CLO-002
Free trial
Verified
Question 1
A company is moving to the cloud and wants to enhance the provisioning of compute, storage, security, and networking. Which of the following will be leveraged?
- A: Infrastructure as code
- B: Infrastructure templates
- C: Infrastructure orchestration
- D: Infrastructure automation
Question 2
A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied?
- A: Acceptance
- B: Avoidance
- C: Transference
- D: Mitigation
Question 3
After a cloud migration, a company hires a third party to conduct an assessment to detect any cloud infrastructure vulnerabilities. Which of the following BEST describes this process?
- A: Hardening
- B: Risk assessment
- C: Penetration testing
- D: Application scanning
Question 4
For which of the following reasons is the infrastructure as code technique used?
- A: To improve the ability to migrate applications to different cloud providers to avoid vendor lock-in.
- B: To specify the hardware configuration and system installation procedures in machine-readable formats.
- C: To capture the system configurations to track changes and remediate configuration drift.
- D: To assign server administration responsibilities to software developers for application deployments.
Question 5
Which of the following strategies allows an organization to plan for cloud expenditures in a way that most closely aligns with the capital expenditure model?
- A: Simplifying contract requirements
- B: Implementing consolidated billing
- C: Considering a BYOL policy
- D: Using reserved cloud instances
Question 6
An organization determines it cannot go forward with a cloud migration due to the risks involved. Which of the following types of risk response does this describe?
- A: Acceptance
- B: Transference
- C: Avoidance
- D: Mitigation
Question 7
A cloud developer chooses to use private key encryption for all traffic in a new application. Which of the following security concerns does this BEST describe?
- A: Integrity
- B: Confidentiality
- C: Availability
- D: Authorization
Question 8
A cloud administrator is reviewing the requirements for a SaaS application and estimates downtime will be very expensive for the organization. Which of the following should the administrator configure to minimize downtime? (Choose two.)
- A: Continuous deployment
- B: Right-sizing
- C: Availability zones
- D: Geo-redundancy
- E: Hardening
- F: Backups
Question 9
Which of the following allows for the management of network policies from a central portal while maintaining a hardware-agnostic approach?
- A: Virtual private network
- B: Software-defined network
- C: Load balancing
- D: Direct Connect
Question 10
A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?
- A: Configuration management
- B: Incident management
- C: Resource management
- D: Change management
Question 11
Which of the following cloud migration methods would be BEST suited for disaster recovery scenarios?
- A: Replatforming
- B: Phased
- C: Rip and replace
- D: Lift and shift
Question 12
Which of the following BEST explains why there should be an established communication policy between CSPs and clients?
- A: To set guidelines for securing network traffic for all communications with endpoints on the corporate local area network
- B: To ensure all staff know the acceptable guidelines for representing themselves on social media.
- C: To have protocols in place for notifying staff when a cloud outage occurs.
- D: To have proper procedures in place for interactions between internal departments and cloud vendors submitting bids for software or service.
Question 13
Which of the following documents has the sole purpose of outlining a professional services engagement that governs a proposed cloud migration?
- A: Gap analysis
- B: Statement of work
- C: Feasibility study
- D: Service level agreement
Question 14
Which of the following explains why a cloud provider would establish and publish a format data sanitization policy for its clients?
- A: To establish guidelines for how the provider will cleanse any data being imported during a cloud migration
- B: To be transparent about how the CSP will handle malware infections that may impact systems housing client data
- C: To provide a value add for clients that will assist in cleansing records at no additional charge
- D: To ensure clients feel comfortable about the handling of any leftover data after termination of the contract
Question 15
A small online retailer is looking for a solution to handle the high load on its servers during the holiday season. The retailer is not currently ready to move its IT operations completely to the cloud.
Which of the following will BEST fit these requirements?
- A: Elasticity
- B: Scalability
- C: Bursting
- D: Self-service
Question 16
Monthly cloud service costs are BEST described as:
- A: operating expenditures.
- B: fixed expenditures.
- C: capital expenditures.
- D: personnel expenditures.
Question 17
An architect recently discovered new opportunities the cloud can provide to the company. A business analyst is currently working with the architect to document the business use-case scenarios. Which of the following should be the architect's NEXT step?
- A: Initialize a PoC.
- B: Conduct a feasibility study.
- C: Perform a gap analysis.
- D: Gather cloud requirements.
Question 18
Which of the following cloud migration methods would take full advantage of the cloud computing model?
- A: Rip and replace
- B: Lift and shift
- C: Phased
- D: Hybrid
Question 19
A cloud service provider is marketing its new PaaS offering to potential clients. Which of the following companies would MOST likely be interested?
- A: A company specializing in application development
- B: A company with many legacy applications
- C: A company with proprietary systems
- D: A company that outsources support of its IT systems
Question 20
A software developer wants to ensure a packaged application can be deployed in different environments without modifying anything but the application settings.
The developer creates an image and provides instructions for the systems administrator to use for deployment. This is an example of:
- A: application versioning.
- B: source code control.
- C: containerization.
- D: deployment automation.
Question 21
A business analyst is drafting a risk assessment.
Which of the following components should be included in the draft? (Choose two.)
- A: Asset management
- B: Database type
- C: Encryption algorithms
- D: Certificate name
- E: Asset inventory
- F: Data classification
Question 22
Which of the following is used to build and manage interconnections between cloud resources within the same cloud environment?
- A: Firewall
- B: Software-defined network
- C: Virtual private network
- D: Direct Connect
Question 23
A business analyst is examining a report and notices compute costs are very high for four cloud-based, load-balanced virtual machines hosting an application. The application will be in use for at least two more years, but there are no developers available to help optimize it. Which of the following should the analyst recommend to BEST reduce costs without impacting performance?
- A: Decommission a virtual machine.
- B: Change to a pay-as-you-go plan.
- C: Convert the application to a SaaS solution.
- D: Switch the virtual machines to reserved instances.
Question 24
A project manager is interested in the notification process a CSP follows after discovering a breach of customer data. Which of the following is MOST likely to provide the necessary information?
- A: Communication plans
- B: Incident response policy
- C: Service level agreement
- D: Access controls
Question 25
A cloud risk assessment indicated possible outages in some regions. In response, the company enabled geo-redundancy for its cloud environment. Which of the following did the company adopt?
- A: Risk mitigation
- B: Risk acceptance
- C: Risk transference
- D: Risk avoidance
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!