Free CV0-004 Exam Braindumps (page: 19)

Page 18 of 54

Which of the following refers to the idea that data should stay within certain borders or territories?

  1. Data classification
  2. Data retention
  3. Data sovereignty
  4. Data ownership

Answer(s): C

Explanation:

Data sovereignty refers to the concept that data is subject to the laws and governance structures within the nation it is collected or stored. It implies that regardless of where a company's data is stored, the data must comply with the laws of the country where it is physically located.


Reference:

The principle of data sovereignty is a critical consideration in international cloud services and is included in the governance, risk, and compliance domain of CompTIA Cloud+.



A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging.
Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

  1. Log retention
  2. Tracing
  3. Log aggregation
  4. Log rotation
  5. Hashing
  6. Encryption

Answer(s): A,C

Explanation:

For detailed logging to support root cause analysis of past events, the team should implement log retention to ensure logs are kept for the necessary amount of time and log aggregation to compile logs from various sources for easier analysis and correlation.


Reference:

Log management practices, including retention and aggregation, are part of the cloud management strategies covered in the CompTIA Cloud+ curriculum, particularly in the domain of technical operations.



A company experienced a data leak through its website. A security engineer, who is investigating the issue, runs a vulnerability scan against the website and receives the following output:



Which of the following is the most likely cause of this leak?

  1. RTMP port open
  2. SQL injection
  3. Privilege escalation
  4. Insecure protocol

Answer(s): D

Explanation:

The data leak is most likely caused by the use of an insecure protocol. The vulnerability scan output shows that port 21/tcp for FTP (File Transfer Protocol) is open. FTP is known for transmitting data unencrypted, which could allow sensitive data to be intercepted during transfer.


Reference:

The security risks associated with the use of insecure or unencrypted protocols are covered under cloud security best practices in the CompTIA Cloud+ curriculum.



A customer's facility is located in an area where natural disasters happen frequently. The customer requires the following:
· Data resiliency due to exposure to frequent natural disasters · Data localization because of privacy regulations in the country · High availability
Which of the following cloud resources should be provisioned to meet these requirements?

  1. Storage in a separate data center located in same region
  2. An on-premises private cloud carrying duplicate data
  3. Storage in an availability zone outside the region
  4. Storage in the same availability zone as the primary data

Answer(s): C

Explanation:

To meet the requirements of data resiliency, data localization, and high availability in a region prone to natural disasters, the customer should provision storage in an availability zone outside the region. This ensures that data is not affected by regional disasters and complies with data localization by remaining within the country's borders, while also providing high availability.


Reference:

Disaster recovery and high availability strategies, including the use of multiple availability zones, are discussed in the CompTIA Cloud+ certification material.






Post your Comments and Discuss CompTIA CV0-004 exam with other Community members:

CV0-004 Discussions & Posts