00:15:00

Free CompTIA Cloud+ CV0-003 Practice Test

Prepare for the CompTIA Cloud+ CV0-003 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Cloud Architecture and Design
    • Security
    • Deployment
    • Operations and Support
    • Troubleshooting
Question 1 of 15

Which of the following best defines the retention aspect of a backup and restore policy?

  • The frequency at which backups are performed.

  • The length of time that backup copies are kept before they are deleted or archived.

  • The number of backup copies that must be stored in different locations.

  • The rule that requires three copies of data on two different media with one copy offsite.

Question 2 of 15

Which process allows for the automatic testing and deployment of software updates to a production environment to ensure high velocity in software delivery?

  • Continuous integration/ continuous deployment

  • Lifecycle state management

  • Infrastructure as code

  • Change management automation

  • Service orchestration

  • Resource tagging automation

Question 3 of 15

A cloud administrator needs to implement a solution that will inspect and manage web application traffic to protect against threats, such as cross-site scripting and SQL injection, without modifying the back-end infrastructure. Which of the following options is the BEST to achieve this?

  • Data loss prevention (DLP) system

  • Web application firewall (WAF)

  • Proxy server configured for high anonymity

  • Network access control (NAC)

Question 4 of 15

In the event of data loss, which type of restoration method allows you to bring back the system to the most recent state before the loss occurred without restoring the entire system?

  • Restore files

  • Alternate location

  • Snapshot

  • In place

Question 5 of 15

Which network function is MOST essential to provide high availability and prevent a single point of failure in a cloud environment?

  • DDoS protection

  • Routers

  • Load balancers

  • Switches

Question 6 of 15

What distinguishes a multicloud strategy from other cloud deployment models?

  • It solely relies on a private cloud infrastructure to deploy different applications.

  • It is only utilizing various services provided by a single public cloud provider.

  • It is a mix of on-premises, private cloud, and public cloud service from a single provider.

  • It leverages multiple cloud services from different providers to meet specific business requirements.

Question 7 of 15

Which tool leverages the concept of 'playbooks' to automate cloud infrastructure provisioning and management, emphasizing the need for no additional remote agents and using SSH for communication?

  • Terraform

  • Chef

  • Puppet

  • Ansible

Question 8 of 15

During an audit, a cloud technician finds that customer credit card information was stored without any protective measures. Which of the following represents the MOST likely data security issue in this scenario?

  • Insecure ciphers

  • Unencrypted data

  • Data misclassification

  • Lack of encryption in protocols

Question 9 of 15

A company is looking to adopt a cloud-based service to enhance their team's ability to collaborate on documents, spreadsheets, and presentations in real time. The service should also integrate seamlessly with their existing email and calendar system, which is managed by a third-party vendor. Additionally, they require a solution that minimizes the need for ongoing IT management. Which service would BEST meet these requirements?

  • Virtual desktop infrastructure (VDI) with built-in word processor

  • Dedicated cloud-based email service with limited document handling

  • Infrastructure as a Service (IaaS) to host custom collaboration applications

  • Collaboration platform with real-time editing capabilities

  • Legacy on-premises application with a cloud storage gateway

  • Stand-alone cloud-based project management tool

Question 10 of 15

A tech company is experiencing unexpected surges in user traffic to their cloud-hosted application during holiday seasons. To ensure that the application remains responsive without purchasing excess permanent capacity, which scaling architecture should they implement?

  • Cloud bursting

  • Vertical scaling

  • Horizontal scaling

  • Auto-scaling

Question 11 of 15

A company wants to optimize their cloud architecture for a high-volume, event-driven application that needs to process thousands of requests per second while keeping infrastructure management to a minimum. Which of the following solutions should they implement to meet these requirements most effectively?

  • Deploy the application using serverless computing functions

  • Host the application on a container orchestration platform with manual scaling

  • Use a Platform as a Service (PaaS) offering with pre-defined compute resources

  • Set up multiple virtual machines with auto-scaling groups

Question 12 of 15

Following a recent upgrade to the cloud service platform, an automation script used for resource deployment fails to execute correctly. The script was operational before the platform upgrade. What is the MOST likely reason for the failure of the script?

  • Network configuration changes

  • Corrupt script files

  • Incompatibility with the updated platform features

  • Expired user credentials

Question 13 of 15

An affinity rule in a cloud environment requires that certain virtual machines run on the same physical host to enhance performance.

  • True

  • False

Question 14 of 15

An agricultural company wishes to improve crop yields through precise, data-driven decision-making. They plan to deploy numerous sensors across their fields to collect environmental data. Which cloud service model would best facilitate the aggregation and analysis of this data from the IoT devices for real-time decision-making?

  • Software as a Service (SaaS)

  • Platform as a Service (PaaS)

  • Serverless computing

  • Infrastructure as a Service (IaaS)

Question 15 of 15

A financial firm utilizes an Infrastructure as a Service (IaaS) cloud model to process transactions and store sensitive client data. With a regulatory requirement to safeguard data with strong cryptographic measures, which of the following represents the most comprehensive approach to meet compliance standards?

  • Use the cloud provider's default database encryption and enable Secure File Transfer Protocol (SFTP) for data transit.

  • Encrypt the data in transit using HTTPS and rely on the cloud vendor’s default encryption settings for data at rest.

  • Encrypt the data at-rest using AES-256 and employ HTTPS for end-to-end encryption during transit.

  • Configure file permissions to restrict unauthorized access and utilize RSA for data transmission security.