CV1-003Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 1

SIMULATION -
A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday.
The majority of the application load takes place on the application server under normal conditions. For this reason, the company decides to deploy additional application servers into a commercial cloud provider using the on-premises orchestration engine that installs and configures common software and network configurations.
The remote computing environment is connected to the on-premises datacenter via a site-to-site IPSec tunnel. The external DNS provider has been configured to use weighted round-robin routing to load balance connections from the Internet.
During testing, the company discovers that only 20% of connections completed successfully.

INSTRUCTIONS -
Review the network architecture and supporting documents and fulfill these requirements:
Part 1:
✑ Analyze the configuration of the following components: DNS, Firewall 1, Firewall 2, Router 1, Router 2, VPN and Orchestrator Server.
✑ Identify the problematic device(s).
Part 2:
✑ Identify the correct options to provide adequate configuration for hybrid cloud architecture.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Part 1:

Cloud Hybrid Network Diagram -

Image 1 Image 2 Image 3 Image 4 Image 5 Image 6 Image 7 Image 8

Part 2:
Only select a maximum of TWO options from the multiple choice question

Image 9

Question 2

A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance.
Which of the following licensing models is the application MOST likely using?

  • A: Per device
  • B: Per user
  • C: Core-based
  • D: Volume-based

Question 3

A systems administrator needs to convert ten physical servers to virtual.
Which of the following would be the MOST efficient conversion method for the administrator to use?

  • A: Rebuild the servers from scratch
  • B: Use the vendor's conversion tool
  • C: Clone the hard drive
  • D: Restore from backup

Question 4

Which of the following cloud services is fully managed?

  • A: IaaS
  • B: GPU in the cloud
  • C: IoT
  • D: Serverless compute
  • E: SaaS

Question 5

A vendor is installing a new retail store management application for a customer. The application license ensures software costs are low when the application is not being used, but costs go up when use is higher.
Which of the following licensing models is MOST likely being used?

  • A: Socket-based
  • B: Core-based
  • C: Subscription
  • D: Volume-based

Question 6

A systems administrator swapped a failed hard drive on a server with a RAID 5 array. During the RAID resynchronization, a second hard drive failed.
Which of the following actions will make the server fully operational?

  • A: Restart the RAID resynchronization process
  • B: Perform a P2V migration of the server
  • C: Swap the failed hard drive with a fresh one
  • D: Restore the server from backup

Question 7

A cloud administrator is building a new VM for machine-learning training. The developer requesting the VM has stated that the machine will need a full GPU dedicated to it.
Which of the following configuration options would BEST meet this requirement?

  • A: Virtual GPU
  • B: External GPU
  • C: Passthrough GPU
  • D: Shared GPU

Question 8

A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention.
Which of the following will BEST resolve this issue?

  • A: Ensure all database queries are encrypted
  • B: Create an IPSec tunnel between the database server and its clients
  • C: Enable protocol encryption between the storage and the hypervisor
  • D: Enable volume encryption on the storage
  • E: Enable OS encryption

Question 9

An OS administrator is reporting slow storage throughput on a few VMs in a private IaaS cloud. Performance graphs on the host show no increase in CPU or memory. However, performance graphs on the storage show a decrease of throughput in both IOPS and MBps but not much increase in latency. There is no increase in workload, and latency is stable on the NFS storage arrays that are used by those VMs.
Which of the following should be verified NEXT?

  • A: Application
  • B: SAN
  • C: VM GPU settings
  • D: Network

Question 10

A systems administrator is configuring RAID for a new server. This server will host files for users and replicate to an identical server. While redundancy is necessary, the most important need is to maximize storage.
Which of the following RAID types should the administrator choose?

  • A: 5
  • B: 6
  • C: 10
  • D: 50

Question 11

An organization purchased new servers with GPUs for render farms. The servers have limited CPU resources.
Which of the following GPU configurations will be the MOST optimal for virtualizing this environment?

  • A: Dedicated
  • B: Shared
  • C: Passthrough
  • D: vGPU

Question 12

SIMULATION -
The QA team is testing a newly implemented clinical trial management (CTM) SaaS application that uses a business intelligence application for reporting. The
UAT users were instructed to use HTTP and HTTPS.
Refer to the application dataflow:
1A "" The end user accesses the application through a web browser to enter and view clinical data.
2A "" The CTM application server reads/writes data to/from the database server.
1B "" The end user accesses the application through a web browser to run reports on clinical data.
2B "" The CTM application server makes a SOAP call on a non-privileged port to the BI application server.
3B "" The BI application server gets the data from the database server and presents it to the CTM application server.
When UAT users try to access the application using https://ctm.app.com or http://ctm.app.com, they get a message stating: "Browser cannot display the webpage." The QA team has raised a ticket to troubleshoot the issue.

INSTRUCTIONS -
You are a cloud engineer who is tasked with reviewing the firewall rules as well as virtual network settings.
You should ensure the firewall rules are allowing only the traffic based on the dataflow.
You have already verified the external DNS resolution and NAT are working.
Verify and appropriately configure the VLAN assignments and ACLs. Drag and drop the appropriate VLANs to each tier from the VLAN Tags table. Click on each
Firewall to change ACLs as needed.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Image 1 Image 2 Image 3 Image 4 Image 5

Question 13

A company needs to rehost its ERP system to complete a datacenter migration to the public cloud. The company has already migrated other systems and configured VPN connections.
Which of the following MOST likely needs to be analyzed before rehosting the ERP?

  • A: Software
  • B: Licensing
  • C: Right-sizing
  • D: The network

Question 14

A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement?

  • A: Performance testing
  • B: Penetration testing
  • C: Vulnerability testing
  • D: Regression testing

That’s the end of your free questions

You’ve reached the preview limit for CV1-003

Consider upgrading to gain full access!

Page 1 of 3 • Questions 1-25 of 66

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!