Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA CLO-002 - CompTIA Cloud Essentials+

Page: 7 / 7
Total 218 questions

Which of the following are considered secure access types of hosts in the cloud? (Choose two.)

A.

HTTPS

B.

HTTP

C.

SSH

D.

Telnet

E.

RDP

F.

FTP

For which of the following reasons is the infrastructure as code technique used?

A.

To improve the ability to migrate applications to different cloud providers to avoid vendor lock-in.

B.

To specify the hardware configuration and system installation procedures in machine-readable formats.

C.

To capture the system configurations to track changes and remediate configuration drift.

D.

To assign server administration responsibilities to software developers for application deployments.

A startup company wants to use a CRM application to manage its sales and support organizations. The company does not have any IT staff. Which of the following cloud computing models is MOST appropriate for this company to use?

A.

CaaS

B.

PaaS

C.

IaaS

D.

SaaS

A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied?

A.

Acceptance

B.

Avoidance

C.

Transference

D.

Mitigation

Which of the following allows an IP address to be referenced via an easily remembered name for a SaaS application?

A.

DNS

B.

CDN

C.

VPN

D.

WAN