70% of the users are using the same database, those issues are not reported. Which of the following is the most likely cause?

Options:

A.

Oversubscription

B.

Resource allocation

C.

Sizing issues

D.

Service quotas

Question 2

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these

requirements?

Options:

A.

Cloning

B.

Clustering

C.

Hardware passthrough

D.

Stand-alone container

Question 3

A company's engineering department is conducting a month-long test on the scalability of an in-house-developed software that requires a cluster of 100 or more servers. Which of

the following models is the best to use?

Options:

A.

PaaS

B.

SaaS

C.

DBaaS

D.

laaS

Question 4

A cloud engineer wants resource-level visibility for billing reports. Which of the following should the cloud engineer configure?

Options:

A.

Rightsizing

B.

Invoicing

C.

Reserve instances

D.

Tagging

Question 5

Which of the following types of storage is read-only and is accessed only when needed?

Options:

A.

Cold

B.

Hot

C.

Warm

D.

Archive

Question 6

Which of the following should be used on containers to process data and keep the output in files for later review?

Options:

A.

Standard output

B.

Optical disk mount

C.

Ephemeral storage

D.

Persistent volumes

Question 7

A cloud administrator recently created three servers in the cloud. The goal was to create ACLs so the servers could not communicate with each other. The servers were configured

with the following IP addresses:

After implementing the ACLs, the administrator confirmed that some servers are still able to reach the other servers. Which of the following should the administrator change to

prevent the servers from being on the same network?

Options:

A.

The IP address of Server 1 to 172.16.12.36

B.

The IP address of Server 1 to 172.16.12.2

C.

The IP address of Server 2 to 172.16.12.18

D.

The IP address of Server 2 to 172.16.14.14

Question 8

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

Options:

A.

VPC

B.

Application load balancer

C.

CDN

D.

API gateway

Question 9

Which of the following is a protocol frequently used with IoT devices to communicate with a gateway?

Options:

A.

ICMP

B.

MQTT

C.

RPC

D.

SSH

Question 10

A cloud engineer has provisioned a VM for a high-frequency trading application. After the VM is put into production, users report high latency in trades. The engineer checks the last six hours of VM metrics and sees the following:

• CPU utilization is between 30% to 60%.

• Networkln is between 50Kbps and 70Kbps.

• NetworkOut is between 3.000Kpbs and 5.000Kbps.

• DiskReadOps is at 30.

• DiskWriteOps is at 70

• Memory utilization is between 50% and 70%.

Which of the following steps should the engineer take next to solve the latency issue?

Options:

A.

Move to a network-optimized instance type as the network throughput is not enough.

B.

Modify the disk IOPS to a higher value as the disk IO is being bottlenecked at 100 IOPS.

C.

Increase the memory of the instance as the high-frequency trading application requires more RAM.

D.

Increase the instance size to allocate more vCPUs as the CPU utilization is very high.

Question 11

Which of the following is the most cost-effective way to store data that is infrequently accessed?

Options:

A.

Cold site

B.

Hot site

C.

Off-site

D.

Warm site

Question 12

A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour. Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

Options:

A.

Use laC to deploy the laaS infrastructure.

B.

Convert the containers to VMs.

C.

Deploy the containers over SSH.

D.

Use private repositories for the containers.

Question 13

Users report being unable to access an application that uses TLS 1.1. The users are able to access other applications on the internet. Which of the following is the most likely

reason for this issue?

Options:

A.

The security team modified user permissions.

B.

Changes were made on the web server to address vulnerabilities.

C.

Privileged access was implemented.

D.

The firewall was modified.

Question 14

A cloud consultant needs to modernize a legacy application that can no longer address user demand and is expensive to maintain. Which of the following is the best migration

strategy?

Options:

A.

Retain

B.

Rehost

C.

Refactor

D.

Replatform

Question 15

A cloud engineer wants to run a script that increases the volume storage size if it is below 100GB. Which of the following should the engineer run?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 16

An engineer wants lo scale several cloud workloads on demand. Which of the following approaches is the most suitable?

Options:

A.

Load

B.

Scheduled

C.

Manual

D.

Trending

Question 17

An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to

calculate the severity of the risk from using this component?

Options:

A.

CWE

B.

CVSS

C.

CWSS

D.

CVE

Question 18

Which of the following is used to deliver code quickly and efficiently across the development, test, and production environments?

Options:

A.

Snapshot

B.

Container image

C.

Serverless function

D.

VM template

Question 19

A developer is building a new application version using a CI/CD pipeline. The developer receives the following error message log when the build fails:

Which of the following is the most likely cause of this failure?

Options:

A.

Incorrect version

B.

Test case failure

C.

Broken build pipeline

D.

Dependency issue

Question 20

Which of the following will best reduce the cost of running workloads while maintaining the same performance? (Select two).

Options:

A.

Instance size

B.

Tagging

C.

Reserved resources model

D.

Spot instance model

E.

Pay-as-you-go model

F.

Dedicated host model

Question 21

Which of the following interfaces is most commonly used for SSDs but not for HDDs?

Options:

A.

NVMe

B.

Serial Attached SCSI (SAS)

C.

SATA

D.

iSCSI

Question 22

A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the

following migration strategies is best approach for this use case?

Options:

A.

Retire

B.

Rearchitect

C.

Refactor

D.

Rehost

Question 23

A video surveillance system records road incidents and stores the videos locally before uploading them to the cloud and deleting them from local storage. Which of the following

best describes the nature of the local storage?

Options:

A.

Persistent

B.

Ephemeral

C.

Differential

D.

Incremental

Question 24

An organization wants to ensure its data is protected in the event of a natural disaster. To support this effort, the company has rented a colocation space in another part of the

country. Which of the following disaster recovery practices can be used to best protect the data?

Options:

A.

On-site

B.

Replication

C.

Retention

D.

Off-site

Question 25

An administrator needs to adhere to the following requirements when moving a customer's data to the cloud:

• The new service must be geographically dispersed.

• The customer should have local access to data

• Legacy applications should be accessible.

Which of the following cloud deployment models is most suitable?

Options:

A.

On-premises

B.

Private

C.

Hybrid

D.

Public

Question 26

Which of the following can reduce the risk of CI/CD pipelines leaking secrets?

Options:

A.

Protected Git branches

B.

Use of a VM instead of containers

C.

Private image repositories

D.

Canary tests

Question 27

Which of the following describes the main difference between public and private container repositories?

Options:

A.

Private container repository access requires authorization, while public repository access does not require authorization.

B.

Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.

C.

Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.

D.

Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.

Question 28

A cloud engineer is reviewing a disaster recovery plan that includes the following requirements:

• System state, files, and configurations must be backed up on a weekly basis.

• The system state, file, and configuration backups must be tested annually.

Which of the following backup methods should the engineer implement for the first week the plan is executed?

Options:

A.

Differential

B.

Incremental

C.

Snapshot

D.

Full

Question 29

Which of the following cloud deployment strategies is best for an organization that wants to run open-source workloads with other organizations that are sharing the cost?

Options:

A.

Community

B.

Public

C.

Hybrid

D.

Private

Question 30

A cloud engineer wants to deploy a new application to the cloud and is writing the following script:

Which of the following actions will this script perform?

Options:

A.

Upload a new VM image.

B.

Create a new cloud resource.

C.

Build a local server.

D.

Import a cloud module.

Question 31

A cloud administrator learns that a major version update. 4.6.0. is available for a business-critical application. The application is currently on version 4.5.2. with additional minor versions 3, 4, and 5 available. The administrator needs to perform the update while minimizing downtime. Which of the following should the administrator do first?

Options:

A.

Apply the minor updates and then restart the machine before applying the major update.

B.

During off hours, decommission the machine and create a new one directly on major update 4.6.0.

C.

Stop the service and apply the major updates directly.

D.

Create a test environment and apply the major update

Question 32

Which of the following is a difference between a SAN and a NAS?

Options:

A.

A SAN works only with fiber-based networks.

B.

A SAN works with any Ethernet-based network.

C.

A NAS uses a faster protocol than a SAN

D.

A NAS uses a slower protocol than a SAN.

Question 33

A cloud administrator is working on the deployment of an e-commerce website. The administrator evaluates the scaling methods to be implemented when seasonal or flash sales are launched. Which of the following scaling approaches should the administrator use to best manage this scenario?

Options:

A.

Scheduled

B.

Load

C.

Event

D.

Trending

Question 34

Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?

Options:

A.

Scanning

B.

Assessment

C.

Remediation

D.

Identification

Question 35

Which of the following migration types is best to use when migrating a highly available application, which is normally hosted on a local VM cluster, for usage with an external user population?

Options:

A.

Cloud to on-premises

B.

Cloud to cloud

C.

On-premises to cloud

D.

On-premises to on-premises

Question 36

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

Options:

A.

Resource tagging

B.

Discretionary access control

C.

Multifactor authentication

D.

Role-based access control

E.

Token-based authentication

F.

Bastion host

Question 37

An on-call cloud engineer receives a critical alert about an e-commerce web server being unresponsive. Which of the following steps should the engineer take first?

Options:

A.

Triage

B.

Remediation

C.

Escalation

D.

Monitoring

Question 38

A cloud engineer hardened the WAF for a company that operates exclusively in North America. The engineer did not make changes to any ports, and all protected applications have

continued to function as expected. Which of the following configuration changes did the engineer most likely apply?

Options:

A.

The engineer implemented MFA to access the WAF configurations.

B.

The engineer blocked all traffic originating outside the region.

C.

The engineer installed the latest security patches on the WAF.

D.

The engineer completed an upgrade from TLS version 1.1 to version 1.3.

Question 39

An on-premises data center is located in an earthquake-prone location. The workload consists of real-time, online transaction processing. Which ot the following data protection strategies should be used to back up on-premises data to the cloud while also being cost effective?

Options:

A.

Remote replication for failover

B.

A copy that is RAID 1 protected on spinning drives in an on-premises private cloud

C.

A full backup to on-site tape libraries in a private cloud

D.

Air-gapped protection to provide cyber resiliency

Question 40

A cloud solutions architect wants to deploy a three-tier web application that requires the minimum amount of operational overhead. Which of the following is the best template given these requirements?

Options:

A.

virtual_machine:

name: front-end vm

size: small

bootstrapping: git

repository: front-end-repo

autoScaling: enabled

object_storage:

name: query-handler

staticWebContent: disabled

versioning: enabled

virtual_machine:

name: db-vm

size: medium

bootstrapping: /bin/bash yum install -y psql

B.

object_storage:

name: front-end

staticWebContent: enabled

versioning: enabled

serverless_function:

name: app

runtime: nodejs

memorySize: 2G

code: git

repository: backend-repo

relational_database:

engine: postgreSQL

clusterNode: enabled

C.

virtual_machine:

name: three tiered app

size: xlarge

bootstrapping: /bin/bash yum install -y nodejs httpd psql && \

git clone three-tiered-app && \

./app.sh --listen 8443

autoScaling: enabled

load_balancer:

name: front-end-lb

target: three-tiered-app

targetPort: 8443

listener: 443

D.

object_storage:

name: front-end

staticWebContent: enabled

versioning: enabled

virtual_machine:

name: app-vm

size: small

bootstrapping: git

repository: backend-repo

autoScaling: enabled

relational_database:

engine: postgreSQL

clusterNode: enabled

Question 41

An administrator used a script that worked in the past to create and tag five virtual machines. All of the virtual machines have been created: however, the administrator sees the following results:

{ tags: [ ] }

Which of the following is the most likely reason for this result?

Options:

A.

API throttling

B.

Service quotas

C.

Command deprecation

D.

Compatibility issues

Question 42

A cloud security analyst is investigating the impact of a recent cyberattack. The analyst is reviewing the following information:

Web server access log:

104.210.233.225 - - [21/10/2022:11:17: 40] "POST /uploadfile.html?f=myfile.php" 200 1638674

45.32.10.66 - - [21/10/2022:11:19:12] "GET /welcome.html" 200 5812

104.210.233.225 - - [21/10/2022:11:21:19] "GET / .. / .. / .. / .. /conf/server.xml HTTP/1.1" 200 74458

45.32.10.66 - - [21/10/22:11:22:32] "GET /admin.html HTTP/1.1" 200 9518

Web application firewall log:

"2022/10/21 11:17:33" "10.25.2.35" "104. 210.233.225" "userl" "File transfer completed successfully."

"2022/10/21 11:21:05" "10. 25.2. 35" "104. 210.233.225" "userl" "Accessed application page."

"2022/10/21 11:22:13" "10.25.2.35" "45. 32. 10. 66" "user2" "Accessing admin page. "

Which of the following has occurred?

Options:

A.

The corporate administration page was defaced by the attacker.

B.

A denial-of-service attack was successfully performed on the web server.

C.

A new user was created on the web server by the attacker.

D.

Sensitive information from the corporate web server was leaked.

Question 43

A company wants to combine solutions in a central and scalable environment to achieve the following goals:

• Control

• Visibility

• Automation

• Cost efficiency

Which of the following best describes what the company should implement?

Options:

A.

Batch processing

B.

Workload orchestration

C.

Containerization

D.

Application modernization

Question 44

A bank informs an administrator that changes must be made to backups for long-term reporting purposes. Which of the following is the most important change the administrator

should make to satisfy these requirements?

Options:

A.

Location of the backups

B.

Type of the backups

C.

Retention of the backups

D.

Schedule of the backups

Question 45

Which of the following models will best reduce the cost of running short-term, non-critical workloads?

Options:

A.

Reserved

B.

Spot Instance

C.

Pay-as-you-go

D.

Dedicated host

Question 46

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A – The end user accesses the application through a web browser to enter and view clinical data.

2A – The CTM application server reads/writes data to/from the database server.

1B – The end user accesses the application through a web browser to run reports on clinical data.

2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B – The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 47

A company has solid, validated border protection including a next-generation firewall and IPS. However, compromises and breaches continue. Which of the following is the best way to improve the company's security controls and reduce the number of incidents?

Options:

A.

Assess the border protection assets against a CIS benchmark and apply recommendations.

B.

Execute a network scan on the border protection and close ports that can be used by attackers.

C.

Shift the focus from border protection to a Zero Trust architecture focused on identities.

D.

Include a WAF on the network border, increasing protection and adopting security in layers.

Question 48

A cross-site request forgery vulnerability exploited a web application that was hosted in a public laaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?

Options:

A.

Configure the DDoS protection on the CDN.

B.

Install endpoint protection software on the VMs

C.

Add an ACL to the VM subnet.

D.

Deploy an IDS on the laaS network.

Question 49

An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?

Options:

A.

Warm

B.

Hot

C.

Archive

D.

Cold

Question 50

Which of the following is true of SSDs?

Options:

A.

SSDs do not have self-encrypting capabilities.

B.

SSDs have small storage capacities.

C.

SSDs can be used for high-IOP applications.

D.

SSDs are used mostly in cold storage.

Question 51

An organization uses a cloud provider’s specific features to host applications. The organization planned to move to another cloud provider due to rising costs, but moving was not technically feasible. Which of the following best describes this situation?

Options:

A.

Platform as a service

B.

Oversubscription

C.

Vendor lock-in

D.

Regulatory compliance

Question 52

Which of the following service options would provide the best availability for critical applications in the event of a disaster?

Options:

A.

Edge computing

B.

Cloud bursting

C.

Availability zones

D.

Multicloud tenancy

Question 53

A developer is building an application that has multiple microservices that need to communicate with each other. The developer currently manually updates the IP address of each service. Which of the following best resolves the communication issue and automates the process?

Options:

A.

Service discovery

B.

Fan-out

C.

Managed container services

D.

DNS

Question 54

Which of the following best describes a system that keeps all different versions of a software separate from each other while giving access to all of the versions?

Options:

A.

Code documentation

B.

Code control

C.

Code repository

D.

Code versioning

Question 55

A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following

delivery mechanisms would best support this integration?

Options:

A.

Enterprise service bus

B.

Socket

C.

RPC

D.

Queue

Question 56

A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?

Options:

A.

Analyze

B.

Report

C.

Remediation

D.

identification

Question 57

An DevOps engineer is receiving reports that users can no longer access the company's web application after hardening of a web server. The users are receiving the following error:

ERR_SSLJ/ERSION_OR_CIPHER_MISMATCH.

Which of the following actions should the engineer take to resolve the issue?

Options:

A.

Restart the web server.

B.

Configure TLS 1.2 or newer.

C.

Update the web server.

D.

Review logs on the WAF

Question 58

A company’s cybersecurity team receives the following alert that a production VM was deleted from the virtual network:

21 September 09:19:08 (GMT-5)

Resource with ID: PROD-WEB001 was deleted by User: Logging Service

The console to manage virtual network resources uses directory authentication. Only users in a particular directory group can interactively access the virtual network management console. The logging service account is not part of this group and requires some local administration privileges to aggregate logs from various resources. The cybersecurity team discovers the logging service account was previously given full directory administrator privileges and sees the following entry:

21 September 09:10:55 (GMT-5)

User with ID: Logging Service was added to the Group: VNet Console Administrators by actor: Logging Service.

The cybersecurity team removes the compromised service account from the directory group. Which of the following should the cybersecurity team do next to prevent repeat instances of this issue?

Options:

A.

Enable two-factor authentication on the virtual network console.

B.

Reset the logging service account to use a long and complex password.

C.

Disable RDP on the production virtual machines.

D.

Create a scoped administrative role for the logging service account.

Question 59

A cloud administrator is building a company-standard VM image, which will be based on a public image. Which of the following should the administrator implement to secure the image?

Options:

A.

ACLs

B.

Least privilege

C.

Hardening

D.

Vulnerability scanning

Question 60

A security engineer Identifies a vulnerability m a containerized application. The vulnerability can be exploited by a privileged process to read tie content of the host's memory. The security engineer reviews the following Dockerfile to determine a solution to mitigate similar exploits:

Which of the following is the best solution to prevent similar exploits by privileged processes?

Options:

A.

Adding the USER myappuserinstruction

B.

Patching the host running the Docker daemon

C.

Changing FROM alpiner3.17 to FROM alpine:latest

D.

Running the container with the ready-only filesystem configuration

Question 61

A web server hosted in a PaaS public cloud platform has been the target of DDoS attacks. A cloud engineer needs to protect the server from future volumetric DDoS attacks. Which of the following are the best actions for the engineer to take? (Select two.)

Options:

A.

Add a CDN in front of the web server.

B.

Add a DLP on the PaaS platform.

C.

Add a hardened web server instance.

D.

Add an ACL to the web server network.

E.

Add an IDS in-line on the web server network.

F.

Add a WAF in front of the web server.

Question 62

A company requests that its cloud administrator provision virtual desktops for every user. Given the following information:

• One hundred users are at the company.

• A maximum of 30 users work at the same time.

• Users cannot be interrupted while working on the desktop.

Which of the following strategies will reduce costs the most?

Options:

A.

Provisioning VMs of varying sizes to match user needs

B.

Configuring a group of VMs to share with multiple users

C.

Using VMs that have spot availability

D.

Setting up the VMs to turn off outside of business hours at night

Question 63

A cloud administrator wants to provision a host with two VMs. The VMs require the following:

After configuring the servers, the administrator notices that during certain hours of the day, the performance heavily degrades. Which of the following is the best explanation?

Options:

A.

The host requires additional physical CPUs.

B.

A higher number of processes occur at those times.

C.

The RAM on each VM is insufficient.

D.

The storage is overutilized.

Question 64

A company wants to use a solution that will allow for quick recovery from ransomware attacks, as well as intentional and unintentional attacks on data integrity and availability. Which of the following should the company implement that will minimize administrative overhead?

Options:

A.

Object versioning

B.

Data replication

C.

Off-site backups

D.

Volume snapshots

Question 65

A cloud engineer is developing an operating expense report that will be used to purchase various cloud billing models for virtual machine instances. The cloud billing model must meet the following requirements:

• The instance cannot be ephemeral.

• The minimum life cycle of the instance is expected to be five years.

• The software license is charged per physical CPU count.

Which of the following models would best meet these requirements?

Options:

A.

Dedicated host

B.

Spot instance

C.

Pay-as-you-go

D.

Reserved resources

Question 66

A cloud architect attempts to modify a protected branch but is unable to do so. The architect receives an error indicating the action cannot be completed. Which of the following should the architect try instead''

Options:

A.

Adding a new remote

B.

Creating a pull request

C.

Merging the branch

D.

Rebasing the branch

Question 67

A company has ten cloud engineers working on different manual cloud deployments. In the past, engineers have had difficulty keeping deployments consistent. Which of the following is the best method to address this issue?

Options:

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Question 68

A cloud engineer wants to replace the current on-premises. unstructured data storage with a solution in the cloud. The new solution needs to be cost-effective and highly scalable. Which of the following types of storage would be best to use?

Options:

A.

File

B.

Block

C.

Object

D.

SAN

Question 69

Which of the following container storage types loses data after a restart?

Options:

A.

Object

B.

Persistent volume

C.

Ephemeral

D.

Block

Question 70

A DevOps engineer is performing maintenance on the mail servers for a company's web application. Part of this maintenance includes checking core operating system updates. The servers are currently running version 3.2 of the operating system. The engineer has two update options—one to version 4.1 and the other to version 3.7. Both versions are fully supported by the operating system manufacturer. Which of the following best describes the action the engineer should take?

Options:

A.

Upgrade to 3.7 in the development environment.

B.

Upgrade to 4.1 on one production server at a time.

C.

Read the release notes on version 4.1.

D.

Schedule a maintenance window and upgrade to 3.7 in the production environment.

Question 71

Which of the following is a field of computer science that enables computers to identify and understand objects and people in images and videos?

Options:

A.

Image reconstruction

B.

Facial recognition

C.

Natural language processing

D.

Computer vision

Question 72

A company operates a website that allows customers to upload, share, and retain full ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

Options:

A.

Sovereignty

B.

Data classification

C.

Litigation holds

D.

Retention

Question 73

A customer relationship management application, which is hosted in a public cloud laaS network, is vulnerable to a remote command execution vulnerability. Which of the following is

the best solution for the security engineer to implement to prevent the application from being exploited by basic attacks?

Options:

A.

IPS

B.

ACL

C.

DLP

D.

WAF

Question 74

A cloud administrator shortens the amount of time a backup runs. An executive in the company requires a guarantee that the backups can be restored with no data loss. Which of th€ following backup features should the administrator lest for?

Options:

A.

Encryption

B.

Retention

C.

Schedule

D.

Integrity

Question 75

A cloud engineer is deploying a cloud solution that will be used on premises with need-to-know access. Which of the following cloud deployment models best meets this

requirement?

Options:

A.

Community

B.

Public

C.

Private

D.

Hybrid

Question 76

A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly experiencing high latency. Which of the following would best help determine the source of the latency?

Options:

A.

Configuring centralized logging to analyze HTTP requests

B.

Running a flow log on the network to analyze the packets

C.

Configuring an API gateway to track all incoming requests

D.

Enabling tracing to detect HTTP response times and codes

Demo: 76 questions
Total 254 questions