👻🕸️ Cybersecurity Awareness Month Sale - 50% off select memberships! 🕸️👻

21 hours, 46 minutes remaining!
00:15:00

Free CompTIA Cloud+ CV0-003 Practice Test

Prepare for the CompTIA Cloud+ CV0-003 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Cloud Architecture and Design
    • Security
    • Deployment
    • Operations and Support
    • Troubleshooting
Question 1 of 15

Which command can be used to test the accessibility of a web service by retrieving data from a specified URL?

Question 2 of 15

Which of the following describes a hybrid cloud model?

  • A deployment dedicated to a single organization with no external services integrated.

  • A deployment consisting of services sourced from several unrestricted public cloud providers without any private elements.

  • A deployment shared by several organizations with similar regulatory concerns but without integration to their on-premises infrastructures.

  • A deployment that combines private computing resources with public cloud services, allowing data and application portability between them.

Question 3 of 15

A company is deploying a new application in the cloud which is expected to have variable workloads throughout the day, with peak usage anticipated during business hours. The cloud administrator needs to ensure that the compute resources automatically adjust to the changing workload demand to maintain performance while controlling costs. Which feature should the cloud administrator configure?

  • Ballooning

  • Static resource allocation

  • Auto-scaling

  • Reservations

Question 4 of 15

Which network function is MOST essential to provide high availability and prevent a single point of failure in a cloud environment?

  • Load balancers

  • Routers

  • DDoS protection

  • Switches

Question 5 of 15

A cloud-based CRM software used by your company allows users to export sensitive customer data. To align with the company's data handling policy, which software feature policy should be enforced?

  • Enforce password complexity requirements

  • Encrypt data at rest

  • Restrict the export feature based on user roles

  • Provide read-only access to all users

Question 6 of 15

A company is seeking to extend its IT capabilities without investing in additional data center infrastructure. They plan to use cloud services for common business applications and high-demand services that face the public internet. They require a model that provides a high degree of elasticity and allows them to only pay for the resources they use. Which type of cloud model would best suit their needs?

  • Hybrid cloud model

  • Public cloud model

  • Private cloud model

  • Community cloud model

Question 7 of 15

A financial organization requires a cloud solution that enables it to maintain stringent control over its data and infrastructure due to compliance with financial regulations and to promote sensitive data handling protocols. Which cloud deployment model would BEST align with these requirements while maintaining the option for future integration with broader cloud services?

  • Dedicated Hosts on a Public Cloud

  • Private Cloud

  • Community Cloud

  • Hybrid Cloud with a dominant public infrastructure

Question 8 of 15

An organization is reviewing security solutions for their cloud-based hosts. The security team wants a solution that not only detects potential intrusions by analyzing system events and log files but also has the capability to automatically block suspicious activity in real time without human intervention. Which type of solution should the organization implement on their hosts?

  • Host-based Intrusion Prevention System (HIPS)

  • Host-based Intrusion Detection System (HIDS)

  • Standard network firewall

  • Anti-virus software

Question 9 of 15

What distinguishes a multicloud strategy from other cloud deployment models?

  • It leverages multiple cloud services from different providers to meet specific business requirements.

  • It is only utilizing various services provided by a single public cloud provider.

  • It solely relies on a private cloud infrastructure to deploy different applications.

  • It is a mix of on-premises, private cloud, and public cloud service from a single provider.

Question 10 of 15

A company is planning to shift its email service from one Software as a Service (SaaS) provider to another due to a change in business requirements. Which of the following would be a primary consideration to ensure the migration process accounts for potential differences between the platforms?

  • Evaluating feature compatibility between the old and new services

  • Adjusting hypervisor settings to match the new provider's environment

  • Streamlining account permissions for the new provider's directory service

  • Reconfiguring on-site hardware to support the new cloud platform

Question 11 of 15

A company's cloud infrastructure is experiencing erratic performance and the security team suspects a potential malware infection on several virtual servers. What should be the FIRST action to ensure a proper response to this suspected security incident?

  • Activate the EDR system's isolation feature for the affected virtual servers.

  • Check system logs for irregularities before taking action on the virtual servers.

  • Run a full system scan on all network nodes without any preliminary containment measures.

  • Reboot the affected virtual servers to interrupt potential malicious processes.

Question 12 of 15

An organization with a distributed workforce is planning to implement a cloud-hosted virtual desktop infrastructure (VDI). Each user needs to access the VDI from multiple devices, with some users requiring more intensive graphics processing than others. What per-user licensing approach should the organization consider to balance between cost-efficiency and tailored user experience?

  • Flat-rate per-user licensing

  • Concurrent user licensing

  • Varied service tiers per-user licensing

  • Socket-based licensing

Question 13 of 15

A DevOps engineer needs to deploy a new cloud application using containers. The application requires access to sensitive configuration information, such as database credentials, which should not be stored in the container image or in source code. Which of the following solutions should the engineer use to securely manage this sensitive configuration information?

  • Use a secrets management service to provide the credentials to the containers at runtime.

  • Store the credentials on persistent storage volumes shared with the containers.

  • Configure the credentials as environment variables accessible within the container.

  • Write the credentials in a configuration file and include that file within the container image.

Question 14 of 15

A cloud administrator is deploying a set of virtual machine instances using an Infrastructure as Code (IaC) template. The instances are being created, but they are not configured with the necessary network security group which should allow inbound traffic on port 80 and 443. Upon inspecting the template, the administrator needs to identify the issue that is causing the network security group to not be associated properly. What should the administrator look for in the IaC template to resolve this issue?

  • The number of instances exceeds the template limit.

  • Syntax errors in the template that prevent execution.

  • Network security group configured for only outbound rules.

  • A missing reference to the network security group in the virtual machine configuration section of the template.

Question 15 of 15

A cloud administrator is tasked with selecting a security tool for monitoring network traffic and protecting against malware in a cloud environment. However, the administrator must ensure that the deployment of this tool has a minimal impact on system performance. Which of the following would be the BEST option to use?

  • Port scanner

  • Agent-based intrusion detection system (IDS)

  • Network-based intrusion detection system (IDS)

  • Vulnerability scanner