CompTIA CLO-002 - CompTIA Cloud Essentials+
Which of the following are considered secure access types of hosts in the cloud? (Choose two.)
For which of the following reasons is the infrastructure as code technique used?
A startup company wants to use a CRM application to manage its sales and support organizations. The company does not have any IT staff. Which of the following cloud computing models is MOST appropriate for this company to use?
A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied?
Which of the following allows an IP address to be referenced via an easily remembered name for a SaaS application?