Question 25

A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly expenenang high latency. Which of the following would best help determine the source of the latency?

Correct Answer:D
Enabling tracing in the application can help determine the source of high latency by providing detailed information on HTTP request and response times, as well as response codes. This can identify which API calls are experiencing delays and contribute to overall application latency, allowing for targeted troubleshooting and optimization.

Question 26

A healthcare organization must follow strict compliance requirements to ensure that Pll is not leaked. The cloud administrator needs to ensure the cloud email system can support this requirement Which of the following should the organization enable?

Correct Answer:B
To ensure that Personally Identifiable Information (PII) is not leaked and to comply with strict healthcare regulations, the organization should enable Data Loss Prevention (DLP). DLP systems are designed to detect and prevent unauthorized access or sharing of sensitive data, making them ideal for securing PII in cloud email systems and ensuring compliance with healthcare industry standards.References: CompTIA Cloud+ content covers governance, risk, compliance, and security aspects of cloud computing, highlighting the role of DLP in safeguarding sensitive information and maintaining compliance in regulated industries like healthcare.

Question 27

A company receives files daily from a bank. The company requires that the files must be copied from the cloud storage resource to another cloud storage resource for further processing. Which of the following methods requires the least amount of effort to achieve the task?

Correct Answer:C
An event-driven architecture is the most efficient method for automating the task of copying files from one cloud storage resource to another upon their arrival. This architecture allows systems to automatically trigger actions based on specific events, such as the arrival of new files, minimizing manual effort and ensuring timely processing. References: CompTIA Cloud+ resources and cloud service architectures

Question 28

Which of the following compute resources is the most optimal for running a single scripted task on a schedule?

Correct Answer:D
Serverless functions are ideal for running scripted tasks on a schedule because they can be triggered by events, run the task, and then shut down, incurring costs only for the actual compute time used. This eliminates the need for a continuously running server and is optimal for sporadic or scheduled tasks. References: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg.

Question 29

A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?

Correct Answer:D
The phase of vulnerability management that involves looking for existing security vulnerabilities on software applications is known as 'Identification'. This step precedes analysis, reporting, and remediation, focusing on discovering known and unknown vulnerabilities within the system or software to assess the security posture effectively.

Question 30

A developer at a small startup company deployed some code for a new feature to its public repository. A few days later, a data breach occurred. A security team investigated the incident and found that the database was hacked. Which of the following is the most likely cause of this breach?

Correct Answer:B
Hard-coded credentials within code, especially when deployed in a public repository, are a common security vulnerability. If credentials such as passwords or API keys are embedded in the code, anyone with access to the repository can potentially use them to gain unauthorized access to databases or other sensitive resources. This is a likely cause of the data breach in the scenario described. References: CompTIA Security+ Guide to Network Security Fundamentals by Mark Ciampa.

START CV0-004 EXAM