100% Pass Ensure CompTIA Cloud+ CV0-001 Practice Test with Free VCE and PDF (Question 31 – Question 60)

PassLeader released the NEWEST CompTIA CV0-001 exam dumps recently! Both CV0-001 VCE dumps and CV0-001 PDF dumps are available on PassLeader, either CV0-001 VCE dumps or CV0-001 PDF dumps have the NEWEST CV0-001 exam questions in it, they will help you passing CompTIA CV0-001 exam easily! You can download the valid CV0-001 dumps VCE and PDF from PassLeader here: https://www.passleader.com/cv0-001.html (408 Q&As Dumps –> 730 Q&As Dumps)

Also, previewing the NEWEST PassLeader CV0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpczFYMEdHMHdmbEk

QUESTION 31
A company wants to migrate its critical application to a public cloud but the security administrator is concerned with the application’s data confidentiality requirements. Which of the following can be done to review if the appropriate management security controls are in place at the provider?

A.    Penetration testing
B.    Vulnerability assessment
C.    Performance and application testing
D.    Policy and procedure audit

Answer: D

QUESTION 32
A catastrophic disk failure occurred on a company’s critical database. After a technician performs a full system restore, one of the business units realizes that the current backup does not hold fresh enough information. Which of the following should the company revise?

A.    RTO
B.    MTTR
C.    RPO
D.    MTBF

Answer: C

QUESTION 33
A company has virtualized all of their servers on one physical server located on the company’s first floor datacenter. The company also uses security software from a third-party cloud vendor as part of a SaaS contract. The overall cloud network model for this company’s network is BEST described by which of the following?

A.    Hybrid
B.    Offsite public
C.    On-site private
D.    Community

Answer: A

QUESTION 34
A company has five servers and wishes to consolidate into a single physical server. Which of the following migration methods would accomplish this?

A.    P2P
B.    V2P
C.    V2V
D.    P2V

Answer: D

QUESTION 35
An external USB hard drive physically attached to a server is a: ____.

A.    SAN
B.    DAS
C.    VLAN
D.    NAS

Answer: B

QUESTION 36
Which of the following protocols is MOST likely used by a switch to communicate status information to an administrator?

A.    SNMP
B.    SMTP
C.    NNTP
D.    HTTP

Answer: A

QUESTION 37
A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses. Which of the following should be implemented?

A.    Soft limit quotas
B.    Reservations
C.    Resource pooling
D.    Entitlement allocations

Answer: B

QUESTION 38
A technician would like to connect to a virtual server from inside the network, using a desktop computer. Which of the following tools could the technician use?

A.    HTTP
B.    RDP
C.    IMAP
D.    SSL

Answer: B

QUESTION 39
Which of the following is an example of two-factor authentication when accessing a virtual server?

A.    Multiple usernames/passwords for all websites
B.    Username/password, fingerprint scanner, and key fob
C.    Username/password and PIN
D.    Username/password and fingerprints

Answer: D

QUESTION 40
A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met. Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards?

A.    Replication consistency
B.    Penetration test
C.    Bandwidth assessment
D.    Application delivery

Answer: B

QUESTION 41
A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?

A.    Latency
B.    Replication
C.    Redundancy
D.    Failback

Answer: C

QUESTION 42
Which of the following would allow the knowledge management division to maximize the ability to find documents within an online document repository?

A.    Object ID
B.    Access control
C.    Metadata
D.    Rapid deployment

Answer: C

QUESTION 43
A system administrator wants to create a mitigation strategy to quickly roll back a virtual image after applying the latest updates. Which of the following would the administrator utilize?

A.    File backup
B.    Snapshot
C.    Offline backup
D.    Image backup

Answer: B

QUESTION 44
A system administrator currently has two web server VMs on one host. Users are reporting that query searches within the site are slow. The system administrator notices that the host CPU is above the threshold. Which of the following should be completed?

A.    Migrate one web server to another host.
B.    Defragment the hard drives on the server.
C.    Rebuild the two web server VMs.
D.    Install another NIC for the creation of a network bridge.

Answer: A

QUESTION 45
A storage administrator has 100 terabytes of physical storage space within the SAN. Which of the following is used to enable access to the storage space?

A.    Drive mirroring
B.    LUN creation
C.    Drive striping
D.    RAID configuration

Answer: B

QUESTION 46
The network administrator creates a DNS A record. Which of the following tools can identify which IP has been assigned to a FQDN?

A.    arp
B.    ipconfig
C.    nslookup
D.    tracert

Answer: C

QUESTION 47
A system administrator wants to be able to use one server to collect all of the logs on the network. Which of the following would be used to satisfy this scenario?

A.    Firewall logging
B.    Change management database
C.    Syslog service
D.    SNMP

Answer: C

QUESTION 48
Which of the following will allow the network administrator to verify that one IP is assigned to one VM?

A.    Virtual Local Area Network
B.    Reservations
C.    Resource Pooling
D.    Storage allocation

Answer: B

QUESTION 49
A storage administrator wants to limit an operating system from accessing all of the storage within the array. Which of the following could be enabled on the SAN?

A.    LUN masking
B.    Implement different file formats
C.    Access control lists
D.    Data at rest encryption

Answer: A

QUESTION 50
A company is required to provide their customers with zero downtime for its web application. Which of the following would satisfy this requirement?

A.    Cold site
B.    High availability
C.    Multipathing
D.    Load balancing

Answer: B

QUESTION 51
Which of the following cloud services provides billing, payroll, contract management, and human resource management functions?

A.    CaaS
B.    SaaS
C.    BPaaS
D.    DaaS

Answer: C

QUESTION 52
Which of the following cloud delivery models is deployed over a company intranet or company-hosted datacenter?

A.    Private cloud
B.    Hybrid cloud
C.    Community cloud
D.    Public cloud

Answer: A

QUESTION 53
Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?

A.    Blob data
B.    Object ID
C.    Replicas
D.    Metadata

Answer: D

QUESTION 54
Which of the following hypervisor types runs on a host operating system that provides virtualization services, including memory management and device support?

A.    Type II hypervisor
B.    Proprietary hypervisor
C.    Type I hypervisor
D.    Open source hypervisor

Answer: A

QUESTION 55
Users on a network report that they are unable to access any external websites, however, they are able to access resources by IP address. Which of the following command line utilities would be used FIRST in troubleshooting this problem?

A.    netstat
B.    telnet
C.    nslookup
D.    ipconfig

Answer: C

QUESTION 56
Which of the following storage technologies would be MOST appropriate for installations where fast data access time is paramount?

A.    USB
B.    Tape
C.    HDD
D.    SSD

Answer: D

QUESTION 57
A web hosting company received reports of slow performance from four out of the five clients. Upon investigation, it was determined that a hosted virtual machine was using more RAM and CPU than the others. Which of the following MOST likely contributed to the issue?

A.    Hard quota limits
B.    Soft quota limits
C.    Storage allocation
D.    Resource pooling

Answer: D

QUESTION 58
Which of the following access control types allows users to assign security attributes to objects such as files and directories?

A.    Role based
B.    Mandatory
C.    Discretionary
D.    Rule set based

Answer: C

QUESTION 59
An administrator is tasked to perform a P2V migration of a critical application. Which of the following steps should the administrator perform FIRST before the migration?

A.    Harden the operating system
B.    Migrate the server in a development environment
C.    Contact the vendor for compatibility requirements
D.    Establish a performance baseline

Answer: C

QUESTION 60
Which of the following networking components would be used to connect two subnets in a virtual environment?

A.    Virtual switch
B.    Virtual disks
C.    Virtual router
D.    Virtual HBA

Answer: C


Welcome to choose PassLeader CV0-001 dumps for 100% passing CompTIA CV0-001 exam: https://www.passleader.com/cv0-001.html (408 Q&As VCE Dumps and PDF Dumps –> 730 Q&As VCE Dumps and PDF Dumps)

Also, previewing the NEWEST PassLeader CV0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpczFYMEdHMHdmbEk