Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA CLO-002 CompTIA Cloud Essentials+ Exam Practice Test

Page: 1 / 14
Total 143 questions

CompTIA Cloud Essentials+ Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Which of the following risks is MOST likely to be accepted as a result of transferring business to a single CSP?

Options:

A.

Vendor lock-in

B.

The inability to scale

C.

Data breach due to a break-in

D.

Loss of equipment due to a natural disaster

Question 2

Which of the following cloud migration methods would be BEST suited for disaster recovery scenarios?

Options:

A.

Replatforming

B.

Phased

C.

Rip and replace

D.

Lift and shift

Question 3

A Chief Information Officer is starting a cloud migration plan for the next three years of growth and requires an understanding of IT initiatives. Which of the following will assist in the assessment?

Options:

A.

Technical gap analysis

B.

Cloud architecture diagram review

C.

Current and future business requirements

D.

Feasibility study

Question 4

Due to local natural disaster concerns, a cloud customer is transferring all of its cold storage data to servers in a safer geographic region. Which of the following risk response techniques is the cloud customer employing?

Options:

A.

Avoidance

B.

Transference

C.

Mitigation

D.

Acceptance

Question 5

A document that outlines the scope of a project, specific deliverables, scheduling, and additional specific details from the client/buyer is called a:

Options:

A.

statement of work.

B.

standard operating procedure.

C.

master service document.

D.

service level agreement.

Question 6

A business analyst asked for an RFI from a public CSP. The analyst wants to assess the financial aspects of a potential contract. Which of the following should the analyst expect to see in the RFI?

Options:

A.

Time to market

B.

Fixed costs

C.

Training

D.

Capital expenditures

Question 7

A manufacturing company is selecting applications for a cloud migration. The company’s main concern relates to the ERP system, which needs to receive data from multiple industrial systems to generate the executive reports. Which of the following will provide the details needed for the company’s decision regarding the cloud migration?

Options:

A.

Standard operating procedures

B.

Feasibility studies

C.

Statement of work

D.

Benchmarks

Question 8

An on-premises, business-critical application is used for financial reporting and forecasting. The Chief Financial Officer requests options to move the application to cloud. Which of the following would be BEST to review the options?

Options:

A.

Test the applications in a sandbox environment.

B.

Perform a gap analysis.

C.

Conduct a feasibility assessment.

D.

Design a high-level architecture.

Question 9

A redundancy option must be provided for an on-premises server cluster. The financial team is concerned about the cost of extending to the cloud. Which of the following resources about the on-premises infrastructure would BEST help to estimate cloud costs?

Options:

A.

Server cluster architecture diagram

B.

Compute and storage reporting

C.

Industry benchmarks

D.

Resource management policy

Question 10

A cloud administrator wants to ensure nodes are added automatically when the load on a web cluster increases. Which of the following should be implemented?

Options:

A.

Autonomous systems

B.

Infrastructure as code

C.

Right-sizing

D.

Autoscaling

Question 11

Which of the following is MOST likely to use a CDN?

Options:

A.

Realty listing website

B.

Video streaming service

C.

Email service provider

D.

Document management system

Question 12

A company's finance team is reporting increased cloud costs against the allocated cloud budget. Which of the following is the BEST approach to match some of the cloud operating costs with the appropriate departments?

Options:

A.

Right-sizing

B.

Scaling

C.

Chargeback

D.

Showback

Question 13

A business analyst at a large multinational organization has been tasked with checking to ensure an application adheres to GDPR rules. Which of the following topics would be BEST for the analyst to research?

Options:

A.

Data integrity

B.

Industry-based requirements

C.

ISO certification

D.

Regulatory concerns

Question 14

Which of the following types of risk is MOST likely to be associated with moving all data to one cloud provider?

Options:

A.

Vendor lock-in

B.

Data portability

C.

Network connectivity

D.

Data sovereignty

Question 15

A company with critical resources in the cloud needs to ensure data is available in multiple datacenters around the world.

Which of the following BEST meets the company's needs?

Options:

A.

Auto-scaling

B.

Geo-redundancy

C.

Disaster recovery

D.

High availability

Question 16

An analyst is reviewing a report on a company's cloud resource usage. The analyst has noticed many of the cloud instances operate at a fraction of the full processing capacity. Which of the following actions should the analyst consider to lower costs and improve efficiency?

Options:

A.

Consolidating into fewer instances

B.

Using spot instances

C.

Right-sizing compute resource instances

D.

Negotiating better prices on the company's reserved instances

Question 17

A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment. All users require the ability to modify personal working environments. Which of the following is the BEST solution?

Options:

A.

SSO

B.

VDI

C.

SSH

D.

VPN

Question 18

A business analyst is writing a disaster recovery strategy. Which of the following should the analyst include in the document? (Select THREE).

Options:

A.

Capacity on demand

B.

Backups

C.

Resource tagging

D.

Replication

E.

Elasticity

F.

Automation

G.

Geo-redundancy

Question 19

A large online car retailer needs to leverage the public cloud to host photos that must be accessible from anywhere and available at anytime. Which of the following cloud storage types would be cost-effective and meet the requirements?

Options:

A.

Cold storage

B.

File storage

C.

Block storage

D.

Object storage

Question 20

A business analyst has been drafting a risk response for a vulnerability that was identified on a server. After considering the options, the analyst decides to decommission the server. Which of the following describes this approach?

Options:

A.

Mitigation

B.

Transference

C.

Acceptance

D.

Avoidance

Question 21

A large enterprise has the following invoicing breakdown of current cloud consumption spend:

The level of resources consumed by each department is relatively similar. Which of the following is MOST likely affecting monthly costs?

Options:

A.

The servers in use by the marketing department are in an availability zone that is generally expensive.

B.

The servers in use by the accounting and IT operations departments are in different geographic zones with lower pricing.

C.

The accounting and IT operations departments are choosing to bid on non-committed resources.

D.

The marketing department likely stores large media files on its servers, leading to increased storage costs.

Question 22

A company decommissioned its testing environment. Which of the following should the company do FIRST to avoid charges?

Options:

A.

Detach and delete disposable resources.

B.

Empty the logging directory.

C.

Delete infrastructure as code templates.

D.

Disable alerts and alarms.

Question 23

Which of the following metrics defines how much data loss a company can tolerate?

Options:

A.

RTO

B.

TCO

C.

MTTR

D.

ROI

E.

RPO

Question 24

A company’s current billing agreement is static. If the company were to migrate to an entirely IaaS-based setup, which of the following billing concepts would the company be adopting?

Options:

A.

Enterprise agreement

B.

Perpetual

C.

Variable cost

D.

Fixed cost

Question 25

Which of the following cloud computing characteristics is a facilitator of a company's organizational agility?

Options:

A.

Professional services

B.

Managed services

C.

Reduced time to market

D.

Licensing model

Question 26

Which of the following security concerns is BEST addressed by moving systems to the cloud?

Options:

A.

Availability

B.

Authentication

C.

Confidentiality

D.

Integrity

Question 27

A cloud administrator needs to ensure as much uptime as possible for an application. The application has two database servers. If both servers go down simultaneously, the application will go down. Which of the following must the administrator configure to ensure the CSP does not bring both servers down for maintenance at the same time?

Options:

A.

Backups

B.

Availability zones

C.

Autoscaling

D.

Replication

Question 28

Which of the following BEST explains the concept of RTOs for restoring servers to operational use?

Options:

A.

To reduce the amount of data loss that can occur in the event of a server failure

B.

To ensure the restored server is available and operational within a given window of time

C.

To ensure the data on the restored server is current within a given window of time

D.

To reduce the amount of time a particular server is unavailable and offline

Question 29

Which of the following is true about the use of technologies such as JSON and XML for cloud data interchange and automation tasks?

Options:

A.

It can cause cloud vendor lock-in

B.

The company needs to define a specific programming language for cloud management.

C.

The same message format can be used across different cloud platforms.

D.

It is considered an unsafe format of communication.

Question 30

An organization has experienced repeated occurrences of system configurations becoming incorrect over time. After implementing corrections on all system configurations across the enterprise, the Chief Information Security Officer (CISO) purchased an automated tool that will monitor system configurations and identify any deviations. In the future, whic' if th following should be used to identify incorrectly configured systems?

Options:

A.

Baseline

B.

Gap analysis

C.

Benchmark

D.

Current and future requirements

Question 31

A web application was deployed, and files are available globally to improve user experience. Which of the following technologies is being used?

Options:

A.

SAN

B.

CDN

C.

VDI

D.

API

Question 32

Which of the following DevOps options is used to integrate with cloud solutions?

Options:

A.

Provisioning

B.

API

C.

SOA

D.

Automation

Question 33

A startup company wants to develop a new voice assistant that leverages technology that can improve its product based on end user input. Which of the following would MOST likely accomplish this goal?

Options:

A.

Big Data

B.

Blockchain

C.

VDI

D.

Machine learning

Question 34

Which of the following is a benefit of microservice applications in a cloud environment?

Options:

A.

Microservices are dependent on external shared databases found on cloud solutions.

B.

Federation is a mandatory component for an optimized microservice deployment.

C.

The architecture of microservice applications allows the use of auto-scaling.

D.

Microservice applications use orchestration solutions to update components in each service.

Question 35

A company with a variable number of employees would make good use of the cloud model because of:

Options:

A.

multifactor authentication

B.

self-service

C.

subscription services

D.

collaboration

Question 36

A cloud administrator configures a server to insert an entry into a log file whenever an administrator logs in to the server remotely. Which of the following BEST describes the type of policy being used?

Options:

A.

Audit

B.

Authorization

C.

Hardening

D.

Access

Question 37

A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied?

Options:

A.

Acceptance

B.

Avoidance

C.

Transference

D.

Mitigation

Question 38

Which of the following risks is MOST likely a result of vendor lock-in?

Options:

A.

Premature obsolescence

B.

Data portability issues

C.

External breach

D.

Greater system vulnerability

Question 39

Which of the following is the result of performing a physical-to-virtual migration of desktop workstations?

Options:

A.

SaaS

B.

laaS

C.

VDI

D.

VPN

Question 40

A company is planning to use cloud computing to extend the compute resources that will run a new resource- intensive application. A direct deployment to the cloud would cause unexpected billing. Which of the following must be generated while the application is running on-premises to predict the cloud budget for this project better?

Options:

A.

Proof or concept

B.

Benchmark

C.

Baseline

D.

Feasibility study

Question 41

Which of the following are considered secure access types of hosts in the cloud? (Choose two.)

Options:

A.

HTTPS

B.

HTTP

C.

SSH

D.

Telnet

E.

RDP

F.

FTP

Question 42

Which of the following is a valid mechanism for achieving interoperability when extracting and pooling data among different CSPs?

Options:

A.

Use continuous integration/continuous delivery.

B.

Recommend the use of the same CLI client.

C.

Deploy regression testing to validate pooled data.

D.

Adopt the use of communication via APIs.

Question 43

Which of the following would BEST provide access to a Windows VDI?

Options:

A.

RDP

B.

VPN

C.

SSH

D.

HTTPS

Question 44

Before conducting a cloud migration, a compliance team requires confirmation that sensitive data will remain close to their users. Which of the following will meet this requirement during the cloud design phase?

Options:

A.

Data locality

B.

Data classification

C.

Data certification

D.

Data validation

Question 45

Which of the following service models BEST describes a cloud-hosted application in which the end user only creates user access and configures options?

Options:

A.

MaaS

B.

SaaS

C.

PaaS

D.

laaS

Question 46

Which of the following allows an IP address to be referenced via an easily remembered name for a SaaS application?

Options:

A.

DNS

B.

CDN

C.

VPN

D.

WAN

Question 47

A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?

Options:

A.

Configuration management

B.

Incident management

C.

Resource management

D.

Change management

Question 48

A company is discontinuing its use of a cloud provider. Which of the following should the provider do to ensure there is no sensitive data stored in the company's cloud?

Options:

A.

Replicate the data.

B.

Encrypt the data.

C.

Lock in the data.

D.

Sanitize the data.

Question 49

Resource consumption in a company's laaS environment has been stable; however, a few servers have recently experienced spikes in CPU usage for days at a time. Costs are rising steadily, and it is unclear who owns the servers. Which of the following would work BEST to allow the company to charge the appropriate department? (Select TWO).

Options:

A.

Employ a software defined network.

B.

Employ orchestration automation.

C.

Review the storage usage reports.

D.

Review the network ingress reports.

E.

Employ resource tagging.

F.

Review the compute usage reports.

Question 50

An IT team documented the procedure for upgrading an existing IT resource within the cloud. Which of the following BEST describes this procedure?

Options:

A.

Security procedure

B.

Incident management

C.

Change management

D.

Standard operating procedure

Question 51

Which of the following cloud deployment models has on-premises and off-site data?

Options:

A.

Private

B.

Community

C.

Public

D.

Hybrid

Question 52

A business analyst is comparing utilization for a company’s cloud servers on a financial expenditures report. The usage report is as follows:

Which of the following instances represents the highest utilization?

Options:

A.

Mail server

B.

Application server

C.

File server

D.

Web server

Question 53

Which of the following stores transactions in a distributed ledger of which all users have a copy?

Options:

A.

Big Data

B.

Block chain

C.

Machine learning

D.

Artificial intelligence

Question 54

Which of the following BEST specifies how software components interoperate in a cloud environment?

Options:

A.

Federation

B.

Regression

C.

Orchestration

D.

API integration

Question 55

A company is migrating its e-commerce platform to a cloud service provider. The e-commerce site has a significant number of images. Which of the following is the BEST storage type for storing the images?

Options:

A.

Object

B.

Cold

C.

File

D.

Block

Question 56

A company is evaluating the capital expenditure necessary to modernize its on-premises datacenter. Management has directed that 50% of capital expenditure be reallocated to operating expenditure. Which of the following cloud characteristics applies?

Options:

A.

BYOL

B.

Billing chargeback

C.

Pay-as-you-go

D.

High availability

Question 57

A company wants to migrate mission-critical applications to the cloud. In order for technicians to build, decommission, and perform other routine functions, which of the following cloud characteristics would BEST satisfy this business requirement?

Options:

A.

Self-service

B.

Elasticity

C.

Broad network access

D.

Availability

Question 58

A company migrated all of its infrastructure to the cloud. The cloud security team must review the security post-migration.

Which of the following is the MOST appropriate task for the cloud security team to perform?

Options:

A.

Risk register

B.

Threat assessment

C.

Application scan

D.

Vulnerability scan

Question 59

Which of the following concepts will help lower the attack surface after unauthorized user-level access?

Options:

A.

Hardening

B.

Validation

C.

Sanitization

D.

Audit

Question 60

A systems administrator must select a CSP while considering system uptime and access to critical servers. Which of the following is the MOST important criterion when choosing the CSP?

Options:

A.

Elasticity

B.

Scalability

C.

Availability

D.

Serviceability

Question 61

Which of the following is the cloud storage technology that would allow a company with 12 nearly identical servers to have the SMALLEST storage footprint?

Options:

A.

Capacity on demand

B.

Compression

C.

Software-defined storage

D.

Deduplication

Question 62

A company deploys a data management capability that reduces RPO. Which of the following BEST describes the capability needed?

Options:

A.

Locality

B.

Replication

C.

Portability

D.

Archiving

Question 63

A software company that develops mobile applications is struggling with the complicated process of deploying the development, testing. QA. and staging environments. Which of the following cloud service models offers the BEST automated development environment for the software company?

Options:

A.

SaaS

B.

laaS

C.

PaaS

D.

CaaS

Question 64

Which of the following security objectives is MOST improved when moving a system to the cloud?

Options:

A.

Availability

B.

Integrity

C.

Privacy

D.

Confidentiality

Question 65

A cloud administrator suggested using spot instances to reduce cloud costs for part of a new cloud infrastructure.

Which of the following conditions must be addressed by the application that will run on these instances?

Options:

A.

The application needs to store data in a database.

B.

There is a restriction for distributed network communications.

C.

The application needs to handle unpredictable instance termination.

D.

Resource-intensive compute loads will be forbidden.

Page: 1 / 14
Total 143 questions