Which of the following describes the access control method where data owners authorize who is granted access to their files?
A. Mandatory access control
B. Role-based access control
C. Access control list
D. Discretionary access control
Which of the following could be assigned to a virtual CPU?
A. Cores
B. HBAs
C. LUNs
D. Stepping
Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?
A. Antivirus
B. Firewall
C. Audit logs
D. IDS
Which of the following reduces the risk of known attacks from being successful?
A. DLP techniques
B. Patching frequency
C. Mandatory access controls
D. Encryption methods
Which of the following networking components would be used to connect two subnets in a virtual environment?
A. Virtual switch
B. Virtual disks
C. Virtual router
D. Virtual HBA
An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration?
A. Harden the operating system
B. Migrate the server in a development environment
C. Contact the vendor for compatibility requirements
D. Establish a performance baseline
Which of the following access control types allows users to assign security attributes to objects such as files and directories?
A. Role based
B. Mandatory
C. Discretionary
D. Rule set based
Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?
A. USB
B. Tape
C. HDD
D. SSD
A web hosting company received reports of slow performance from four out of the five clients. Upon investigation, it was determined that a hosted virtual machine was using more RAM and CPU than the others. Which of the following MOST likely contributed to the issue?
A. Hard quota limits
B. Soft quota limits
C. Storage allocation
D. Resource pooling
Which of the following hypervisor types runs on a host operating system that provides virtualization services, including memory management and device support?
A. Type II hypervisor
B. Proprietary hypervisor
C. Type I hypervisor
D. Open source hypervisor
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CV0-001 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.