FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. CompTIA Certification
  3. CV0-004 Exam
  4. CompTIA.CV0-004.v2025-01-01.q158 Dumps
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • »
  • »»
Download Now

Question 1

A cross-site request forgery vulnerability exploited a web application that was hosted in a public laaS network.
A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?

Correct Answer: C
After a WAF deployment fails to prevent an exploit, adding an Access Control List (ACL) to the Virtual Machine (VM) subnet can be an effective control. ACLs provide an additional layer of security by explicitly defining which traffic can or cannot enter a network segment. By setting granular rules based on IP addresses, protocols, and ports, ACLs help to restrict access to resources, thereby mitigating potential exploits and enhancing the security of the IaaS network.References: CompTIA Cloud+ materials cover governance, risk, compliance, and security for the cloud, including the implementation of network security controls like ACLs, to protect cloud environments from unauthorized access and potential security threats.
insert code

Question 2

A security analyst reviews the daily logs and notices the following suspicious activity:

The analyst investigates the firewall logs and identities the following:

Which of the following steps should the security analyst take next to resolve this issue? (Choose two.)

Correct Answer: B,D
Given the suspicious activity and Kali Linux's association with penetration testing and hacking tools, the security analyst should block all inbound connections on port 4444, as it is commonly used for malicious purposes, and block the IP address that's potentially the source of the intrusion. Additionally, checking the running processes on John Smith's computer is crucial to determine if a backdoor or unauthorized connection has been established.
insert code

Question 3

Once a year, a company's private cloud experiences increased activity. The company has a disaster recovery site that is hosted in a public cloud. To avoid investment in additional hardware, which of the following actions would BEST address this issue?

Correct Answer: A
Cloud bursting is a technique that allows you to automatically scale your cloud resources up or down based on demand. This can be a cost-effective way to address spikes in traffic or workload, without having to invest in additional hardware.
In this case, the company can configure cloud bursting to automatically spin up new VMs in the public cloud when the private cloud reaches its capacity. The new VMs will be terminated when the usage is back to normal. This will allow the company to handle the increased traffic without having to invest in additional hardware.
insert code

Question 4

A system surpasses 75% to 80% of resource consumption. Which of the following scaling approaches is the most appropriate?

Correct Answer: C
Load scaling is the most appropriate approach when a system surpasses 75% to 80% of resource consumption. This method involves adjusting resources dynamically in response to the current load, ensuring the system can handle increased demand without performance degradation. Load scaling can be automatic, allowing systems to scale up or down based on predefined metrics like CPU usage, memory, or network traffic, providing an efficient way to manage resources and maintain optimal performance.
insert code

Question 5

An IT security team wants to ensure that the correct parties are informed when a specific user account is signed in. Which of the following would most likely allow an administrator to address this concern?

Correct Answer: A
To ensure that the correct parties are informed when a specific user account is signed in, the best action is to create an alert based on user sign-in criteria. This alert can notify administrators or security personnel when the specified event occurs.References: Security monitoring and alerting are critical components of managing cloud environments securely, as discussed in the CompTIA Cloud+ certification.
insert code
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download CompTIA.CV0-004.v2025-01-01.q158 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.