CV0-004試験無料問題集「CompTIA Cloud+ (2024) 認定」
A company wants to create a few additional VDIs so support vendors and contractors have a secure method to access the company's cloud environment. When a cloud administrator attempts to create the additional instances in the new locations, the operation is successful in some locations but fails in others. Which of the following is the most likely reason for this failure?
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A cloud solutions architect needs to determine the best strategy to deploy an application environment in production, given the following requirements:
- No downtime
- Instant switch to a new version using traffic control for all users
Which of the following deployment strategies would be the BEST solution?
- No downtime
- Instant switch to a new version using traffic control for all users
Which of the following deployment strategies would be the BEST solution?
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A company wants to use a solution that will allow for quick recovery from ransomware attacks, as well as intentional and unintentional attacks on data integrity and availability. Which of the following should the company implement that will minimize administrative overhead?
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:
- The VPN tunnel is established on the headquarter office firewall.
While inside the office, developers report that they cannot connect to
the development network resources.
- While outside the office on a client VPN, developers report that they can connect to the development network resources.
- The office and the client VPN have different IP subnet ranges. The
firewall flow logs show VPN traffic is reaching the development network from the office.
Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?
- The VPN tunnel is established on the headquarter office firewall.
While inside the office, developers report that they cannot connect to
the development network resources.
- While outside the office on a client VPN, developers report that they can connect to the development network resources.
- The office and the client VPN have different IP subnet ranges. The
firewall flow logs show VPN traffic is reaching the development network from the office.
Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?
正解:B
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A cloud engineer has provisioned a VM for a high-frequency trading application. After the VM is put into production, users report high latency in trades. The engineer checks the last six hours of VM metrics and sees the following:
- CPU utilization is between 30% to 60%.
- Networkln is between 50Kbps and 70Kbps.
- NetworkOut is between 3.000Kpbs and 5.000Kbps.
- DiskReadOps is at 30.
- DiskWriteOps is at 70
- Memory utilization is between 50% and 70%.
Which of the following steps should the engineer take next to solve the latency issue?
- CPU utilization is between 30% to 60%.
- Networkln is between 50Kbps and 70Kbps.
- NetworkOut is between 3.000Kpbs and 5.000Kbps.
- DiskReadOps is at 30.
- DiskWriteOps is at 70
- Memory utilization is between 50% and 70%.
Which of the following steps should the engineer take next to solve the latency issue?
正解:A
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A company has developed an online trading platform. The engineering team selected event- based scaling for the platform's underlying resources. The platform resources scale up with every
2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains why this is the case?
2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains why this is the case?
正解:C
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A security engineer Identifies a vulnerability m a containerized application. The vulnerability can be exploited by a privileged process to read tie content of the host's memory. The security engineer reviews the following Dockerfile to determine a solution to mitigate similar exploits:
Which of the following is the best solution to prevent similar exploits by privileged processes?
Which of the following is the best solution to prevent similar exploits by privileged processes?
正解:C
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)