CompTIA CV0-004 Exam (page: 8)
CompTIA Cloud+
Updated on: 15-Feb-2026

Viewing Page 8 of 44

A cloud engineer has provisioned a VM for a high-frequency trading application. After the VM is put into production, users report high latency in trades. The engineer checks the last six hours of VM metrics and sees the following:
· CPU utilization is between 30% to 60%.
· Networkln is between 50Kbps and 70Kbps.
· NetworkOut is between 3.000Kpbs and 5.000Kbps.
· DiskReadOps is at 30.
· DiskWriteOps is at 70
· Memory utilization is between 50% and 70%.
Which of the following steps should the engineer take next to solve the latency issue?

  1. Move to a network-optimized instance type as the network throughput is not enough.
  2. Modify the disk IOPS to a higher value as the disk IO is being bottlenecked at 100 IOPS.
  3. Increase the memory of the instance as the high-frequency trading application requires more RAM.
  4. Increase the instance size to allocate more vCPUs as the CPU utilization is very high.

Answer(s): A

Explanation:

Since the NetworkOut is significantly higher than NetworkIn and considering the nature of a high- frequency trading application, the issue most likely lies with network throughput. Moving to a network-optimized instance type would provide higher network bandwidth, which can reduce latency in trades.


Reference:

This solution is derived from the Management and Technical Operations domain of the

CompTIA Cloud+ objectives, focusing on performance optimization for cloud services.



A cloud engineer was deploying the company's payment processing application, but it failed with the following error log:
ERFOR:root: Transaction failed http 429 response, please try again Which of the following are the most likely causes for this error? (Select two).

  1. API throttling
  2. API gateway outage
  3. Web server outage
  4. Oversubscription
  5. Unauthorized access
  6. Insufficient quota

Answer(s): A,F

Explanation:

The error "http 429 response, please try again" typically indicates API throttling, where the number of requests exceeds the rate limit set by the API provider, and insufficient quota, where the allowed number of API calls within a given timeframe has been exceeded.


Reference:

API throttling and quota management are key concepts in the management of cloud resources, as highlighted in the CompTIA Cloud+ curriculum.



An organization's web application experiences penodic bursts of traffic when a new video is launched. Users are reporting poor performance in the middle of the month.
Which of the following scaling approaches should the organization use to scale based on forecasted traffic?

  1. Scheduled
  2. Manual
  3. Event
  4. Load

Answer(s): A

Explanation:

For periodic bursts of traffic that are predictable, such as when a new video is launched, a scheduled scaling approach is suitable. This strategy involves scaling resources based on forecasted or known traffic patterns, ensuring that the infrastructure can handle the load during expected peak times.


Reference:

The use of scheduled scaling to manage predictable traffic increases is discussed within the Management and Technical Operations section of the CompTIA Cloud+ exam objectives.



A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour.
Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

  1. Use laC to deploy the laaS infrastructure.
  2. Convert the containers to VMs.
  3. Deploy the containers over SSH.
  4. Use private repositories for the containers.

Answer(s): D

Explanation:

To prevent proprietary code from being exposed to third parties, a cloud engineer should use private repositories for the containers. Private repositories ensure that access to container images is restricted and controlled, unlike public repositories where images are accessible to anyone.


Reference:

The concept of using private repositories for protecting proprietary code is part of cloud security best practices, which is covered under the Governance, Risk, Compliance, and Security domain of the CompTIA Cloud+ certification.



Which of the following is an auditing procedure that ensures service providers securely manage the data to protect the interests of the organization and the privacy of its clients?

  1. CIS
  2. ITIL
  3. SOC2
  4. ISO 27001

Answer(s): C

Explanation:

SOC2 (Service Organization Control 2) is an auditing procedure that ensures service providers securely manage data to protect the interests of an organization and the privacy of its clients. SOC2 is specifically designed for service providers storing customer data in the cloud, making it pertinent for data management and privacy.


Reference:

SOC2 and its role in auditing and ensuring secure data management by cloud service providers are part of the compliance standards and regulations included in the CompTIA Cloud+ certification material.



Viewing Page 8 of 44



Share your comments for CompTIA CV0-004 exam with other users:

Edward 9/13/2023 5:27:00 PM

question #50 and question #81 are exactly the same questions, azure site recovery provides________for virtual machines. the first says that it is fault tolerance is the answer and second says disater recovery. from my research, it says it should be disaster recovery. can anybody explain to me why? thank you
CANADA


Monti 5/24/2023 11:14:00 PM

iam thankful for these exam dumps questions, i would not have passed without this exam dumps.
UNITED STATES


Anon 10/25/2023 10:48:00 PM

some of the answers seem to be inaccurate. q10 for example shouldnt it be an m custom column?
MALAYSIA


PeterPan 10/18/2023 10:22:00 AM

are the question real or fake?
Anonymous


CW 7/11/2023 3:19:00 PM

thank you for providing such assistance.
UNITED STATES


Mn8300 11/9/2023 8:53:00 AM

nice questions
Anonymous


Nico 4/23/2023 11:41:00 PM

my 3rd purcahse from this site. these exam dumps are helpful. very helpful.
ITALY


Chere 9/15/2023 4:21:00 AM

found it good
Anonymous


Thembelani 5/30/2023 2:47:00 AM

excellent material
Anonymous


vinesh phale 9/11/2023 2:51:00 AM

very helpfull
UNITED STATES


Bhagiii 11/4/2023 7:04:00 AM

well explained.
Anonymous


Rahul 8/8/2023 9:40:00 PM

i need the pdf, please.
CANADA


CW 7/11/2023 2:51:00 PM

a good source for exam preparation
UNITED STATES


Anchal 10/23/2023 4:01:00 PM

nice questions
INDIA


J Nunes 9/29/2023 8:19:00 AM

i need ielts general training audio guide questions
BRAZIL


Ananya 9/14/2023 5:16:00 AM

please make this content available
UNITED STATES


Swathi 6/4/2023 2:18:00 PM

content is good
Anonymous


Leo 7/29/2023 8:45:00 AM

latest dumps please
INDIA


Laolu 2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.
UNITED STATES


Zaynik 9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer
Anonymous


Massam 6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump
Anonymous


Anonymous 12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.
INDIA


Japles 5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.
Anonymous


Faritha 8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures
UNITED STATES


Anonymous 9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i
UNITED STATES


p das 12/7/2023 11:41:00 PM

very good questions
UNITED STATES


Anna 1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?
KOREA REPUBLIC OF


Bhavya 9/13/2023 10:15:00 AM

very usefull
Anonymous


Rahul Kumar 8/31/2023 12:30:00 PM

need certification.
CANADA


Diran Ole 9/17/2023 5:15:00 PM

great exam prep
CANADA


Venkata Subbarao Bandaru 6/24/2023 8:45:00 AM

i require dump
Anonymous


D 7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,
Anonymous


Ann 9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks
AUSTRALIA


Sridhar 1/16/2024 9:19:00 PM

good questions
Anonymous