CV0-002 Real Exam Dumps Questions and answers 21-30

Get Full Version of the Exam

Question No.21

A cloud service company is proposing a solution to a major sporting venue. The solution offers 99.999% availability during special events, which is proven through specialized testing. Which of the following techniques should be applied to confirm the high availability claimed by the company? (Select TWO.)

  1. Vulnerability testing

  2. Penetration testing

  3. Load testing

  4. Failover testing

  5. Integration testing

Correct Answer: BD

Question No.22

A physical server with SSD drives that hosts an IO-intensive database has been migrated into a private cloud to ensure further growth possibilities and accommodate quarterly load spikes (up to 10,000 IOPs). The requirement is to have log partition latency below 5ms and data partition latency below 10ms, irrespective of the load spikes. A cloud administrator has conducted extensive tests after the migration. Which of the following test results would ensure the migration is successful?


  1. Option A

  2. Option B

  3. Option C

  4. Option D

Correct Answer: A

Question No.23

A cloud administrator is required to implement a solution to handle data-at-rest encryption requirements for a database. Which of the following would BEST satisfy the requirements?

  1. Install an SSL certificate and only allow secure connections to the server.

  2. Enable two-factor authentication on connections to the database server and log activities.

  3. Activate memory encryption on the virtual server and store the certificates remotely.

  4. Create a virtual encrypted disk, add it to the virtual server, and have the database write to it.

Correct Answer: A

Question No.24

A new application with availability SLA requirements of 99.99% has been deployed in a cloud. For a test spanning a month, which of the following unavailability times would mean the test was successful? (Select TWO).

  1. 1 minute

  2. 4 minutes

  3. 10 minutes

  4. 30 minutes

  5. 60 minutes

Correct Answer: AB

Question No.25

In an IaaS environment, the security team issues a new signature file to prevent specific malware threats from infiltrating the company network. Which of the following describes where the security team should deploy the updated signatures?

  1. IDS

  2. Spam filter

  3. WAF

  4. NIPS

  5. HIPS

Correct Answer: C

Question No.26

A company wants to take advantage of cloud benefits while retaining control of and maintaining compliance with all its security policy obligations. Based on the non-functional requirements, which of the following should the company use?

  1. Hybrid cloud, as use is restricted to trusted customers

  2. IaaS, as the cloud provider has a minimal level of security responsibility

  3. PaaS, as the cloud customer has the most security responsibility

  4. SaaS, as the cloud provider has less security responsibility

Correct Answer: B

Question No.27

In an IaaS model, to which of the following methodologies would the client apply a list of OS patches, assuming approval from CAB has been given?

  1. Using a patch management system, identify the hypervisor type, select a group of hypervisors to be patched, and perform a rolling application of patches.

  2. Using a patch management system, identify the guests that require patching, and select and apply the patches.

  3. Using a patch management system, identify the applications needing the patch, select the required application in a patch management console, and apply the patches.

  4. Using a patch management system, identify the services that require patching, and select and apply the patches.

Correct Answer: A

Question No.28

The legal department requires eDiscovery of hosted file shares. To set up access, which of the following is the BEST method to ensure the eDiscovery analyst only has the ability to search but not change configuration or settings?

  1. PKI

  2. SSO

  3. MFA

  4. RBAC

Correct Answer: D

Question No.29

A new browser version has been deployed to all users at a company. After the deployment, users report that they can no longer access the company#39;s secure time-card system, which is hosted by a SaaS provider. A technician investigates and discovers a security error is received upon opening the site. If the browser is rolled back to the older version, the site is accessible again.

Which of the following is the MOST likely cause of the security error users are seeing?

  1. SSL certificate expiration on the SaaS load balancers

  2. Federation issues between the SaaS provider and the company

  3. Obsolete security technologies implemented on the SaaS servers

  4. Unencrypted communications between the users and the application

Correct Answer: C

Question No.30

A cloud-based web store is experiencing poor website performance and unavailability. Which of the following approaches would prevent the issue without administrator intervention?

  1. Install and deploy a load balancer in the front of the web server.

  2. Increase the computing resources to the web server.

  3. Increase the network#39;s bandwidth to handle the spike.

  4. Partner with a cloud provider to scale the required resources as needed.

Correct Answer: A

Get Full Version of CV0-002 Dumps