Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CompTIA CV0-001 CompTIA Cloud+ Certification Exam Exam Practice Test

Note! Following CV0-001 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is CV0-003
Page: 1 / 57
Total 565 questions

CompTIA Cloud+ Certification Exam Questions and Answers

Question 1

A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?

Options:

A.

Latency

B.

Replication

C.

Redundancy

D.

Failback

Question 2

Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?

Options:

A.

Blob data

B.

Object ID

C.

Replicas

D.

Metadata

Question 3

A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses. Which of the following should be implemented?

Options:

A.

Soft limit quotas

B.

Reservations

C.

Resource pooling

D.

Entitlement allocations

Question 4

A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company’s servers. Which of the following should the administrator perform to accomplish this goal?

Options:

A.

P2V

B.

P2P

C.

V2P

D.

V2V

Question 5

A user is notified that they will be terminated at the end of the day. As they start cleaning up their workstation, they try to FTP information from their workstation to a cloud-based, personal backup solution. Which of the following hardening techniques would be used to restrict their ability to transfer this information via FTP?

Options:

A.

Antivirus

B.

NIPS

C.

NIDS

D.

Host-based firewall

Question 6

Which of the following is an example of two-factor authentication when accessing a virtual server?

Options:

A.

Multiple usernames/passwords for all websites

B.

Username/password, fingerprint scanner, and key fob

C.

Username/password and PIN

D.

Username/password and fingerprints

Question 7

Which of the following should an administrator implement when connecting the company’s existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?

Options:

A.

A proxy server

B.

A load balancing solution

C.

An IPSec tunnel

D.

A server clustering solution

Question 8

A company is required to provide their customers with zero downtime for its web application. Which of the following would satisfy this requirement?

Options:

A.

Cold site

B.

High availability

C.

Multipathing

D.

Load balancing

Question 9

Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?

Options:

A.

Extra processing is needed to store encryption keys used for secure transmission between the server and the network.

B.

Additional processing is used to run ports and services not turned off through the process of server hardening.

C.

Some processing is required for operational overhead on the processor and between the physical and virtualized processors.

D.

Significant processing is used to create and maintain the cache on multi-core processors.

Question 10

Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 10

Question 11

An external USB hard drive physically attached to a server is a:

Options:

A.

SAN.

B.

DAS.

C.

VLAN.

D.

NAS.

Question 12

To avoid the same LUN showing up multiple times in client hosts, an administrator should implement:

Options:

A.

Multipathing software

B.

Multiple HBAs

C.

Multiple zones

D.

Multiple initiators

Question 13

Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?

Options:

A.

NAS

B.

DAS

C.

LUN

D.

HBA

Question 14

Which of the following is true about a Type II hypervisor?

Options:

A.

It requires a primary hypervisor to function properly.

B.

It implements stronger security controls than a Type I supervisor at the same patch level.

C.

It provides slower performance than a Type I hypervisor installed on the same hardware.

D.

It provides direct hardware access through the use of specialized drivers.

Question 15

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?

Options:

A.

Antivirus

B.

Firewall

C.

Audit logs

D.

IDS

Question 16

Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?

Options:

A.

CHAP

B.

AES

C.

PKI

D.

VPN

Question 17

A technician wants to isolate storage from other network traffic. Which of the following MUST the technician implement to ensure storage traffic is securely segregated?

Options:

A.

VLAN

B.

VMFS

C.

PAT

D.

NTFS

Question 18

Which of the following could be assigned to a virtual CPU?

Options:

A.

Cores

B.

HBAs

C.

LUNs

D.

Stepping

Question 19

Which of the following reduces the risk of known attacks from being successful?

Options:

A.

DLP techniques

B.

Patching frequency

C.

Mandatory access controls

D.

Encryption methods

Question 20

An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration?

Options:

A.

Harden the operating system

B.

Migrate the server in a development environment

C.

Contact the vendor for compatibility requirements

D.

Establish a performance baseline

Question 21

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement?

Options:

A.

Type I

B.

Type II

C.

Bare Metal

D.

Native

Question 22

Several clients hosted on a cluster, is BEST referred to as:

Options:

A.

IaaS.

B.

PaaS.

C.

multi-tenancy.

D.

on-premise hosting.

Question 23

An administrator is troubleshooting the cause of multiple VMs which are suddenly going offline. Which of the following is the FIRST step in troubleshooting the issue?

Options:

A.

Review LUN configurations for errors

B.

Review Fibre Channel zoning configuration

C.

Review system logs on the host

D.

Review VM OS multipathing software configuration

Question 24

Which of the following disk drive types would be the BEST for a mission critical application with low latency requirements?

Options:

A.

FC

B.

SATA

C.

SSD

D.

SAS

Question 25

Which of the following is the BEST means of ensuring resource utilization remains even across the hosts?

Options:

A.

Resource pooling

B.

VM affinity

C.

Dynamic VM placement

D.

VM high availability

Question 26

Which of the following ports is generally associated with a UDP based service?

Options:

A.

22

B.

25

C.

53

D.

80

Question 27

When conducting penetration testing on production systems during business hours, such testing will MOST likely cause disruption to operations when doing which of the following?

Options:

A.

When testing account lockout policies

B.

When checking file system ACLs

C.

When footprinting the network

D.

When discovering service versions

Question 28

A start-up company has recently gone public and is experiencing unexpected growth. Which of the following cloud service models would allow the company to provide internal email quickly to new employees?

Options:

A.

PaaS

B.

CaaS

C.

SaaS

D.

IaaS

Question 29

Which of the following virtualization implementations yields the HIGHEST performance of the same hardware configuration?

Options:

A.

CPU emulation

B.

Type I

C.

Memory ballooning

D.

Type II

Question 30

An administrator creates a new VM, but after powering on the VM, the administrator receives the message “no boot device detected”. Which of the following needs to be done to resolve this problem?

Options:

A.

Mount a NIC that is connected to the virtual switch

B.

Migrate the VM to a new host

C.

Connect the host to working VM storage

D.

Mount an ISO containing an operating system

Question 31

A company needs to have a system that allows for high availability access to data for users. Which of the following terms BEST describes how a storage engineer would design the system to allow for that level of redundancy?

Options:

A.

Dual homing

B.

Traffic shaping

C.

Network binding

D.

Multipathing

Question 32

After deploying VM guests from a VM template on an NFS datastore, the administrator has discovered misaligned VM guest partition offsets in multiple VM guests. Which of the following represents a complete solution for improving I/O performance?

Options:

A.

Correct the VM guest partition offset in the deployed VMs

B.

Correct the VM guest partition offset in the deployed VMs and use the correct LUN alignment offset for the VM guest OS

C.

Correct the VM guest partition offset in the VM template

D.

Correct the VM guest partition offset in the VM template and the deployed VMs

Question 33

Which of the following can an administrator implement to achieve boot on SAN?

Options:

A.

Thin provisioning

B.

vNIC

C.

NPIV

D.

NAT

Question 34

Which of the following is an example of vertical scaling?

Options:

A.

Adding memory to a host

B.

Adding CPU to a VM guest

C.

Adding memory to the VM guest

D.

Migrating all VM guests from one host to another in a cluster

Question 35

Which of the following would assist in preventing malware from spreading in a cloud environment?

Options:

A.

Software-based firewall

B.

Deploy DMZ

C.

Implement a honeypot

D.

Antivirus software

Question 36

Which of the following locations would a system engineer MOST likely place a NAS storage device for VM image files?

Options:

A.

In the same subnet as the associated hypervisors

B.

Outside of the external router

C.

In a remote datacenter for geographic diversity

D.

Behind a LUN mask to maximize obfuscation

Question 37

An administrator is investigating performance issues related to database application response time that is not within the baseline. Which of the following is the symptom of the performance issue?

Options:

A.

Aggregation

B.

Latency

C.

Throttling

D.

Bottleneck

Question 38

The Chief Information Officer (CIO) tells the IT department that all non business critical production applications can be down for no more than 48 hours. Which of the following has the CIO defined?

Options:

A.

Failback

B.

RPO

C.

RTO

D.

Failover

Question 39

An administrator has noticed that a 500MB file is taking over three hours to move over a 10Gbps link. Which of the following is MOST likely responsible for this performance?

Options:

A.

Bandwidth

B.

Compression

C.

Caching

D.

Latency

Question 40

A company has two datacenters in different cities. When one of the datacenters loses power, there is near instant failover to the other datacenter. This is an example of which of the following?

Options:

A.

Warm site

B.

Hot site

C.

Offsite storage

D.

Backup

Question 41

In order for a company to transition to a cloud solution, which of the following should the company check FIRST before transitioning? (Select TWO).

Options:

A.

Service level agreements

B.

IT operations policy

C.

Business needs

D.

Company stock performance

E.

Virtual desktop environment

Question 42

Which of the following protocols allows fibre channel to be transmitted over the network?

Options:

A.

HBA

B.

FCoE

C.

NFS

D.

iSCSI

Question 43

An administrator is planning to implement multipathing for IP-based storage. Which of the following protocols can be used in this configuration?

Options:

A.

NFS

B.

iSCSI

C.

FC

D.

FCoE

Question 44

An administrator is designing a VM cluster to support a new testing department in the company. This department will require high availability and the ability to migrate VMs with little impact to other network functions within the department. The infrastructure available for the department supports a 1GB internal backbone upon which virtual switches are being configured. Which of the following network designs would meet the criteria for the department?

Options:

A.

Assign the migration VLAN, management VLAN and storage VLAN on one virtual switch port and a client VLAN on a separate virtual switch port

B.

Assign the migration VLAN, management VLAN and client VLAN on one virtual switch port and assign the storage VLAN on a separate virtual switch port

C.

Assign the migration VLAN and client VLAN on one virtual switch port, and the management VLAN and storage VLAN on one virtual switch port

D.

Assign the migration VLAN, management VLAN, client VLAN and storage VLAN all on separate virtual switch ports

Question 45

Which of the following security methods would be used to harden a switch?

Options:

A.

IDS

B.

ACL

C.

VPN

D.

VLAN

Question 46

A network administrator was tasked with creating several new subnets which will support 30 virtual hosts per subnet. Which of the following VLANs below would be used to support those hosts?

VLAN 100 192.168.1.0/30

VLAN 200 192.168.1.0/29

VLAN 300 192.168.1.0/26

VLAN 400 192.168.1.30/32

Options:

A.

100

B.

200

C.

300

D.

400

Question 47

A security administrator is being hired to perform a penetration test of a third-party cloud provider as part of an annual security audit. Which of the following is the FIRST step that must be performed?

Options:

A.

Attempt known exploits

B.

Scan for vulnerabilities

C.

Research publicized incidents

D.

Get written permission

Question 48

Which of the following cloud services would MOST likely be used to deliver web applications?

Options:

A.

IaaS

B.

DaaS

C.

SaaS

D.

PaaS

Question 49

A company that provides IaaS to small business organizations needs to allow customers to control the power state of their virtual machines. Which of the following should be implemented to accomplish this task?

Options:

A.

Grant limited access to the hypervisor management interface

B.

Grant limited access to the host power managing infrastructure

C.

Allow Wake-on-LAN packets on the firewall

D.

Configure customer’s VMs to be in an always-on state

Question 50

A software development team is looking for a sandbox environment to test new releases before deploying to production and has requested several virtual machines for this purpose. Which of the following virtual components could be utilized to help isolate these virtual machines from the production infrastructure?

Options:

A.

Shared storage

B.

One virtual CPU per virtual machine

C.

Shared memory

D.

Virtual NICs on a different network

Question 51

A network engineer is investigating slow response times for queries to a cloud-hosted database. The switch configurations show that there are several traffic bottlenecks. Which of the following should the engineer implement to BEST solve the problem and prevent future issues?

Options:

A.

Add a router to the network to increase traffic paths

B.

Migrate the cloud-hosted database to a type II hypervisor

C.

Configure QoS on the network switches to alleviate bottlenecks

D.

Configure QoS on the virtual desktop

Question 52

A system administrator can no longer easily control a remote hypervisor because the workstation’s mouse is broken. Which of the following remote access tools is the system administrator using?

Options:

A.

Local console port

B.

RDP

C.

Telnet

D.

SSH

Question 53

Virtual switches are:

Options:

A.

Virtualized network switching devices.

B.

Used to differentiate network traffic with tags.

C.

Virtual machines that are on the same network.

D.

Physical switches running on the same network with virtual machines.

Question 54

Which of the following would need to be consistent for a LUN to be considered healthy?

Options:

A.

Metadata

B.

Structure

C.

Superblock

D.

inode

Question 55

Which of the following are SAN protocols? (Select TWO).

Options:

A.

Fibre Channel

B.

iSNS

C.

NFS

D.

iSCSI

E.

TCP/IP

F.

CIFS

Question 56

Which of the following would be a deciding factor when choosing a multi-tenant cloud environment over a locally hosted virtual environment?

Options:

A.

Security

B.

Cost of ownership

C.

Litigation hold

D.

Standardization

Question 57

A company wants to streamline their reporting tools. They have decided to implement a third party SaaS cloud reporting tool to process additional data, but will continue to process confidential data internally. Which of the following deployment models is BEST suited for the company?

Options:

A.

Shared

B.

Private

C.

Hybrid

D.

Community

Question 58

Which of the following storage technologies uses file level access?

Options:

A.

NAS

B.

iSCSI

C.

SAN

D.

FCoE

Question 59

Which of the following ciphers consists of independent keys providing a key length of 168 bits?

Options:

A.

3DES

B.

RC6

C.

RC5

D.

AES

Question 60

Which of the following would be used to advertise a public IP address on redundant WAN circuits?

Options:

A.

BGP

B.

UDP

C.

OSPF

D.

ICMP

Question 61

The BEST way to compare daily performance metrics against a “normal” operational metric is to first establish:

Options:

A.

A standard metrics process.

B.

An operational baseline.

C.

An operational goal.

D.

An analysis formula.

Question 62

A system administrator is planning storage infrastructure to store backup copies of virtual machines that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select TWO).

Options:

A.

SMB

B.

RAW

C.

EXT

D.

FAT

E.

NTFS

Question 63

A network administrator needs to manage a virtual switch remotely in a secure manner. Which of the following tools would MOST likely be used?

Options:

A.

RDP

B.

SNMP

C.

SSH

D.

Telnet

Question 64

Which of the following cloud service models would be recommended to a company for hardware capacity to host a production database application?

Options:

A.

CaaS

B.

XaaS

C.

IaaS

D.

PaaS

Question 65

An organization is converting a physical SQL server into a virtual server. The SQL database has been in use for several years and contains critical data for the organization. Which of the following conversion methods would be MOST appropriate?

Options:

A.

Automated offline

B.

Manual offline

C.

Manual online

D.

Automated online

Question 66

Which of the following reduces the amount of data that must be transmitted on a network by keeping a copy of recently transmitted data in memory?

Options:

A.

Latency

B.

Compression

C.

Caching

D.

Bandwidth

Question 67

A company is expanding its cloud hosting services to include storage. Prior to upgrading existing customers with the new service, the testing department needs to validate that users can access the new service without seeing other customer data or company sensitive data also hosted in the cloud environment. Which of the following should be conducted prior to deployment of the new service?

Options:

A.

Bandwidth test

B.

Load balancing

C.

Security test

D.

Storage test

Question 68

Which of the following tools would an administrator use to troubleshoot when users are unable to reach web servers by name to determine if the name is valid?

Options:

A.

arp

B.

nslookup

C.

ping

D.

netstat

Question 69

Which of the following is a benefit of having a virtual versus physical server environment?

Options:

A.

Improved security

B.

IPSec tunnel

C.

Data scraping

D.

Redundancy

Question 70

An administrator has created a VM on a new virtualization host and notices network speeds are significantly slower than expected. Upon further review, the VM is using a legacy virtual driver for the NIC. Which of the following should the administrator perform?

Options:

A.

Change the default gateway to point to a faster router

B.

Change the router port to support spanning tree

C.

Install guest VM tools

D.

Add an additional virtual NIC

Question 71

Joe, a new administrator, is asked to enter his mobile phone number into a log management system. Which of the following alert features is MOST likely being edited?

Options:

A.

Syslog

B.

SNMP

C.

APM

D.

SMS

Question 72

Which of the following should be implemented to ensure email continuity is not disrupted if one of multiple datacenters experiences an outage?

Options:

A.

Geo-clustering

B.

Offsite backup

C.

Local load balancing

D.

Multipathing

Question 73

Which of the following techniques would be used to deliver SLA performance guarantees for a VM in a virtual environment? (Select two.)

Options:

A.

Licensing

B.

Mirroring

C.

Resource pooling

D.

Memory ballooning

E.

Reservations

Question 74

A small business owner needs to establish a secure logon to the company database server to troubleshoot an issue while on vacation. Which of the following will allow secure access to manage the server from a remote location?

Options:

A.

SFTP

B.

Telnet

C.

SSH

D.

RSH

Question 75

A cloud solution provider offers services solely to the healthcare industry which meets specific security and government regulations. This is an example of which of the following cloud types?

Options:

A.

Public

B.

Hybrid

C.

Private

D.

Community

Question 76

A system has the ability to automatically provision additional virtual servers in response to a load increase. This is an example of which of the following cloud features?

Options:

A.

Replication

B.

Resource Pooling

C.

Orchestration

D.

Virtual Network

Question 77

An administrator is tasked with the virtualization of all database management applications. Which of the following should the administrator do FIRST to ensure that database performance will be optimal?

Options:

A.

Follow the recommendations of the database management application vendor.

B.

Design a physical to virtual migration plan of the application.

C.

Adhere to the recommendations of the virtualization software vendor.

D.

Develop a migration plan to the new environment, ensuring maximum uptime.

Question 78

Which of the following backup methods is MOST used by VM users?

Options:

A.

Tape backups

B.

Cloning

C.

Image backups

D.

Snapshots

Question 79

Which of the following can be used to physically restrict employees from accessing a datacenter?

Options:

A.

Access badge

B.

Password

C.

Mantrap

D.

PIN

Question 80

A network administrator has been asked to implement a security solution to protect a company’s internal network from external threats on the Internet. Which of the following technologies is the administrator MOST likely to use?

Options:

A.

IDS

B.

Proxy

C.

DMZ

D.

Firewall

Question 81

Which of the following tests would be MOST appropriate when over allocate storage on VMs in a development cluster?

Options:

A.

Penetration testing

B.

Vulnerability scan

C.

Latency testing

D.

Bandwidth determination

Question 82

An administrator has recently added a new host server to a private cloud environment. The host has two quad-core processors and 128GB of RAM. The server will have ten guest servers that require a minimum of 1 CPU and 8GB of RAM per server. Four of the servers will only be used during off hours. Which of the following should the administrator implement to ensure that the guest servers have the proper resources?

Options:

A.

Dynamic CPU

B.

Redundancy

C.

NIC Teaming

D.

Dynamic RAM

Question 83

An administrator is no longer receiving alerting messages from the web server platform that recently failed over to a new secondary datacenter due to a power failure. Which of the following is the cause of the problem?

Options:

A.

Port 21 in only allowed inbound at the primary datacenter

B.

Port 22 to the log server is blocked outbound

C.

Port 162 in DMZ is blocked inbound

D.

Port 162 in DMZ is blocked outbound

Question 84

Which of the following cryptographic technologies is MOST likely to be used to protect data at rest?

Options:

A.

IPSEC

B.

SSL/TLS

C.

AES

D.

RSA

Page: 1 / 57
Total 565 questions