Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Cloud Essentials > CLO-002

CLO-002 CompTIA Cloud Essentials+ Question and Answers

Question # 4

A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?

A.

Configuration management

B.

Incident management

C.

Resource management

D.

Change management

Full Access
Question # 5

A startup company that provides streaming media services is considering a new CSP. The company sees an average volume of 5000TB daily and high QoS. It has received the following bids:

Based on the information above, which of the following CSPs offers the MOST cost-effective solution for streaming?

A.

Provider 1

B.

Provider 2

C.

Provider 3

D.

Provider 4

Full Access
Question # 6

A large database needs to be hosted in a cloud environment with little to no downtime while minimizing any loss of content. Which of the following will BEST facilitate these requirements?

A.

Automation

B.

Sandboxing

C.

Replication

D.

Orchestration

Full Access
Question # 7

An IT company is planning to migrate its current infrastructure to the cloud due to support no longer being available and dependence on some legacy databases. Which of the following would be the BEST migration approach?

A.

Rip and replace

B.

Phased

C.

Hybrid

D.

Lift and shift

Full Access
Question # 8

For which of the following reasons is the infrastructure as code technique used?

A.

To improve the ability to migrate applications to different cloud providers to avoid vendor lock-in.

B.

To specify the hardware configuration and system installation procedures in machine-readable formats.

C.

To capture the system configurations to track changes and remediate configuration drift.

D.

To assign server administration responsibilities to software developers for application deployments.

Full Access
Question # 9

Which of the following is a limitation of the SaaS cloud model?

A.

Users cannot choose the global location where their data will be stored

B.

It does not support integration with pre-existing identity engines.

C.

It does not scale to allow additional users.

D.

Users do not have full control over the software version and roadmap of the cloud solution.

Full Access
Question # 10

Which of the following BEST specifies how software components interoperate in a cloud environment?

A.

Federation

B.

Regression

C.

Orchestration

D.

API integration

Full Access
Question # 11

A company’s current billing agreement is static. If the company were to migrate to an entirely IaaS-based setup, which of the following billing concepts would the company be adopting?

A.

Enterprise agreement

B.

Perpetual

C.

Variable cost

D.

Fixed cost

Full Access
Question # 12

Due to local natural disaster concerns, a cloud customer is transferring all of its cold storage data to servers in a safer geographic region. Which of the following risk response techniques is the cloud customer employing?

A.

Avoidance

B.

Transference

C.

Mitigation

D.

Acceptance

Full Access
Question # 13

A company has defined a multicloud model.

Which of the following is the MOST important aspect to consider when defining the company's needs?

A.

Change management

B.

Data sovereignty

C.

Data portability

D.

Data classification

Full Access
Question # 14

A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied?

A.

Acceptance

B.

Avoidance

C.

Transference

D.

Mitigation

Full Access
Question # 15

A web developer configured an application to have a local user database option to ensure the application can still be used if the corporate directory is not responsive to login requests. Which of the following security concepts BEST describes having this second database?

A.

Access

B.

Authorization

C.

Auditing

D.

Availability

Full Access
Question # 16

A company is in its second year of a three-year agreement with a cloud vendor. After the initial phase of the cloud migration, resource consumption has stabilized.

Which of the following would help the company reduce the cost of infrastructure?

A.

Reserved instances

B.

Pay-as-you-go

C.

Spot instances

D.

Bring your own license

Full Access
Question # 17

Which of the following is a valid mechanism for achieving interoperability when extracting and pooling data among different CSPs?

A.

Use continuous integration/continuous delivery.

B.

Recommend the use of the same CLI client.

C.

Deploy regression testing to validate pooled data.

D.

Adopt the use of communication via APIs.

Full Access
Question # 18

A contract that defines the quality and performance metrics that are agreeable to both parties is called an:

A.

SOP.

B.

SOA.

C.

SOW.

D.

SLA.

Full Access
Question # 19

An organization plans to keep three of its cloud servers online for another nine months and a fourth server online for a year. The current pricing is $200 per month per server. The cloud provider announced the sale price of $1,500 per year per reserved instance.

Which of the following represents the cost savings by converting all four of the cloud servers to reserved instances?

A.

$900

B.

$1,800

C.

$2,400

D.

$3,600

Full Access
Question # 20

Which of the following concepts is the backup and recovery of data considered?

A.

Risk avoidance

B.

Confidentiality

C.

Integrity

D.

Availability

Full Access
Question # 21

An IT team documented the procedure for upgrading an existing IT resource within the cloud. Which of the following BEST describes this procedure?

A.

Security procedure

B.

Incident management

C.

Change management

D.

Standard operating procedure

Full Access
Question # 22

A company is migrating its e-commerce platform to a cloud service provider. The e-commerce site has a significant number of images. Which of the following is the BEST storage type for storing the images?

A.

Object

B.

Cold

C.

File

D.

Block

Full Access
Question # 23

A company wants to ensure its existing functionalities are not compromised by the addition of a new functionality.

Which of the following is the BEST testing technique?

A.

Regression

B.

Stress

C.

Load

D.

Quality

Full Access
Question # 24

A large enterprise has the following invoicing breakdown of current cloud consumption spend:

The level of resources consumed by each department is relatively similar. Which of the following is MOST likely affecting monthly costs?

A.

The servers in use by the marketing department are in an availability zone that is generally expensive.

B.

The servers in use by the accounting and IT operations departments are in different geographic zones with lower pricing.

C.

The accounting and IT operations departments are choosing to bid on non-committed resources.

D.

The marketing department likely stores large media files on its servers, leading to increased storage costs.

Full Access
Question # 25

A systems administrator is reviewing a disaster recovery option that requires little to no downtime in the event of a natural disaster.

Which of the following BEST meets this requirement?

A.

Configure availability zones.

B.

Configure high availability.

C.

Configure geo-redundancy.

D.

Configure auto-scaling.

Full Access
Question # 26

Which of the following should be enforced for billing recognition to allow department members to provision their own cloud resource?

A.

Sandboxing

B.

BYOL

C.

Resource tagging

D.

Reserved instances

Full Access
Question # 27

Which of the following technologies allows a social media application to authenticate access to resources that are available in the cloud?

A.

Microservices

B.

LDAP

C.

Federation

D.

MFA

Full Access
Question # 28

After a cloud migration, a company hires a third party to conduct an assessment to detect any cloud infrastructure vulnerabilities. Which of the following BEST describes this process?

A.

Hardening

B.

Risk assessment

C.

Penetration testing

D.

Application scanning

Full Access
Question # 29

Which of the following is MOST likely to use a CDN?

A.

Realty listing website

B.

Video streaming service

C.

Email service provider

D.

Document management system

Full Access
Question # 30

A company migrated all of its infrastructure to the cloud. The cloud security team must review the security post-migration.

Which of the following is the MOST appropriate task for the cloud security team to perform?

A.

Risk register

B.

Threat assessment

C.

Application scan

D.

Vulnerability scan

Full Access
Question # 31

Which of the following policies dictates when to grant certain read/write permissions?

A.

Access control

B.

Communications

C.

Department-specific

D.

Security

Full Access
Question # 32

Which of the following allows an IP address to be referenced via an easily remembered name for a SaaS application?

A.

DNS

B.

CDN

C.

VPN

D.

WAN

Full Access
Question # 33

Which of the following BEST represents a successful presentation to a customer of the working result of a new cloud feature?

A.

Benchmark

B.

Proof of concept

C.

Baseline

D.

Feasibility study

Full Access
Question # 34

Which of the following aspects of cloud design enables a customer to continue doing business after a major data center incident?

A.

Replication

B.

Disaster recovery

C.

Scalability

D.

Autoscaling

Full Access
Question # 35

For security reasons, a cloud service that can be accessed from anywhere would make BEST use of:

A.

replication.

B.

multifactor authentication.

C.

single sign-on.

D.

data locality

Full Access
Question # 36

Which of the following BEST describes the open-source licensing model for application software?

A.

Software is free to use, but the source code is not available to modify.

B.

Modifications to existing software are not allowed.

C.

Code modifications must be submitted for approval.

D.

Source code is readily available to view and use.

Full Access
Question # 37

An on-premises, business-critical application is used for financial reporting and forecasting. The Chief Financial Officer requests options to move the application to cloud. Which of the following would be BEST to review the options?

A.

Test the applications in a sandbox environment.

B.

Perform a gap analysis.

C.

Conduct a feasibility assessment.

D.

Design a high-level architecture.

Full Access
Question # 38

An online retailer wants to ensure its inventory for the holiday season is correct. The company does not have a large IT infrastructure or staff to collect and analyze sales information, customer analytics, marketing information, or trends. Which of the following cloud services will help the company analyze these metrics without a large investment in human capital?

A.

Containerization

B.

Big Data

C.

Microservices

D.

Blockchain

Full Access
Question # 39

Which of the following techniques helps an organization determine benchmarks for application performance within a set of resources?

A.

Auto-scaling

B.

Load testing

C.

Sandboxing

D.

Regression testing

Full Access
Question # 40

Which of the following is an example of outsourcing administration in the context of the cloud?

A.

Managed services

B.

Audit by a third party

C.

Community support

D.

Premium support

Full Access
Question # 41

A company is required to move its human resources application to the cloud to reduce capital expenses. The IT team does a feasibility analysis and learns the application requires legacy infrastructure and cannot be moved to the cloud.

Which of the following is the MOST appropriate cloud migration approach for the company?

A.

Lift and shift

B.

Hybrid

C.

Rip and replace

D.

In-place upgrade

Full Access
Question # 42

An organization's servers are experiencing performance degradation from oversubscription of memory in the virtual environment and exhausted physical RAM.

Which of the following cloud computing characteristics would BEST address the issue?

A.

Availability

B.

Elasticity

C.

Pay-as-you-go

D.

Self-service

Full Access
Question # 43

A company with a variable number of employees would make good use of the cloud model because of:

A.

multifactor authentication

B.

self-service

C.

subscription services

D.

collaboration

Full Access
Question # 44

A vendor wants to distribute a cloud management application in a format that can be used on both public and private clouds, but one that does not include an underlying OS that would require patching and management. Which of the following would BEST meet this need?

A.

Containerization

B.

Federation

C.

Collaboration

D.

Microservices

Full Access
Question # 45

An architect recently discovered new opportunities the cloud can provide to the company. A business analyst is currently working with the architect to document the business use-case scenarios. Which of the following should be the architect’s NEXT step?

A.

Initialize a PoC.

B.

Conduct a feasibility study.

C.

Perform a gap analysis.

D.

Gather cloud requirements.

Full Access
Question # 46

Which of the following risks is MOST likely to be accepted as a result of transferring business to a single CSP?

A.

Vendor lock-in

B.

The inability to scale

C.

Data breach due to a break-in

D.

Loss of equipment due to a natural disaster

Full Access
Question # 47

A DevOps team wants to document the upgrade steps for its public database solution. The team needs a dedicated virtual environment separate from the production systems to replicate multiple installations. Which of the following BEST represents what the team needs?

A.

Containerization

B.

Cold storage

C.

Infrastructure as code

D.

Sandboxing

Full Access
Question # 48

A company would like to improve its current DR plan with an emphasis on high availability. Which of the following metrics should the company focus on?

A.

MTTR

B.

RTO

C.

QoS

D.

RPO

Full Access
Question # 49

A cloud developer chooses to use private key encryption for all traffic in a new application. Which of the following security concerns does this BEST describe?

A.

Integrity

B.

Confidentiality

C.

Availability

D.

Authorization

Full Access
Question # 50

A company is sending copies of its information to an off-site server managed by a CSR Which of the following BEST describes this strategy?

A.

Backup

B.

Zones

C.

Locality

D.

Geo-redundancy

Full Access
Question # 51

A company wants to migrate mission-critical applications to the cloud. In order for technicians to build, decommission, and perform other routine functions, which of the following cloud characteristics would BEST satisfy this business requirement?

A.

Self-service

B.

Elasticity

C.

Broad network access

D.

Availability

Full Access
Question # 52

Which of the following can be used to achieve automation, environment consistency, and standardization of computer resources in a cloud environment?

A.

Content management system

B.

Automation

C.

Service-oriented architecture

D.

Infrastructure as code

Full Access
Question # 53

A software company that develops mobile applications is struggling with the complicated process of deploying the development, testing. QA. and staging environments. Which of the following cloud service models offers the BEST automated development environment for the software company?

A.

SaaS

B.

laaS

C.

PaaS

D.

CaaS

Full Access
Question # 54

Which of the following BEST explains why there should be an established communication policy between CSPs and clients?

A.

To set guidelines for securing network traffic for all communications with endpoints on the corporate local area network

B.

To ensure all staff know the acceptable guidelines for representing themselves on social media.

C.

To have protocols in place for notifying staff when a cloud outage occurs.

D.

To have proper procedures in place for interactions between internal departments and cloud vendors submitting bids for software or service.

Full Access
Question # 55

A human resources department is considering a SaaS-based human resources portal and requires a risk analysis.

Which of the following are requirements to consider? (Choose two.)

A.

Support

B.

Threats

C.

Chargebacks

D.

Vulnerabilities

E.

Maintenance

F.

Gap analysis

Full Access
Question # 56

A business analyst is examining a report and notices compute costs are very high for four cloud-based, load- balanced virtual machines hosting an application. The application will be in use for at least two more years, but there are no developers available to help optimize it. Which of the following should the analyst recommend to BEST reduce costs without impacting performance?

A.

Decommission a virtual machine.

B.

Change to a pay-as-you-go plan.

C.

Convert the application to a SaaS solution.

D.

Switch the virtual machines to reserved instances.

Full Access
Question # 57

A business analyst is comparing used vs. allocated storage cost for each reserved instance on a financial expenditures report related to the cloud. The CSP is currently billing at the following rates for storage:

  • $1.50 per GB of used space
  • $0.75 per GB of allocated space

The operating expenditures the analyst is reviewing are as follows:

Given this scenario, which of the following servers is costing the firm the least, and which should have storage increased due to over 70% utilization?

A.

Least: File server

Optimize: Application server

B.

Least: Application server Optimize: Mail server

C.

Least: Mail server Optimize: File server

D.

Least: Application server Optimize: File server

Full Access
Question # 58

Which of the following stores transactions in a distributed ledger of which all users have a copy?

A.

Big Data

B.

Block chain

C.

Machine learning

D.

Artificial intelligence

Full Access
Question # 59

Which of the following allows for the management of network policies from a central portal while maintaining a hardware-agnostic approach?

A.

Virtual private network

B.

Software-defined network

C.

Load balancing

D.

Direct Connect

Full Access
Question # 60

Which of the following results from implementing a proprietary SaaS solution when an organization does not ensure the solution adopts open standards? (Choose two.)

A.

Vendor lock-in

B.

Inability to enforce the SLA

C.

Lack of technical support

D.

Higher ongoing operational expenditure

E.

Integration issues

F.

Higher initial capital expenditure

Full Access
Question # 61

A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment. All users require the ability to modify personal working environments. Which of the following is the BEST solution?

A.

SSO

B.

VDI

C.

SSH

D.

VPN

Full Access
Question # 62

A document that outlines the scope of a project, specific deliverables, scheduling, and additional specific details from the client/buyer is called a:

A.

statement of work.

B.

standard operating procedure.

C.

master service document.

D.

service level agreement.

Full Access
Question # 63

Which of the following is related to data availability in the cloud?

A.

Resiliency

B.

Deduplication

C.

Scalability

D.

Elasticity

Full Access
Question # 64

An incident response team requires documentation for an email phishing campaign against a company's email server. Which of the following is the BEST resource to use to start the investigation?

A.

Audit and system logs

B.

Change management procedures

C.

Departmental policies

D.

Standard operating procedures

Full Access
Question # 65

A cloud administrator is reviewing the requirements for a SaaS application and estimates downtime will be very expensive for the organization. Which of the following should the administrator configure to minimize downtime? (Choose two.)

A.

Continuous deployment

B.

Right-sizing

C.

Availability zones

D.

Geo-redundancy

E.

Hardening

F.

Backups

Full Access