CompTIA CV0-003 Exam
CompTIA Cloud+ Certification (Page 5 )

Updated On: 12-Feb-2026

A cloud architect is designing the VPCs for a new hybrid cloud deployment. The business requires the following:

-High availability
-Horizontal auto-scaling
-60 nodes peak capacity per region
-Five reserved network IP addresses per subnet
-/24 range

Which of the following would BEST meet the above requirements?

  1. Create two /25 subnets in different regions.
  2. Create three /25 subnets in different regions.
  3. Create two /26 subnets in different regions.
  4. Create three /26 subnets in different regions.
  5. Create two /27 subnets in different regions.
  6. Create three /27 subnets in different regions.

Answer(s): A

Explanation:

You need 65 IPs per region. /27 will only give you 32 and /26 will only give you 64. You need a /25 network which will give you 128 per region. Having two regions will give you the requirement of high availability. Yes, 3 regions is better than 2, but it doesn't ask for the best high availability option, it just asks for high availability which 2 regions provides.



A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST?

  1. Server power
  2. Rack power
  3. Switch power
  4. SAN power

Answer(s): C

Explanation:

The question tells you that the servers did not lose power. If the servers in the rack did not lose power, the problem is not the rack power. The most likely reason the severs were inaccessible is due to connectivity, thus I would check the switch power.



A cloud provider wants to make sure consumers are utilizing its IaaS platform but prevent them from installing a hypervisor on the server. Which of the following will help the cloud provider secure the environment and limit consumers' activity?

  1. Patch management
  2. Hardening
  3. Scaling
  4. Log and event monitoring

Answer(s): B

Explanation:

They want to prevent unauthorized access to a server. That's what hardening is for. Log and Event Monitoring won't prevent unauthorized access. Scaling and Patch Management make so sense here.



A resource pool in a cloud tenant has 90 GB of memory and 120 cores. The cloud administrator needs to maintain a 30% buffer for resources for optimal performance of the hypervisor. Which of the following would allow for the maximum number of two-core machines with equal memory?

  1. 30 VMs, 3GB of memory
  2. 40 VMs, 1,5GB of memory
  3. 45 VMs, 2 GB of memory
  4. 60 VMs, 1 GB of memory

Answer(s): B

Explanation:

The answer is B. after subtracting 30% from the memory and the cores, we end up with 63GB and 84 Cores left. We can make 42 2 core vms. That eliminates C and D. Quick math with the remaining options: A) 3GB x 30= 90GB. we only have 63GBs to work with so A is wrong. B) 1.5GB x 40= 60GB. There are leftover cores and memory but this is the best choice.



A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider's environment that do not belong to the company. Which of the following BEST describes this attack?

  1. VM escape
  2. Directory traversal
  3. Buffer overflow
  4. Heap spraying

Answer(s): A


Reference:

https://whatis.techtarget.com/definition/virtual-machine-escape






Post your Comments and Discuss CompTIA CV0-003 exam prep with other Community members:

Join the CV0-003 Discussion