CompTIA Cloud+ v1.0

Page:    1 / 5   
Exam contains 74 questions

A cloud administrator needs to collect process-level, memory-usage tracking for the virtual machines that are part of an autoscaling group. Which of the following is the best way to accomplish the goal by using cloud-native monitoring services?

  • A. Configuring page file/swap metrics
  • B. Deploying the cloud-monitoring agent software
  • C. Scheduling a script to collect the data
  • D. Enabling memory monitoring in the VM configuration


Answer : B

A cloud developer is creating a static website that customers will be accessing globally. Which of the following services will help reduce latency?

  • A. VPC
  • B. Application load balancer
  • C. CDN
  • D. API gateway


Answer : C

A cloud engineer is designing a cloud native, three-tier application. The engineer must adhere to the following security best practices:
Minimal services should run on all layers of the stack.
The solution should be vendor agnostic.
Virtualization could be used over physical hardware.
Which of the following concepts should the engineer use to design the system to best meet these requirements?

  • A. Virtual machine
  • B. Microservices
  • C. Fan-out
  • D. Cloud-provided managed services


Answer : B

A cloud solutions architect needs to have consistency between production, staging, and development environments. Which of the following options will best achieve this goal?

  • A. Using Terraform templates with environment variables
  • B. Using Grafana in each environment
  • C. Using the ELK stack in each environment
  • D. Using Jenkins agents in different environments


Answer : A

A healthcare organization must follow strict compliance requirements to ensure that PII is not leaked. The cloud administrator needs to ensure the cloud email system can support this requirement. Which of the following should the organization enable?

  • A. IPS
  • B. DLP
  • C. ACL
  • D. WAF


Answer : B

A company’s content management system (CMS) service runs on an IaaS cluster on a public cloud. The CMS service is frequently targeted by a malicious threat actor using DDoS.
Which of the following should a cloud engineer monitor to identify attacks?

  • A. Network flow logs
  • B. Endpoint detection and response logs
  • C. Cloud provider event logs
  • D. Instance syslog


Answer : A

Which of the following is the most cost-effective way to store data that is infrequently accessed?

  • A. Cold site
  • B. Hot site
  • C. Off-site
  • D. Warm site


Answer : C

Which of the following models will best reduce the cost of running short-term, non-critical workloads?

  • A. Reserved
  • B. Spot instance
  • C. Pay-as-you-go
  • D. Dedicated host


Answer : B

Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?

  • A. Scanning
  • B. Assessment
  • C. Remediation
  • D. Identification


Answer : D

Which of the following types of storage provides the greatest performance advantage for a traditional relational database?

  • A. File
  • B. Object
  • C. Block
  • D. Ephemeral


Answer : C

A cloud networking engineer is troubleshooting the corporate office’s network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments’ subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Choose two.)

  • A. Modifying the subnet mask to 255.255.254.0 for IT and operations departments
  • B. Configuring static routing to allow access from each subnet to 10.1.40.1
  • C. Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network
  • D. Configuring static routing to allow access from 10.1.30.1 to each subnet
  • E. Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee
  • F. Modifying the subnet mask to 255.255.255.128 for the IT and operations departments


Answer : DF

Which of the following compute resources is the most optimal for running a single scripted task on a schedule?

  • A. Bare-metal server
  • B. Managed container
  • C. Virtual machine
  • D. Serverless function


Answer : D

A video surveillance system records road incidents and stores the videos locally before uploading them to the cloud and deleting them from local storage. Which of the following best describes the nature of the local storage?

  • A. Persistent
  • B. Ephemeral
  • C. Differential
  • D. Incremental


Answer : B

An organization is hosting a seminar with eight individuals who need to connect to their own dedicated VM. The technician used the following VM configurations:

IP address: DHCP -

NIC: 1Gbps -

Network: 10.1.10.0/29 -
Several users are unable to access their VMs. Which of the following best describes the reason?

  • A. Not enough addresses are available.
  • B. The routes are misconfigured.
  • C. Too much traffic is on the network.
  • D. DHCP is not working correctly on the VM.


Answer : A

Department supervisors have requested a report that will help them understand the utilization of cloud resources, make decisions about budgeting for the following year, and reduce costs. Which of the following are the most important requisite steps to create the report? (Choose two.)

  • A. Set the desired retention of resource logs.
  • B. Configure application tracing.
  • C. Integrate email alerts with ticketing software.
  • D. Enable resource tagging.
  • E. Configure the collection of performance/utilization logs.
  • F. Configure metric threshold alerts.


Answer : DE

Page:    1 / 5   
Exam contains 74 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy