Troubleshooting
Diagnose and resolve deployment, network, and security issues in cloud environments (12% of exam).
Troubleshooting within the CompTIA Cloud+ framework is a structured approach to resolving incidents across complex, virtualized environments. It is anchored by the standard six-step troubleshooting methodology: identifying the problem, establishing a theory of probable cause, testing that theory, c…
Cloud+ - Troubleshooting Example Questions
Test your knowledge of Troubleshooting
Question 1
A cloud operations team discovers that their auto-scaling group is not launching replacement instances when existing instances become unhealthy. The health check configuration uses ELB health checks with a 60-second interval and a healthy threshold of 2. CloudWatch metrics confirm that instances are being marked unhealthy by the load balancer, but the auto-scaling group shows all instances as healthy. What configuration issue is most likely preventing the auto-scaling group from detecting the unhealthy instances?
Question 2
A healthcare technology company implements cloud object storage for medical imaging files. During a security assessment, the team discovers that radiologists from Partner Hospital B can view and download imaging studies belonging to Partner Hospital A patients. The storage architecture uses separate prefixes for each partner organization, bucket policies enforce partner-specific access based on IAM role tags, and all access requires valid authentication through SAML federation. Network logs confirm requests originate from authorized partner IP ranges. Further investigation reveals that the storage service's access control lists (ACLs) on individual objects were set to 'authenticated-users' during an automated batch upload process six months ago. What storage misconfiguration most likely enabled this cross-partner data access?
Question 3
A security team responds to an alert indicating that an unauthorized user has accessed cloud storage buckets containing customer financial data. The team has successfully isolated the compromised resources and terminated the malicious sessions. According to incident response methodology, what should the team focus on during the eradication phase?