00:00

QUESTION 16

An administrator received a report that company data has been compromised. The compromise occurred on a holiday, and no one in the organization was working. While reviewing
the logs from the holiday, the administrator noted the following details:
CV0-004 dumps exhibit
The most appropriate action for the cloud security analyst to recommend is using CIS- hardened images. These images are pre-configured by the Center for Internet Security to provide security benchmark standards that help in mitigating vulnerabilities in publicly available container images.References: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Security Posture
Which of the following accounts should the administrator disable to prevent a further breach?

Correct Answer: D
Based on the provided log details, the account of the Software Developer was used to gain unauthorized access. This account should be disabled to prevent further breaches, especially considering no one from the organization was working during the holiday, suggesting a compromised account. References: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Security

QUESTION 17

A company wants to build its new platform using a public cloud. The workload requirements include the following:
• Implementation of custom CIS compliance
• Patch for vulnerabilities within 24 hours
• Warrant at least 1,800 IOPS per volume Which of the following meets the requirements?

Correct Answer: B
Infrastructure as a Service (IaaS) provides the most flexibility among cloud service models, allowing for the implementation of custom security and compliance standards, such as CIS compliance. IaaS environments offer control over the infrastructure, enabling patch management within specific time frames. Additionally, IaaS providers typically offer configurable storage options, including the ability to specify IOPS (Input/Output Operations Per Second) per volume to meet performance requirements.

QUESTION 18

A developer at a small startup company deployed some code for a new feature to its public repository. A few days later, a data breach occurred. A security team investigated the incident and found that the database was hacked. Which of the following is the most likely cause of this breach?

Correct Answer: B
Hard-coded credentials within code, especially when deployed in a public repository, are a common security vulnerability. If credentials such as passwords or API keys are embedded in the code, anyone with access to the repository can potentially use them to gain unauthorized access to databases or other sensitive resources. This is a likely cause of the data breach in the scenario described. References: CompTIA Security+ Guide to Network Security Fundamentals by Mark Ciampa.

QUESTION 19

A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

Correct Answer: AC
For detailed logging to support root cause analysis of past events, the team should implement log retention to ensure logs are kept for the necessary amount of time and log aggregation to compile logs from various sources for easier analysis and correlation.References: Log management practices, including retention and aggregation, are part of the cloud management strategies covered in the CompTIA Cloud+ curriculum, particularly in the domain of technical operations.

QUESTION 20

A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour. Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

Correct Answer: D
To prevent proprietary code from being exposed to third parties, a cloud engineer should use private repositories for the containers. Private repositories ensure that access to container images is restricted and controlled, unlike public repositories where images are accessible toanyone.References: The concept of using private repositories for protecting proprietary code is part of cloud security best practices, which is covered under the Governance, Risk, Compliance, and Security domain of the CompTIA Cloud+ certification.