00:20:00

CompTIA Cloud+ Practice Test (CV0-004)

Use the form below to configure your CompTIA Cloud+ Practice Test (CV0-004). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Cloud+ CV0-004 (V4)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Cloud+ CV0-004 (V4) Information

The CompTIA Cloud+ CV0-004 is a test that shows someone knows how to work with cloud computers. A cloud computer is not a single machine in one room. It is many computers in distant data centers that share power and space through the internet. Companies use these shared computers to store files, run programs, and keep services online.

To pass the Cloud+ test a person must understand several ideas. First, they need to plan a cloud system. Planning means choosing the right amount of storage, memory, and network speed so that programs run smoothly. Second, the person must set up or deploy the cloud. This includes connecting servers, loading software, and making sure everything talks to each other.

Keeping the cloud safe is another part of the exam. Test takers study ways to protect data from loss or theft. They learn to control who can log in and how to spot attacks. They also practice making backup copies so that information is not lost if a problem occurs.

After setup, the cloud must run every day without trouble. The exam covers monitoring, which is the act of watching systems for high use or errors. If something breaks, the person must know how to fix it fast. This is called troubleshooting. Good troubleshooting keeps websites and apps online so users are not upset.

The Cloud+ certificate lasts for three years. Holders can renew it by taking new classes or earning more points through training. Many employers look for this certificate because it proves the worker can design, build, and manage cloud systems. Passing the CV0-004 exam can open doors to jobs in network support, cloud operations, and system engineering.

CompTIA Cloud+ CV0-004 (V4) Logo
  • Free CompTIA Cloud+ CV0-004 (V4) Practice Test

  • 20 Questions
  • Unlimited
  • Cloud Architecture
    Deployment
    Operations
    Security
    DevOps Fundamentals
    Troubleshooting
Question 1 of 20

A hospital seeks a unified sign-in among several clinics to cut down on overhead from creating individual accounts. Which solution best satisfies this need while still transferring user attributes between locations?

  • Allow each clinic to manage credentials independently using broader privileges

  • Replicate all user accounts to each clinic through periodic synchronization

  • Extend local user directories across all clinics with one password policy

  • Adopt a recognized single sign-on solution that shares user details across sites

Question 2 of 20

An environment with unpredictable usage patterns and minimal automation tools requires direct oversight to handle capacity changes. The team wants to add or remove resources themselves whenever usage varies. Which approach is best to meet these requirements?

  • A manual method that enables direct oversight for capacity changes

  • A triggered approach using performance metrics

  • A vertical strategy that increases resources on one component

  • A scheduled process with defined intervals

Question 3 of 20

A small enterprise seeks a secondary location that is not active but can be made available in a moderate timeframe. The facility will keep core systems ready, though not running day-to-day. Which environment approach best fulfills their needs?

  • A managed off-site service that provides adjustable capacity without dedicated equipment

  • A mirror site with periodic data copying and redundant systems that reflect active production

  • A partially configured location with basic infrastructure pre-installed, requiring limited steps for activation

  • A minimally equipped location that needs installation and restoration from archived backups

Question 4 of 20

Which method ensures an encrypted path for data transmissions across an untrusted link?

  • Application load balancer

  • Transit gateway

  • VPN

  • Peering

Question 5 of 20

After upgrading the organization's container orchestration platform to the newest version, new application deployments begin failing. Build logs repeatedly reference configuration files that existed only in an earlier container image revision. What is the BEST first step an administrator should take to restore successful deployments?

  • Force the platform to pull the latest container images, replacing outdated local copies

  • Synchronize host clocks with the registry's NTP servers

  • Increase memory reservations on the container hosts

  • Modify internal DNS records to route traffic through a different gateway

Question 6 of 20

A developer is creating a new service that requires programmatic connections to a remote resource in a shared environment. Which measure best supports proper verification of those connections?

  • Use a common repository for access keys overseen by an external entity

  • Save tokens in configuration files with controlled access on each server

  • Store credentials in environment variables to support automated workflows

  • Obtain short-term credentials from a validation service that regularly issues new tokens

Question 7 of 20

An organization notices a virtual machine continues to run after a proof-of-concept ended. It is generating traffic and incurring charges, yet no one claims ownership. What best describes this neglected resource?

  • An expired license node

  • An unused snapshot

  • A zombie instance

  • A shared resource group

Question 8 of 20

An organization wants to standardize the initial security posture of its Linux, Windows, and container hosts before deploying them in production. According to guidance from the Center for Internet Security, which of the following approaches best establishes a secure baseline across all these systems?

  • Waiting for vendor updates and applying them during quarterly maintenance cycles

  • Archiving system images on a local drive for quick rollback

  • Conducting internal audits on an annual schedule to track misconfigurations

  • Using recommended community-based configuration checks to ensure minimum secure settings for each platform

Question 9 of 20

A cloud administrator needs to configure a backup solution that minimizes the daily backup window. The primary requirement is to only back up data that has changed since the previous day's backup operation. Which backup type meets this requirement?

  • Incremental

  • Differential

  • Synthetic full

  • Full

Question 10 of 20

A junior cloud engineer on your team accidentally committed a script containing an administrative access key to a public code repository. The key was quickly discovered and used to make unauthorized changes to the cloud environment. Which of the following is the MOST effective administrative control to prevent this type of incident from recurring?

  • Establish a security awareness program that includes mandatory training on secrets management for all technical staff.

  • Enforce a policy requiring peer review for all code changes before they are committed to a public repository.

  • Integrate an automated secret scanning tool into the CI/CD pipeline to block commits containing credentials.

  • Implement the principle of least privilege by revoking administrative access for all junior engineers.

Question 11 of 20

A developer writes environment settings in a file that uses curly braces, double-quoted property keys, and no trailing commas. During a test of the automated rollout, there is a parsing error caused by an extra comma at the end of one section. Which approach would fix the error and preserve the file’s supported structure?

  • Put all data on one line for minimal spacing

  • Use angled brackets instead of curly braces

  • Delete the comma after the last pair in each section

  • Place a semicolon after the final element

Question 12 of 20

A cloud administrator notices a high volume of emails being sent to employees. The emails appear to be from the internal IT department and request that users click a link to update their security settings. The link, however, directs them to a fraudulent website designed to harvest credentials. Which type of attack does this scenario describe?

  • DNS hijacking

  • Phishing

  • SQL injection

  • Pretexting

Question 13 of 20

A real estate group has a listing service used by internal customers, but they discover that external queries can view confidential property data without logging in. Which solution helps prevent this data exposure?

  • Write all connection attempts to activity logs for later investigation

  • Keep credentials in the application code for enhanced verification

  • Stop all network paths from reaching the service interface

  • Enforce a request token policy that verifies user rights for each property lookup

Question 14 of 20

A team has created a custom portal that lets users log in through an external provider instead of sharing passwords with the portal. Which method accomplishes this setup?

  • Prompt users to store their passwords in the portal database for each login

  • Forward credentials from the portal to a local identity service that verifies passwords directly

  • Replicate account credentials into a shared directory on the portal’s infrastructure

  • Redirect users to the external provider, have them grant access, then exchange the returned code for a token to request data

Question 15 of 20

An organization is rolling out new software to multiple environments and wants a method that ensures minimal overhead, consistent configuration, and efficient updates across different platforms. Which approach meets these needs?

  • Build a large VM template tailored for each environment

  • Create an archive containing every system library

  • Store a container blueprint in a centralized repository

  • Rely on extensive manual installation scripts per environment

Question 16 of 20

A subscription-based SaaS provider needs to introduce a new analytics engine into production. To limit the blast radius of potential issues, the team wants to send only about 5 % of live user traffic to the new version, monitor key performance indicators, and then progressively scale the rollout if results are satisfactory. Which deployment strategy best satisfies these requirements?

  • Rolling update

  • Blue-green deployment

  • In-place update

  • Canary deployment

Question 17 of 20

Which scaling approach is illustrated by an application that automatically launches additional servers whenever a new user successfully signs up?

  • Manual scaling

  • Event-triggered (event-based) scaling

  • Load-based (metric/trending) scaling

  • Scheduled scaling

Question 18 of 20

A cloud engineer is using a managed AI service to analyze a large volume of customer feedback from social media. The goal is to determine the overall attitude (positive, negative, or neutral) within the comments to gauge public perception of a new product. Which AI service should the engineer use?

  • Language translation

  • Topic clustering

  • Sentiment analysis

  • Visual recognition

Question 19 of 20

A company must keep regulatory records for at least seven years. The data is seldom accessed but must remain immutable and available if auditors request it. Which storage strategy is the MOST cost-effective while still meeting these requirements?

  • Move the data to a cold/archive object-storage tier that supports write-once-read-many (WORM) retention.

  • Replicate the dataset to an in-memory database cluster to speed retrieval.

  • Configure lifecycle rules to delete the data after 90 days to free capacity.

  • Keep the records on high-performance SSD block storage for quick random I/O.

Question 20 of 20

A cloud engineer is managing Infrastructure as Code (IaC) templates in a version control system. After a successful deployment, a manager suggests deleting all previous versions of the templates to save storage space. Which of the following describes the MOST significant risk of following this suggestion?

  • It would violate the cloud provider's terms of service.

  • The ability to roll back to a known-good state would be lost.

  • Onboarding new team members would be more difficult.

  • The currently deployed infrastructure would immediately become unstable.