Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CV0-004 CompTIA Cloud+ (V4) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your CompTIA CV0-004 CompTIA Cloud+ (V4) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 4
Total 254 questions

An IT manager needs to deploy a cloud solution that meets the following requirements:

. Users must use two authentication methods to access resources.

· Each user must have 10GB of storage space by default.

Which of the following combinations should the manager use to provision these requirements?

A.

OAuth 2.0 and ephemeral storage

B.

OIDC and persistent storage

C.

MFA and storage quotas

D.

SSO and external storage

Which of the following describes what CRUD is typically used for?

A.

Relational databases

B.

Time series databases

C.

Graph databases

D.

NoSQL databases

A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned. Which of the following

scripts should the systems administrator use to achieve this goal?

A.

RESPONSE_CODE }string APP_URLbool RESPONSE_CODEstring VMhealth checker (APP_URL, VM) {if [ http_probe (APP_URL) == 200] {echo RESPONSE_CODE }else{stop (VM)echo

B.

else{echostring APP_URLfloat RESPONSE_CODEstring VMhealth_checker (APP_URL, VM) {if [ http_probe (APP_URL) == 200] {stop (RESPONSE_CODE)echo VM }stop (VM)RESPONSE CODE }

C.

else{echostring APP_URLint RESPONSE CODEstring VMhealth checker (APP_URL, VM) {if [ http_probe (APP_URL) == 200] {echo RESPONSE_CODE }stop (VM)RESPONSE_CODE }

D.

else{echostring APP_URLint RESPONSE_CODEstring VMhealth_checker (APP_URL, VM) {if [ http_probe (VM) == 200] {stop (VM)echo RESPONSE_CODE }RESPONSE CODE }

Which of the following migration types is best to use when migrating a highly available application, which is normally hosted on a local VM cluster, for usage with an external user population?

A.

Cloud to on-premises

B.

Cloud to cloud

C.

On-premises to cloud

D.

On-premises to on-premises

For compliance purposes, a cloud developer at an insurance company needs to save all customer policies for more than ten years. Which of the following options is the most cost-

efficient tier to save the data in the cloud?

A.

Archive

B.

Hot

C.

Cold

D.

Warm

A system surpasses 75% to 80% of resource consumption. Which of the following scaling approaches is the most appropriate?

A.

Trending

B.

Manual

C.

Load

D.

Scheduled

A cloud developer needs to update a REST API endpoint to resolve a defect. When too many users attempt to call the API simultaneously, the following message is displayed:

Error: Request Timeout - Please Try Again Later

Which of the following concepts should the developer consider to resolve this error?

A.

Server patch

B.

TLS encryption

C.

Rate limiting

D.

Permission issues

A technician receives an email from a vendor who is requesting payment of an invoice for human resources services. The email contains a request for bank account numbers. Which of the following types of attacks does this behavior most likely indicate?

A.

MaIware

B.

Cryptojacking

C.

Ransomware

D.

Phishing

Which of the following industry standards mentions that credit card data must not be exchanged or stored in cleartext?

A.

CSA

B.

GDPR

C.

SOC2

D.

PCI-DSS

A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to

recommend?

A.

Using CIS-hardened images

B.

Using watermarked images

C.

Using digitally signed images

D.

Using images that have an application firewall

Between 11:00 a.m. and 1:00 p.m. on workdays, users report that the sales database is either not accessible, sluggish, or difficult to connect to. A cloud administrator discovers that during the impacted time, all hypervisors are at capacity. However, when 70% of the users are using the same database, those issues are not reported. Which of the following is the most likely cause?

A.

Oversubscription

B.

Resource allocation

C.

Sizing issues

D.

Service quotas

A cloud security analyst is investigating the impact of a recent cyberattack. The analyst is reviewing the following information:

Web server access log:

104.210.233.225 - - [21/10/2022:11:17: 40] "POST /uploadfile.html?f=myfile.php" 200 1638674

45.32.10.66 - - [21/10/2022:11:19:12] "GET /welcome.html" 200 5812

104.210.233.225 - - [21/10/2022:11:21:19] "GET / .. / .. / .. / .. /conf/server.xml HTTP/1.1" 200 74458

45.32.10.66 - - [21/10/22:11:22:32] "GET /admin.html HTTP/1.1" 200 9518

Web application firewall log:

"2022/10/21 11:17:33" "10.25.2.35" "104. 210.233.225" "userl" "File transfer completed successfully."

"2022/10/21 11:21:05" "10. 25.2. 35" "104. 210.233.225" "userl" "Accessed application page."

"2022/10/21 11:22:13" "10.25.2.35" "45. 32. 10. 66" "user2" "Accessing admin page. "

Which of the following has occurred?

A.

The corporate administration page was defaced by the attacker.

B.

A denial-of-service attack was successfully performed on the web server.

C.

A new user was created on the web server by the attacker.

D.

Sensitive information from the corporate web server was leaked.

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these

requirements?

A.

Cloning

B.

Clustering

C.

Hardware passthrough

D.

Stand-alone container

Which of the following is the most cost-effective and efficient strategy when migrating to the cloud?

A.

Retire

B.

Replatform

C.

Retain

D.

Refactor

An organization's security policy states that software applications should not exchange sensitive data in cleartext. The security analyst is concerned about a software application that uses Base64 to encode credit card data. Which of the following would be the best algorithm to replace Base64?

A.

3DES

B.

AES

C.

RC4

D.

SHA-3

A company's man web application is no longer accessible via the internet. The cloud administrator investigates and discovers the application is accessible locally and only via an IP access. Which of the following was misconfigured?

A.

IP

B.

DHCP

C.

NAT

D.

DNS

Which of the following should be used on containers to process data and keep the output in files for later review?

A.

Standard output

B.

Optical disk mount

C.

Ephemeral storage

D.

Persistent volumes

A cloud engineer wants to implement a disaster recovery strategy that:

. Is cost-effective.

. Reduces the amount of data loss in case of a disaster.

. Enables recovery with the least amount of downtime.

Which of the following disaster recovery strategies best describes what the cloud engineer wants to achieve?

A.

Cold site

B.

Off site

C.

Warm site

D.

Hot site

A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:

secure connectivity that minimizes user login

tracks user activity and monitors for anomalous activity

requires secondary authentication

INSTRUCTIONS

Select controls and servers for the proper control points.

A company developed an online trading platform. The engineering team selected event-based scaling for the platform's underlying resources. The platform resources scale up with every 2,000 subscribed users. The engineering team finds out that although compute utilization is low, scaling is still occurring. Which of the following statements best explains why this is the case?

A.

Event-based scaling does not scale down resources.

B.

Event-based scaling should not be triggered at the 2,000-user frequency.

C.

Event-based scaling should not track user subscriptions.

D.

Event-based scaling does not take resource load into account.

Page: 3 / 4
Total 254 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved