Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CLO-002 Questions and Answers

Question # 6

Which of the following cloud characteristics BEST describes the ability to add resources upon request?

A.

Scalability

B.

Portability

C.

Integrity

D.

Availability

Full Access
Question # 7

A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?

A.

Configuration management

B.

Incident management

C.

Resource management

D.

Change management

Full Access
Question # 8

A cloud administrator needs to ensure as much uptime as possible for an application. The application has two database servers. If both servers go down simultaneously, the application will go down. Which of the following must the administrator configure to ensure the CSP does not bring both servers down for maintenance at the same time?

A.

Backups

B.

Availability zones

C.

Autoscaling

D.

Replication

Full Access
Question # 9

A human resources department is considering a SaaS-based human resources portal and requires a risk analysis.

Which of the following are requirements to consider? (Choose two.)

A.

Support

B.

Threats

C.

Chargebacks

D.

Vulnerabilities

E.

Maintenance

F.

Gap analysis

Full Access
Question # 10

A business analyst is using a public cloud provider’s CRM service to manage contacts and organize all communication. Which of the following cloud service models is the analyst using?

A.

IaaS

B.

SaaS

C.

DBaaS

D.

PaaS

Full Access
Question # 11

A large online car retailer needs to leverage the public cloud to host photos that must be accessible from anywhere and available at anytime. Which of the following cloud storage types would be cost-effective and meet the requirements?

A.

Cold storage

B.

File storage

C.

Block storage

D.

Object storage

Full Access
Question # 12

A company wants to save on cloud storage costs for data that does not need to be accessible in a timely manner. Which of the following storage types would be the BEST option?

A.

Cold

B.

Block

C.

Object

D.

Tape

Full Access
Question # 13

A company is moving to the cloud and wants to enhance the provisioning of compute, storage, security, and networking. Which of the following will be leveraged?

A.

Infrastructure as code

B.

Infrastructure templates

C.

Infrastructure orchestration

D.

Infrastructure automation

Full Access
Question # 14

A company decides to move some of its computing resources to a public cloud provider but keep the rest in-house. Which of the following cloud migration approaches does this BEST describe?

A.

Rip and replace

B.

Hybrid

C.

Phased

D.

Lift and shift

Full Access
Question # 15

A contract that defines the quality and performance metrics that are agreeable to both parties is called an:

A.

SOP.

B.

SOA.

C.

SOW.

D.

SLA.

Full Access
Question # 16

Which of the following explains why a cloud provider would establish and publish a format data sanitization policy for its clients?

A.

To establish guidelines for how the provider will cleanse any data being imported during a cloud migration

B.

To be transparent about how the CSP will handle malware infections that may impact systems housing client data

C.

To provide a value add for clients that will assist in cleansing records at no additional charge

D.

To ensure clients feel comfortable about the handling of any leftover data after termination of the contract

Full Access
Question # 17

Which of the following would BEST provide access to a Windows VDI?

A.

RDP

B.

VPN

C.

SSH

D.

HTTPS

Full Access
Question # 18

Which of the following is a valid mechanism for achieving interoperability when extracting and pooling data among different CSPs?

A.

Use continuous integration/continuous delivery.

B.

Recommend the use of the same CLI client.

C.

Deploy regression testing to validate pooled data.

D.

Adopt the use of communication via APIs.

Full Access
Question # 19

Which of the following risks is MOST likely a result of vendor lock-in?

A.

Premature obsolescence

B.

Data portability issues

C.

External breach

D.

Greater system vulnerability

Full Access
Question # 20

Which of the following documents has the sole purpose of outlining a professional services engagement that

governs a proposed cloud migration?

A.

Gap analysis

B.

Statement of work

C.

Feasibility study

D.

Service level agreement

Full Access
Question # 21

Before conducting a cloud migration, a compliance team requires confirmation that sensitive data will remain close to their users. Which of the following will meet this requirement during the cloud design phase?

A.

Data locality

B.

Data classification

C.

Data certification

D.

Data validation

Full Access
Question # 22

Which of the following technologies allows a social media application to authenticate access to resources that are available in the cloud?

A.

Microservices

B.

LDAP

C.

Federation

D.

MFA

Full Access
Question # 23

Which of the following policies dictates when to grant certain read/write permissions?

A.

Access control

B.

Communications

C.

Department-specific

D.

Security

Full Access
Question # 24

Which of the following is used to build and manage interconnections between cloud resources within the same cloud environment?

A.

Firewall

B.

Software-defined network

C.

Virtual private network

D.

Direct Connect

Full Access
Question # 25

Which of the following security objectives is MOST improved when moving a system to the cloud?

A.

Availability

B.

Integrity

C.

Privacy

D.

Confidentiality

Full Access
Question # 26

A Chief Information Officer is starting a cloud migration plan for the next three years of growth and requires an understanding of IT initiatives. Which of the following will assist in the assessment?

A.

Technical gap analysis

B.

Cloud architecture diagram review

C.

Current and future business requirements

D.

Feasibility study

Full Access
Question # 27

A developer is leveraging a public cloud service provider to provision servers using the templates created by the company's cloud engineer.

Which of the following does this BEST describe?

A.

Subscription services

B.

Containerization

C.

User self-service

D.

Autonomous environments

Full Access
Question # 28

An organization is determining an acceptable amount of downtime. Which of the following aspects of cloud design should the organization evaluate?

A.

RPO

B.

RTO

C.

ERP

D.

TCO

Full Access
Question # 29

A business analyst is writing a disaster recovery strategy. Which of the following should the analyst include in the document? (Select THREE).

A.

Capacity on demand

B.

Backups

C.

Resource tagging

D.

Replication

E.

Elasticity

F.

Automation

G.

Geo-redundancy

Full Access
Question # 30

A company recently launched the first version of an application. Based on customer feedback, the company identified the features that need to be incorporated in the next release. Which of the following will help the company understand the extra effort required to meet the customer requirements?

A.

Statement of work

B.

Baseline

C.

Benchmark

D.

Gap analysis

Full Access
Question # 31

Which of the following testing techniques provides the BEST isolation for security threats?

A.

Load

B.

Regression

C.

Black box

D.

Sandboxing

Full Access
Question # 32

Which of the following concepts will help lower the attack surface after unauthorized user-level access?

A.

Hardening

B.

Validation

C.

Sanitization

D.

Audit

Full Access
Question # 33

A company is planning to use cloud computing to extend the compute resources that will run a new resource- intensive application. A direct deployment to the cloud would cause unexpected billing. Which of the following must be generated while the application is running on-premises to predict the cloud budget for this project better?

A.

Proof or concept

B.

Benchmark

C.

Baseline

D.

Feasibility study

Full Access
Question # 34

A cloud administrator patched a known vulnerability in an operating system. This is an example of risk:

A.

transference

B.

avoidance.

C.

mitigation.

D.

acceptance.

Full Access
Question # 35

The Chief Financial Officer for a company that operates a popular SaaS application has noticed compute costs from the CSP are extremely high but storage costs are relatively low. Which of the following does the company MOST likely operate?

A.

An email application

B.

A CDN service

C.

A gaming application

D.

Audio streaming service

Full Access
Question # 36

Transferring all of a customer's on-premises data and virtual machines to an appliance, and then shipping it to a cloud provider is a technique used in a:

A.

phased migration approach.

B.

replatforming migration approach.

C.

rip and replace migration approach.

D.

lift and shift migration approach.

Full Access
Question # 37

An on-premises, business-critical application is used for financial reporting and forecasting. The Chief Financial Officer requests options to move the application to cloud. Which of the following would be BEST to review the options?

A.

Test the applications in a sandbox environment.

B.

Perform a gap analysis.

C.

Conduct a feasibility assessment.

D.

Design a high-level architecture.

Full Access
Question # 38

Which of the following allows an IP address to be referenced via an easily remembered name for a SaaS application?

A.

DNS

B.

CDN

C.

VPN

D.

WAN

Full Access
Question # 39

A network team establishes a new connection to an IaaS CSP that is more efficient and has networking costs that are 25% less than previous monthly expenditures. The bill outlines the following costs:

Storage:$10000

Compute:$12000

Network:$7000

Which of the following will be the total cloud expenditure for the following month? A. $26000

B. $26250

C. $27250

D. $29000

Full Access
Question # 40

A company is sending copies of its information to an off-site server managed by a CSR Which of the following BEST describes this strategy?

A.

Backup

B.

Zones

C.

Locality

D.

Geo-redundancy

Full Access
Question # 41

A vendor wants to distribute a cloud management application in a format that can be used on both public and private clouds, but one that does not include an underlying OS that would require patching and management. Which of the following would BEST meet this need?

A.

Containerization

B.

Federation

C.

Collaboration

D.

Microservices

Full Access
Question # 42

Which of the following BEST describes the open-source licensing model for application software?

A.

Software is free to use, but the source code is not available to modify.

B.

Modifications to existing software are not allowed.

C.

Code modifications must be submitted for approval.

D.

Source code is readily available to view and use.

Full Access
Question # 43

Which of the following metrics defines how much data loss a company can tolerate?

A.

RTO

B.

TCO

C.

MTTR

D.

ROI

E.

RPO

Full Access
Question # 44

A manufacturing company is selecting applications for a cloud migration. The company’s main concern relates to the ERP system, which needs to receive data from multiple industrial systems to generate the executive reports. Which of the following will provide the details needed for the company’s decision regarding the cloud migration?

A.

Standard operating procedures

B.

Feasibility studies

C.

Statement of work

D.

Benchmarks

Full Access
Question # 45

A company is considering moving its database application to a public cloud provider. The application is regulated and requires the data to meet confidentiality standards. Which of the following BEST addresses this requirement?

A.

Authorization

B.

Validation

C.

Encryption

D.

Sanitization

Full Access
Question # 46

A company is moving its long-term archive data to the cloud. Which of the following storage types will the company MOST likely use?

A.

File

B.

Object

C.

Tape

D.

Block

Full Access
Question # 47

Volume, variety, velocity, and veracity are the four characteristics of:

A.

machine learning.

B.

Big Data.

C.

microservice design.

D.

blockchain.

E.

object storage.

Full Access
Question # 48

A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied?

A.

Acceptance

B.

Avoidance

C.

Transference

D.

Mitigation

Full Access
Question # 49

A cloud risk assessment indicated possible outages in some regions. In response, the company enabled geo- redundancy for its cloud environment. Which of the following did the company adopt?

A.

Risk mitigation

B.

Risk acceptance

C.

Risk transference

D.

Risk avoidance

Full Access
Question # 50

A cloud administrator notices users call to report application performance degradation between 1:00 p.m. and 3:00 p.m. every day. Which of the following is the BEST option for the administrator to configure?

A.

Locality

B.

Block storage

C.

Right-sizing

D.

Auto-scaling

Full Access
Question # 51

A company has been running tests on a newly developed algorithm to increase the responsiveness of the application. The company's monthly bills for the testing have been much higher than expected.

Which of the following documents should the company examine FIRST?

A.

Memory report

B.

Compute report

C.

Network report

D.

Storage report

Full Access
Question # 52

Which of the following results from implementing a proprietary SaaS solution when an organization does not ensure the solution adopts open standards? (Choose two.)

A.

Vendor lock-in

B.

Inability to enforce the SLA

C.

Lack of technical support

D.

Higher ongoing operational expenditure

E.

Integration issues

F.

Higher initial capital expenditure

Full Access
Question # 53

Which of the following storage types will BEST allow data to be backed up and retained for long periods of time?

A.

Solid state storage

B.

Block storage

C.

Object storage

D.

File storage

Full Access
Question # 54

Which of the following risks can an organization transfer by adopting the cloud?

A.

Data breach due to a break-in at the facility

B.

Data sovereignty due to geo-redundancy

C.

Data loss due to incomplete backup sets

D.

Data misclassification due to human error

Full Access
Question # 55

A business analysis team is reviewing a report to try to determine the costs for a cloud application. The report does not allow separating costs by application.

Which of the following should the team use to BEST report on the costs of the specific cloud application?

A.

Right-sizing

B.

Content management

C.

Optimization

D.

Resource tagging

Full Access
Question # 56

A business analyst at a large multinational organization has been tasked with checking to ensure an application adheres to GDPR rules. Which of the following topics would be BEST for the analyst to research?

A.

Data integrity

B.

Industry-based requirements

C.

ISO certification

D.

Regulatory concerns

Full Access
Question # 57

After a cloud migration, a company hires a third party to conduct an assessment to detect any cloud infrastructure vulnerabilities. Which of the following BEST describes this process?

A.

Hardening

B.

Risk assessment

C.

Penetration testing

D.

Application scanning

Full Access
Question # 58

Which of the following aspects of cloud design enables a customer to continue doing business after a major data center incident?

A.

Replication

B.

Disaster recovery

C.

Scalability

D.

Autoscaling

Full Access
Question # 59

A company wants to ensure its existing functionalities are not compromised by the addition of a new functionality.

Which of the following is the BEST testing technique?

A.

Regression

B.

Stress

C.

Load

D.

Quality

Full Access
Question # 60

A low-budget project with a flexible completion time can become financially feasible via the use of:

A.

right-sizing.

B.

resource tagging.

C.

reserved instances.

D.

spot instances.

Full Access
Question # 61

Which of the following is an example of outsourcing administration in the context of the cloud?

A.

Managed services

B.

Audit by a third party

C.

Community support

D.

Premium support

Full Access
Question # 62

Which of the following strategies allows an organization to plan for cloud expenditures in a way that most closely aligns with the capital expenditure model?

A.

Simplifying contract requirements

B.

Implementing consolidated billing

C.

Considering a BYOL policy

D.

Using reserved cloud instances

Full Access
Question # 63

Which of the following are the main advantages of using ML/AI for data analytics in the cloud as opposed to on premises? (Choose two.)

A.

Cloud providers offer enhanced technical support.

B.

Elasticity allows access to a large pool of compute resources.

C.

The shared responsibility model offers greater security.

D.

AI enables DevOps to build applications easier and faster.

E.

A pay-as-you-go approach allows the company to save money.

F.

ML enables DevOps to build applications easier and faster.

Full Access
Question # 64

A small business is engaged with a cloud provider to migrate from on-premises CRM software. The contract includes fixed costs associated with the product. Which of the following variable costs must be considered?

A.

Time to market

B.

Operating expenditure fees

C.

BYOL costs

D.

Human capital

Full Access
Question # 65

Which of the following types of risk is MOST likely to be associated with moving all data to one cloud provider?

A.

Vendor lock-in

B.

Data portability

C.

Network connectivity

D.

Data sovereignty

Full Access