Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

CompTIA CLO-002 Dumps

Page: 1 / 16
Total 143 questions

CompTIA Cloud Essentials+ Questions and Answers

Question 1

A business analyst is examining a report and notices compute costs are very high for four cloud-based, load- balanced virtual machines hosting an application. The application will be in use for at least two more years, but there are no developers available to help optimize it. Which of the following should the analyst recommend to BEST reduce costs without impacting performance?

Options:

A.

Decommission a virtual machine.

B.

Change to a pay-as-you-go plan.

C.

Convert the application to a SaaS solution.

D.

Switch the virtual machines to reserved instances.

Question 2

A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment. All users require the ability to modify personal working environments. Which of the following is the BEST solution?

Options:

A.

SSO

B.

VDI

C.

SSH

D.

VPN

Question 3

Which of the following policies dictates when to grant certain read/write permissions?

Options:

A.

Access control

B.

Communications

C.

Department-specific

D.

Security

Question 4

Which of the following is the BEST way to secure a web session to a hosted e-commerce website?

Options:

A.

SSL

B.

VPN

C.

Firewall

D.

DNS

Question 5

For security reasons, a cloud service that can be accessed from anywhere would make BEST use of:

Options:

A.

replication.

B.

multifactor authentication.

C.

single sign-on.

D.

data locality

Question 6

Which of the following cloud migration methods would take full advantage of the cloud computing model?

Options:

A.

Rip and replace

B.

Lift and shift

C.

Phased

D.

Hybrid

Question 7

Which of the following BEST describes the open-source licensing model for application software?

Options:

A.

Software is free to use, but the source code is not available to modify.

B.

Modifications to existing software are not allowed.

C.

Code modifications must be submitted for approval.

D.

Source code is readily available to view and use.

Question 8

A business analyst has been drafting a risk response for a vulnerability that was identified on a server. After considering the options, the analyst decides to decommission the server. Which of the following describes this approach?

Options:

A.

Mitigation

B.

Transference

C.

Acceptance

D.

Avoidance

Question 9

Monthly cloud service costs are BEST described as:

Options:

A.

operating expenditures.

B.

fixed expenditures.

C.

capital expenditures.

D.

personnel expenditures.

Question 10

After performing an initial assessment of a cloud-hosted architecture, a department wants to gain the support of upper management.

Which of the following should be presented to management?

Options:

A.

Project charter

B.

Feasibility study

C.

Managed services

D.

Pilot

Question 11

Which of the following are examples of capital expenditures? (Select TWO).

Options:

A.

Cloud consultant fees

B.

Data center wiring

C.

Data center electric bill

D.

Server purchases

E.

Spot instances

F.

Disposable virtual machine

Question 12

Options:

Question 13

An organization determines it cannot go forward with a cloud migration due to the risks involved. Which of the following types of risk response does this describe?

Options:

A.

Acceptance

B.

Transference

C.

Avoidance

D.

Mitigation

Question 14

Which of the following deployment models includes application components on a company’s network as well as on the Internet?

Options:

A.

Private

B.

Public

C.

Community

D.

Hybrid

Question 15

Which of the following types of risk is MOST likely to be associated with moving all data to one cloud provider?

Options:

A.

Vendor lock-in

B.

Data portability

C.

Network connectivity

D.

Data sovereignty

Question 16

A Chief Information Officer (CIO) wants to identify two business units to be pilots for a new cloud project. A business analyst who was recently assigned to this project will be selecting a cloud provider. Which of the following should the business analyst do FIRST?

Options:

A.

Conduct a feasibility study of the environment.

B.

Conduct a benchmark of all major systems.

C.

Draw a matrix diagram of the capabilities of the cloud providers.

D.

Gather business and technical requirements for key stakeholders.

Question 17

A large enterprise has the following invoicing breakdown of current cloud consumption spend:

The level of resources consumed by each department is relatively similar. Which of the following is MOST likely affecting monthly costs?

Options:

A.

The servers in use by the marketing department are in an availability zone that is generally expensive.

B.

The servers in use by the accounting and IT operations departments are in different geographic zones with lower pricing.

C.

The accounting and IT operations departments are choosing to bid on non-committed resources.

D.

The marketing department likely stores large media files on its servers, leading to increased storage costs.

Question 18

Which of the following describes the process of moving an application from an isolated data center to reduce latency and ensure close proximity to end users?

Options:

A.

Replication

B.

Zones

C.

Geo-redundancy

D.

Backup

Question 19

Which of the following concepts is the backup and recovery of data considered?

Options:

A.

Risk avoidance

B.

Confidentiality

C.

Integrity

D.

Availability

Question 20

The optimal, sequential order in which cloud resources should be recovered in the event of a major failure would be defined in the:

Options:

A.

recovery point objective.

B.

disaster recovery plan.

C.

incident response plan.

D.

network topology diagram.

Question 21

Each time a new virtual machine is created, a systems administrator creates a new script to accomplish tasks such as obtaining an IP, provisioning a virtual machine, and populating information in a change management database. Creating a new script to coordinate all of these existing scripts into one is BEST an example of:

Options:

A.

automation.

B.

orchestration.

C.

collaboration.

D.

federation.

Question 22

A company wants to deploy an application in a public cloud. Which of the following service models gives the MOST responsibility to the provider?

Options:

A.

PaaS

B.

IaaS

C.

BPaaS

D.

SaaS

Question 23

An organization has experienced repeated occurrences of system configurations becoming incorrect over time. After implementing corrections on all system configurations across the enterprise, the Chief Information Security Officer (CISO) purchased an automated tool that will monitor system configurations and identify any deviations. In the future, whic' if th following should be used to identify incorrectly configured systems?

Options:

A.

Baseline

B.

Gap analysis

C.

Benchmark

D.

Current and future requirements

Question 24

Which of the following would help a company avoid failure of a cloud project due to a lack of adherence of the company’s operations and business processes to a cloud solution?

Options:

A.

Cloud managed services

B.

Company baseline

C.

Proof of value

D.

Industry benchmarks

Question 25

Which of the following are aspects of cloud data availability? (Choose two.)

Options:

A.

Resource tagging

B.

Data sovereignty

C.

Locality

D.

Zones

E.

Geo-redundancy

F.

Auto-scaling

Question 26

A company is migrating its e-commerce platform to a cloud service provider. The e-commerce site has a significant number of images. Which of the following is the BEST storage type for storing the images?

Options:

A.

Object

B.

Cold

C.

File

D.

Block

Question 27

An architect recently discovered new opportunities the cloud can provide to the company. A business analyst is currently working with the architect to document the business use-case scenarios. Which of the following should be the architect’s NEXT step?

Options:

A.

Initialize a PoC.

B.

Conduct a feasibility study.

C.

Perform a gap analysis.

D.

Gather cloud requirements.

Question 28

Which of the following cloud characteristics BEST describes the ability to add resources upon request?

Options:

A.

Scalability

B.

Portability

C.

Integrity

D.

Availability

Question 29

An IT team documented the procedure for upgrading an existing IT resource within the cloud. Which of the following BEST describes this procedure?

Options:

A.

Security procedure

B.

Incident management

C.

Change management

D.

Standard operating procedure

Question 30

A report identified that several of a company's SaaS applications are against corporate policy. Which of the following is the MOST likely reason for this issue?

Options:

A.

Shadow IT

B.

Sensitive data

C.

Encryption

D.

Vendor lock-in

Question 31

A company purchased insurance due to the risks involved with a cloud migration project. Which of the following risk response strategies is this an example of?

Options:

A.

Mitigation

B.

Avoidance

C.

Acceptance

D.

Transference

Question 32

Which of the following would BEST provide access to a Windows VDI?

Options:

A.

RDP

B.

VPN

C.

SSH

D.

HTTPS

Question 33

A cloud administrator needs to ensure as much uptime as possible for an application. The application has two database servers. If both servers go down simultaneously, the application will go down. Which of the following must the administrator configure to ensure the CSP does not bring both servers down for maintenance at the same time?

Options:

A.

Backups

B.

Availability zones

C.

Autoscaling

D.

Replication

Question 34

A company is moving to the cloud and wants to enhance the provisioning of compute, storage, security, and networking. Which of the following will be leveraged?

Options:

A.

Infrastructure as code

B.

Infrastructure templates

C.

Infrastructure orchestration

D.

Infrastructure automation

Question 35

Which of the following aspects of cloud design enables a customer to continue doing business after a major data center incident?

Options:

A.

Replication

B.

Disaster recovery

C.

Scalability

D.

Autoscaling

Question 36

A business analyst is comparing used vs. allocated storage cost for each reserved instance on a financial expenditures report related to the cloud. The CSP is currently billing at the following rates for storage:

  • $1.50 per GB of used space
  • $0.75 per GB of allocated space

The operating expenditures the analyst is reviewing are as follows:

Given this scenario, which of the following servers is costing the firm the least, and which should have storage increased due to over 70% utilization?

Options:

A.

Least: File server

Optimize: Application server

B.

Least: Application server Optimize: Mail server

C.

Least: Mail server Optimize: File server

D.

Least: Application server Optimize: File server

Question 37

Which of the following is a benefit of microservice applications in a cloud environment?

Options:

A.

Microservices are dependent on external shared databases found on cloud solutions.

B.

Federation is a mandatory component for an optimized microservice deployment.

C.

The architecture of microservice applications allows the use of auto-scaling.

D.

Microservice applications use orchestration solutions to update components in each service.

Question 38

Which of the following is the result of performing a physical-to-virtual migration of desktop workstations?

Options:

A.

SaaS

B.

laaS

C.

VDI

D.

VPN

Question 39

Which of the following is true about the use of technologies such as JSON and XML for cloud data interchange and automation tasks?

Options:

A.

It can cause cloud vendor lock-in

B.

The company needs to define a specific programming language for cloud management.

C.

The same message format can be used across different cloud platforms.

D.

It is considered an unsafe format of communication.

Question 40

A company is considering moving its database application to a public cloud provider. The application is regulated and requires the data to meet confidentiality standards. Which of the following BEST addresses this requirement?

Options:

A.

Authorization

B.

Validation

C.

Encryption

D.

Sanitization

Question 41

A business analyst is drafting a risk assessment.

Which of the following components should be included in the draft? (Choose two.)

Options:

A.

Asset management

B.

Database type

C.

Encryption algorithms

D.

Certificate name

E.

Asset inventory

F.

Data classification

Question 42

A company is required to move its human resources application to the cloud to reduce capital expenses. The IT team does a feasibility analysis and learns the application requires legacy infrastructure and cannot be moved to the cloud.

Which of the following is the MOST appropriate cloud migration approach for the company?

Options:

A.

Lift and shift

B.

Hybrid

C.

Rip and replace

D.

In-place upgrade

Question 43

A cloud service provider is marketing its new PaaS offering to potential clients. Which of the following companies would MOST likely be interested?

Options:

A.

A company specializing in application development

B.

A company with many legacy applications

C.

A company with proprietary systems

D.

A company that outsources support of its IT systems

Question 44

Which of the following concepts will help lower the attack surface after unauthorized user-level access?

Options:

A.

Hardening

B.

Validation

C.

Sanitization

D.

Audit

Question 45

A company deploys a data management capability that reduces RPO. Which of the following BEST describes the capability needed?

Options:

A.

Locality

B.

Replication

C.

Portability

D.

Archiving

Question 46

Which of the following can be used by a client’s finance department to identify the cost of cloud use in a public cloud environment shared by different projects and departments?

Options:

A.

Reserved instances

B.

Service level agreement

C.

Resource tagging

D.

RFI from the CSP

Question 47

Which of the following are the appropriate responses to risks?

Options:

A.

Mitigate, accept, avoid, validate

B.

Migrate, accept, avoid, transfer

C.

Mitigate, accept, avoid, transfer

D.

Migrate, accept, avoid, validate

Question 48

Which of the following risks can an organization transfer by adopting the cloud?

Options:

A.

Data breach due to a break-in at the facility

B.

Data sovereignty due to geo-redundancy

C.

Data loss due to incomplete backup sets

D.

Data misclassification due to human error

Question 49

Due to local natural disaster concerns, a cloud customer is transferring all of its cold storage data to servers in a safer geographic region. Which of the following risk response techniques is the cloud customer employing?

Options:

A.

Avoidance

B.

Transference

C.

Mitigation

D.

Acceptance

Question 50

A business analyst is writing a disaster recovery strategy. Which of the following should the analyst include in the document? (Select THREE).

Options:

A.

Capacity on demand

B.

Backups

C.

Resource tagging

D.

Replication

E.

Elasticity

F.

Automation

G.

Geo-redundancy

Question 51

An analyst is reviewing a report on a company's cloud resource usage. The analyst has noticed many of the cloud instances operate at a fraction of the full processing capacity. Which of the following actions should the analyst consider to lower costs and improve efficiency?

Options:

A.

Consolidating into fewer instances

B.

Using spot instances

C.

Right-sizing compute resource instances

D.

Negotiating better prices on the company's reserved instances

Question 52

A cloud systems administrator needs to log in to a remote Linux server that is hosted in a public cloud. Which of the following protocols will the administrator MOST likely use?

Options:

A.

HTTPS

B.

RDP

C.

Secure Shell

D.

Virtual network computing

Question 53

Which of the following techniques helps an organization determine benchmarks for application performance within a set of resources?

Options:

A.

Auto-scaling

B.

Load testing

C.

Sandboxing

D.

Regression testing

Question 54

Volume, variety, velocity, and veracity are the four characteristics of:

Options:

A.

machine learning.

B.

Big Data.

C.

microservice design.

D.

blockchain.

E.

object storage.

Question 55

A systems administrator must select a CSP while considering system uptime and access to critical servers. Which of the following is the MOST important criterion when choosing the CSP?

Options:

A.

Elasticity

B.

Scalability

C.

Availability

D.

Serviceability

Question 56

Which of the following explains why a cloud provider would establish and publish a format data sanitization policy for its clients?

Options:

A.

To establish guidelines for how the provider will cleanse any data being imported during a cloud migration

B.

To be transparent about how the CSP will handle malware infections that may impact systems housing client data

C.

To provide a value add for clients that will assist in cleansing records at no additional charge

D.

To ensure clients feel comfortable about the handling of any leftover data after termination of the contract

Question 57

A business analyst is reviewing a software upgrade plan. The plan mentions the term “hash” value. Which of the following BEST represents what this term implies?

Options:

A.

Non-repudiation of data

B.

Integrity of data

C.

Confidentiality of data

D.

Availability of data

Question 58

Which of the following service models BEST describes a cloud-hosted application in which the end user only creates user access and configures options?

Options:

A.

MaaS

B.

SaaS

C.

PaaS

D.

laaS

Question 59

A cloud administrator is reviewing the requirements for a SaaS application and estimates downtime will be very expensive for the organization. Which of the following should the administrator configure to minimize downtime? (Choose two.)

Options:

A.

Continuous deployment

B.

Right-sizing

C.

Availability zones

D.

Geo-redundancy

E.

Hardening

F.

Backups

Question 60

A cloud administrator configures a server to insert an entry into a log file whenever an administrator logs in to the server remotely. Which of the following BEST describes the type of policy being used?

Options:

A.

Audit

B.

Authorization

C.

Hardening

D.

Access

Question 61

A company is moving its long-term archive data to the cloud. Which of the following storage types will the company MOST likely use?

Options:

A.

File

B.

Object

C.

Tape

D.

Block

Question 62

An incident response team requires documentation for an email phishing campaign against a company's email server. Which of the following is the BEST resource to use to start the investigation?

Options:

A.

Audit and system logs

B.

Change management procedures

C.

Departmental policies

D.

Standard operating procedures

Question 63

A company’s new systems administrator has been asked to create a new user for the human resources department. Which of the following will help the systems administrator understand the user privileges for each role in the company?

Options:

A.

Identity and access control management policy

B.

Classification and management policy

C.

Change management policy

D.

Standard operating procedures

Question 64

The legal team is required to share legal proceedings with an outside council. The team uses SaaS fileshares. Which of the following policies will BEST state the requirements for sharing information with external parties?

Options:

A.

Information security policy

B.

Communication policy

C.

Resource management policy

D.

Identity control policy

Question 65

A company requires 24 hours' notice when a database is taken offline for planned maintenance. Which of the following policies provides the BEST guidance about notifying users?

Options:

A.

Communication policy

B.

Access control policy

C.

Information security policy

D.

Risk management policy

Page: 1 / 16
Total 143 questions