CV0-002Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 1

A new browser version has been deployed to all users at a company. After the deployment, users report that they can no longer access the company's secure time-card system, which is hosted by a SaaS provider. A technician investigates and discovers a security error is received upon opening the site. If the browser is rolled back to the older version, the site is accessible again. Which of the following is the MOST likely cause of the security error users are seeing?

  • A: SSL certificate expiration on the SaaS load balancers
  • B: Federation issues between the SaaS provider and the company
  • C: Obsolete security technologies implemented on the SaaS servers
  • D: Unencrypted communications between the users and the application

Question 2

A cloud architect created a new delivery controller for a large VM farm to scale up according to organizational needs. The old and new delivery controllers now form a cluster. However, the new delivery controller returns an error when entering the license code. Which of the following is the MOST likely cause?

  • A: A firewall is blocking the port on the license server.
  • B: The existing license is for a lower version.
  • C: The existing license is not supported for clusters.
  • D: The existing license has expired.

Question 3

The following three hosts are being put into a virtualization cluster for a new project initiative:

Image 1

As more VMs are deployed to the cluster, which of the following virtualization technologies is MOST likely to report an error with this configuration?

  • A: High availability
  • B: Ballooning
  • C: Memory overcommitment
  • D: Hyperthreading

Question 4

A company is implementing a SaaS solution with a large user base. SaaS solution licensing is user based, and user management is critical to keep the cost in check. Which of the following is the MOST efficient way to meet this requirement?

  • A: Have the administrator of the SaaS solution keep track of user activities.
  • B: Have a nightly upload to the SaaS provider of the current user base based on API call.
  • C: Have users remove their SaaS accounts when they no longer need the service.
  • D: Have a weekly user management script maintain the SaaS user base.

Question 5

A cloud administrator updates the syslog forwarder configuration on a local server in production to use a different port. The development team is no longer receiving the audit logs from that server. However, the security team can retrieve and search the logs for the same server. Which of the following is MOST likely the issue?

  • A: The development team is not looking at the correct server when querying for the logs.
  • B: The security team has greater permissions than the development team.
  • C: The audit logging service has been disabled on the server.
  • D: The development team's syslog server is configured to listen on the wrong port.

Question 6

Performance on a new private cloud deployment is not meeting expectations. An engineer has determined the virtualization host is experiencing high ready/wait times. VMs with the following configurations and metrics currently reside on the host:

Image 1

Which of the following troubleshooting choices would MOST likely be used to bring the high ready/wait times to meet the expected baseline?

  • A: Decrease the CPU count for VM1.
  • B: Increase the memory size for VM2.
  • C: Decrease the memory size for VM3.
  • D: Increase the CPU count for VM4.

Question 7

The CASB report indicates several unsanctioned SaaS applications are being used in an organization. Which of the following is the MOST likely cause?

  • A: VPN bypass
  • B: Shadow IT
  • C: Web proxy bypass
  • D: CAB approval

Question 8

A company has been migrating a significant number of its on-premises applications to various SaaS providers. The IT department has noticed the following:

  1. User account management has become challenging.
  2. User account compromises have increased.
  3. Accessing various SaaS applications is challenging.
    Which of the following should the IT security department implement to BEST resolve the issue? (Choose three.)
  • A: Single sign-on
  • B: Multifactor authentication
  • C: Network intrusion prevention system
  • D: Password synchronization
  • E: Federation
  • F: IPSec tunnel to the SaaS providers
  • G: VPN to SaaS providers

Question 9

A cloud administrator is securing access to a VM using an IaaS cloud platform. The administrator must perform this task using an automated method, allow administrators to perform any method and expose any property of the VM, deny access for everyone else, and allow only read-only access to everyone else.
Given this scenario, which of the following should the administrator use to BEST meet these requirements?

  • A: jQuery
  • B: JavaScript
  • C: Java
  • D: JSON

Question 10

A company is deploying a new instant messaging app to allow for communications with external vendors. Each entity will host its own version of the application, but users must be able to talk between the companies. Which of the following security techniques would MOST likely be used to allow this to happen?

  • A: User synchronization
  • B: Password synchronization
  • C: Public federation
  • D: Multifactor authentication

Question 11

A multinational corporation needs to migrate servers, which are supporting a national defense project, to a new datacenter. The data in question is approximately
20GB in size. The engineer on the project is considering datacenters in several countries as possible destinations. All sites in consideration are on a high-speed
MPLS network (10Gb+ connections). Which of the following environmental constraints is MOST likely to rule out a possible site as an option?

  • A: Downtime impact
  • B: Legal restrictions
  • C: Peak time frames
  • D: Bandwidth

Question 12

A cloud administrator wants to apply patches in an isolated copy of the production virtual server to assess the impact. Which of the following activities would BEST achieve this objective?

  • A: Clustering
  • B: Snapshot
  • C: Image backup
  • D: Cloning

Question 13

A security and risk team requires a weekly report to detect VM file system changes and validate the integrity of the OS. Which of the following is the BEST solution for this requirement?

  • A: Configure a FIM agent on the VM and forward syslogs to a central location.
  • B: Configure debugging on the VM and forward syslogs to a central location.
  • C: Configure an antivirus agent on the VM and create the report through the web GUI.
  • D: Configure a FIM agent on the VM and create the report through the web GUI.

Question 14

IaaS users are reporting longer than expected wait times when accessing the virtual file repository. There are more than 2TB of free disk space, and vCPU and vRAM do not reach more than 75% utilization. In which of the following ways should the cloud systems administrator analyze this issue?

  • A: Access the cloud services portal and increase the amount of available disk space by 25%.
  • B: Access the cloud services portal and check the amount of CPU and RAM on the host machine.
  • C: Access the cloud services portal and look at the historical performance numbers.
  • D: Access the cloud services portal and check the security log for access denied requests.

Question 15

A software company recently moved all of its development testing to a public cloud environment. The company primarily uses IaaS to deploy and test its code. The company needs the software developers to be more agile and efficient when testing application code. Which of the following backup types should the developers use to BEST ensure the speedy recovery of a system if it is damaged?

  • A: Snapshots
  • B: Full
  • C: Incremental
  • D: Differential

Question 16

In a private cloud environment, which of the following is the BEST way to update 20 VMs with the same patch that has been regression tested and approved for rollout?

  • A: Automate the distribution of the patch and use an orchestration tool to roll it out.
  • B: Roll out the patch manually to the 20 VMs and reboot the system.
  • C: Deploy the patch to ten VMs for testing and then install it on the remaining VMs.
  • D: Install the patch on as many VMs as possible during the next maintenance window.

Question 17

A company is looking for a hardware feature with the least amount of downtime in terms of firmware upgrades. Which of the following features BEST meet this requirement?

  • A: In-service upgrades
  • B: Rolling upgrades
  • C: Failover upgrades
  • D: User-mode upgrades

Question 18

A company uses SaaS and IaaS solutions from multiple cloud providers. Users report that this requires them to manage and remember multiple user accounts and passwords. Which of the following solutions should be implemented to fix this issue?

  • A: SSO
  • B: Federation
  • C: Password synchronization
  • D: Lowered password complexity
  • E: Multifactor authentication

Question 19

A cloud administrator is provisioning five VMs, each with a minimum of 8GB of RAM and a varying load throughout the day. The hypervisor has only 32GB of
RAM. Which of the following features should the administrator use?

  • A: Memory overcommitment
  • B: Thin-provisioned model
  • C: Process scheduling
  • D: Hyperthreading

Question 20

A CSA needs to bring a client's public cloud site online at another location in the same region after a disaster. The RPO is eight hours, and the RTO is four hours.
Which of the following is the BEST way to accomplish this goal?

  • A: Restore the site at the new location within six hours by using backups from the failed public cloud site from eight hours earlier. Switch users from the failed site to the online regional public cloud site.
  • B: Restore the site at the new location within two hours by using backups from the failed public cloud site from two hours earlier. Switch users from the failed site to the online regional public cloud site.
  • C: Restore the site at the new location within eight hours by using backups from the failed public cloud site from six hours earlier. Switch users from the failed site to the online regional public cloud site.
  • D: Restore the site at the new location within four and half hours by using backups from the failed public cloud site from a half hour earlier. Switch users from the failed site to the online regional public cloud site.

Question 21

Company A just acquired Company B and needs to migrate critical applications to Company A's private cloud infrastructure. Company B's applications are running on legacy servers and cannot be removed from the current datacenter where they reside. Which of the following migration strategies should the cloud administrator use?

  • A: V2V
  • B: P2V
  • C: V2P
  • D: P2P

Question 22

Ann, the lead product developer for a company, just hired three new developers. Ann asked the cloud administrator to give these developers access to the fileshares in the public cloud environment. Which of the following is the BEST approach for the cloud administrator to take?

  • A: Clone Ann's account to create three new developer accounts.
  • B: Distribute the credentials of Ann's shared account to the three new developers.
  • C: Copy the fileshares to each new developer's laptop.
  • D: Create a new role to access the fileshares and assign the three new developers.

Question 23

A company hosts its server in a public IaaS cloud. The company's management decides to migrate the servers to a different geographical region that is closer to the user base. A cloud administrator creates a new environment in that geographical region. Which of the following is the BEST way to migrate the VM from the original geographic region to the new region?

  • A: 1. Create a full backup of the VM. 2. Copy the backup files into the new region using FTP. 3. Restore the VM from the backup files.
  • B: 1. Create a VM image. 2. Export the VM image to the new region using vendor's tools. 3. Deploy a new VM based on the created image.
  • C: 1. Create a VM clone. 2. Copy the clone into the new region using FTP. 3. Apply the network and security groups from the new region to the cloned VM and start it.
  • D: 1. Create a new VM in the new region. 2. Restore a full-system backup from the original VM. 3. Apply the network and security groups from the original region to the new VM.

Question 24

A new startup company is growing and wants to deploy a human resources management system on a private cloud that is only accessible to the human resources department. Which of the following is the BEST method of access control?

  • A: Discretionary access control
  • B: Mandatory access control
  • C: Non-discretionary access control
  • D: Comprehensive access control

Question 25

A Type 1 hypervisor has the following specifications:

RAM 128GB -

CPU 4 socket quad-core -

Storage 16TB -
Each VM must have reserved 8GB RAM, 1 vCPU, and 512GB storage. Which of the following is the MAXIMUM number of VMs that can be hosted on this hypervisor?

  • A: 14
  • B: 15
  • C: 31
  • D: 32
Page 1 of 8 • Questions 1-25 of 183

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!