A company would like to migrate its current on-premises workloads to the public cloud. The current platform requires at least 80 instances running at all times to work properly. The company wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe, and the costs to be kept to a minimum. Which of the following strategies should the company implement?
A. Create /25 subnets in two regions and run 80 instances on each one.
B. Create /26 subnets in two regions and run 40 instances on each one.
C. Create /26 subnets in three regions and run 40 instances on each one
D. Create /26 subnets in three regions and run 80 instances on each one.
Correct Answer: C
1.at least 80 instances running at all times to work 2.wants the workload to be highly available, even if the cloud provider loses one region due to a catastrophe 3.costs to be kept to a minimum
The choice of /26 subnets allows for up to 64 IP addresses, which is sufficient for running 40 instances in each region - Respect al 3 requiraments
By running 40 instances in each region, the company can achieve the desired level of availability while keeping costs lower - So, we have cost optimization !
By distributing the workload across three regions, the company ensures redundancy and fault tolerance. They want AT LEAST 80 instances.
Question 112:
An enterprise recently upgraded the memory of its on-premises VMs from 8GB to 16GB. However, users are not experiencing any performance benefit. Which of the following is the MOST likely reason?
A. Insufficient memory on the hypervisor
B. Operating system memory limit
C. Memory mismatch error
D. Dynamic memory allocation
Correct Answer: B
The most likely reason why users are not experiencing any performance benefit after upgrading the memory of their on-premises VMs is that the operating system has a memory limit that prevents it from using more than 8GB of RAM. This could be due to the operating system version, edition, or configuration. The systems administrator should check the operating system settings and requirements and adjust them accordingly to allow the VMs to use the full 16GB of RAM. Reference: CompTIA Cloud+ Certification Exam Objectives, Domain 4.0 Troubleshooting, Objective 4.3 Given a scenario, troubleshoot capacity issues within a cloud environment.
Question 113:
A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying the CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue?
A. Modify the deployment script to delete and recreate the database whenever the CMS application is deployed.
B. Modify the ACL to allow the staging environment to access the database in the sandbox environment.
C. Modify the CMS application deployment to use the previous version and redeploy the application.
D. Modify the configuration settings of the CMS application to connect to the database in the current environment.
Correct Answer: D
Modifying the configuration settings of the CMS (Content Management System) application to connect to the database in the current environment is what the cloud administrator should do to resolve the issue of web page displaying an error message stating the application is unavailable after deploying CMS application changes to the staging environment. A CMS is a software or platform that allows users to create, manage, and publish web content. A CMS may use a database to store and retrieve web content and information. A staging environment is a testing or pre-production environment that simulates the production environment and allows users to verify and validate changes or updates before deploying them to production. Modifying the configuration settings of the CMS application can help to resolve the issue by ensuring that the CMS application can access and communicate with the database in the current environment, rather than using the previous or default settings that may point to a different or non-existent database.
Question 114:
A cloud administrator has created a new asynchronous workflow lo deploy VMs to the cloud in bulk. When the workflow is tested for a single VM, it completes successfully. However, if the workflow is used to create 50 VMs at once, the job fails. Which of the following is the MOST likely cause of the issue? (Choose two.)
A. Incorrect permissions
B. Insufficient storage
C. Billing issues with the cloud provider
D. No connectivity to the public cloud
E. Expired API token
F. Disabled autoscaling
Correct Answer: BF
Insufficient storage could cause the deployment of 50 VMs to fail as the cloud may not have enough available storage to create the instances.
Disabled autoscaling could also cause the deployment to fail as the workflow is set to deploy a large number of VMs at once, and without autoscaling, the cloud may not have the resources to handle the workload.
Question 115:
A systems administrator is asked to implement a new three-host cluster. The cloud architect specifies this should be a testing environment, and the budget is limited. The estimated resource consumption for each application is as follows:
A. Three public cloud hosts with four cores 120GB of RAM 100GB of storage 1Gbps
B. Three public cloud hosts with six cores 80GB of RAM 180GB of storage 150Mbps
C. Three public cloud hosts with six cores 80GB of RAM 1TB of storage 200Mbps
D. Four public cloud hosts with four cores 140GB of RAM 200GB of storage
Correct Answer: B
The best option to implement a new three-host cluster with a limited budget for testing purposes is to use three public cloud hosts with six cores, 80GB of RAM, 180GB of storage, and 150Mbps of bandwidth each. This option will provide enough resources to run all the applications without exceeding their estimated consumption, while also minimizing the cost and complexity of the cluster. The other options either provide insufficient or excessive resources, which could affect the performance or cost of the cluster. Reference: [CompTIA Cloud+ Certification Exam Objectives], Domain 1.0 Configuration and Deployment, Objective 1.2 Given a scenario involving requirements for deploying an application in the cloud, select an appropriate solution design.
Question 116:
A systems administrator is about to deploy a new VM to a cloud environment. Which of the following will the administrator MOST likely use to select an address for the VM?
A. CDN
B. DNS
C. NTP
D. IPAM
Correct Answer: D
IPAM (IP Address Management) is what the administrator will most likely use to select an address for the new VM that is about to be deployed to a cloud environment. IPAM is a tool or service that allows customers to plan, track, and manage the IP addresses and DNS names of their cloud resources or systems. IPAM can help to select an address for the new VM by providing information such as available IP addresses, IP address ranges, subnets, domains, etc., as well as ensuring that the address is unique and valid.
Question 117:
A company had a system compromise, and the engineering team resolved the issue after 12 hours. Which of the following information will MOST likely be requested by the Chief Information Officer (CIO) to understand the issue and its resolution?
A. A root cause analysis
B. Application documentation
C. Acquired evidence
D. Application logs
Correct Answer: A
A root cause analysis is what will most likely be requested by the Chief Information Officer (CIO) to understand the issue and its resolution after a system compromise that was resolved by the engineering team after 12 hours. A root cause
analysis is a technique of investigating and identifying the underlying or fundamental cause or reason for an incident or issue that affects or may affect the normal operation or performance of a system or service. A root cause analysis can
help to understand the issue and its resolution by providing information such as:
What happened: This describes what occurred during the incident or issue, such as symptoms, effects, impacts, etc.
Why it happened: This explains why the incident or issue occurred, such as triggers, factors, conditions, etc.
How it was resolved: This details how the incident or issue was fixed or mitigated, such as actions, steps, methods, etc.
How it can be prevented: This suggests how the incident or issue can be avoided or reduced in the future, such as recommendations, improvements, changes, etc.
Question 118:
An organization has a public-facing API that is hosted on a cloud provider. The API performs slowly at times. Which of the following technologies should the cloud administrator apply to provide speed acceleration and a secure connection?
A. WAF
B. EDR
C. IDS
D. HIPS
E. SSL
Correct Answer: E
The best technology to provide speed acceleration and a secure connection for a public-facing API that is hosted on a cloud provider is SSL (Secure Sockets Layer). SSL is a protocol that encrypts and authenticates the data between a client
and a server over an HTTP connection. It also compresses the data to reduce its size and improve its transmission speed. SSL can enhance the security and performance of an API by preventing unauthorized access, tampering, or
interception of the data. Reference:
[CompTIA Cloud+ Certification Exam Objectives], Domain 2.0 Security, Objective 2.2 Given a scenario, implement appropriate network security controls for a cloud environment.
Question 119:
A production engineer is configuring a new application, which is running in containers, that requires access to a database. Which of the following methods will allow the application to authenticate to the database in the MOST secure way?
A. Store the credentials in a variable on every worker node
B. Store the credentials on a shared volume using whole-disk encryption
C. Store the credentials in a configuration file using SHA-256 inside the container image
D. Store the credentials using the orchestrator secret manager
Correct Answer: D
The most secure way to store the credentials for a new application that is running in containers and requires access to a database is to use the orchestrator secret manager. The orchestrator secret manager is a feature that allows storing and managing sensitive data, such as passwords, tokens, or keys, for containers in an encrypted and centralized way. It also provides access control, auditing, and rotation features for the secrets. This method will protect the credentials from being exposed or compromised by unauthorized parties or malicious actors. Reference: [CompTIA Cloud+ Certification Exam Objectives], Domain 2.0 Security, Objective 2.5 Given a scenario, apply data security techniques in the cloud.
Question 120:
A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?
A. A service availability scan
B. An agent-based vulnerability scan
C. A default and common credentialed scan
D. A network port scan
Correct Answer: C
A default and common credentialed scan is what the administrator should use to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. A credentialed scan is a type of vulnerability scan that uses valid credentials or accounts to access and scan target systems or devices. A credentialed scan can provide more accurate and detailed results than a non- credentialed scan, as it can perform more actions and tests on target systems or devices. A default and common credentialed scan is a type of credentialed scan that uses default or common credentials or accounts, such as admin/admin, root/root, etc., to access and scan target systems or devices. A default and common credentialed scan can help to identify weak or insecure passwords on administrative web consoles, such as "qwerty", and recommend stronger passwords.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CV0-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.