CV0-001 - CompTIA Cloud+ Certification Exam

Go back to CompTIA

Exam FAQ

How many questions are there on the CV0-001 exam? How long is the CV0-001 exam? How much does the CV0-001 exam cost? What is the best way to study for the CV0-001 exam?

Example Questions

An administrator notices that the mouse does not perform as expected within a VM. Which of the following might improve the performance of the mouse? An administrator is planning to implement multipathing for IP-based storage. Which of the following protocols can be used in this configuration? A system administrator has a pool of employees using VMs that have a low business value. Which of the following would MOST likely be an appropriate allocation of host resources for this pool? Which of the following is the correct subnet mask for a VM with an IP address configuration of An administrator has noticed that a 500MB file is taking over three hours to move over a 10Gbps link. Which of the following is MOST likely responsible for this performance? A datacenter migration is taking place and the administrator has been tasked with reducing the footprint of the new datacenter by virtualizing as many servers as possible. A physical server has been flagged as a candidate for relocation to the new data center. Which of the following methods would be the FIRST method for relocating the server to the new data center? Which of the following offers 128, 192, and 256 bit encryption? Which of the following is true about a Type II hypervisor? Ubiquitous access to cloud computing means: Which of the following describes a best practice for placement of VM swap files in a virtualized environment? The Chief Information Officer (CIO) of a company is tasked to save costs by reducing datacenter space. The administrator explains that virtualization of servers will support this task as a benefit of migrating to a cloud environment known as: Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred? Which of the following access control types allows users to assign security attributes to objects such as files and directories? Which of the following protocols uses port 53, by default? VM templates should have their default account passwords changed upon deployment to prevent: An employee is asked to run an instance of a Linux OS while booted up in a Windows OS. Which of the following types of virtualization would be used to meet this requirement? An administrator needs to provide Internet access to all internal systems using a single IP address. Which of the following should the administrator implement? A company has contracted email and storage services from a cloud provider. They have seen significant growth in sales of their product and have been hiring additional workers. Their recent cloud services bill has increased and is projected to increase with another new project coming online. Which of the following cloud characteristics is represented? Which of the following cloud services provides billing, payroll, contract management, and human resource management functions? A government agency wants to create a common environment that would allow them to share documents with other agencies using a cloud model. Which of the following would be the BEST approach? Which of the following technologies would MOST likely be used for personal use to virtualize a desktop? Which of the following will allow the administrator to be able to reduce Internet Service Provider costs for two sites that have replication as a preferred method for disaster recovery events? In which of the following situations would a network administrator optimize a company's WAN? An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography. Which of the following should the administrator implement NEXT? Which of the following mitigates newly found vulnerabilities within software for an environment? A VM that is generally used for development is tested quarterly on other hypervisors to validate sideways compatibility. Which of the following migrations does this describe? An administrator is creating a new VM template and has a requirement that the OS must be hardened. Which of the following should be performed to harden a guest OS? A hypervisor host that has two fibre-channel ports needs to be connected to a storage array that has four fibre-channel ports. How many zones should be created for maximum redundancy? A small business is moving ten physical servers to the cloud. Which of the following should the cloud provider implement to ensure that all ten servers can dynamically share memory resources with other tenants as needed while not interfering with the other tenants? An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration? A company has an existing internal network that hosts confidential information. However, this network also has a connection to a separate site. The separate site is managed by a third party organization that has an SLA with the company. Which of the following BEST defines this cloud delivery model? An administrator has configured a cluster but one of the VMs returns an error when attempting to automatically fail-over to another host in the cluster. Which of the following should be verified? Which of the following would be the FIRST choice to encrypt a laptop hard drive? Which of the following is a subcomponent of a virtual machine? A network engineer is investigating slow response times for queries to a cloud-hosted database. The switch configurations show that there are several traffic bottlenecks. Which of the following should the engineer implement to BEST solve the problem and prevent future issues? An administrator has been reviewing a cloud providers website and would like to view the current information about all services available. Which of the following should the administrator analyze? Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors? Which of the following would be used to prove the existence of vulnerabilities on a network? A storage array is shared with other departments. An administrator would like to ensure that no other department performs backups on the LUNs. Which of the following could be used to mitigate this? (Select TWO). A company has two datacenters in different cities. When one of the datacenters loses power, there is near instant failover to the other datacenter. This is an example of which of the following? Which of the following is MOST important when factoring network level security in a public cloud environment? A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met. Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards? Monitoring alarms should be set based on: Which of the following describes the combination of a disk, computer, and a network into a pool of resources to efficiently allocate resources? A start-up company has recently gone public and is experiencing unexpected growth. Which of the following cloud service models would allow the company to provide internal email quickly to new employees? Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data? An external USB hard drive physically attached to a server is a: Which of the following will allow the network administrator to verify that one IP is assigned to one VM? The administrator is required to accommodate 200GB of online (near-line) storage for the monthly backups while minimizing cost. Which of the following disk types should be purchased? A system administrator identified an issue on a critical server that is hosted in the cloud. The user community is affected by this issue, but is still able to work. A reboot is needed to rectify this issue. Which of the following steps should the administrator do FIRST to resolve this issue?

Study Guides