CV0-003 Dumps

CV0-003 Free Practice Test

CompTIA CV0-003: CompTIA Cloud+ Certification Exam

QUESTION 111

- (Topic 2)
A technician is trying to delete six decommissioned VMs. Four VMs were deleted without issue. However, two of the VMs cannot be deleted due to an error. Which of the following would MOST likely enable the technician to delete the VMs?

Correct Answer: D
Removing the lock from the two VMs is what would most likely enable the technician to delete the VMs that cannot be deleted due to an error. A lock is a feature that prevents certain actions or operations from being performed on a resource or service, such as deleting, modifying, moving, etc. A lock can help to protect a resource or service from accidental or unwanted changes or removals. Removing the lock from the two VMs can enable the technician to delete them by allowing the delete action or operation to be performed on them.

QUESTION 112

- (Topic 1)
An organization is hosting a cloud-based web server infrastructure that provides web- hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations.
Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?

Correct Answer: B
Distributed denial-of-service (DDoS) protection is a type of security solution that detects and mitigates DDoS attacks that aim to overwhelm or disrupt a system or service by sending large volumes of traffic from multiple sources. DDoS protection can prevent such disruptive traffic from reaching the web servers by filtering out malicious or unwanted traffic and allowing only legitimate traffic to pass through. DDoS protection can also help maintain the availability and functionality of web services and applications during a DDoS attack. References: CompTIA Cloud+ Certification Exam Objectives, page 14, section 2.7
Reference: https://blog.paessler.com/the-top-5-causes-of-sudden-network-spikes

QUESTION 113

After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message.
Which of the following should the administrator verify NEXT?

Correct Answer: A

QUESTION 114

A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task.
Which of the following ports should the administrator open on the monitoring server’s firewall?

Correct Answer: D

QUESTION 115

A systems administrator needs to convert ten physical servers to virtual.
Which of the following would be the MOST efficient conversion method for the administrator to use?

Correct Answer: C