Unlock Cloud Mastery: CompTIA Cloud+ CV0-003 Prep That Propels Your Career
An organization's two-node, hybrid container cluster is experiencing failures during horizontal scaling to the cloud cluster instance. The on-premises IP range is 192.168.0.0/16, and the cloud environment is 10.168.0.0/16. Overlapping or stretched VLANs are not permitted, and a node is deployed in each location. The cloud monitoring agent reports a healthy status for the second instance, but when pinging the clusters from on premises, the following output is received:
pinging cluster1. compti
a. containers.com C192.168.100 reply
pinging cluster2. comptia. containers.com [192.16B .100 .128] request timed out
Which of the following is the most likely reason for the scaling failure?
Correct : E
An incorrect IP route is the most likely reason for the scaling failure, as it prevents the communication between the on-premises and cloud cluster nodes. The ping output shows that the DNS entry for cluster2.comptia.containers.com is resolved to an IP address in the cloud environment (192.168.100.128), but the request times out, indicating a network connectivity issue. An incorrect proxy entry, an offline cluster node, or an incorrect cluster IP would not cause the DNS resolution to fail. An incorrect DNS entry would not cause the ping request to time out.
Start a Discussions
A cloud solutions architect is working on a private cloud environment in which storage consumption is increasing daily, resulting in high costs. Which of the following can the architect use to provide more space without adding more capacity? (Select two).
Start a Discussions
An organization is deploying development, quality assurance, and production environments with equal numbers of IP addresses to the cloud. The IP address range provided is 10.168.0.0/24, and it needs to be terminated on a firewall. Which of the following IP subnets and firewall IPS should be used for one of the environments?
Correct : A
The IP address range 10.168.0.0/24 can be divided into four equal subnets of 64 addresses each by using a /26 mask. The subnets are 10.168.0.0/26, 10.168.0.64/26, 10.168.0.128/26, and 10.168.0.192/26. The last address in each subnet is the broadcast address, and the second-last address can be used as the gateway address for that subnet. Therefore, one of the possible subnets and firewall IPs for one of the environments is 10.168.0.0/26 and 10.168.0.63.
Start a Discussions
A systems administrator audits a cloud application and discovers one of the key regulatory requirements has not been addressed. The requirement states that if
a physical breach occurs and hard drives are stolen, the contents of the drives should not be readable. Which of the following should be used to address the requirement?
Correct : B
Encryption is the process of transforming data into an unreadable format using a secret key or algorithm. Encryption can be used to protect data at rest or in transit from unauthorized access or theft. If a physical breach occurs and hard drives are stolen, encryption can prevent the contents of the drives from being readable by anyone who does not have the decryption key or algorithm.
Start a Discussions
A cloud administrator is reviewing the current private cloud and public laaS environment, and is building an optimization plan. Portability is of great concern for the administrator so resources can be easily moved from one environment to another.
Which of the following should the administrator implement?
Start a Discussions
Total 406 questions