ExamGecko
Home Home / CompTIA / CLO-002

CompTIA CLO-002 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











Which of the following results from implementing a proprietary SaaS solution when an organization does not ensure the solution adopts open standards? (Choose two.)

A.
Vendor lock-in
A.
Vendor lock-in
Answers
B.
Inability to enforce the SLA
B.
Inability to enforce the SLA
Answers
C.
Lack of technical support
C.
Lack of technical support
Answers
D.
Higher ongoing operational expenditure
D.
Higher ongoing operational expenditure
Answers
E.
Integration issues
E.
Integration issues
Answers
F.
Higher initial capital expenditure
F.
Higher initial capital expenditure
Answers
Suggested answer: A, E

A requirement states that an application must be restored within six hours. Which of the following should be included in the SLA to satisfy this requirement?

A.
MTTR
A.
MTTR
Answers
B.
RPO
B.
RPO
Answers
C.
ROI
C.
ROI
Answers
D.
RTO
D.
RTO
Answers
Suggested answer: D

A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment. All users require the ability to modify personal working environments. Which of the following is the BEST solution?

A.
SSO
A.
SSO
Answers
B.
VDI
B.
VDI
Answers
C.
SSH
C.
SSH
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: D

A company with a variable number of employees would make good use of the cloud model because of:

A.
multifactor authentication
A.
multifactor authentication
Answers
B.
self-service
B.
self-service
Answers
C.
subscription services
C.
subscription services
Answers
D.
collaboration
D.
collaboration
Answers
Suggested answer: B

Which of the following would help a company avoid failure of a cloud project due to a lack of adherence of the company's operations and business processes to a cloud solution?

A.
Cloud managed services
A.
Cloud managed services
Answers
B.
Company baseline
B.
Company baseline
Answers
C.
Proof of value
C.
Proof of value
Answers
D.
Industry benchmarks
D.
Industry benchmarks
Answers
Suggested answer: A

Which of the following can be used to achieve automation, environment consistency, and standardization of computer resources in a cloud environment?

A.
Content management system
A.
Content management system
Answers
B.
Automation
B.
Automation
Answers
C.
Service-oriented architecture
C.
Service-oriented architecture
Answers
D.
Infrastructure as code
D.
Infrastructure as code
Answers
Suggested answer: D

A company's new systems administrator has been asked to create a new user for the human resources department. Which of the following will help the systems administrator understand the user privileges for each role in the company?

A.
Identity and access control management policy
A.
Identity and access control management policy
Answers
B.
Classification and management policy
B.
Classification and management policy
Answers
C.
Change management policy
C.
Change management policy
Answers
D.
Standard operating procedures
D.
Standard operating procedures
Answers
Suggested answer: A

An organization is determining an acceptable amount of downtime. Which of the following aspects of cloud design should the organization evaluate?

A.
RPO
A.
RPO
Answers
B.
RTO
B.
RTO
Answers
C.
ERP
C.
ERP
Answers
D.
TCO
D.
TCO
Answers
Suggested answer: B

A company is considering moving all of its VMs to reserved instances, which would save 20% on each instance. The instances the company would move are shown below:

Which of the following is the amount the company would save annually be converting all of these VMs to reserved instances?

A.
$1110
A.
$1110
Answers
B.
$1600
B.
$1600
Answers
C.
$3840
C.
$3840
Answers
D.
$5550
D.
$5550
Answers
E.
$13320
E.
$13320
Answers
F.
$53280
F.
$53280
Answers
Suggested answer: E

Which of the following is an example of multifactor authentication?

A.
A password policy that requires both upper and lowercase letters
A.
A password policy that requires both upper and lowercase letters
Answers
B.
A short message service (SMS) message sent to a phone and an access PIN
B.
A short message service (SMS) message sent to a phone and an access PIN
Answers
C.
Encryption of cached password information and a challenge question
C.
Encryption of cached password information and a challenge question
Answers
D.
A password that expires after 90 days and a PIN
D.
A password that expires after 90 days and a PIN
Answers
Suggested answer: B
Total 143 questions
Go to page: of 15