[May 01, 2022] Get New CV0-003 Certification Practice Test Questions Exam Dumps [Q45-Q60]

Rate this post

[May 01, 2022] Get New CV0-003 Certification Practice Test Questions Exam Dumps

Real CV0-003 Exam Dumps Questions Valid CV0-003 Dumps PDF

NO.45 A systems administrator would like to reduce the network delay between two servers.
Which of the following will reduce the network delay without taxing other system resources?

 
 
 
 

NO.46 A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such dat a. Which of the following should the systems administrator implement?

 
 
 
 

NO.47 A systems administrator is configuring a storage array.
Which of the following should the administrator configure to set up mirroring on this array?

 
 
 
 

NO.48 A systems administrator is reviewing two CPU models for a cloud deployment. Both CPUs have the same number of cores/threads and run at the same clock speed.
Which of the following will BEST identify the CPU with more computational power?

 
 
 
 

NO.49 A cloud administrator needs to implement a mechanism to monitor the expense of the company’s cloud resources.
Which of the following is the BEST option to execute this task with minimal effort?

 
 
 
 

NO.50 After accidentally uploading a password for an IAM user in plain text, which of the following should a cloud administrator do FIRST? (Choose two.)

 
 
 
 
 

NO.51 An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources.
Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?

 
 
 
 

NO.52 SIMULATION
The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The UAT users were instructed to use HTTP and HTTPS.
Refer to the application dataflow:
1A – The end user accesses the application through a web browser to enter and view clinical data.
2A – The CTM application server reads/writes data to/from the database server.
1B – The end user accesses the application through a web browser to run reports on clinical data.
2B – The CTM application server makes a SOAP call on a non-privileged port to the BI application server.
3B – The BI application server gets the data from the database server and presents it to the CTM application server.
When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: “Browser cannot display the webpage.” The QA team has raised a ticket to troubleshoot the issue.
INSTRUCTIONS
You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.
You should ensure the firewall rules are allowing only the traffic based on the dataflow.
You have already verified the external DNS resolution and NAT are working.
Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each Firewall to change ACLs as needed.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.




 
 

NO.53 A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well.
Which of the following should the administrator recommend the user do FIRST?

 
 
 
 

NO.54 A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities.
Which of the following testing techniques would be BEST to use?

 
 
 
 

NO.55 A cloud administrator has built a new private cloud environment and needs to monitor all computer, storage, and network components of the environment.
Which of the following protocols would be MOST useful for this task?

 
 
 
 

NO.56 A company just successfully completed a DR test and is ready to shut down its DR site and resume normal operations.
Which of the following actions should the cloud administrator take FIRST?

 
 
 
 

NO.57 After a hardware upgrade on a private cloud system, the systems administrator notices a considerable drop in network performance. Which of the following is MOST likely the cause?

 
 
 
 

NO.58 A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?

 
 
 
 

NO.59 A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.
The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.
The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.
During testing, the company discovers that only 20% of connections completed successfully.
INSTRUCTIONS
Review the network architecture and supporting documents and fulfill these requirements:
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Part 1:
Cloud Hybrid Network Diagram








Part 2:
Only select a maximum of TWO options from the multiple choice question

NO.60 An organization is required to set a custom registry key on the guest operating system.
Which of the following should the organization implement to facilitate this requirement?

 
 
 
 

CompTIA CV0-003 Exam Syllabus Topics:

Topic Details

Cloud Architecture and Design – 13%

Compare and contrast the different types of cloud models. – Deployment models

  • Public
  • Private
  • Hybrid
  • Community
  • Cloud within a cloud
  • Multicloud
  • Multitenancy

– Service models

  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)

– Advanced cloud services

  • Internet of Things (IoT)
  • Serverless
  • Machine learning/Artificial intelligence (AI)

– Shared responsibility model

Explain the factors that contribute to capacity planning. – Requirements

  • Hardware
  • Software
  • Budgetary
  • Business need analysis

– Standard templates

  • Per-user
  • Socket-based
  • Volume-based
  • Core-based
  • Subscription

– Licensing
– User density
– System load
– Trend analysis

  • Baselines
  • Patterns
  • Anomalies

– Performance capacity planning

Explain the importance of high availability and scaling in cloud environments. – Hypervisors

  • Affinity
  • Anti-affinity

– Oversubscription

  • Compute
  • Network
  • Storage

– Regions and zones
– Applications
– Containers
– Clusters
– High availability of network functions

  • Switches
  • Routers
  • Load balancers
  • Firewalls

– Avoid single points of failure
– Scalability

  • Auto-scaling
  • Horizontal scaling
  • Vertical scaling
  • Cloud bursting
Given a scenario, analyze the solution design in support of the business requirements. – Requirement analysis

  • Software
  • Hardware
  • Integration
  • Budgetary
  • Compliance
  • Service-level agreement (SLA)
  • User and business needs
  • Security
  • Network requirements
    1. Sizing
    2. Subnetting
    3. Routing

– Environments

  • Development
  • Quality assurance (QA)
  • Staging
  • Blue-green
  • Production
  • Disaster recovery (DR)

– Testing techniques

  • Vulnerability testing
  • Penetration testing
  • Performance testing
  • Regression testing
  • Functional testing
  • Usability testing

Security – 20%

Given a scenario, configure identity and access management. – Identification and authorization

  • Privileged access management
  • Logical access management
  • Account life-cycle management
    1. Provision and deprovision accounts
  • Access controls
    1. Role-based
    2. Discretionary
    3. Non-discretionary
    4. Mandatory

– Directory services

  • Lightweight directory access protocol (LDAP)

– Federation
– Certificate management
– Multifactor authentication (MFA)
– Single sign-on (SSO)

  • Security assertion markup language (SAML)

– Public key infrastructure (PKI)
– Secret management
– Key management

Given a scenario, secure a network in a cloud environment. – Network segmentation

  • Virtual LAN (VLAN)/Virtual extensible LAN (VXLAN)/Generic network virtualization encapsulation (GENEVE)
  • Micro-segmentation
  • Tiering

– Protocols

  • Domain name service (DNS)
    1. DNS over HTTPS (DoH)/DNS over TLS (DoT)
    2. DNS security (DNSSEC)
  • Network time protocol (NTP)
    1. Network time security (NTS)
  • Encryption
    1. IPSec
    2. Transport layer security (TLS)
    3. Hypertext transfer protocol secure (HTTPS)
  • Tunneling
    1. Secure Shell (SSH)
    2. Layer 2 tunneling protocol (L2TP)/Point-to-point tunneling protocol (PPTP)
    3. Generic routing encapsulation (GRE)

– Network services

  • Firewalls
    1. Stateful
    2. Stateless
  • Web application firewall (WAF)
  • Application delivery controller (ADC)
  • Intrusion protection system (IPS)/Intrusion detection system (IDS)
  • Data loss prevention (DLP)
  • Network access control (NAC)
  • Packet brokers

– Log and event monitoring
– Network flows
– Hardening and configuration changes

  • Disabling unnecessary ports and services
  • Disabling weak protocols and ciphers
  • Firmware upgrades
  • Control ingress and egress traffic
    1. Allow list (previously known as whitelisting) or blocklist (previously known as blacklisting)
    2. Proxy servers
  • Distributed denial of service (DDoS) protection
Given a scenario, apply the appropriate OS and application security controls. – Policies

  • Password complexity
  • Account lockout
  • Application approved list (previously known as whitelisting)
  • Software feature
  • User/group

– User permissions
– Antivirus/anti-malware/endpoint detection and response (EDR)
– Host-based IDS (HIDS)/Host-based IPS (HIPS)
– Hardened baselines

  • Single function

– File integrity
– Log and event monitoring
– Configuration management
– Builds

  • Stable
  • Long-term support (LTS)
  • Beta
  • Canary

– Operating system (OS) upgrades
– Encryption

  • Application programming interface (API) endpoint
  • Application
  • OS
  • Storage
  • Filesystem

– Mandatory access control
– Software firewall

Given a scenario, apply data security and compliance controls in cloud environments. – Encryption
– Integrity

  • Hashing algorithms
  • Digital signatures
  • File integrity monitoring (FIM)

– Classification
– Segmentation
– Access control
– Impact of laws and regulations

  • Legal hold

– Records management

  • Versioning
  • Retention
  • Destruction
  • Write once read many

– Data loss prevention (DLP)
– Cloud access security broker (CASB)

Given a scenario, implement measures to meet security requirements. – Tools

  • Vulnerability scanners
  • Port scanners

– Vulnerability assessment

  • Default and common credential scans
  • Credentialed scans
  • Network-based scans
  • Agent-based scans
  • Service availabilities

– Security patches

  • Hot fixes
  • Scheduled updates
  • Virtual patches
  • Signature updates
  • Rollups

– Risk register
– Prioritization of patch application
– Deactivate default accounts
– Impacts of security tools on systems and services
– Effects of cloud service models on security implementation

Explain the importance of incident response procedures. – Preparation

  • Documentation
  • Call trees
  • Training
  • Tabletops
  • Documented incident types/categories
  • Roles and responsibilities

– Incident response procedures

  • Identification
    1. Scope
  • Investigation
  • Containment, eradication, and recovery
    1. Isolation
    2. Evidence acquisition
    3. Chain of custody
    4. Root cause analysis
  • Post-incident and lessons learned

Deployment – 23%

Given a scenario, integrate components into a cloud solution. – Subscription services

  • File subscriptions
  • Communications
    1. Email
    2. Voice over IP (VoIP)
    3. Messaging
  • Collaboration
  • Virtual desktop infrastructure (VDI)
  • Directory and identity services
  • Cloud resources
    1. IaaS
    2. PaaS
    3. SaaS

– Provisioning resources

  • Compute
  • Storage
  • Network

– Application

  • Serverless

– Deploying virtual machines (VMs) and custom images
– Templates

  • OS templates
  • Solution templates

– Identity management
– Containers

  • Configure variables
  • Configure secrets
  • Persistent storage

– Auto-scaling
– Post-deployment validation

Given a scenario, provision storage in cloud environments. – Types

  • Block
    1. Storage area network (SAN)
    – Zoning
  • File
    1. Network attached storage (NAS)
  • Object
    1. Tenants
    2. Buckets

– Tiers

  • Flash
  • Hybrid
  • Spinning disks
  • Long-term

– Input/output operations per second (IOPS) and read/write
– Protocols

  • Network file system (NFS)
  • Common Internet file system (CIFS)
  • Internet small computer system interface (iSCSI)
  • Fibre Channel (FC)
  • Non-volatile memory express over fabrics (NVMe-oF)

– Redundant array of inexpensive disks (RAID)

  • 0
  • 1
  • 5
  • 6
  • 10

– Storage system features

  • Compression
  • Deduplication
  • Thin provisioning
  • Thick provisioning
  • Replication

– User quotas
– Hyperconverged
– Software-defined storage (SDS)

Given a scenario, deploy cloud networking solutions. – Services

  • Dynamic host configuration protocol (DHCP)
  • NTP
  • DNS
  • Content delivery network (CDN)
  • IP address management (IPAM)

– Virtual private networks (VPNs)

  • Site-to-site
  • Point-to-point
  • Point-to-site
  • IPSec
  • Multiprotocol label switching (MPLS)

– Virtual routing

  • Dynamic and static routing
  • Virtual network interface controller (vNIC)
  • Subnetting

– Network appliances

  • Load balancers
  • Firewalls

– Virtual private cloud (VPC)

  • Hub and spoke
  • Peering

– VLAN/VXLAN/GENEVE
– Single root input/output virtualization (SR-IOV)
– Software-defined network (SDN)

Given a scenario, configure the appropriate compute sizing for a deployment. – Virtualization

  • Hypervisors
    1. Type 1
    2. Type 2
  • Simultaneous multi-threading (SMT)
  • Dynamic allocations
  • Oversubscription

– Central processing unit (CPU)/virtual CPU (vCPU)
– Graphics processing unit (GPU)

  • Virtual
    1. Shared
  • Pass-through

– Clock speed/Instructions per cycle (IPC)
– Hyperconverged
– Memory

  • Dynamic allocation
  • Ballooning
Given a scenario, perform cloud migrations. – Physical to virtual (P2V)
– Virtual to virtual (V2V)
– Cloud-to-cloud migrations

  • Vendor lock-in
  • PaaS or SaaS migrations
    1. Access control lists (ACLs)
    2. Firewalls

– Storage migrations

  • Block
  • File
  • Object

– Database migrations

  • Cross-service migrations
  • Relational
  • Non-relational

Operations and Support – 22%

Given a scenario, configure logging, monitoring, and alerting to maintain operational status. – Logging

  • Collectors
    1. Simple network management protocol (SNMP)
    2. Syslog
  • Analysis
  • Severity categorization
  • Audits
  • Types
    1. Access/authentication
    2. System
    3. Application
  • Automation
  • Trending

– Monitoring

  • Baselines
  • Thresholds
  • Tagging
  • Log scrubbing
  • Performance monitoring
    1. Application
    2. Infrastructure components
  • Resource utilization
  • Availability
    1. SLA-defined uptime requirements
  • Verification of continuous monitoring activities
  • Service management tool integration

– Alerting

  • Common messaging methods
  • Enable/disable alerts
    1. Maintenance mode
  • Appropriate responses
  • Policies for categorizing and communicating alerts
Given a scenario, maintain efficient operation of a cloud environment. – Confirm completion of backups
– Life-cycle management

  • Roadmaps
  • Old/current/new versions
  • Upgrading and migrating systems
  • Deprecations or end of life

– Change management
– Asset management

  • Configuration management database (CMDB)

– Patching

  • Features or enhancements
  • Fixes for broken or critical infrastructure or applications
  • Scope of cloud elements to be patched
    1. Hypervisors
    2. VMs
    3. Virtual appliances
    4. Networking components
    5. Applications
    6. Storage components
    7. Firmware
    8. Software
    9. OS
  • Policies
    1. n-1
  • Rollbacks

– Impacts of process improvements on systems
– Upgrade methods

  • Rolling upgrades
  • Blue-green
  • Canary
  • Active-passive
  • Development/QA/production/DR

– Dashboard and reporting

  • Tagging
  • Costs
    1. Chargebacks
    2. Showbacks
  • Elasticity usage
  • Connectivity
  • Latency
  • Capacity
  • Incidents
  • Health
  • Overall utilization
  • Availability
Given a scenario, optimize cloud environments. – Right-sizing

  • Auto-scaling
  • Horizontal scaling
  • Vertical scaling
  • Cloud bursting

– Compute

  • CPUs
  • GPUs
  • Memory
  • Containers

– Storage

  • Tiers
    1. Adaptive optimization
  • IOPS
  • Capacity
  • Deduplication
  • Compression

– Network

  • Bandwidth
  • Network interface controllers (NICs)
  • Latency
  • SDN
  • Edge computing
    1. CDN

– Placement

  • Geographical
  • Cluster placement
  • Redundancy
  • Colocation

– Device drivers and firmware

  • Generic
  • Vendor
  • Open source

 

CV0-003 Exam Dumps – PDF Questions and Testing Engine: https://www.passtestking.com/CompTIA/CV0-003-practice-exam-dumps.html

admin

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below
 

Post comment