Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CompTIA Cloud+ Question and Answers

CompTIA Cloud+

Last Update May 15, 2024
Total Questions : 213

We are offering FREE CV0-004 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare CV0-004 free exam questions and then go for complete pool of CompTIA Cloud+ test questions that will help you more.

CV0-004 pdf

CV0-004 PDF

$35  $99.99
CV0-004 Engine

CV0-004 Testing Engine

$42  $119.99
CV0-004 PDF + Engine

CV0-004 PDF + Testing Engine

$56  $159.99
Questions 1

A cloud administrator shortens the amount of time a backup runs. An executive in the company requires a guarantee that the backups can be restored with no data loss. Which of th€ following backup features should the administrator lest for?

Options:

A.  

Encryption

B.  

Retention

C.  

Schedule

D.  

Integrity

Discussion 0
Questions 2

A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly expenenang high latency. Which of the following would best help determine the source of the latency?

Options:

A.  

Configuring centralized logging to analyze HTTP requests

B.  

Running a flow log on the network to analyze the packets

C.  

Configuring an API gateway to track all incoming requests

D.  

Enabling tracing to detect HTTP response times and codes

Discussion 0
Questions 3

Which of the following is the best type of database for storing different types of unstructured data that may change frequently?

Options:

A.  

Vector

B.  

Relational

C.  

Non-relational

D.  

Graph

Discussion 0
Questions 4

Which of the following is the most cost-effective way to store data that is infrequently accessed?

Options:

A.  

Cold site

B.  

Hot site

C.  

Off-site

D.  

Warm site

Discussion 0
Questions 5

A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?

Options:

A.  

Disk I/O

B.  

Network packets

C.  

Average memory utilization

D.  

Percent of CPU utilization

Discussion 0
Questions 6

A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour. Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

Options:

A.  

Use laC to deploy the laaS infrastructure.

B.  

Convert the containers to VMs.

C.  

Deploy the containers over SSH.

D.  

Use private repositories for the containers.

Discussion 0
Questions 7

A developer is building a new application version using a CI/CD pipeline. The developer receives the following error message log when the build fails:

Which of the following is the most likely cause of this failure?

Options:

A.  

Incorrect version

B.  

Test case failure

C.  

Broken build pipeline

D.  

Dependency issue

Discussion 0
Questions 8

A cloud deployment uses three different VPCs. The subnets on each VPC need to communicate with the others over private channels. Which of the following will achieve this objective?

Options:

A.  

Deploying a load balancer to send traffic to the private IP addresses

B.  

Creating peering connections between all VPCs

C.  

Adding BGP routes using the VPCs' private IP addresses

D.  

Establishing identical routing tables on all VPCs

Discussion 0
Questions 9

Which of the following can reduce the risk of CI/CD pipelines leaking secrets?

Options:

A.  

Protected Git branches

B.  

Use of a VM instead of containers

C.  

Private image repositories

D.  

Canary tests

Discussion 0
Questions 10

A cloud developer needs to update a REST API endpoint to resolve a defect. When too many users attempt to call the API simultaneously, the following message is displayed:

Error: Request Timeout - Please Try Again Later

Which of the following concepts should the developer consider to resolve this error?

Options:

A.  

Server patch

B.  

TLS encryption

C.  

Rate limiting

D.  

Permission issues

Discussion 0
Questions 11

A cross-site request forgery vulnerability exploited a web application that was hosted in a public laaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?

Options:

A.  

Configure the DDoS protection on the CDN.

B.  

Install endpoint protection software on the VMs

C.  

Add an ACL to the VM subnet.

D.  

Deploy an IDS on the laaS network.

Discussion 0
Questions 12

Which of the following Al/ML technologies consumes text input to discern tone?

Options:

A.  

Text recognition

B.  

Computer vision

C.  

Visual recognition

D.  

Sentiment analysis

Discussion 0
Questions 13

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

Options:

A.  

Splicing

B.  

Rotation

C.  

Sampling

D.  

Inspection

Discussion 0
Questions 14

A cloud engineer needs to determine a scaling approach for a payroll-processing solution that runs on a biweekly basis. Given the complexity of the process, the deployment to each

new VM takes about 25 minutes to get ready. Which of the following would be the best strategy?

Options:

A.  

Horizontal

B.  

Scheduled

C.  

Trending

D.  

Event

Discussion 0
Questions 15

A systems administrator is configuring backups on a VM and needs the process to run as quickly as possible, reducing the bandwidth on the network during all times from Monday through Saturday. In the event of data corruption, the management team expects the mean time to recovery to be as low as possible. Which of the following backup methods can the administrator use to accomplish these goals?

Options:

A.  

Incremental backup daily to the cloud

B.  

Full backup on Sunday and incremental backups on all other days of the week

C.  

Differential backup daily to the cloud

D.  

Incremental backups during off-hours on Monday, Wednesday, and Friday

Discussion 0
Questions 16

Which of the following cloud deployment strategies is best for an organization that wants to run open-source workloads with other organizations that are sharing the cost?

Options:

A.  

Community

B.  

Public

C.  

Hybrid

D.  

Private

Discussion 0
Questions 17

A company wants to build its new platform using a public cloud. The workload requirements include the following:

• Implementation of custom CIS compliance

• Patch for vulnerabilities within 24 hours

• Warrant at least 1,800 IOPS per volume

Which of the following meets the requirements?

Options:

A.  

SaaS

B.  

laaS

C.  

FaaS

D.  

PaaS

Discussion 0
Questions 18

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

Options:

A.  

Rehost

B.  

Rearchitect

C.  

Refactor

D.  

Retain

Discussion 0
Questions 19

An administrator received a report that company data has been compromised. The compromise occurred on a holiday, and no one in the organization was working. While reviewing

the logs from the holiday, the administrator noted the following details:

The most appropriate action for the cloud security analyst to recommend is using CIS-hardened images. These images are pre-configured by the Center for Internet Security to provide security benchmark standards that help in mitigating vulnerabilities in publicly available container images.References: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Security Posture

Which of the following accounts should the administrator disable to prevent a further breach?

Options:

A.  

Cloud administrator

B.  

Human resources manager

C.  

Security engineer

D.  

Software developer

Discussion 0
Questions 20

An administrator used a script that worked in the past to create and tag five virtual machines. All of the virtual machines have been created: however, the administrator sees the following results:

{ tags: [ ] }

Which of the following is the most likely reason for this result?

Options:

A.  

API throttling

B.  

Service quotas

C.  

Command deprecation

D.  

Compatibility issues

Discussion 0
Questions 21

A cloud administrator recently created three servers in the cloud. The goal was to create ACLs so the servers could not communicate with each other. The servers were configured

with the following IP addresses:

After implementing the ACLs, the administrator confirmed that some servers are still able to reach the other servers. Which of the following should the administrator change to

prevent the servers from being on the same network?

Options:

A.  

The IP address of Server 1 to 172.16.12.36

B.  

The IP address of Server 1 to 172.16.12.2

C.  

The IP address of Server 2 to 172.16.12.18

D.  

The IP address of Server 2 to 172.16.14.14

Discussion 0
Questions 22

Which of the following storage resources provides higher availability and speed for currently used files?

Options:

A.  

Warm/HDD

B.  

Cold/SSD

C.  

Hot/SSD

D.  

Archive/HDD

Discussion 0
Questions 23

A cloud networking engineer is troubleshooting the corporate office's network configuration. Employees in the IT and operations departments are unable to resolve IP addresses on all devices, and the IT department cannot establish a connection to other departments' subnets. The engineer identifies the following configuration currently in place to support the office network:

Each employee needs to connect to the network with a maximum of three hosts. Each subnet must be segregated, but the IT department must have the ability to communicate with all subnets. Which of the following meet the IP addressing and routing requirements? (Select two).

Options:

A.  

Modifying the subnet mask to 255 255 254.0 for IT and operations departments

B.  

Configuring static routing to allow access from each subnet to 10.1.40.1

C.  

Modifying the BYOD policy to reduce the volume of devices that are allowed to connect to the corporate network

D.  

Configuring static routing to allow access from 10.1.30.1 to each subnet

E.  

Combining the subnets and increasing the allocation of IP addresses available to support three hosts for each employee

F.  

Modifying the subnet mask to 255.255.255.128 for the IT and operations departments

Discussion 0
Questions 24

Which of the following is used to deliver code quickly and efficiently across the development, test, and production environments?

Options:

A.  

Snapshot

B.  

Container image

C.  

Serverless function

D.  

VM template

Discussion 0
Questions 25

A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?

Options:

A.  

Setting up private development, public development, and testing environments

B.  

Segregating environments for internal and external teams

C.  

Configuring DDoS protection to mitigate the risk of downtime

D.  

Using IAM and ACL in order to bolster DLP

Discussion 0
Questions 26

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A– The end user accesses the application through a web browser to enter and view clinical data.

2A– The CTM application server reads/writes data to/from the database server.

1B– The end user accesses the application through a web browser to run reports on clinical data.

2B– The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B– The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Discussion 0
Questions 27

Which of the following provides secure, private communication between cloud environments without provisioning additional hardware or appliances?

Options:

A.  

VPN

B.  

VPC peering

C.  

BGP

D.  

Transit gateway

Discussion 0
Questions 28

A junior cloud administrator was recently promoted to cloud administrator and has been added to the cloud administrator group. The cloud administrator group is the only one that can access the engineering VM. The new administrator unsuccessfully attempts to access the engineering VM. However, the other administrators can access it without issue. Which of the following is the best way to identify the root cause?

Options:

A.  

Rebooting the engineering VM

B.  

Reviewing the administrator's permissions to access the engineering VM

C.  

Allowing connections from 0.0.0.070 to the engineering VM

D.  

Performing a packet capture on the engineering VM

Discussion 0
Questions 29

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.

The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.

The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.

During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS

Review the network architecture and supporting documents and fulfill these requirements:

Part 1:

Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.

Identify the problematic device(s).

Part 2:

Identify the correct options to provide adequate configuration for hybrid cloud architecture.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1:

Cloud Hybrid Network Diagram

Part 2:

Only select a maximum of TWO options from the multiple choice question

Options:

Discussion 0
Questions 30

A company has ten cloud engineers working on different manual following is the best method to address this issue?

Options:

A.  

Deployment documentation

B.  

Service logging

C.  

Configuration as code

D.  

Change ticketing

Discussion 0
Questions 31

Which of the following requirements are core considerations when migrating a small business's on-premises applications to the cloud? (Select two).

Options:

A.  

Availability

B.  

Hybrid

C.  

Testing

D.  

Networking

E.  

Compute

F.  

Logs

Discussion 0
Questions 32

Users have been reporting that a remotely hosted application is not accessible following a recent migration. However, the cloud administrator is able to access the application from

the same site as the users. Which of the following should the administrator update?

Options:

A.  

Cipher suite

B.  

Network ACL

C.  

Routing table

D.  

Permissions

Discussion 0
Questions 33

A cloud engineer is designing a high-performance computing cluster for proprietary software. The software requires low network latency and high throughput between cluster nodes.

Which of the following would have the greatest impact on latency and throughput when designing the HPC infrastructure?

Options:

A.  

Node placement

B.  

Node size

C.  

Node NIC

D.  

Node OS

Discussion 0
Questions 34

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

Options:

A.  

Resource tagging

B.  

Discretionary access control

C.  

Multifactor authentication

D.  

Role-based access control

E.  

Token-based authentication

F.  

Bastion host

Discussion 0
Questions 35

A banking firm's cloud server will be decommissioned after a successful proof of concept using mirrored data. Which of the following is the best action to take regarding the storage used on the decommissioned server?

Options:

A.  

Keep it temporarily.

B.  

Archive it.

C.  

Delete it.

D.  

Retain it permanently

Discussion 0
Questions 36

A bank informs an administrator that changes must be made to backups for long-term reporting purposes. Which of the following is the most important change the administrator

should make to satisfy these requirements?

Options:

A.  

Location of the backups

B.  

Type of the backups

C.  

Retention of the backups

D.  

Schedule of the backups

Discussion 0
Questions 37

A company implements a web farm with 100 servers behind an application load balancer. Dunng scaling events, new web servers that are placed in service have not loaded all their modules, which causes some requests to the web farm to fail. Which of the following should the cloud engineer implement to address the scaling issue?

Options:

A.  

Instance warm-up

B.  

Scheduled scaling

C.  

Event-based scaling

D.  

Load balancer passthrough

Discussion 0
Questions 38

A company wants to implement a work environment that will have low operational overhead and highly accessible enterprise resource planning, email, and data resources. Which of

the following cloud service models should the company implement?

Options:

A.  

laaS

B.  

PaaS

C.  

DBaaS

D.  

SaaS

Discussion 0
Questions 39

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

Options:

A.  

Review the development network routing table.

B.  

Change the ciphers on the site-to-site VPN.

C.  

Restart the site-to-site VPN tunnel.

D.  

Check the ACLS on the development workloads

Discussion 0
Questions 40

A newly configured VM fails to run application updates despite having internet access. The updates download automatically from a third-party network. Given the following output:

Which of the following troubleshooting steps would be best to take?

Options:

A.  

Checking DNS configurations

B.  

Reconfiguring routing protocols

C.  

Testing the IP address configuration

D.  

Running a trace to the router

Discussion 0
Questions 41

A company operates a website that allows customers to upload, share, and retain tull ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

Options:

A.  

Sovereignty

B.  

Data classification

C.  

Litigation holds

D.  

Retention

Discussion 0
Questions 42

Which of the following describes the main difference between public and private container repositories?

Options:

A.  

Private container repository access requires authorization, while public repository access does not require authorization.

B.  

Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images.

C.  

Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses.

D.  

Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection.

Discussion 0
Questions 43

Which of the following is a customer be responsible for in a provider-managed database service? (Select two).

Options:

A.  

Operating system patches

B.  

Table-level permissions

C.  

Minor database engine updates

D.  

Cluster configuration

E.  

Row-level encryption

F.  

Availability of hardware for scaling

Discussion 0
Questions 44

An administrator needs to adhere to the following requirements when moving a customer's data to the cloud:

• The new service must be geographically dispersed.

• The customer should have local access to data

• Legacy applications should be accessible.

Which of the following cloud deployment models is most suitable?

Options:

A.  

On-premises

B.  

Private

C.  

Hybrid

D.  

Public

Discussion 0
Questions 45

A company is required to save historical data for seven years. A cloud administrator implements a script that automatically deletes data older than seven years. Which of the following concepts best describes why the historical data is being deleted?

Options:

A.  

End of life

B.  

Data loss prevention

C.  

Cost implications

D.  

Tiered storage for archiving

Discussion 0
Questions 46

A cloud engineer is in charge of deploying a platform in an laaS public cloud. The application tracks the state using session cookies, and there are no affinity restrictions. Which of

the following will help the engineer reduce monthly expenses and allow the application to provide the service?

Options:

A.  

Resource metering

B.  

Reserved resources

C.  

Dedicated host

D.  

Pay-as-you-go model

Discussion 0
Questions 47

A company has decided to adopt a microservices architecture for its applications that are deployed to the cloud. Which of the following is a major advantage of this type of architecture?

Options:

A.  

Increased security

B.  

Simplified communication

C.  

Reduced server cost

D.  

Rapid feature deployment

Discussion 0
Questions 48

A company's website suddenly crashed. A cloud engineer investigates the following logs:

Which of the following is the most likely cause of the issue?

Options:

A.  

SQL injection

B.  

Cross-site scripting

C.  

Leaked credentials

D.  

DDoS

Discussion 0
Questions 49

Which of the following strategies requires the development of new code before an application can be successfully migrated to a cloud provider?

Options:

A.  

Refactor

B.  

Rearchitect

C.  

Rehost

D.  

Replatform

Discussion 0
Questions 50

A company's man web application is no longer accessible via the internet. The cloud administrator investigates and discovers the application is accessible locally and only via an IP access. Which of the following was misconfigured?

Options:

A.  

IP

B.  

DHCP

C.  

NAT

D.  

DNS

Discussion 0
Questions 51

Which of the following is used to detect signals and measure physical properties, such as the temperature of the human body?

Options:

A.  

Beacon

B.  

Transmission protocols

C.  

Sensors

D.  

Gateways

Discussion 0
Questions 52

An organization's critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of

a software web application:

"2021/12/18 09:33:12" "10. 34. 32.18" "104. 224. 123. 119" "POST / login.php?u=administrator&p=or%201%20=1"

"2021/12/18 09:33:13" "10.34. 32.18" "104. 224. 123.119" "POST /login. php?u=administrator&p=%27%0A"

"2021/12/18 09:33:14" "10. 34. 32.18" "104. 224. 123. 119" "POST /login. php?u=administrator&p=%26"

"2021/12/18 09:33:17" "10.34. 32.18" "104. 224. 123.119" "POST / login.php?u=administrator&p=%3B"

"2021/12/18 09:33:12" "10.34. 32. 18" "104. 224. 123. 119" "POST / login. php?u=admin&p=or%201%20=1"

"2021/12/18 09:33:19" "10.34.32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%27%0A"

"2021/12/18 09:33:21" "10. 34. 32.18" "104.224. 123.119" "POST / login. php?u=admin&p=%26"

"2021/12/18 09:33:23" "10. 34. 32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%3B"

Which of the following types of attacks occurred?

Options:

A.  

SQL injection

B.  

Cross-site scripting

C.  

Reuse of leaked credentials

D.  

Privilege escalation

Discussion 0
Questions 53

An e-commerce store is preparing for an annual holiday sale. Previously, this sale has increased the number of transactions between two and ten times the normal level of

transactions. A cloud administrator wants to implement a process to scale the web server seamlessly. The goal is to automate changes only when necessary and with minimal cost.

Which of the following scaling approaches should the administrator use?

Options:

A.  

Scale horizontally with additional web servers to provide redundancy.

B.  

Allow the load to trigger adjustments to the resources.

C.  

When traffic increases, adjust the resources using the cloud portal.

D.  

Schedule the environment to scale resources before the sale begins.

Discussion 0
Questions 54

A company experienced a data leak through its website. A security engineer, who is investigating the issue, runs a vulnerability scan against the website and receives the following output:

Which of the following is the most likely cause of this leak?

Options:

A.  

RTMP port open

B.  

SQL injection

C.  

Privilege escalation

D.  

Insecure protocol

Discussion 0
Questions 55

A cloud consultant needs to modernize a legacy application that can no longer address user demand and is expensive to maintain. Which of the following is the best migration

strategy?

Options:

A.  

Retain

B.  

Rehost

C.  

Refactor

D.  

Replatform

Discussion 0
Questions 56

A company wants to combine solutions in a central and scalable environment to achieve the following goals:

• Control

• Visibility

• Automation

• Cost efficiency

Which of the following best describes what the company should implement?

Options:

A.  

Batch processing

B.  

Workload orchestration

C.  

Containerization

D.  

Application modernization

Discussion 0
Questions 57

Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?

Options:

A.  

Scanning

B.  

Assessment

C.  

Remediation

D.  

Identification

Discussion 0
Questions 58

A company wants to create a few additional VDIs so support vendors and contractors have a secure method to access the company's cloud environment. When a cloud

administrator attempts to create the additional instances in the new locations, the operation is successful in some locations but fails in others. Which of the following is the

most likely reason for this failure?

Options:

A.  

Partial service outages

B.  

Regional service availability

C.  

Service quotas

D.  

Deprecation of functionality

Discussion 0
Questions 59

Which of the following container storage types loses data after a restart?

Options:

A.  

Object

B.  

Persistent volume

C.  

Ephemeral

D.  

Block

Discussion 0
Questions 60

A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned. Which of the following

scripts should the systems administrator use to achieve this goal?

Options:

A.  

RESPONSE_CODE }

string APP_URL

bool RESPONSE_CODE

string VM

health checker (APP_URL, VM) {

if [ http_probe (APP_URL) == 200] {

echo RESPONSE_CODE }

else{

stop (VM)

echo

B.  

else{

echo

string APP_URL

float RESPONSE_CODE

string VM

health_checker (APP_URL, VM) {

if [ http_probe (APP_URL) == 200] {

stop (RESPONSE_CODE)

echo VM }

stop (VM)

RESPONSE CODE }

C.  

else{

echo

string APP_URL

int RESPONSE CODE

string VM

health checker (APP_URL, VM) {

if [ http_probe (APP_URL) == 200] {

echo RESPONSE_CODE }

stop (VM)

RESPONSE_CODE }

D.  

else{

echo

string APP_URL

int RESPONSE_CODE

string VM

health_checker (APP_URL, VM) {

if [ http_probe (VM) == 200] {

stop (VM)

echo RESPONSE_CODE }

RESPONSE CODE }

Discussion 0
Questions 61

A software engineer is integrating an application lo The cloud that is web socket based. Which of the following applications is the engineer most likely deploying?

Options:

A.  

Image-sharing

B.  

Data visualization

C.  

Chat

D.  

File transfer

Discussion 0
Questions 62

A company recently set up a CDN for its photography and image-sharing website. Which of the following is the most likely reason for the company's action?

Options:

A.  

To eliminate storage costs

B.  

To improve site speed

C.  

To enhance security of static assets

D.  

To prevent unauthorized access

Discussion 0
Questions 63

A company wants to use a solution that will allow for quick recovery from ransomware attacks, as well as intentional and unintentional attacks on data integrity and availability. Which of the following should the company implement that will minimize administrative overhead?

Options:

A.  

Object versioning

B.  

Data replication

C.  

Off-site backups

D.  

Volume snapshots

Discussion 0