Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CV0-004 CompTIA Cloud+ (2025) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CompTIA CV0-004 CompTIA Cloud+ (2025) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 229 questions

A cloud deployment uses three different VPCs. The subnets on each VPC need to communicate with the others over private channels. Which of the following will achieve this objective?

A.

Deploying a load balancer to send traffic to the private IP addresses

B.

Creating peering connections between all VPCs

C.

Adding BGP routes using the VPCs' private IP addresses

D.

Establishing identical routing tables on all VPCs

A company that has several branches worldwide needs to facilitate full access to a specific cloud resource to a branch in Spain. Other branches will have only read access. Which of

the following is the best way to grant access to the branch in Spain?

A.

Set up MFA for the users working at the branch.

B.

Create a network security group with required permissions for users in Spain.

C.

Apply a rule on the WAF to allow only users in Spain access to the resource.

D.

Implement an IPS/IDS to detect unauthorized users.

The change control board received a request to approve a configuration change 10 deploy in the cloud production environment. Which of the following should have already been competed?

A.

Penetration test

B.

End-to-end security testing

C.

Cost benefit analysis

D.

User acceptance testing

An administrator configures three subnets to the corporate network. All servers should communicate with the main corporate network and access the internet. The administrator creates the following configurations:

After configuring the networks, the administrator recognizes an issue with the configuration. Which of the following can the administrator change in one step to accomplish the goal?

A.

Remove source 192.168.12.0/24 and destination 192.168.1.0/24 from the routing table.

B.

Replace destination 192.168.1.0/24 with destination 192.168.0.0/24.

C.

Add source 192.168.12.0/24 and destination 192.168.0.0/24 to the routing table.

D.

Reconfigure Network 4 to 192.168.13.0/24.

A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log

mechanisms should the cloud engineer implement to address this issue?

A.

Splicing

B.

Rotation

C.

Sampling

D.

Inspection

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

A.

Rehost

B.

Rearchitect

C.

Refactor

D.

Retain

A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly experiencing high latency. Which of the following would best help determine the source of the latency?

A.

Configuring centralized logging to analyze HTTP requests

B.

Running a flow log on the network to analyze the packets

C.

Configuring an API gateway to track all incoming requests

D.

Enabling tracing to detect HTTP response times and codes

A company operates a website that allows customers to upload, share, and retain full ownership of their photographs. Which of the following could affect image ownership as the website usage expands globally?

A.

Sovereignty

B.

Data classification

C.

Litigation holds

D.

Retention

Which of the following do developers use to keep track of changes made during software development projects?

A.

Code drifting

B.

Code control

C.

Code testing

D.

Code versioning

A network administrator is budding a site-to-site VPN tunnel from the company's headquarters office 10 the company's public cloud development network. The network administrator confirms the following:

The VPN tunnel is established on the headquarter office firewall.

While inside the office, developers report that they cannot connect to the development network resources.

While outside the office on a client VPN, developers report that they can connect to the development network resources.

The office and the client VPN have different IP subnet ranges.

The firewall flow logs show VPN traffic is reaching the development network from the office.

Which of the following is the next step the next network administrator should take to troubleshoot the VPN tunnel?

A.

Review the development network routing table.

B.

Change the ciphers on the site-to-site VPN.

C.

Restart the site-to-site VPN tunnel.

D.

Check the ACLS on the development workloads

A cloud developer needs to update a REST API endpoint to resolve a defect. When too many users attempt to call the API simultaneously, the following message is displayed:

Error: Request Timeout - Please Try Again Later

Which of the following concepts should the developer consider to resolve this error?

A.

Server patch

B.

TLS encryption

C.

Rate limiting

D.

Permission issues

A cloud administrator deploys new VMs in a cluster and discovers they are getting IP addresses in the range of 169.254.0.0/16. Which of the following is the most likely cause?

A.

The scope has been exhausted.

B.

The network is overlapping.

C.

The VLAN is missing.

D.

The NAT is Improperly configured.

Which of the following network protocols is generally used in a NAS environment?

A.

BGP

B.

RDP

C.

TCP/IP

D.

iSCSI

Which of the following is used to deliver code quickly and efficiently across the development, test, and production environments?

A.

Snapshot

B.

Container image

C.

Serverless function

D.

VM template

A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour. Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

A.

Use laC to deploy the laaS infrastructure.

B.

Convert the containers to VMs.

C.

Deploy the containers over SSH.

D.

Use private repositories for the containers.

A cloud solution needs to be replaced without interruptions. The replacement process can be completed in phases, but the cost should be kept as low as possible. Which of the

following is the best strategy to implement?

A.

Blue-green

B.

Rolling

C.

In-place

D.

Canary

The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.

Refer to the application dataflow:

1A – The end user accesses the application through a web browser to enter and view clinical data.

2A – The CTM application server reads/writes data to/from the database server.

1B – The end user accesses the application through a web browser to run reports on clinical data.

2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.

3B – The BI application server gets the data from the database server and presents it to the CTM application server.

When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS

You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.

You should ensure the firewall rules are allowing only the traffic based on the dataflow.

You have already verified the external DNS resolution and NAT are working.

Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

A.

Resource tagging

B.

Discretionary access control

C.

Multifactor authentication

D.

Role-based access control

E.

Token-based authentication

F.

Bastion host

A company's engineering department is conducting a month-long test on the scalability of an in-house-developed software that requires a cluster of 100 or more servers. Which of

the following models is the best to use?

A.

PaaS

B.

SaaS

C.

DBaaS

D.

laaS

A company has ten cloud engineers working on different manual following is the best method to address this issue?

A.

Deployment documentation

B.

Service logging

C.

Configuration as code

D.

Change ticketing

Page: 2 / 4
Total 229 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved