CLO-002Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 1

A company is moving to the cloud and wants to enhance the provisioning of compute, storage, security, and networking. Which of the following will be leveraged?

  • A: Infrastructure as code
  • B: Infrastructure templates
  • C: Infrastructure orchestration
  • D: Infrastructure automation

Question 2

A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied?

  • A: Acceptance
  • B: Avoidance
  • C: Transference
  • D: Mitigation

Question 3

After a cloud migration, a company hires a third party to conduct an assessment to detect any cloud infrastructure vulnerabilities. Which of the following BEST describes this process?

  • A: Hardening
  • B: Risk assessment
  • C: Penetration testing
  • D: Application scanning

Question 4

For which of the following reasons is the infrastructure as code technique used?

  • A: To improve the ability to migrate applications to different cloud providers to avoid vendor lock-in.
  • B: To specify the hardware configuration and system installation procedures in machine-readable formats.
  • C: To capture the system configurations to track changes and remediate configuration drift.
  • D: To assign server administration responsibilities to software developers for application deployments.

Question 5

Which of the following strategies allows an organization to plan for cloud expenditures in a way that most closely aligns with the capital expenditure model?

  • A: Simplifying contract requirements
  • B: Implementing consolidated billing
  • C: Considering a BYOL policy
  • D: Using reserved cloud instances

Question 6

An organization determines it cannot go forward with a cloud migration due to the risks involved. Which of the following types of risk response does this describe?

  • A: Acceptance
  • B: Transference
  • C: Avoidance
  • D: Mitigation

Question 7

A cloud developer chooses to use private key encryption for all traffic in a new application. Which of the following security concerns does this BEST describe?

  • A: Integrity
  • B: Confidentiality
  • C: Availability
  • D: Authorization

Question 8

A cloud administrator is reviewing the requirements for a SaaS application and estimates downtime will be very expensive for the organization. Which of the following should the administrator configure to minimize downtime? (Choose two.)

  • A: Continuous deployment
  • B: Right-sizing
  • C: Availability zones
  • D: Geo-redundancy
  • E: Hardening
  • F: Backups

Question 9

Which of the following allows for the management of network policies from a central portal while maintaining a hardware-agnostic approach?

  • A: Virtual private network
  • B: Software-defined network
  • C: Load balancing
  • D: Direct Connect

Question 10

A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?

  • A: Configuration management
  • B: Incident management
  • C: Resource management
  • D: Change management

Question 11

Which of the following cloud migration methods would be BEST suited for disaster recovery scenarios?

  • A: Replatforming
  • B: Phased
  • C: Rip and replace
  • D: Lift and shift

Question 12

Which of the following BEST explains why there should be an established communication policy between CSPs and clients?

  • A: To set guidelines for securing network traffic for all communications with endpoints on the corporate local area network
  • B: To ensure all staff know the acceptable guidelines for representing themselves on social media.
  • C: To have protocols in place for notifying staff when a cloud outage occurs.
  • D: To have proper procedures in place for interactions between internal departments and cloud vendors submitting bids for software or service.

Question 13

Which of the following documents has the sole purpose of outlining a professional services engagement that governs a proposed cloud migration?

  • A: Gap analysis
  • B: Statement of work
  • C: Feasibility study
  • D: Service level agreement

Question 14

Which of the following explains why a cloud provider would establish and publish a format data sanitization policy for its clients?

  • A: To establish guidelines for how the provider will cleanse any data being imported during a cloud migration
  • B: To be transparent about how the CSP will handle malware infections that may impact systems housing client data
  • C: To provide a value add for clients that will assist in cleansing records at no additional charge
  • D: To ensure clients feel comfortable about the handling of any leftover data after termination of the contract

Question 15

A small online retailer is looking for a solution to handle the high load on its servers during the holiday season. The retailer is not currently ready to move its IT operations completely to the cloud.
Which of the following will BEST fit these requirements?

  • A: Elasticity
  • B: Scalability
  • C: Bursting
  • D: Self-service

Question 16

Monthly cloud service costs are BEST described as:

  • A: operating expenditures.
  • B: fixed expenditures.
  • C: capital expenditures.
  • D: personnel expenditures.

Question 17

An architect recently discovered new opportunities the cloud can provide to the company. A business analyst is currently working with the architect to document the business use-case scenarios. Which of the following should be the architect's NEXT step?

  • A: Initialize a PoC.
  • B: Conduct a feasibility study.
  • C: Perform a gap analysis.
  • D: Gather cloud requirements.

Question 18

Which of the following cloud migration methods would take full advantage of the cloud computing model?

  • A: Rip and replace
  • B: Lift and shift
  • C: Phased
  • D: Hybrid

Question 19

A cloud service provider is marketing its new PaaS offering to potential clients. Which of the following companies would MOST likely be interested?

  • A: A company specializing in application development
  • B: A company with many legacy applications
  • C: A company with proprietary systems
  • D: A company that outsources support of its IT systems

Question 20

A software developer wants to ensure a packaged application can be deployed in different environments without modifying anything but the application settings.
The developer creates an image and provides instructions for the systems administrator to use for deployment. This is an example of:

  • A: application versioning.
  • B: source code control.
  • C: containerization.
  • D: deployment automation.

Question 21

A business analyst is drafting a risk assessment.
Which of the following components should be included in the draft? (Choose two.)

  • A: Asset management
  • B: Database type
  • C: Encryption algorithms
  • D: Certificate name
  • E: Asset inventory
  • F: Data classification

Question 22

Which of the following is used to build and manage interconnections between cloud resources within the same cloud environment?

  • A: Firewall
  • B: Software-defined network
  • C: Virtual private network
  • D: Direct Connect

Question 23

A business analyst is examining a report and notices compute costs are very high for four cloud-based, load-balanced virtual machines hosting an application. The application will be in use for at least two more years, but there are no developers available to help optimize it. Which of the following should the analyst recommend to BEST reduce costs without impacting performance?

  • A: Decommission a virtual machine.
  • B: Change to a pay-as-you-go plan.
  • C: Convert the application to a SaaS solution.
  • D: Switch the virtual machines to reserved instances.

Question 24

A project manager is interested in the notification process a CSP follows after discovering a breach of customer data. Which of the following is MOST likely to provide the necessary information?

  • A: Communication plans
  • B: Incident response policy
  • C: Service level agreement
  • D: Access controls

Question 25

A cloud risk assessment indicated possible outages in some regions. In response, the company enabled geo-redundancy for its cloud environment. Which of the following did the company adopt?

  • A: Risk mitigation
  • B: Risk acceptance
  • C: Risk transference
  • D: Risk avoidance
Page 1 of 7 • Questions 1-25 of 157

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!