Free CV0-003 Exam Braindumps (page: 46)

Page 45 of 98

A web application has been configured to use auto-scaling for provisioning and deprovisioning more VMs according to the workload. The systems administrator deployed a new Cl/CD tool to automate new releases of the web application. During the night, a script was deployed and configured to be executed by the VMs during bootstrapping. Now, the auto-scaling configuration is creating a new VM every five minutes.
Which of the following actions will MOST likely resolve the issue?

  1. Reducing the maximum threshold in the auto-scaling configuration
  2. Debugging the script and redeploying it
  3. Changing the automation tool because it is incompatible
  4. Modifying the script to shut down the VM after five minutes

Answer(s): B



A systems administrator is troubleshooting an application that is configured to auto-scale with a minimum of two nodes and a maximum of four. The application will scale out if the CPU utilization of one of the nodes exceeds 80% for more than five minutes and will scale in if the CPU utilization of one of the nodes drops under
20% for more than ten minutes. There is a reverse proxy in front of the application. The systems administrator notices two of the nodes are often running over 80% for a long period of time, which is triggering the creation of the other two nodes; however, they are being created and terminated while the load in the first two remains over 50% all the time.
Which of the following should the administrator configure to fix this issue?

  1. Disable DNS caching in the reverse proxy.
  2. Reduce the minimum node count to one.
  3. Disable TLS tickets.
  4. Reduce the scale-out rule to 50%.
  5. Increase the scale-in rule to 50%.

Answer(s): A



Over the last couple of years, the growth of a company has required a more complex DNS and DHCP environment.
Which of the following should a systems administration team implement as an appropriate solution to simplify management?

  1. IPAM
  2. DoH
  3. VLAN
  4. SDN

Answer(s): A



A financial industry services firm was the victim of an internal data breach, and the perpetrator was a member of the company's development team. During the investigation. one of the security administrators accidentally deleted the perpetrator’s user data. Even though the data is recoverable, which of the following has been violated?

  1. Chain of custody
  2. Evidence acquisition
  3. Containment
  4. Root cause analysis

Answer(s): A






Post your Comments and Discuss CompTIA CV0-003 exam with other Community members:

CV0-003 Discussions & Posts