This content has been archived. It may no longer be relevant
CV0-002 CompTIA Cloud+
A new browser version has been deployed to all users at a company. After the deployment, users report that they can no longer access the company’s
secure time-card system, which is hosted by a SaaS provider. A technician investigates and discovers a security error is received upon opening the site.
If the browser is rolled back to the older version, the site is accessible again. Which of the following is the MOST likely cause of the security error users
A. SSL certificate expiration on the SaaS load balancers
B. Federation issues between the SaaS provider and the company
C. Obsolete security technologies implemented on the SaaS servers
D. Unencrypted communications between the users and the application
Correct Answer: C
A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated
increase in demand during an upcoming holiday. The majority of the application load takes place on the application server under normal conditions. For
this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine
that installs and configures common software and network configurations. The remote computing environment is connected to the on-premises
datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance
connections from the Internet.
During testing, the company discovers that only 20% of connections completed successfully.
Review the network architecture and supporting documents and fulfill these requirements:
1. Analyze the configuration of the following components: DNS, Firewall1, Firewall2, Router1, Rouler2, VPN and Orchestrator Server.
2. Identify the problematic device(s).
3. Identify the correct options to provide adequate configuration for hybrid cloud architecture.
If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.
Correct Answer: See the solution below.
Router 2 is the problem and this should be selected. If you examine the preshared key used for the VPN you will see that it is not configured with the
correct key. It is using Cloud002 while router1 is using Cloud001
Update the PSK (Pre-shared key in Router2)
Add the Application Server at on-premises to the Load Balancer
A hosted file share was infected with CryptoLocker and now root cause analysis needs to be performed. Place the tasks in the correct order according to
the troubleshooting methodology.
A company is seeking a new backup solution for its virtualized file servers that fits the following characteristics:
The files stored on the servers are extremely large.
Existing files receive multiple small changes per day.
New files are only created once per month.
All backups are being sent to a cloud repository.
Which of the following would BEST minimize backup size?
A. Local snapshots
B. Differential backups
C. File-based replication
D. Change block tracking
Correct Answer: B
A company has deployed a four-node cluster in a COLO environment with server configurations listed below. The company wants to ensure there is 50%
overhead for failover and redundancy. There are currently eight VMs running within the cluster with four vCPUs x32GB each. The company wants to
better utilize its resources within the cluster without compromising failover and redundancy.
Given the information above, which of the following should a cloud administrator do to BEST accommodate failover and redundancy requirements?
A. Ensure hyperthreading is being utilized with physical server CPUs.
B. Ensure dynamic resource allocation is being utilized.
C. Overcommit memory, and the systems will allocate resources as required.
D. Set hard limits for VM resources and turn on hyperthreading.