Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA CLO-002 - CompTIA Cloud Essentials+

Page: 1 / 7
Total 218 questions

A developer is leveraging a public cloud service provider to provision servers using the templates created by the company's cloud engineer.

Which of the following does this BEST describe?

A.

Subscription services

B.

Containerization

C.

User self-service

D.

Autonomous environments

A company would like to improve its current DR plan with an emphasis on high availability. Which of the following metrics should the company focus on?

A.

MTTR

B.

RTO

C.

QoS

D.

RPO

Which of the following cloud principles will help manage the risk of a network breach?

A.

Shared responsibility

B.

Self-service

C.

Availability

D.

Elasticity

Which of the following cloud migration methods would be BEST suited for disaster recovery scenarios?

A.

Replatforming

B.

Phased

C.

Rip and replace

D.

Lift and shift

A project manager must inform the Chief Information Officer (CIO) of the additional resources necessary to migrate services to the cloud successfully.

Which of the following cloud assessments would be MOST appropriate to use for the recommendation?

A.

Feasibility study

B.

Gap analysis

C.

Future requirements

D.

Baseline report

Which of the following security objectives is MOST improved when moving a system to the cloud?

A.

Availability

B.

Integrity

C.

Privacy

D.

Confidentiality

Which of the following are the appropriate responses to risks?

A.

Mitigate, accept, avoid, validate

B.

Migrate, accept, avoid, transfer

C.

Mitigate, accept, avoid, transfer

D.

Migrate, accept, avoid, validate

A cloud systems administrator needs to log in to a remote Linux server that is hosted in a public cloud. Which of the following protocols will the administrator MOST likely use?

A.

HTTPS

B.

RDP

C.

Secure Shell

D.

Virtual network computing

Which of the following BEST describes how a cloud provider helps a company with security risk responses?

A.

Acceptance

B.

Mitigation

C.

Avoidance

D.

Transference

An IT team documented the procedure for upgrading an existing IT resource within the cloud. Which of the following BEST describes this procedure?

A.

Security procedure

B.

Incident management

C.

Change management

D.

Standard operating procedure