CV0-002 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam

Question No.1

A company#39;s security policy requires full disk encryption on all clients with preboot enabled. The encryption server is hosted, and the requirement is to push an update to all endpoints. Which of the following is the BEST method to test and apply the update with minimal disruption to end users?

  1. Access the API of the encryption server, develop a custom script, and then update all endpoints.

  2. Access the web UI portal of the encryption server, apply the update to the test group, validate, and then update all endpoints.

  3. Add the update to the standard desktop configuration image, apply the update to a test VM, and then reimage clients.

  4. Access the web UI of the encryption server and disable preboot, apply the update, test, and then deploy the update to all endpoints.

Correct Answer: B

Question No.2

A cloud administrator is configuring a bastion host. The bastion host will be used to administer systems in the cloud remotely from the administrator#39;s on-premises desktop. The administrator is given the following requirements:


Ensure port 22 is open on the host and only allow the public IP of the on-premises router/firewall.


Ensure port 3389 is open on the host and only allow the public IP of the on-premises router/firewall.


Harden these services with PKI (where applicable).

Given this scenario, which of the following should the administrator utilize to BEST address these requirements? (Select THREE).

  1. RDP protocol from the desktop to the bastion host

  2. Telnet protocol from the desktop to the bastion host

  3. SSH protocol from the desktop to the bastion host

  4. MD5 and RC4 with a signed certificate

  5. RSA and AES with a signed certificate

  6. Blowfish and SHA-1 with a signed certificate

  7. VNC protocol from the desktop to the bastion host

Correct Answer: ACD

Question No.3

A cloud administrator is analyzing usage trends for a website housed within an IaaS cloud platform. The administrator notices that traffic and visitors to the site quadrupled from the normal baseline during the holiday season. The environment has a load balancer that uses standardized VMs to host the applications. Given this scenario, which of the following would be the MOST efficient, provide no downtime, and address the temporary spike in traffic?

  1. Implement an upward vertical scaling solution.

  2. Implement a downward vertical scaling solution.

  3. Implement an inward horizontal scaling solution.

  4. Implement an outward horizontal scaling solution.

Correct Answer: A

Question No.4

A private cloud customer is considering using the public cloud to accommodate the peak utilization workload. Which of the following would be considered the ideal scaling solution?

  1. Cloud bursting

  2. Load balancing

  3. Horizontal scaling

  4. Vertical scaling

Correct Answer: A

Question No.5

A company purchased a SaaS CRM application. The signed SLA meets year-round performance requirements. Three months after deployment, customers start reporting a slow application response time. System availability, connectivity, and proper functionality still meet the SLA. Which of the following is MOST likely the reason for the poor response time?

  1. Incorrect business requirements are invalidating the testing results.

  2. Bandwidth restrictions are causing poor performance.

  3. The application version is causing compatibility issues.

  4. Inadequate documentation is affecting the user interface.

Correct Answer: C

Question No.6

A cloud provider is evaluating an insider threat. A resource from the company operations team has access to the servers#39; virtual disks. This poses a risk that someone could copy and move the virtual server image and have access to the data. Which of the following solutions would help mitigate this problem?

  1. Tokenization

  2. Encryption

  3. Virtual firewall

  4. Hashing

Correct Answer: A

Question No.7

A cloud administrator updates the syslog forwarder configuration on a local server in production to use a different port. The development team is no longer receiving the audit logs from that server. However, the security team can retrieve and search the logs for the same server. Which of the following is MOST likely the issue?

  1. The development team is not looking at the correct server when querying for the logs.

  2. The security team has greater permissions than the development team.

  3. The audit logging service has been disabled on the server.

  4. The development team#39;s syslog server is configured to listen on the wrong port.

Correct Answer: B

Question No.8

A new startup company is growing and wants to deploy a human resources management system on a private cloud that is only accessible to the human resources department. Which of the following is the BEST method of access control?

  1. Discretionary access control

  2. Mandatory access control

  3. Non-discretionary access control

  4. Comprehensive access control

Correct Answer: A

Question No.9

A technician receives a report of system utilization:


Which of the following additional resources should the technician add FIRST given the trend data shown above?

  1. CPU

  2. Disk

  3. Bandwidth

  4. RAM

Correct Answer: B

Question No.10

Ann, the lead product developer for a company, just hired three new developers. Ann asked the cloud administrator to give these developers access to the fileshares in the public cloud environment. Which of the following is the BEST approach for the cloud administrator to take?

  1. Clone Ann#39;s account to create three new developer accounts.

  2. Distribute the credentials of Ann#39;s shared account to the three new developers.

  3. Copy the fileshares to each new developer#39;s laptop.

  4. Create a new role to access the fileshares and assign the three new developers.

Correct Answer: D

Get Full Version of CV0-002 Dumps