CompTIA Cloud+ Sample Questions for CV0-004 Certification Success
- CertiMaan
- Oct 26, 2025
- 17 min read
Updated: Feb 2
Sharpen your skills and prepare for the CompTIA Cloud+ CV0-004 certification with this handpicked set of sample questions and realistic practice exams. These CompTIA Cloud+ sample questions reflect real exam scenarios covering cloud architecture, deployment, security, and troubleshooting. Ideal for IT professionals working in cloud environments, this resource offers updated CV0-004 practice exams, mock tests, and scenario-based questions that build confidence and identify knowledge gaps. Whether you're reviewing key cloud concepts or simulating exam conditions, these tools are designed to accelerate your path to certification. Master the Cloud+ exam with confidence using reliable, up-to-date study material tailored for 2026 success.
CompTIA Cloud+ Sample Questions List :
1. A cloud engineer is running a latency-sensitive workload that must be resilient and highly available across multiple regions. Which of the following concepts best addresses these requirements?
Cloning
Stand-alone container
Clustering
Hardware passthrough
2. A customer is migrating applications to the cloud and wants to grant authorization using the classification levels of each system. Which of the following should the customer implement to ensure authorization to systems is granted when the user and system classification properties match? (Choose two.)
Single sign-on
Attribute-based access control
Token-based authentication
Multifactor authentication
Bastion host
Resource tagging
3. Which of the following is the most cost-effective and efficient strategy when migrating containers to the cloud?
Refactor
Retire
Replatform
Retain
4. A company wants to implement a work environment that will have low operational overhead and highly accessible enterprise resource planning, email, and data resources. Which of the following cloud service models should the company implement?
DBaaS
IaaS
PaaS
SaaS
5. A DevOps engineer is performing maintenance on the mail servers for a company’s web application. Part of this maintenance includes checking core operating system updates. The servers are currently running version 3.2 of the operating system. The engineer has two update options—one to version 4.1 and the other to version 3.7. Both versions are fully supported by the operating system manufacturer. Which of the following best describes the action the engineer should take?
Upgrade to 3.7 in the development environment
Schedule a maintenance window and upgrade to 3.7 in the production environment
Read the release notes on version 4.1
Upgrade to 4.1 on one production server at a time
6. A customer relationship management application, which is hosted in a public cloud IaaS network, is vulnerable to a remote command execution vulnerability. Which of the following is the best solution for the security engineer to implement to prevent the application from being exploited by basic attacks?
DLP
ACL
WAF
IPS
7. A cloud engineer is designing a cloud native, three-tier application. The engineer must adhere to the following security best practices: Minimal services should run on all layers of the stack. The solution should be vendor agnostic. Virtualization could be used over physical hardware. Which of the following concepts should the engineer use to design the system to best meet these requirements?
Virtual machine
Fan-out
Microservices
Cloud-provided managed services
8. Department supervisors have requested a report that will help them understand the utilization of cloud resources, make decisions about budgeting for the following year, and reduce costs. Which of the following are the most important requisite steps to create the report? (Choose two.)
Configure metric threshold alerts
Enable resource tagging
Configure application tracing
Configure the collection of performance/utilization logs
Set the desired retention of resource logs
Integrate email alerts with ticketing software
9. A DevOps engineer is receiving reports that users can no longer access the company’s web application after hardening of a web server. The users are receiving the following error: ERR SSL VERSION OR CIPHER MISMATCH. Which of the following actions should the engineer take to resolve the issue?
Configure TLS 1.2 or newer
Review logs on the WAF
Update the web server
Restart the web server
10. A company’s engineering department is conducting a month-long test on the scalability of an in-house-developed software that requires a cluster of 100 or more servers. Which of the following models is the best to use?
PaaS
DBaaS
SaaS
IaaS
11. A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to recommend?
Using images that have an application firewall
Using CIS-hardened images
Using watermarked images
Using digitally signed images
12. A group of cloud administrators frequently uses the same deployment template to recreate a cloud-based development environment. The administrators are unable to go back and review the history of changes they have made to the template. Which of the following cloud resource deployment concepts should the administrator start using?
Versioning
Repeatability
Drift detection
Documentation
13. Which of the following protocols is often used in IoT to reduce the amount of data exchanged?
MQTT
NFS
HTTPS
SMB
14. A developer sends multiple requests to a SaaS application in a short amount of time. The developer realizes that the entire server and all other users can no longer send requests to the application. Which of the following best describes the issue?
Full outage
Regional service availability
Service quotas
API rate limiting
15. A company receives files daily from a bank. The company requires that the files must be copied from the cloud storage resource to another cloud storage resource for further processing. Which of the following methods requires the least amount of effort to achieve the task?
16. An application that is running on containers writes files to the operating system after processing data. The produced output files are stored under /project-files owned by root. A cloud engineer needs to make sure no output files are owned by root. Which of the following actions should the engineer take to best achieve this objective?
Run chown myapp:myapp /project-files with cron every minute
Modify the container application to execute sudo -u myapp myapp
Add USER myapp to the Dockerfile and rebuild the container
Mount the volume in Docker using --user=myapp
17. Which of the following vulnerability management phases includes the process of discovering newly introduced security vulnerabilities?
Scanning
Remediation
Identification
Reporting
18. Which of the following is the most cost-effective way to store data that is infrequently accessed?
Off-site
Hot site
Warm site
Cold site
19. Which of the following describes the main difference between public and private container repositories?
Private container repositories are used to obfuscate the content of the Dockerfile, while public container repositories allow for Dockerfile inspection
Private container repository access requires authorization, while public repository access does not require authorization
Private container repositories must use proprietary licenses, while public container repositories must have open-source licenses
Private container repositories are hidden by default and containers must be directly referenced, while public container repositories allow browsing of container images
20. A cloud engineer is troubleshooting an application that consumes multiple third-party REST APIs. The application is randomly experiencing high latency. Which of the following would best help determine the source of the latency?
Configuring an API gateway to track all incoming requests
Configuring centralized logging to analyze HTTP requests
Enabling tracing to detect HTTP response times and codes
Running a flow log on the network to analyze the packets
21. Which of the following reduces the chance of introducing a misconfiguration into cloud deployment templates?
Opening pull requests for changes
Performing a git fetch after every commit
Using the web interface to update files
Committing updates to the main branch
22. Which of the following strategies requires the development of new code before an application can be successfully migrated to a cloud provider?
Refactor
Rehost
Rearchitect
Replatform
23. A CI/CD pipeline is used to deploy VMs to an IaaS environment. Which of the following can be used to harden the operating system once the VM is running?
Git
Kubernetes
Ansible
Docker
24. Which of the following files should be used to install software with a package manager?
package.tar
package.json
package.deb
25. A company needs to deploy its own code directly in the cloud without provisioning additional infrastructure. Which of the following is the best cloud service model for the company to use?
SaaS
XaaS
IaaS
PaaS
26. An organization is running a database application on a SATA disk, and a customer is experiencing slow performance most of the time. Which of the following should be implemented to improve application performance?
Increase disk capacity
Increase the memory and network bandwidth
Upgrade the application
Upgrade the environment and use SSD drives
27. A systems administrator is troubleshooting performance issues with a Windows VDI environment. Users have reported that VDI performance is very slow at the start of the workday, but the performance is fine during the rest of the day. Which of the following is the MOST likely cause of the issue? (Choose two.)
Disk I/O limits
Affinity rule
CPU oversubscription
RAM usage
28. A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well. Which of the following should the administrator recommend the user do FIRST?
Disable antivirus/anti-malware software
Turn off the software firewall
Establish a VPN tunnel between the computer and the web server
Update the web browser to the latest version
29. A cloud administrator is reviewing a new application implementation document. The administrator needs to make sure all the known bugs and fixes are applied, and unwanted ports and services are disabled. Which of the following techniques would BEST help the administrator assess these business requirements?
Performance testing
Usability testing
Vulnerability testing
Regression testing
30. Due to a policy change, a few of a customer’s application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%. Which of the following is the MOST likely cause?
There is not enough vCPU assigned
The application is not compatible with the new settings
The new configuration is adding latency
The memory of the VM is underallocated
31. A systems administrator recently upgraded the processors in a web application host. Upon the next login, the administrator sees a new alert regarding the license being out of compliance. Which of the following licensing models is the application MOST likely using?
Per device
Per user
Core-based
Volume-based
32. After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message. Which of the following should the administrator verify NEXT?
The TLS certificate
The firewall rules
The concurrent connection limit
The folder permissions
33. A systems administrator is troubleshooting a performance issue with a virtual database server. The administrator has identified the issue as being disk related and believes the cause is a lack of IOPS on the existing spinning disk storage. Which of the following should the administrator do NEXT to resolve this issue?
Upgrade the virtual database server.
Move the virtual machine to flash storage and test again.
Check if other machines on the same storage are having issues.
Document the findings and place them in a shared knowledge base.
34. The security team for a large corporation is investigating a data breach. The team members are all trying to do the same tasks but are interfering with each other’s work. Which of the following did the team MOST likely forget to implement?
Incident type categories
A calling tree
Change management
Roles and responsibilities
35. A systems administrator is deploying a new cloud application and needs to provision cloud services with minimal effort. The administrator wants to reduce the tasks required for maintenance, such as OS patching, VM and volume provisioning, and autoscaling configurations. Which of the following would be the BEST option to deploy the new application?
A VM cluster
Containers
OS templates
Serverless
36. An organization is hosting a DNS domain with private and public IP ranges. Which of the following should be implemented to achieve ease of management?
Network peering
A CDN solution
A SDN solution
An IPAM solution
37. Which of the following should be considered for capacity planning?
Requirements, licensing, and trend analysis
Laws and regulations
Regions, clusters, and containers
Hypervisors and scalability
38. A company has decided to get multiple compliance and security certifications for its public cloud environment. However, the company has few staff members to handle the extra workload, and it has limited knowledge of the current infrastructure. Which of the following will help the company meet the compliance requirements as quickly as possible?
DLP
CASB
FIM
NAC
39. A systems administrator adds servers to a round-robin, load-balanced pool, and then starts receiving reports of the website being intermittently unavailable. Which of the following is the MOST likely cause of the issue?
The network is being saturated.
The load balancer is being overwhelmed.
New web nodes are not operational.
The API version is incompatible.
40. A company wants to implement business continuity, and the cloud solution architect needs to design the correct solution. Which of the following will provide the data to measure business continuity? (Choose two.)
A service-level agreement
Automation scripts
Playbooks
A network diagram
A backup and restore
A recovery time objective
41. A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?
DLP
WAF
FIM
ADC
42. A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook?
Use the server’s root credentials
Hard-code the password within the playbook
Create a service account on the server
Use the administrator’s SSO credentials
43. A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?
The laaS compute configurations, the capacity trend analysis reports, and the storage IOPS
The hypervisor logs, the memory utilization of the hypervisor host, and the network throughput of the hypervisor
The scheduled job logs for successes and failures, the time taken to execute the job, and the job schedule
Migrating from laaS to on premises, the network traffic between on-premises users and the laaS instance, and the CPU utilization of the hypervisor host
44. A systems administrator notices that a piece of networking equipment is about to reach its end of support. Which of the following actions should the administrator recommend?
Update the firmware
Migrate the equipment to the cloud
Update the OS
Replace the equipment
45. A systems administrator has been asked to restore a VM from backup without changing the current VM's operating state. Which of the following restoration methods would BEST fit this scenario?
Alternate location
Rolling
Storage live migration
In-place
46. A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations. Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment?
Integrity
Versioning
Classification
Segmentation
47. A systems administrator audits a cloud application and discovers one of the key regulatory requirements has not been addressed. The requirement states that if a physical breach occurs and hard drives are stolen, the contents of the drives should not be readable. Which of the following should be used to address the requirement?
Obfuscation
Encryption
EDR
HIPS
48. An organization is hosting a cloud-based web server infrastructure that provides web- hosting solutions. Sudden continuous bursts of traffic have caused the web servers to saturate CPU and network utilizations. Which of the following should be implemented to prevent such disruptive traffic from reaching the web servers?
Solutions to perform NAC and DLP
DDoS protection
QoS on the network
A solution to achieve microsegmentation
49. A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies. Which of the following cloud service subscription types would BEST meet these requirements?
PaaS
SaaS
DBaaS
IaaS
50. A systems administrator wants to ensure two VMs remain together on the same host. Which of the following must be set up to enable this functionality?
Affinity
Zones
Regions
A cluster
51. A systems administrator is configuring updates on a system. Which of the following update branches should the administrator choose to ensure the system receives updates that are maintained for at least four years?
LTS
Canary
Beta
Stable
52. A company wants to move its environment from on premises to the cloud without vendor lock-in. Which of the following would BEST meet this requirement?
DBaaS
SaaS
IaaS
PaaS
53. A company is currently running a website on site. However, because of a business requirement to reduce current RTO from 12 hours to one hour, and the RPO from one day to eight hours, the company is considering operating in a hybrid environment. The website uses mostly static files and a small relational database. Which of the following should the cloud architect implement to achieve the objective at the LOWEST cost possible?
Implement a load-balanced environment in the cloud that is equivalent to the current on- premises setup and use DNS to shift the load from on premises to cloud.
Implement backups to cloud storage and infrastructure as code to provision the environment automatically when the on-premises site is dow
Restore the data from the backups.
Implement a website replica in the cloud with auto-scaling using the smallest possible footprin
54. A system administrator is migrating a bare-metal server to the cloud. Which of the following types of migration should the systems administrator perform to accomplish this task?
V2V
V2P
P2P
P2V
55. Which of the following would be the BEST option for discussion of what individuals should do in an incident response or disaster recovery scenario?
A business continuity plan
Incident response/disaster recovery documentation
A tabletop exercise
A root cause analysis
56. A cloud administrator is setting up a new coworker for API access to a public cloud environment. The administrator creates a new user and gives the coworker access to a collection of automation scripts. When the coworker attempts to use a deployment script, a 403 error is returned. Which of the following is the MOST likely cause of the error?
57. A development team recently completed testing changes to a company's web-based CMS in the sandbox environment. The cloud administrator deployed these CMS application changes to the staging environment as part of the next phase in the release life cycle. The deployment was successful, but after deploying the CMS application, the web page displays an error message stating the application is unavailable. After reviewing the application logs, the administrator sees an error message that the CMS is unable to connect to the database. Which of the following is the BEST action for the cloud administrator to perform to resolve the issue?
Modify the deployment script to delete and recreate the database whenever the CMS application is deployed.
Modify the ACL to allow the staging environment to access the database in the sandbox environment.
Modify the CMS application deployment to use the previous version and redeploy the application.
Modify the configuration settings of the CMS application to connect to the database in the current environment.
58. A systems administrator is configuring network management but is concerned about confidentiality. Which of the following should the administrator configure to address this concern?
SNMPv3
Community strings
IPSec tunnels
ACLs
59. A company had a system compromise, and the engineering team resolved the issue after 12 hours. Which of the following information will MOST likely be requested by the Chief Information Officer (CIO) to understand the issue and its resolution?
A root cause analysis
Application documentation
Acquired evidence
Application logs
60. An organization is using multiple SaaS-based business applications, and the systems administrator is unable to monitor and control the use of these subscriptions. The administrator needs to implement a solution that will help the organization apply security policies and monitor each individual SaaS subscription. Which of the following should be deployed to achieve these requirements?
DLP
CASB
IPS
HIDS
61. A cloud engineer is responsible for managing a public cloud environment. There is currently one virtual network that is used to host the servers in the cloud environment. The environment is rapidly growing, and the network does not have any more available IP addresses. Which of the following should the engineer do to accommodate additional servers in this environment?
Create a VPC and peer the networks.
Implement dynamic routing.
Enable DHCP on the networks.
Obtain a new IPAM subscription.
62. A cloud administrator needs to reduce the cost of cloud services by using the company's off-peak period. Which of the following would be the BEST way to achieve this with minimal effort?
Create a separate subscription.
Create tags.
Create an auto-shutdown group.
Create an auto-scaling group.
63. Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A’s cloud resources while retaining its IAM solution. Which of the following should be implemented?
Multifactor authentication
Single sign-on
Identity federation
Directory service
64. A systems administrator is performing upgrades to all the hypervisors in the environment. Which of the following components of the hypervisors should be upgraded? (Choose two.)
The fabric interconnects
The virtual appliances
The firmware
The virtual machines
The baselines
The operating system
65. A SaaS provider wants to maintain maximum availability for its service. Which of the following should be implemented to attain the maximum SLA?
A hot site
An active-active site
A warm site
A cold site
66. A VDI administrator has received reports from the drafting department that rendering is slower than normal. Which of the following should the administrator check FIRST to optimize the performance of the VDI infrastructure?
GPU
CPU
Storage
Memory
67. Lateral-moving malware has infected the server infrastructure. Which of the following network changes would MOST effectively prevent lateral movement in the future?
Implement DNSSEC in all DNS servers
Segment the physical network using a VLAN
Implement microsegmentation on the network
Implement 802.1X in the network infrastructu
68. A cloud administrator is assigned to establish a connection between the on-premises data center and the new CSP infrastructure. The connection between the two locations must be secure at all times and provide service for all users inside the organization. Low latency is also required to improve performance during data transfer operations. Which of the following would BEST meet these requirements?
A VPC peering configuration
An IPSec tunnel
An MPLS connection
A point-to-site VPN
69. A systems administrator is configuring a storage array. Which of the following should the administrator configure to set up mirroring on this array?
RAID 0
RAID 1
RAID 5
RAID 6
70. A systems administrator is trying to establish an RDP session from a desktop to a server in the cloud. However, the connection appears to be refused even through the VM is responding to ICMP echo requests. Which of the following should the administrator check FIRST?
The firewall
The subnet
The gateway
The services
71. A security analyst is investigating a recurring alert. The alert is reporting an insecure firewall configuration state after every cloud application deployment. The process of identifying the issue, requesting a fix, and waiting for the developers to manually patch the environment is being repeated multiple times. In an effort to identify the root issue, the following logs were collected: Deploying template app prod. •yaml Instance DB successfully created DB keys successfully stored on vault Instance WebApp successfully created Access rules successfully applied Access—keys successfully created Which of the following options will provide a permanent fix for the issue?
Validate the Iac code used during the deployment.
Avoid the use of a vault to store database passwords.
Rotate the access keys that were created during deployment.
Recommend that the developers do not create multiple resources at once.
72. A web consultancy group currently works in an isolated development environment. The group uses this environment for the creation of the final solution, but also for showcasing it to customers, before commissioning the sites in production. Recently, customers of newly commissioned sites have reported they are not receiving the final product shown by the group, and the website is performing in unexpected ways. Which of the following additional environments should the group adopt and include in its process?
Provide each web consultant a local environment on their device.
Require each customer to have a blue-green environment.
Leverage a staging environment that is tightly controlled for showcasing.
Initiate a disaster recovery environment to fail to in the event of reported issues.
73. An organization deployed an application using a cloud provider's internal managed certificates. Developers are unable to retrieve data when calling the API from any machine. The following error message is in the log: 12-04-2023-10:05:25, SSL Negotiation Error 12-04-2023-10:05:28,Invalid Certificate 12-04-2023-10:05:29, TLS Handshake Failed 12-04-2023-10:05:30,Connection Closed Which of the following is the most likely cause of the error?
FAQs
1. What is the CompTIA Cloud+ CV0-004 certification exam?
It is an advanced-level certification that validates the skills required to deploy, maintain, and optimize cloud infrastructure services securely and efficiently.
2. How do I become CompTIA Cloud+ CV0-004 certified?
To earn the certification, you must register for and pass the CV0-004 exam, which tests cloud architecture, security, deployment, and troubleshooting skills.
3. What are the prerequisites for the CompTIA Cloud+ CV0-004 exam?
There are no official prerequisites, but CompTIA recommends 2–3 years of experience in system administration or networking and knowledge of cloud technologies.
4. How much does the CompTIA Cloud+ CV0-004 certification cost?
The exam costs $358 USD, though prices may vary by region.
5. How many questions are in the CompTIA Cloud+ CV0-004 exam?
The exam consists of 90 multiple-choice and performance-based questions.
6. What topics are covered in the CompTIA Cloud+ CV0-004 exam?
It covers cloud architecture, deployment, automation, operations, security, and troubleshooting.
7. How difficult is the CompTIA Cloud+ CV0-004 certification exam?
It’s moderately challenging and requires both technical experience and hands-on cloud skills.
8. How long does it take to prepare for the CompTIA Cloud+ CV0-004 exam?
Most candidates take 8–12 weeks of consistent study and practice to prepare effectively.
9. What jobs can I get after earning the CompTIA Cloud+ CV0-004 certification?
You can work as a Cloud Engineer, Systems Administrator, Cloud Specialist, or Infrastructure Engineer.
10. How much salary can I earn with a CompTIA Cloud+ CV0-004 certification?
Professionals typically earn between $85,000–$115,000 annually, depending on experience and job role.



