CompTIA Cloud+ Certification Exam v8.0 (CV0-001)

Page:    1 / 38   
Total 565 questions

A system administrator wants to create a mitigation strategy to quickly roll back a virtual image after applying the latest updates. Which of the following would the administrator utilize?

  • A. File backup
  • B. Snapshot
  • C. Offline backup
  • D. Image backup


Answer : B

Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops. Which of the following should the lab administrator implement to allow students to upload files?

  • A. Resource pooling
  • B. Secure FTP
  • C. Storage quotas
  • D. Port mapping


Answer : D

Which of the following components should be virtualized and added to cloud infrastructure to ensure virtual servers are only able to access the volumes assigned to them?

  • A. NAS
  • B. DAS
  • C. LUN
  • D. HBA


Answer : D

Although the SAN appears to be running without any problems, the technician is unable to reach the SANs web enabled management interface. Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?

  • A. arp
  • B. traceroute
  • C. ping
  • D. ipconfig


Answer : B

Which of the following business continuity designs provides the highest degree of fault tolerance?

  • A. Cold Site
  • B. Site Mirroring
  • C. Warm Site
  • D. Hot Site


Answer : B

Which of the following protocols is MOST likely used by a switch to communicate status information to an administrator?

  • A. SNMP
  • B. SMTP
  • C. NNTP
  • D. HTTP


Answer : A

Which of the following can be used to encrypt data at rest on a VM located in the cloud?

  • A. AES
  • B. SSL
  • C. TLS
  • D. VPN


Answer : A

A storage administrator has 100 terabytes of physical storage space within the SAN. Which of the following is used to enable access to the storage space?

  • A. Drive mirroring
  • B. LUN creation
  • C. Drive striping
  • D. RAID configuration


Answer : B

A critical hypervisor security patch has been released and needs to be rolled out as soon as possible. Which of the following steps can be taken to minimize downtime for all guest
VMs currently running?

  • A. In the next scheduled maintenance window, apply patch, reboot host, and wait for all VMs to come back online.
  • B. In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, patch host, reboot host, and place host back into availability cluster.
  • C. In the next scheduled maintenance window, shut down all VMs, apply patch, reboot host, and wait for all VMs to come back online.
  • D. In the next scheduled maintenance window, migrate VMs to another host. Remove host from any availability clusters, unplug network cables from host, patch host, reboot host, reconnect network cables, and place host back into availability cluster.


Answer : B

Which of the following should be installed on VMs to report and take action against potential threats?

  • A. NIDS
  • B. HIPS
  • C. NIPS
  • D. HIDS


Answer : B

Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized. Which of the following should be used to ensure access is controlled appropriately between devices? (Select TWO).

  • A. LUN Masking
  • B. Hard Zoning
  • C. Supernetting
  • D. Soft Zoning
  • E. Subnetting


Answer : A,D

A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?

  • A. Latency
  • B. Replication
  • C. Redundancy
  • D. Failback


Answer : C

Which of the following cloud delivery models presents the LEAST vulnerabilities to a company's existing network?

  • A. Hybrid
  • B. Community
  • C. Public
  • D. Private


Answer : D

Which of the following is MOST important when factoring network level security in a public cloud environment?

  • A. Ensuring good user experience
  • B. Ensuring confidentiality
  • C. Ensuring redundancy
  • D. Ensuring high availability


Answer : B

Which of the following access control types allows users to assign security attributes to objects such as files and directories?

  • A. Role based
  • B. Mandatory
  • C. Discretionary
  • D. Rule set based


Answer : C

Page:    1 / 38   
Total 565 questions