Cloud+

Here you have the best CompTIA CV0-002 practice exam questions

  • You have 183 total questions to study from
  • Each page has 5 questions, making a total of 37 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 26, 2024
Question 1 of 183

A new browser version has been deployed to all users at a company. After the deployment, users report that they can no longer access the company's secure time-card system, which is hosted by a SaaS provider. A technician investigates and discovers a security error is received upon opening the site. If the browser is rolled back to the older version, the site is accessible again. Which of the following is the MOST likely cause of the security error users are seeing?

    Correct Answer: C

    The issue is most likely due to obsolete security technologies implemented on the SaaS servers. The error surface only after upgrading the browser, indicating that the new browser version does not support the older security protocols or technologies being used by the SaaS provider. Rolling back to the older browser removes the error because it still supports those outdated protocols.

Question 2 of 183

SIMULATION -

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday. The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations. The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

1. Analyze the configuration of the following components: DNS, Firewall1, Firewall2, Router1, Rouler2, VPN and Orchestrator Server.

2. Identify the problematic device(s).

Part 2:

3. Identify the correct options to provide adequate configuration for hybrid cloud architecture.

Instructions:

If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

Simulation -

    Correct Answer:

    The company is experiencing a problem with the success rate of connections during testing for their hybrid cloud architecture. The network architecture includes an on-premise datacenter and a commercial cloud provider connected via a site-to-site IPSec tunnel. The testing connections issue is likely due to a misconfiguration in Router2’s Pre-shared Key (PSK) for the VPN connection, as Router1 is configured with PSK 'Cloud001' while Router2 is configured with PSK 'Cloud002.' This mismatch can prevent the establishment of a successful VPN tunnel, thereby causing connection failures. Additionally, to improve load balancing and ensure higher success rates in routing, it also makes sense to add the on-premises Application Server to the Load Balancer, thus helping distribute traffic effectively between the on-premises datacenter and the cloud. Therefore, the two correct options to resolve the issue and provide adequate configuration are: 'Update the PSK (Pre-shared key) in Router 2' and 'Add the Application Server at on-premises to the Load Balancer.'

Question 3 of 183

A company is seeking a new backup solution for its virtualized file servers that fits the following characteristics:

✑ The files stored on the servers are extremely large.

✑ Existing files receive multiple small changes per day.

✑ New files are only created once per month.

✑ All backups are being sent to a cloud repository.

Which of the following would BEST minimize backup size?

    Correct Answer: D

    Change block tracking is the best option to minimize backup size in this scenario. It tracks and backs up only the portions of the files that have changed since the last backup, which is highly effective given that existing files receive multiple small changes per day. This method significantly reduces the amount of data that needs to be backed up each time, especially compared to differential backups which would grow incrementally larger with each change.

Question 4 of 183

A company has deployed a four-node cluster in a COLO environment with server configurations listed below. The company wants to ensure there is 50% overhead for failover and redundancy. There are currently eight VMs running within the cluster with four vCPUs x32GB each. The company wants to better utilize its resources within the cluster without compromising failover and redundancy.

Given the information above, which of the following should a cloud administrator do to BEST accommodate failover and redundancy requirements?

    Correct Answer: B

    To ensure 50% overhead for failover and redundancy, dynamic resource allocation is the best approach. This method allows the cloud infrastructure to allocate resources dynamically based on current demands and workloads, ensuring optimal utilization without compromising redundancy and failover capabilities. Hyperthreading and setting hard limits on VM resources, while beneficial, do not directly address failover and redundancy as effectively as dynamic resource allocation. Overcommiting memory could lead to performance issues if resources are exhausted, which could impact failover and redundancy.

Question 5 of 183

A courier company has virtualized its packing software application. The CSA needs to confirm the deployment is utilizing the correct amount of CPU per virtual instance. After confirming the deployment requirements, the CSA should log into the cloud services portal to ensure that:

    Correct Answer: C

    The CSA needs to confirm that the deployment is utilizing the correct amount of CPU per virtual instance. This requires comparing the actual CPU usage per virtual instance with the deployment requirements to ensure compliance. Hence, the logical step is to verify that the deployment is using the recommended amount of CPUs per VM.