
CompTIA Cloud+ Certification - CV0-001 Exam Questions
QUESTION NO: 1
Joe, an administrator, has just added a new VM to a production network. Joe's workstation is connecting into the environment from a VPN. Other VMs on the same subnet are open to connections, however the new VM is inaccessible by RDP, SSH, or ping from Joe's workstation. Joe can ping other systems on the production network while connected into the new VM by console. Which of the following is the MOST likely source of the problem?
Joe, an administrator, has just added a new VM to a production network. Joe's workstation is connecting into the environment from a VPN. Other VMs on the same subnet are open to connections, however the new VM is inaccessible by RDP, SSH, or ping from Joe's workstation. Joe can ping other systems on the production network while connected into the new VM by console. Which of the following is the MOST likely source of the problem?
Correct Answer: B
QUESTION NO: 2
Which of the following is the BEST choice for a clustered host interconnect?
Which of the following is the BEST choice for a clustered host interconnect?
Correct Answer: D
QUESTION NO: 3
A small business is moving ten physical servers to the cloud. Which of the following should the cloud provider implement to ensure that all ten servers can dynamically share memory resources with other tenants as needed while not interfering with the other tenants?
A small business is moving ten physical servers to the cloud. Which of the following should the cloud provider implement to ensure that all ten servers can dynamically share memory resources with other tenants as needed while not interfering with the other tenants?
Correct Answer: C
QUESTION NO: 4
Which of the following tables would an administrator use to find a list of paths to network nodes?
Which of the following tables would an administrator use to find a list of paths to network nodes?
Correct Answer: B
QUESTION NO: 5
Which of the following BEST describes the process of restoring service to a primary datacenter in a controlled manner, following a disaster?
Which of the following BEST describes the process of restoring service to a primary datacenter in a controlled manner, following a disaster?
Correct Answer: D
QUESTION NO: 6
An administrator reports the company is running out of disk space on the SAN. The network administrator is installing a new SAN. Which of the following should the administrator implement to alleviate this problem on the new SAN?
An administrator reports the company is running out of disk space on the SAN. The network administrator is installing a new SAN. Which of the following should the administrator implement to alleviate this problem on the new SAN?
Correct Answer: B
QUESTION NO: 7
An IPS is used to:
An IPS is used to:
Correct Answer: C
QUESTION NO: 8
An organization allows clients to retrieve information on earthquake events. This is a description of which of the following classifications?
An organization allows clients to retrieve information on earthquake events. This is a description of which of the following classifications?
Correct Answer: B
QUESTION NO: 9
When a firewall takes an incoming request for a specific IP address and redirects it to an internal host, which of the following is being used?
When a firewall takes an incoming request for a specific IP address and redirects it to an internal host, which of the following is being used?
Correct Answer: D
QUESTION NO: 10
An administrator has been promoted to architect when trying to access one of the servers, the architect receives the error: "Authentication failure: Account is not allowed". Which of the following explains why access was denied?
An administrator has been promoted to architect when trying to access one of the servers, the architect receives the error: "Authentication failure: Account is not allowed". Which of the following explains why access was denied?
Correct Answer: C
QUESTION NO: 11
A company is experiencing latency problems connecting to the cloud. Which of the following should an administrator check FIRST?
A company is experiencing latency problems connecting to the cloud. Which of the following should an administrator check FIRST?
Correct Answer: B
QUESTION NO: 12
A company has hired a new Chief Security Officer (CSO). While reviewing the company's
RAID levels on business critical data volumes, the CSO has decided to change the RAID level to allow for the best protection against number of disk failures. Which of the following
RAID levels will accomplish this?
A company has hired a new Chief Security Officer (CSO). While reviewing the company's
RAID levels on business critical data volumes, the CSO has decided to change the RAID level to allow for the best protection against number of disk failures. Which of the following
RAID levels will accomplish this?
Correct Answer: D
QUESTION NO: 13
Which of the following virtual network components allows a virtual NIC to connect to local area resources?
Which of the following virtual network components allows a virtual NIC to connect to local area resources?
Correct Answer: D
QUESTION NO: 14
A company has instituted a cloud solution where the solution consolidates resources between the human resources and engineering departments. The combined resources are available to be assigned dynamically to each of the two departments without any visible impact on performance to the users. Which of the following terms BEST describes this cloud characteristic?
A company has instituted a cloud solution where the solution consolidates resources between the human resources and engineering departments. The combined resources are available to be assigned dynamically to each of the two departments without any visible impact on performance to the users. Which of the following terms BEST describes this cloud characteristic?
Correct Answer: B
QUESTION NO: 15
Anne, an administrator, notices unusual activity on a database server. After reviewing the logs, she notices a number of successful anonymous FTP logins and transferring of data to an external server. Which of the following hardening techniques would have helped stop this attack from succeeding? (Select two.)
Anne, an administrator, notices unusual activity on a database server. After reviewing the logs, she notices a number of successful anonymous FTP logins and transferring of data to an external server. Which of the following hardening techniques would have helped stop this attack from succeeding? (Select two.)
Correct Answer: A,D
QUESTION NO: 16
Which of the following tools is used to manage virtual servers?
Which of the following tools is used to manage virtual servers?
Correct Answer: A
QUESTION NO: 17
A company has purchased a new self-service provisioning system and has brought in a consultant to deploy the system. During the installation the application attempts to connect to the database server but fails. Which of the following could cause the connection issue?
A company has purchased a new self-service provisioning system and has brought in a consultant to deploy the system. During the installation the application attempts to connect to the database server but fails. Which of the following could cause the connection issue?
Correct Answer: C
QUESTION NO: 18
Which of the following is LEAST suitable for online storage platforms?
Which of the following is LEAST suitable for online storage platforms?
Correct Answer: D
QUESTION NO: 19
A company has just established a new branch office that needs to connect back to centrally hosted applications for day to day operations. The branch office has noted that access to many company services are slow and causing a drop in productivity. The company IT department has investigated a plan to improve performance across the link to the branch office without having to pay for more bandwidth from the Internet Service Provider. This plan includes hardware that after installation will allow for much faster access to day to day business applications. Which of the following terms BEST describes the action taken by the
IT department?
A company has just established a new branch office that needs to connect back to centrally hosted applications for day to day operations. The branch office has noted that access to many company services are slow and causing a drop in productivity. The company IT department has investigated a plan to improve performance across the link to the branch office without having to pay for more bandwidth from the Internet Service Provider. This plan includes hardware that after installation will allow for much faster access to day to day business applications. Which of the following terms BEST describes the action taken by the
IT department?
Correct Answer: B
QUESTION NO: 20
A storage administrator has created five new LUNs for a company's virtual cluster. The company uses iSCSI to connect to storage. Which of the following is needed to present the newly created LUNs on the virtual cluster?
A storage administrator has created five new LUNs for a company's virtual cluster. The company uses iSCSI to connect to storage. Which of the following is needed to present the newly created LUNs on the virtual cluster?
Correct Answer: D