CompTIA CV0-003 Exam
CompTIA Cloud+ Certification (Page 3 )

Updated On: 12-Feb-2026

A Chief Information Security Officer (CISO) is evaluating the company's security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?

  1. An SLA document
  2. A DR plan
  3. SOC procedures
  4. A risk register

Answer(s): D

Explanation:

A risk register would outline all the assets with identified deviations and their mitigation measures. It would it also outline the risks, the risk(s) descriptions, the impact of the risks, and their likelihood of occurring. SOC procedures is poorly worded and doesn't clarify on whether this for your actual SOC's documentation/procedure processes. Or if this is related to SOC reports (Type I, II, or III) when it comes to GRC or RMF functions.


Reference:

https://reciprocity.com/resources/what-is-a-risk-register/
https://www.apomatix.com/blog/how-to-create-an-asset-risk-register/#:~:text=It%20is%20a%20document%20that,to%20have%20an%20asset%20register



A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?

  1. Create a VPC and peer the networks.
  2. Implement dynamic routing.
  3. Enable DHCP on the networks.
  4. Obtain a new IPAM subscription.

Answer(s): A

Explanation:

Neither "B", "C" or "D" will provide addresses to the VPC in question that it doesn't already have. Creating a new VPC and peering the two will allow growth on the new VPC and both VPC's can communicate as if they're on the same network.
Obtaining a new IPAM subscription may provide additional IP addresses, but it is not the most efficient or cost-effective solution. Creating a new network with a VPC and peering the networks is a better approach as it allows for more flexibility in managing and scaling the environment.



A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?

  1. V2V
  2. V2P
  3. P2P
  4. P2V

Answer(s): D



A company is utilizing a private cloud solution that is hosted within its datacenter. The company wants to launch a new business application, which requires the resources below:



The current private cloud has 30 vCPUs and 512GB RAM available. The company is looking for a quick solution to launch this application, with expected maximum sessions to be close to 24,000 at launch and an average of approximately 5,000 sessions. Which of the following solutions would help to company accommodate the new workload in the SHORTEST amount of time and with the maximum financial benefits?

  1. Configure auto-scaling within the private cloud.
  2. Set up cloud bursting for the additional resources.
  3. Migrate all workloads to a public cloud provider.
  4. Add more capacity to the private cloud.

Answer(s): B

Explanation:

The correct answer is "B." Cloud Bursting will provide the quickest deployment for the private cloud by overflowing into the public cloud. This will save time and money in order to provide continued service without interruption.

Cloud Bursting can be used for both compute and storage. This question is about compute capability. "Compute Bursting" unleashes the high-performance compute capabilities of the cloud for processing locally created datasets.


Reference:

https://azure.microsoft.com/en-us/overview/what-is-cloud-bursting/



A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier. Which of the following access control rules should be changed?

  1. Discretionary-based
  2. Attribute-based
  3. Mandatory-based
  4. Role-based

Answer(s): D






Post your Comments and Discuss CompTIA CV0-003 exam prep with other Community members:

Join the CV0-003 Discussion