Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Pearson CV0-004 New Attempt

Page: 12 / 17
Total 229 questions

CompTIA Cloud+ (2025) Questions and Answers

Question 45

An organization's critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of

a software web application:

"2021/12/18 09:33:12" "10. 34. 32.18" "104. 224. 123. 119" "POST / login.php?u=administrator&p=or%201%20=1"

"2021/12/18 09:33:13" "10.34. 32.18" "104. 224. 123.119" "POST /login. php?u=administrator&p=%27%0A"

"2021/12/18 09:33:14" "10. 34. 32.18" "104. 224. 123. 119" "POST /login. php?u=administrator&p=%26"

"2021/12/18 09:33:17" "10.34. 32.18" "104. 224. 123.119" "POST / login.php?u=administrator&p=%3B"

"2021/12/18 09:33:12" "10.34. 32. 18" "104. 224. 123. 119" "POST / login. php?u=admin&p=or%201%20=1"

"2021/12/18 09:33:19" "10.34.32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%27%0A"

"2021/12/18 09:33:21" "10. 34. 32.18" "104.224. 123.119" "POST / login. php?u=admin&p=%26"

"2021/12/18 09:33:23" "10. 34. 32.18" "104. 224. 123.119" "POST / login. php?u=admin&p=%3B"

Which of the following types of attacks occurred?

Options:

A.

SQL injection

B.

Cross-site scripting

C.

Reuse of leaked credentials

D.

Privilege escalation

Question 46

A systems administrator is provisioning VMs according to the following requirements:

· A VM instance needs to be present in at least two data centers.

. During replication, the application hosted on the VM tolerates a maximum latency of one second.

· When a VM is unavailable, failover must be immediate.

Which of the following replication methods will best meet these requirements?

Options:

A.

Snapshot

B.

Transactional

C.

Live

D.

Point-in-time

Question 47

A company requests that its cloud administrator provision virtual desktops for every user. Given the following information:

• One hundred users are at the company.

• A maximum of 30 users work at the same time.

• Users cannot be interrupted while working on the desktop.

Which of the following strategies will reduce costs the most?

Options:

A.

Provisioning VMs of varying sizes to match user needs

B.

Configuring a group of VMs to share with multiple users

C.

Using VMs that have spot availability

D.

Setting up the VMs to turn off outside of business hours at night

Question 48

A cloud service provider just launched a new serverless service that is compliant with all security regulations. A company deployed its code using the service, and the company's application was hacked due to leaked credentials. Which of the following is responsible?

Options:

A.

Customer

B.

Cloud service provider

C.

Hacker

D.

Code repository

Page: 12 / 17
Total 229 questions