An organization wants to ensure its data is protected in the event of a natural disaster. To support this effort, the company has rented a colocation space in another part of the country. Which of the following disaster recovery practices can be used to best protect the data?
A. On-site
B. Replication
C. Retention
D. Off-site
A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned.
Which of the following scripts should the systems administrator use to achieve this goal?
A. RESPONSE_CODE } string APP_URL bool RESPONSE_CODE string VM health checker (APP_URL, VM) { if [ http_probe (APP_URL) == 200] { echo RESPONSE_CODE } else{ stop (VM) echo
B. else{ echo string APP_URL float RESPONSE_CODE string VM health_checker (APP_URL, VM) { if [ http_probe (APP_URL) == 200] { stop (RESPONSE_CODE) echo VM } stop (VM) RESPONSE CODE }
C. else{ echo string APP_URL int RESPONSE CODE string VM health checker (APP_URL, VM) { if [ http_probe (APP_URL) == 200] { echo RESPONSE_CODE } stop (VM) RESPONSE_CODE }
D. else{ echo string APP_URL int RESPONSE_CODE string VM health_checker (APP_URL, VM) { if [ http_probe (VM) == 200] { stop (VM) echo RESPONSE_CODE } RESPONSE CODE }
A customer's facility is located in an area where natural disasters happen frequently. The customer requires the following:
1.
Data resiliency due to exposure to frequent natural disasters
2.
Data localization because of privacy regulations in the country
3.
High availability
Which of the following cloud resources should be provisioned to meet these requirements?
A. Storage in a separate data center located in same region
B. An on-premises private cloud carrying duplicate data
C. Storage in an availability zone outside the region
D. Storage in the same availability zone as the primary data
The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?
A. Penetration test
B. End-to-end security testing
C. Cost benefit analysis
D. User acceptance testing
A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?
A. Setting up private development, public development, and testing environments
B. Segregating environments for internal and external teams
C. Configuring DDoS protection to mitigate the risk of downtime
D. Using IAM and ACL in order to bolster DLP
A security engineer Identifies a vulnerability m a containerized application. The vulnerability can be exploited by a privileged process to read tie content of the host's memory. The security engineer reviews the following Dockerfile to determine a solution to mitigate similar exploits:
FROM alpine:3.17 RUN apk update andand apk upgrade COPY ./myapp ENTRYPOINT ["/myapp/app"]
Which of the following is the best solution to prevent similar exploits by privileged processes?
A. Adding the USER myappuserinstruction
B. Patching the host running the Docker daemon
C. Changing FROM alpiner3.17 to FROM alpine:latest
D. Running the container with the ready-only filesystem configuration
A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly experiencing high latency. Which of the following would best help determine the source of the latency?
A. Configuring centralized logging to analyze HTTP requests
B. Running a flow log on the network to analyze the packets
C. Configuring an API gateway to track all incoming requests
D. Enabling tracing to detect HTTP response times and codes
Which of the following strategies requires the development of new code before an application can be successfully migrated to a cloud provider?
A. Refactor
B. Rearchitect
C. Rehost
D. Replatform
A critical security patch is required on a network load balancer in a public cloud. The organization has a major sales conference next week, and the Chief Executive Officer does not want any interruptions during the demonstration of an
application behind the load balancer.
Which of the following approaches should the cloud security engineer take?
A. Ask the management team to delay the conference.
B. Apply the security patch after the event.
C. Ask the upper management team to approve an emergency patch window.
D. Apply the security patch immediately before the conference.
A company requests that its cloud administrator provision virtual desktops for every user. Given the following information:
1.
One hundred users are at the company.
2.
A maximum of 30 users work at the same time.
3.
Users cannot be interrupted while working on the desktop.
Which of the following strategies will reduce costs the most?
A. Provisioning VMs of varying sizes to match user needs
B. Configuring a group of VMs to share with multiple users
C. Using VMs that have spot availability
D. Setting up the VMs to turn off outside of business hours at night
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CV0-004 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.