CompTIA CV0-004 Practice Test

Prepare smarter and boost your chances of success with our CompTIA CV0-004 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use CV0-004 practice exam are 40–50% more likely to pass on their first attempt.

Start practicing today and take the fast track to becoming CompTIA CV0-004 certified.

12560 already prepared
Updated On : 16-Jul-2025
256 Questions
4.8/5.0

Page 2 out of 26 Pages

Which of the following is a difference between a SAN and a NAS?

A. A SAN works only with fiber-based networks.

B. A SAN works with any Ethernet-based network.

C. A NAS uses a faster protocol than a SAN

D. A NAS uses a slower protocol than a SAN.

D.   A NAS uses a slower protocol than a SAN.

A NAS (Network Attached Storage) typically uses file-level protocols such as NFS or SMB, which are generally considered slower and less efficient than the block-level protocols used by SANs (Storage Area Networks), such as iSCSI or Fibre Channel. SANs are designed for high performance and low latency, making them more suitable for applications requiring fast and efficient storage access.

A critical security patch is required on a network load balancer in a public cloud. The organization has a major sales conference next week, and the Chief Executive Officer does not want any interruptions during the demonstration of an application behind the load balancer. Which of the following approaches should the cloud security engineer take?

A. Ask the management team to delay the conference.

B. Apply the security patch after the event.

C. Ask the upper management team to approve an emergency patch window.

D. Apply the security patch immediately before the conference.

C.   Ask the upper management team to approve an emergency patch window.

Given the critical nature of the patch and the upcoming major sales conference, the cloud security engineer should seek approval for an emergency patch window. This approach balances the need for security with the business requirement of no interruptions during the conference. References: The strategy of managing critical updates in alignment with business operations is part of the governance and risk management topics in the CompTIA Cloud+ certification material.

A company's engineering department is conducting a month-long test on the scalability of an in-house-developed software that requires a cluster of 100 or more servers. Which of the following models is the best to use?

A. PaaS

B. SaaS

C. DBaaS

D. laaS

D.   laaS

For testing the scalability of an in-house-developed software that requires a cluster of 100 or more servers, Infrastructure as a Service (IaaS) is the best model. IaaS provides the necessary computeresources and allows the engineering department to configure the environment as needed for their specific test without the constraints that might be present in PaaS or SaaS offerings. References: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Service Models

A cloud service provider requires users to migrate to a new type of VM within three months. Which of the following is the best justification for this requirement?

A. Security flaws need to be patched.

B. Updates could affect the current state of the VMs.

C. The cloud provider will be performing maintenance of the infrastructure.

D. The equipment is reaching end of life and end of support.

D.   The equipment is reaching end of life and end of support.

The best justification for a cloud service provider requiring users to migrate to a new type of VM within a specific time frame is that the equipment is reaching end of life and end of support (EOL/EOS). This means that the older type of VM will no longer receive updates or support, which could include important security patches, so it is necessary to move to newer VM types to maintain security and performance. References: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson

Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year. Which of the following is this an example of?

A. Recoverability

B. Retention

C. Encryption

D. Integrity

B.   Retention

The instruction by the legal department to store data from the affected virtual machines for a minimum of one year is an example of data Retention. Retention policies are often driven by regulatory compliance requirements and dictate how long certain types of data must be kept before they can be securely disposed of.

References: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson

A company serves customers globally from its website hosted in North America. A cloud engineer recently deployed new instances of the website in the Europe region. Which of the following is the most likely reason?

A. To simplify workflow

B. To enhance security

C. To reduce latency

D. To decrease cost

C.   To reduce latency


The most likely reason for deploying new instances of a website in the Europe region, in addition to the ones hosted in North America, is to reduce latency for users located in Europe. By having the website's resources closer to the end-users, the data has a shorter distance to travel, resulting in faster load times and better performance.

References: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson

A developer at a small startup company deployed some code for a new feature to its public repository. A few days later, a data breach occurred. A security team investigated the incident and found that the database was hacked. Which of the following is the most likely cause of this breach?

A. Database core dump

B. Hard-coded credentials

C. Compromised deployment agent

D. Unpatched web servers

B.   Hard-coded credentials

Hard-coded credentials within code, especially when deployed in a public repository, are a common security vulnerability. If credentials such as passwords or API keys are embedded in the code, anyone with access to the repository can potentially use them to gain unauthorized access to databases or other sensitive resources. This is a likely cause of the data breach in the scenario described.

References: CompTIA Security+ Guide to Network Security Fundamentals by Mark Ciampa.

A security team recently hired multiple interns who all need the same level of access. Which of the following controls should the security team implement to provide access to the cloud environment with the least amount of overhead?

A. MFA

B. Discretionary access

C. Local user access

D. Group-based access control

D.   Group-based access control

Implementing group-based access control is the most efficient way to provide access to multiple interns who require the same level of access. This method allows the security team to assign permissions to a group rather than to individual user accounts, thereby reducing the administrative overhead involved in managing access rights for each intern individually.

References: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg

A company's content management system (CMS) service runs on an laaS cluster on a public cloud. The CMS service is frequently targeted by a malicious threat actor using DDoS. Which of the following should a cloud engineer monitor to identify attacks?

A. Network flow logs

B. Endpoint detection and response logs

C. Cloud provider event logs

D. Instance syslog

A.   Network flow logs

To identify DDoS attacks against a CMS service, a cloud engineer should monitor network flow logs. These logs provide data about the IP traffic going to and from network interfaces in a public cloud, which is essential for detecting the increased traffic volumes typically associated with DDoS attacks.

References: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Security in the Cloud

A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these requirements?

A. Cloning

B. Clustering

C. Hardware passthrough

D. Stand-alone container

B.   Clustering

Clustering refers to the use of multiple servers/computers to form what appears to be a single system. This concept is key for achieving high availability and resilience, especially for latency-sensitive workloads. By distributing the workload across a cluster that spans multiple regions, the system can continue to operate even if one or more nodes fail, thus maintaining performance and availability.

References: CompTIA Cloud+ Guide to Cloud Computing (ISBN: 978-1-64274-282-2)

Page 2 out of 26 Pages
CV0-004 Practice Test