CompTIA Exam Cloud+ CV0-001 Dumps With VCE and PDF Download (Question 211 – Question 240)

PassLeader released the NEWEST CompTIA CV0-001 exam dumps recently! Both CV0-001 VCE dumps and CV0-001 PDF dumps are available on PassLeader, either CV0-001 VCE dumps or CV0-001 PDF dumps have the NEWEST CV0-001 exam questions in it, they will help you passing CompTIA CV0-001 exam easily! You can download the valid CV0-001 dumps VCE and PDF from PassLeader here: https://www.passleader.com/cv0-001.html (408 Q&As Dumps –> 730 Q&As Dumps)

Also, previewing the NEWEST PassLeader CV0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpczFYMEdHMHdmbEk

QUESTION 211
Which of the following is an access control type that requires a username and password along with a hardware token?

A.    SSO
B.    Single-factor
C.    RBAC
D.    ACL
E.    Multifactor

Answer: E

QUESTION 212
The IT department has had problems coping with the demand of service provisioning and deprovisioning. If the IT department implements a cloud computing platform, which of the following would improve their productivity?

A.    On-demand self-service
B.    Multi-tenancy
C.    Scalability
D.    Elasticity

Answer: A

QUESTION 213
A company wants to streamline their reporting tools. They have decided to implement a third party SaaS cloud reporting tool to process additional data, but will continue to process confidential data internally. Which of the following deployment models is BEST suited for the company?

A.    Shared
B.    Private
C.    Hybrid
D.    Community

Answer: C

QUESTION 214
Which of the following mitigates newly found vulnerabilities within software for an environment?

A.    Patching
B.    Clustering
C.    Elasticity
D.    Scaling

Answer: A

QUESTION 215
Joe, an administrator, is searching through directories on his multi-tenant cloud environment when he notices he is able to access a directory holding another company’s data. Which of the following should be implemented to mitigate this issue?

A.    On-premise hosting
B.    Off-premise hosting
C.    Hashing
D.    Data segregation

Answer: D

QUESTION 216
Which of the following would be the FIRST choice to encrypt a laptop hard drive?

A.    DES
B.    TDE
C.    AES
D.    SSL

Answer: C

QUESTION 217
Which of the following would be the FIRST thing to do after determining an upgrade is required for a production application server?

A.    Perform the upgrade
B.    Notify the application users of the upgrade
C.    Submit a change request
D.    Schedule a maintenance window

Answer: C

QUESTION 218
Which of the following refers to the maximum amount of data that can be lost due to a system failure?

A.    MTBF
B.    RTO
C.    MTTR
D.    RPO

Answer: D

QUESTION 219
A company that provides cloud-based storage services wants to ensure that if underlying hard disk drives are sent to the disposal facility, they will not contain any data in clear-text format. Which of the following should be done to accomplish this task?

A.    Implement degaussing
B.    Ensure that ACLs are configured on users’ data
C.    Implement full-disk encryption
D.    Fill disk with random data before disposal

Answer: C

QUESTION 220
A company that provides IaaS to small business organizations needs to allow customers to control the power state of their virtual machines. Which of the following should be implemented to accomplish this task?

A.    Grant limited access to the hypervisor management interface
B.    Grant limited access to the host power managing infrastructure
C.    Allow Wake-on-LAN packets on the firewall
D.    Configure customer’s VMs to be in an always-on state

Answer: A

QUESTION 221
An administrator is planning to implement multipathing for IP-based storage. Which of the following protocols can be used in this configuration?

A.    NFS
B.    iSCSI
C.    FC
D.    FCoE

Answer: B

QUESTION 222
Which of the following, in conjunction with IPSec, can be configured to provide secure access to files on a NAS?

A.    iSCSI
B.    CIFS
C.    FCoE
D.    SSH

Answer: B

QUESTION 223
A system administrator is planning storage infrastructure to store backup copies of virtual machines that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select TWO.)

A.    SMB
B.    RAW
C.    EXT
D.    FAT
E.    NTFS

Answer: CE

QUESTION 224
Which of the following can be used to enable out-of-band management of a Windows-based host?

A.    IPMI
B.    WMI
C.    SMTP
D.    SNMP

Answer: A

QUESTION 225
An administrator notices that the mouse does not perform as expected within a VM. Which of the following might improve the performance of the mouse?

A.    Install a 64-bit OS within the guest.
B.    Enable USB port mapping.
C.    Replace the mouse on the host server.
D.    Install the virtualization guest software.

Answer: D

QUESTION 226
A recently deployed VM is running a Human Resource (HR) application on the HR network. Workstations in the accounting department can access the Internet and other accounting servers, but are unable to ping the new VM. Which of the following must be enabled for the accounting department to access this HR application?

A.    The computers must be granted read rights to the VM.
B.    Replace the accounting workgroup switch.
C.    VLAN routing should be enabled on the router.
D.    Disable port security on the HR workgroup switch.

Answer: C

QUESTION 227
An administrator deployed a VM that is hosting an internal website. Users report they are unable to access the new website. Which of the following should the network administrator do to test whether web traffic is being sent and received?

A.    Browse to any website
B.    Ping the VM’s IP address
C.    Ping the VM’s loopback address
D.    Telnet to port 80

Answer: D

QUESTION 228
Which of the following would be used to advertise a public IP address on redundant WAN circuits?

A.    BGP
B.    UDP
C.    OSPF
D.    ICMP

Answer: A

QUESTION 229
A company has deployed a website which is mirrored at a secondary datacenter. Which of the following should be changed to route users to the secondary datacenter in case of a primary site failure?

A.    Virtual address
B.    DNS record
C.    ARP table
D.    Disaster recovery plan

Answer: B

QUESTION 230
A security administrator is being hired to perform a penetration test of a third-party cloud provider as part of an annual security audit. Which of the following is the FIRST step that must be performed?

A.    Attempt known exploits
B.    Scan for vulnerabilities
C.    Research publicized incidents
D.    Get written permission

Answer: D

QUESTION 231
A bare metal hypervisor runs: ____.

A.    On a virtual database server
B.    On a virtual machine
C.    Directly on a physical machine
D.    On top of another operating system

Answer: C

QUESTION 232
Which of the following is MOST important when factoring network level security in a public cloud environment?

A.    Ensuring good user experience
B.    Ensuring confidentiality
C.    Ensuring redundancy
D.    Ensuring high availability

Answer: B

QUESTION 233
Which of the following should an administrator implement when connecting the company’s existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?

A.    A proxy server
B.    A load balancing solution
C.    An IPSec tunnel
D.    A server clustering solution

Answer: C

QUESTION 234
An administrator is creating a new VM template and has a requirement that the OS must be hardened. Which of the following should be performed to harden a guest OS?

A.    Encrypt the hard drive
B.    Run defrag
C.    Rename administrator account
D.    Change page file

Answer: C

QUESTION 235
A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company’s servers. Which of the following should the administrator perform to accomplish this goal?

A.    P2V
B.    P2P
C.    V2P
D.    V2V

Answer: A

QUESTION 236
An administrator needs to provide Internet access to all internal systems using a single IP address. Which of the following should the administrator implement?

A.    NAT
B.    Virtual switching
C.    VLAN tagging
D.    PAT

Answer: A

QUESTION 237
Which of the following technologies would MOST likely be used for personal use to virtualize a desktop?

A.    Type II
B.    Type I
C.    RAID 5
D.    RAID 0

Answer: A

QUESTION 238
In which of the following cloud services will the customer be responsible for securing provisioned hosts?

A.    PaaS
B.    IaaS
C.    SaaS
D.    DaaS

Answer: B

QUESTION 239
Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?

A.    Defrag system
B.    Update drivers
C.    Disable firewall
D.    Patch system

Answer: D

QUESTION 240
Which of the following can be used to encrypt data at rest on a VM located in the cloud?

A.    AES
B.    SSL
C.    TLS
D.    VPN

Answer: A


Welcome to choose PassLeader CV0-001 dumps for 100% passing CompTIA CV0-001 exam: https://www.passleader.com/cv0-001.html (408 Q&As VCE Dumps and PDF Dumps –> 730 Q&As VCE Dumps and PDF Dumps)

Also, previewing the NEWEST PassLeader CV0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpczFYMEdHMHdmbEk