Cloud Essentials+ CLO-002
Which of the following security concerns is BEST addressed by moving systems to the cloud? A. Availability B. Authentication C. Confidentiality D. Integrity
A. Availability
Which of the following security objectives is MOST improved when moving a system to the cloud? A. Availability B. Integrity C. Privacy D. Confidentiality
A. Availability
Which of the following is related to data availability in the cloud? A. Resiliency B. Deduplication C. Scalability D. Elasticity
A. Resiliency
Which two terms are the most closely related to ITIL? A. Service delivery B. Supplier management C. Service level agreement D. Managed service
A. Service delivery B. Supplier management
Which of the following cloud principles will help manage the risk of a network breach? A. Shared responsibility B. Self-service C. Availability D. Elasticity
A. Shared responsibility
Which of the following would help a company avoid failure of a cloud project due to a lack of adherence of the company's operations and business processes to a cloud solution? A. Cloud managed services B. Company baseline C. Proof of value D. Industry benchmarks
A. Cloud managed services
What should you configure to control which types of virtual machines can be deployed in the cloud? A. Cloud policies B. Cloud template C. Cloud SLA D. Cloud subscription
A. Cloud policies
A company wants to save on cloud storage costs for data that does not need to be accessible in a timely manner. Which of the following storage types would be the BEST option? A. Cold B. Block C. Object D. Tape
A. Cold
You would like to automate the deployment of a cloud-based software testing environment. What should you use? (Choose two.) A. Command-line scripting B. Gap analysis C. GUI deployment tools D. Templates
A. Command-line scripting D. Templates
A project manager is interested in the notification process a CSP follows after discovering a breach of customer data. Which of the following is MOST likely to provide the necessary information? A. Communication plans B. Incident response policy C. Service level agreement D. Access controls
A. Communication plans
What is the primary benefit of using a CDN? A. Regulatory compliance B. Adherence to standards C. Improved performance D. Enhanced security
A. Regulatory compliance
Which of the following cloud migration methods would be BEST suited for disaster recovery scenarios? A. Replatforming B. Phased C. Rip and replace D. Lift and shift
A. Replatforming
A company wants to ensure its existing functionalities are not compromised by the addition of a new functionality. Which of the following is the BEST testing technique? A. Regression B. Stress C. Load D. Quality
A. Regression
A company has been running tests on a newly developed algorithm to increase the responsiveness of the application. The company's monthly bills for the testing have been much higher than expected. Which of the following documents should the company examine FIRST? A. Memory report B. Compute report C. Network report D. Storage report
C. Network report
Which of the following storage types will BEST allow data to be backed up and retained for long periods of time? A. Solid state storage B. Block storage C. Object storage D. File storage
C. Object storage
A company is evaluating the capital expenditure necessary to modernize its on-premises datacenter. Management has directed that 50% of capital expenditure be reallocated to operating expenditure. Which of the following cloud characteristics applies? A. BYOL B. Billing chargeback C. Pay-as-you-go D. High availability
C. Pay-as-you-go
Which of the following BEST describes the open-source licensing model for application software? A. Software is free to use, but the source code is not available to modify. B. Modifications to existing software are not allowed. C. Code modifications must be submitted for approval. D. Source code is readily available to view and use.
D. Source code is readily available to view and use.
An IT team documented the procedure for upgrading an existing IT resource within the cloud. Which of the following BEST describes this procedure? A. Security procedure B. Incident management C. Change management D. Standard operating procedure
D. Standard operating procedure
Which of the following words are most closely related to load balancing? (Choose two.) A. Security B. Performance C. Archiving D. Resiliency
B. Performance D. Resiliency
A company would like to improve its current DR plan with an emphasis on high availability. Which of the following metrics should the company focus on? A. MTTR B. RTO C. QoS D. RPO
B. RTO
Compared to vulnerability assessments, which word is most closely associated with penetration testing? A. Documentation B. Authentication C. Active D. Passive
C. Active
What type of cloud computing service model does cloud-based storage apply to? A. SaaS B. IaaS C. PaaS D. CaaS
B. IaaS
A company with a variable number of employees would make good use of the cloud model because of: A. multifactor authentication B. self-service C. subscription services D. collaboration
B. self-service
Which TCP port is normally used to connect to Microsoft SQL Server? A. 80 B. 443 C. 1433 D. 3389
C. 1433
Your on-premises, mission-critical Windows server is already licensed. You plan to migrate the server to a cloud-based virtual machine. What should you do to reduce costs? A. Use the BYOL option when creating the cloud virtual machine B. Deploy the server as a spot instance C. Increase the virtual machine compute power D. Switch to an open-source OS
Use the BYOL option when creating the cloud virtual machine
Which of the following are considered secure access types of hosts in the cloud? (Choose two.) A. HTTPS B. HTTP C. SSH D. Telnet E. RDP F. FTP
A. HTTPS C. SSH
Your on-premises network is linked to a cloud-based virtual network through a VPN tunnel. What type of cloud deployment model is this? A. Hybrid B. Private C. Public D. Extended
A. Hybrid
A company wants to migrate mission-critical applications to the cloud. In order for technicians to build, decommission, and perform other routine functions, which of the following cloud characteristics would BEST satisfy this business requirement? A. Self-service B. Elasticity C. Broad network access D. Availability
A. Self-service
Which of the following are true about the use of machine learning in a cloud environment? (Choose two). A. Specialized machine learning algorithms can be deployed to optimize results for specific scenarios. B. Machine learning can just be hosted in the cloud for managed services. C. Just one type of cloud storage is available in the cloud for machine learning workloads. D. Machine learning can leverage processes in a cloud environment through the use of cloud storage and auto-scaling. E. Machine learning requires a specialized IT team to create the machine learning models from scratch. F. Using machine learning solutions in the cloud removes the data-gathering step from the learning process.
A. Specialized machine learning algorithms can be deployed to optimize results for specific scenarios. D. Machine learning can leverage processes in a cloud environment through the use of cloud storage and auto-scaling.
A human resources department is considering a SaaS-based human resources portal and requires a risk analysis.Which of the following are requirements to consider? (Choose two.) A. Support B. Threats C. Chargebacks D. Vulnerabilities E. Maintenance F. Gap analysis
A. Support D. Vulnerabilities
Which CDN configuration determines how long before the source of cached data is checked for changes? A. TTL B. Replication C. Path D. SSL
A. Time to Live (TTL)
Which of the following is considered a "bare metal" type of hypervisor? A. Type 1 B. Type 2 C. Type 3 D. Type 4
A. Type 1
You need to minimize cost when periodically testing new OS updates in cloud-based Windows virtual machines. What should you do? A. Use spot instances B. Use reserved instances C. View the virtual machine SLA D. Deploy the virtual machine using a template
A. Use spot instances
Which of the following types of risk is MOST likely to be associated with moving all data to one cloud provider? A. Vendor lock-in B. Data portability C. Network connectivity D. Data sovereignty
A. Vendor lock-in
Which of the following results from implementing a proprietary SaaS solution when an organization does not ensure the solution adopts open standards? (Choose two.) A. Vendor lock-in B. Inability to enforce the SLA C. Lack of technical support D. Higher ongoing operational expenditure E. Integration issues F. Higher initial capital expenditure
A. Vendor lock-in E. Integration issues
Monthly cloud service costs are BEST described as: A. operating expenditures. B. fixed expenditures. C. capital expenditures. D. personnel expenditures.
A. operating expenditures.
A small online retailer is looking for a solution to handle the high load on its servers during the holiday season. The retailer is not currently ready to move its IT operations completely to the cloud.Which of the following will BEST fit these requirements? A. Elasticity B. Scalability C. Bursting D. Self-service
B. Scalability
Your cloud-hosted public website experiences more traffic during the holiday season. You need to design a configuration that responds to application requests to add or remove back-end virtual machines as required. The maximum number of VMs should never exceed four. Which cloud characteristic does this most closely relate to? A. Metered use B. Scalability C. Broad network access D. Availability
B. Scalability
Which term describes adding virtual machines to support a busy application? A. Scaling in horizontally B. Scaling out horizontally C. Scaling down vertically D. Scaling up horizontally
B. Scaling out horizontally
A report identified that several of a company's SaaS applications are against corporate policy. Which of the following is the MOST likely reason for this issue? A. Shadow IT B. Sensitive data C. Encryption D. Vendor lock-in
B. Sensitive data
Which of the following allows for the management of network policies from a central portal while maintaining a hardware-agnostic approach? A. Virtual private network B. Software-defined network C. Load balancing D. Direct Connect
B. Software-defined network
Which term refers to configuring cloud networking without directly having to configure underlying network hardware? A. Load balancing B. Software-defined networking C. Cloud-based routing D. Cloud-based virtualization
B. Software-defined networking
After a load balancer is put in place, users report that they can no longer access a web application. What is the most likely cause of the problem? A. The load balancer DNS name is not resolving to the website name. B. The website DNS name is not resolving to the load balancer. C. TCP port 3389 is blocked in the cloud. D. TCP port 389 is blocked in the cloud.
B. The website DNS name is not resolving to the load balancer.
A company migrated all of its infrastructure to the cloud. The cloud security team must review the security post-migration. Which of the following is the MOST appropriate task for the cloud security team to perform? A. Risk register B. Threat assessment C. Application scan D. Vulnerability scan
B. Threat assessment
Which of the following BEST explains the concept of RTOs for restoring servers to operational use? A. To reduce the amount of data loss that can occur in the event of a server failure B. To ensure the restored server is available and operational within a given window of time C. To ensure the data on the restored server is current within a given window of time D. To reduce the amount of time a particular server is unavailable and offline
B. To ensure the restored server is available and operational within a given window of time
A new company directive requires all departments to ensure intellectual property is kept within a country's borders. Which of the following concepts BEST represents this requirement? A. Data portability B. Data security C. Data locality D. Data sovereignty
D. Data sovereignty
Your manager instructs you to deploy cloud-stored data only within Canada. Which term best describes this scenario? A. Disaster recovery planning B. Load balancing C. Service level agreement D. Data sovereignty
D. Data sovereignty
You are reviewing a CSP's media destruction procedures. Your organization requires that hard disk data is removed magnetically. Which technique does this? A. Drilling B. Shredding C. Hammering D. Degaussing
D. Degaussing
Which solution protects stored data even if physical storage devices are stolen? A. Deduplication B. RAID 1 C. RAID 5 D. Encryption of data at rest
D. Encryption of data at rest
Which term best relates to analyzing test results to identify shortfalls where cloud solutions might not address specific computing requirements? A. Pilot program B. Feasibility study C. Disaster recovery planning D. Gap analysis
D. Gap analysis
A Chief Information Officer (CIO) wants to identify two business units to be pilots for a new cloud project. A business analyst who was recently assigned to this project will be selecting a cloud provider. Which of the following should the business analyst do FIRST? A. Conduct a feasibility study of the environment. B. Conduct a benchmark of all major systems. C. Draw a matrix diagram of the capabilities of the cloud providers. D. Gather business and technical requirements for key stakeholders.
D. Gather business and technical requirements for key stakeholders.
A cloud administrator is reviewing the requirements for a SaaS application and estimates downtime will be very expensive for the organization. Which of the following should the administrator configure to minimize downtime? (Choose two.) A. Continuous deployment B. Right-sizing C. Availability zones D. Geo-redundancy E. Hardening F. Backups
D. Geo-redundancy F. Backups
Developers are planning to write on-premises code that programmatically accesses cloud storage. You are configuring on-premises firewall rules to allow this storage access. Which type of outbound traffic will you most likely allow in this scenario? A. FTPS B. SMB C. NFS D. HTTPS
D. HTTPS
A small business is engaged with a cloud provider to migrate from on-premises CRM software. The contract includes fixed costs associated with the product. Which of the following variable costs must be considered? A. Time to market B. Operating expenditure fees C. BYOL costs D. Human capital
D. Human capital
Which of the following cloud migration methods would take full advantage of the cloud computing model? A. Rip and replace B. Lift and shift C. Phased D. Hybrid
D. Hybrid
Which of the following deployment models includes application components on a compan's network as well as on the Internet? A. Private B. Public C. Community D. Hybrid
D. Hybrid
The cloud consumer compliance team requires the IT department to patch and update cloud resources properly. Which of the following cloud service delivery models will BEST suit this need? A. SaaS B. DBaaS C. DRaaS D. IaaS
D. IaaS
Which of the following can be used to achieve automation, environment consistency, and standardization of computer resources in a cloud environment? A. Content management system B. Automation C. Service-oriented architecture D. Infrastructure as code
D. Infrastructure as code
A company is moving to the cloud and wants to enhance the provisioning of compute, storage, security, and networking. Which of the following will be leveraged? A. Infrastructure as code B. Infrastructure templates C. Infrastructure orchestration D. Infrastructure automation
D. Infrastructure automation
Which of the following is used to build and manage interconnections between cloud resources within the same cloud environment? A. Firewall B. Software-defined network C. Virtual private network D. Direct Connect
A. Firewall
Which of the following allows an IP address to be referenced via an easily remembered name for a SaaS application? A. DNS B. CDN C. VPN D. WAN
A. DNS
You are configuring your on-premises perimeter firewall to allow outbound Windows server remote management. Which port should you open? A. 3389 B. 443 C. 445 D. 389
A. 3389
A cloud service provider is marketing its new PaaS offering to potential clients. Which of the following companies would MOST likely be interested? A. A company specializing in application development B. A company with many legacy applications C. A company with proprietary systems D. A company that outsources support of its IT systems
A. A company specializing in application development
Which of the following is a true statement? A. Anybody with Internet access can potentially access public cloud services. B. Anybody with Internet access can potentially access private cloud services. C. Private clouds are available to any user with a paid subscription. D. Public clouds are used by a single organization.
A. Anybody with Internet access can potentially access public cloud services.
A business analyst is drafting a risk assessment.Which of the following components should be included in the draft? (Choose two.) A. Asset management B. Database type C. Encryption algorithms D. Certificate name E. Asset inventory F. Data classification
A. Asset management F. Data classification
A cloud administrator configures a server to insert an entry into a log file whenever an administrator logs in to the server remotely. Which of the following BEST describes the type of policy being used? A. Audit B. Authorization C. Hardening D. Access
A. Audit
An incident response team requires documentation for an email phishing campaign against a company's email server. Which of the following is the BEST resource to use to start the investigation? A. Audit and system logs B. Change management procedures C. Departmental policies D. Standard operating procedures
A. Audit and system logs
What kind of standard is SSAE No. 16? A. Auditing B. Encryption C. Risk management D. Authentication
A. Auditing
Which of the following technologies would help a game company prepare its cloud infrastructure to support a global distribution workload of a newly released online game? (Choose two.) A. Auto-scaling B. VDI C. Data portability D. CDN E. Templates F. Blockchain
A. Auto-scaling D. CDN
Developers in your company have been leaving cloud-based virtual machines running long after they are needed. What should you configure to reduce costs? A. Auto-shutdown B. Spot instances C. Reserved instances D. Virtual machine templates
A. Auto-shutdown
Users in your company use their work-issued laptops and personal smartphones to access web apps hosted on a company's private cloud infrastructure. Which term best describes this scenario? A. Broad network access B. Scalability C. Elasticity D. Availability
A. Broad network access
A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow? A. Configuration management B. Incident management C. Resource management D. Change management
A. Configuration management
A systems administrator is reviewing a disaster recovery option that requires little to no downtime in the event of a natural disaster. Which of the following BEST meets this requirement? A. Configure availability zones. B. Configure high availability. C. Configure geo-redundancy. D. Configure auto-scaling.
A. Configure availability zones.
A company's new systems administrator has been asked to create a new user for the human resources department. Which of the following will help the systems administrator understand the user privileges for each role in the company? A. Identity and access control management policy B. Classification and management policy C. Change management policy D. Standard operating procedures
A. Identity and access control management policy
Which of the following would be expected from a security consultant who has been hired to investigate a data breach of a private cloud instance? A. Incident report B. Application scan results C. Request for information D. Risk register
A. Incident report
Which of the following policies is MOST critical for being in compliance with regulatory agencies? A. Incident response B. Communication C. Department-specific D. Change management
A. Incident response
A company hired a DevOps engineer to move business systems to the cloud. The current systems administrator does not have scripting experience and has been deploying servers manually. Which of the following would BEST optimize this process? A. Infrastructure as code deployment model B. API integration to a cloud provider C. Load testing D. Continuous delivery/continuous integration
A. Infrastructure as code deployment model
An architect recently discovered new opportunities the cloud can provide to the company. A business analyst is currently working with the architect to document the business use-case scenarios. Which of the following should be the architect's NEXT step? A. Initialize a PoC. B. Conduct a feasibility study. C. Perform a gap analysis. D. Gather cloud requirements.
A. Initialize a PoC.
Why is a CSP's security standards compliance important? (Choose two.) A. It provides a level of assurance to cloud customers that the CSP has taken effective steps to mitigate risk. B. A CSP's security standards compliance means its cloud customers are also compliant. C. It proves that the CSP cannot be hacked. D. The CSP security posture is accredited by third parties.
A. It provides a level of assurance to cloud customers that the CSP has taken effective steps to mitigate risk. D. The CSP security posture is accredited by third parties.
Which of the following is an example of outsourcing administration in the context of the cloud? A. Managed services B. Audit by a third party C. Community support D. Premium support
A. Managed services
You need a dedicated network circuit to link your on-premises network to the cloud. Which of the following options provide this capability? (Choose two.) A. Microsoft Azure ExpressRoute B. AWS DirectConnect C. Microsoft Azure Virtual Network Gateway D. AWS Snowball
A. Microsoft Azure ExpressRoute B. AWS DirectConnect
A company is migrating its e-commerce platform to a cloud service provider. The e-commerce site has a significant number of images. Which of the following is the BEST storage type for storing the images? A. Object B. Cold C. File D. Block
A. Object
Which of the following is most closely related to sensitive medical information? A. PHI B. PII C. COTS D. SLA
A. PHI
Which of the following cloud characteristics helps transform from a typical capital expenditure model to an operating expenditure model? A. Pay-as-you-go B. Elasticity C. Self-service D. Availability
A. Pay-as-you-go
Which activity determines whether an implemented cloud solution will address business requirements? A. Pilot program B. Feasibility study C. Gap analysis D. Cloud migration
A. Pilot program
After performing an initial assessment of a cloud-hosted architecture, a department wants to gain the support of upper management. Which of the following should be presented to management? A. Project charter B. Feasibility study C. Managed services D. Pilot
A. Project charter
A startup company that provides streaming media services is considering a new CSP. The company sees an average volume of 5000TB daily and high QoS. It has received the following bids: Based on the information above, which of the following CSPs offers the MOST cost-effective solution for streaming? A. Provider 1 B. Provider 2 C. Provider 3 D. Provider 4
A. Provider 1
What makes the use of application containers more desirable to developers than virtual machines? A. Quicker startup time B. Better security C. More network options D. Support for MFA
A. Quicker startup time
Which RAID configuration improves disk I/O performance but does not include fault tolerance? A. RAID 0 B. RAID 1 C. RAID 5 D. RAID deduplication
A. RAID 0
Which of the following would BEST provide access to a Windows VDI? A. RDP B. VPN C. SSH D. HTTPS
A. RDP
What is another term commonly used to describe the rip and replace migration strategy? A. Refactoring B. Migrating C. Replication D. Reproducing
A. Refactoring
Which of the following statements regarding laws and regulations is accurate? A. Regulations provide implementation and enforcement details. B. Laws provide implementation and enforcement details. C. Breaking laws can result in fines; this is not true for a lack of regulatory compliance. D. A lack of regulatory compliance can result in fines, but not imprisonment.
A. Regulations provide implementation and enforcement details.
A company is in its second year of a three-year agreement with a cloud vendor. After the initial phase of the cloud migration, resource consumption has stabilized. Which of the following would help the company reduce the cost of infrastructure? A. Reserved instances B. Pay-as-you-go C. Spot instances D. Bring your own license
A. Reserved instances
Which of the following is the BEST approach to optimize data security in an IaaS migration of data to the cloud? A. Review the risk register. B. Perform a vulnerability scan C. Perform server hardening. D. Configure encryption in transit.
A. Review the risk register.
Which of the following models provides the SMALLEST amount of technical overhead? A. SaaS B. PaaS C. MaaS D. IaaS
A. SaaS
Which of the following services would restrict connectivity to cloud resources? A. Security lists B. Firewall C. VPN D. Intrusion detection system
A. Security lists
An organization plans to keep three of its cloud servers online for another nine months and a fourth server online for a year. The current pricing is $200 per month per server. The cloud provider announced the sale price of $1,500 per year per reserved instance. Which of the following represents the cost savings by converting all four of the cloud servers to reserved instances? A. $900 B. $1,800 C. $2,400 D. $3,600
B. $1,800
Which of the following is an example of multifactor authentication? A. A password policy that requires both upper and lowercase letters B. A short message service (SMS) message sent to a phone and an access PIN C. Encryption of cached password information and a challenge question D. A password that expires after 90 days and a PIN
B. A short message service (SMS) message sent to a phone and an access PIN
Which of the following DevOps options is used to integrate with cloud solutions? A. Provisioning B. API C. SOA D. Automation
B. API
Which AWS service is designed to allow physical storage appliances to transfer large volumes of on-premises data to the cloud? A. AWS Direct Connect B. AWS Snowball C. Amazon S3 D. Amazon EC2
B. AWS Snowball
A mobile application development team requires frequent software updates for a major launch of a customer-facing application. The business requirement is to be first-to-market on a new feature that leverages third-party-hosted services.Which of the following is the BEST approach to use for speed and efficiency? A. Proprietary code solution B. Application programming interface C. Regression testing D. Production load testing
B. Application programming interface
You are evaluating cloud service SLAs. What is required to determine if the SLA performance guarantees are suitable for a specific IT workload? A. Template B. Baseline C. Pricing calculator D. Migration toolkit
B. Baseline
An online retailer wants to ensure its inventory for the holiday season is correct. The company does not have a large IT infrastructure or staff to collect and analyze sales information, customer analytics, marketing information, or trends. Which of the following cloud services will help the company analyze these metrics without a large investment in human capital? A. Containerization B. Big Data C. Microservices D. Blockchain
B. Big Data
Volume, variety, velocity, and veracity are the four characteristics of: A. machine learning. B. Big Data. C. microservice design. D. blockchain. E. object storage.
B. Big Data
Which of the following stores transactions in a distributed ledger of which all users have a copy? A. Big Data B. Blockchain C. Machine learning D. Artificial intelligence
B. Blockchain
A web application was deployed, and files are available globally to improve user experience. Which of the following technologies is being used? A. SAN B. CDN C. VDI D. API
B. CDN
Which type of IP addressing notation uses a slash followed by the number of subnet mask bits? A. SDN B. CIDR C. VPN D. QoS
B. CIDR
Your organization runs a private cloud. Cloud usage is tracked by department for monthly billing purposes. Which term best describes this model? A. Service level agreement B. Chargeback C. IaaS D. SaaS
B. Chargeback
You have manually deployed an Ubuntu Linux virtual machine in the public cloud. Who is responsible for applying Linux operating system updates to the VM? A. Cloud service provider B. Cloud tenant C. Ubuntu D. Cloud service provider and cloud tenant
B. Cloud tenant
A cloud developer chooses to use private key encryption for all traffic in a new application. Which of the following security concerns does this BEST describe? A. Integrity B. Confidentiality C. Availability D. Authorization
B. Confidentiality
Your organization is configuring cloud backup for on-premises servers. Which cloud backup storage configuration should be used to minimize costs? A. Increased IOPS B. Cool access tier C. Storage replication D. Hot access tier
B. Cool access tier
Before conducting a cloud migration, a compliance team requires confirmation that sensitive data will remain close to their users. Which of the following will meet this requirement during the cloud design phase? A. Data locality B. Data classification C. Data certification D. Data validation
B. Data classification
To prevent future sensitive data retrieval of cloud-replicated data, you have repartitioned a hard disk within a laptop computer. The computer was running a Windows client operating system at the time of the repartitioning. Which statement regarding this scenario is correct? A. A Windows server operating system should have been used. B. Deleted partitions are easily recovered. C. A Linux server operating system should have been used. D. The operating system cannot be running when disk partitions are removed.
B. Deleted partitions are easily recovered.
An organization's servers are experiencing performance degradation from oversubscription of memory in the virtual environment and exhausted physical RAM.Which of the following cloud computing characteristics would BEST address the issue? A. Availability B. Elasticity C. Pay-as-you-go D. Self-service
B. Elasticity
Which of the following are the main advantages of using ML/AI for data analytics in the cloud as opposed to on premises? (Choose two.) A. Cloud providers offer enhanced technical support. B. Elasticity allows access to a large pool of compute resources. C. The shared responsibility model offers greater security. D. AI enables DevOps to build applications easier and faster. E. A pay-as-you-go approach allows the company to save money. F. ML enables DevOps to build applications easier and faster.
B. Elasticity allows access to a large pool of compute resources. E. A pay-as-you-go approach allows the company to save money.
Which word is the most closely related to using a VPN? A. Performance B. Encryption C. Anonymous D. Updates
B. Encryption
Which term is associated with agreeing to licensing terms? A. Bring Your Own License (BYOL) B. End User License Agreement (EULA) C. Service Level Agreements (SLA) D. Total Cost of Ownership (TCO)
B. End User License Agreement (EULA)
Which of the following two items are commonly found in a cloud SLA? A. Data retention options B. Expected uptime C. Subscription limits D. Service credits
B. Expected uptime D. Service credits
A manufacturing company is selecting applications for a cloud migration. The company's main concern relates to the ERP system, which needs to receive data from multiple industrial systems to generate the executive reports. Which of the following will provide the details needed for the company's decision regarding the cloud migration? A. Standard operating procedures B. Feasibility studies C. Statement of work D. Benchmarks
B. Feasibility studies
An organization wants to migrate a locally hosted application to a PaaS model. The application currently runs on a 15-year-old operating system and cannot be upgraded. Which of the following should the organization perform to ensure the application will be supported in the cloud? A. Risk register B. Feasibility study C. Benchmarks D. Baseline
B. Feasibility study
You need to perform a general analysis to determine if cloud computing will address business needs. What should you perform? A. Pilot program B. Feasibility study C. Phased cloud migration D. Disaster recovery planning
B. Feasibility study
A project manager must inform the Chief Information Officer (CIO) of the additional resources necessary to migrate services to the cloud successfully. Which of the following cloud assessments would be MOST appropriate to use for the recommendation? A. Feasibility study B. Gap analysis C. Future requirements D. Baseline report
B. Gap analysis
A company with critical resources in the cloud needs to ensure data is available in multiple datacenters around the world. Which of the following BEST meets the company's needs? A. Auto-scaling B. Geo-redundancy C. Disaster recovery D. High availability
B. Geo-redundancy
Which of the following should be considered to ensure the availability of data that is accessed across multiple sites? (Choose two.) A. Auto-scaling B. Geo-redundancy C. Backup D. Provisioning E. Locality F. Zones
B. Geo-redundancy C. Backup
In the event of a regional disaster, you would like cloud-stored data available elsewhere. What should you configure? A. RAID 0 B. Geo-redundant storage C. Deduplication D. RAID 1
B. Geo-redundant storage
A company is required to move its human resources application to the cloud to reduce capital expenses. The IT team does a feasibility analysis and learns the application requires legacy infrastructure and cannot be moved to the cloud. Which of the following is the MOST appropriate cloud migration approach for the company? A. Lift and shift B. Hybrid C. Rip and replace D. In-place upgrade
B. Hybrid
What is the primary benefit of deploying a CDN? A. Enhanced security B. Improved performance C. Reduced costs D. Regulatory compliance
B. Improved performance
A business analyst is reviewing a software upgrade plan. The plan mentions the term 'hash' value. Which of the following BEST represents what this term implies? A. Non-repudiation of data B. Integrity of data C. Confidentiality of data D. Availability of data
B. Integrity of data
What makes private clouds different from public clouds? (Choose two.) A. Service availability B. Limited user base C. Security of data at rest D. Responsibility for infrastructure
B. Limited user base D. Responsibility for infrastructure
Which of the following techniques helps an organization determine benchmarks for application performance within a set of resources? A. Auto-scaling B. Load testing C. Sandboxing D. Regression testing
B. Load testing
Which term best describes deploying a cloud-based database without having to configure the underlying virtual machine? A. Horizontal scaling B. Managed service C. Vertical scaling D. Infrastructure as a Service
B. Managed service
Your company uses a dedicated network circuit for public cloud connectivity. You need to ensure that on-premises-to-public cloud connections are not exposed to other Internet users. What should you do? A. Configure a site-to-site VPN B. Nothing C. Configure a client-to-site VPN D. Enable HTTPS
B. Nothing
A company is moving its long-term archive data to the cloud. Which of the following storage types will the company MOST likely use? A. File B. Object C. Tape D. Block
B. Object
Which type of software does not normally charge users for licensing? A. CAPEX B. Open source C. Proprietary D. BYOL
B. Open source
Which term is synonymous with metered usage? A. Elasticity B. Pay-as-you-go C. CAPEX D. Managed service
B. Pay-as-you-go
What is the first phase of a cloud migration? A. Migrate data to the cloud B. Perform an on-premises cloud readiness assessment C. Synchronize on-premises and cloud data D. Decommission on-premises IT systems
B. Perform an on-premises cloud readiness assessment
An organization is determining an acceptable amount of downtime. Which of the following aspects of cloud design should the organization evaluate? A. RPO B. RTO C. ERP D. TCO
B. RTO
Your company has a three-year military contract that will require the use of many virtual machines that must be left running all the time. You need to minimize cloud computing costs. Which cloud virtual machine option should you consider? A. Spot instances B. Reserved instances C. Auto-shutdown D. Template deployment
B. Reserved instances
After a cloud migration, a company hires a third party to conduct an assessment to detect any cloud infrastructure vulnerabilities. Which of the following BEST describes this process? A. Hardening B. Risk assessment C. Penetration testing D. Application scanning
B. Risk assessment
Which type of database solution uses a rigid schema? A. NoSQL B. SQL C. Managed D. Replicated
B. SQL
A business analyst is using a public cloud provider's CRM service to manage contacts and organize all communication. Which of the following cloud service models is the analyst using? A. IaaS B. SaaS C. DBaaS D. PaaS
B. SaaS
Which of the following is a cloud service model that organizations use when their third-party ERP tool is provided as a complete service? A. Public cloud B. SaaS C. Hybrid cloud D. IaaS
B. SaaS
For which of the following reasons is the infrastructure as code technique used? A. To improve the ability to migrate applications to different cloud providers to avoid vendor lock-in. B. To specify the hardware configuration and system installation procedures in machine-readable formats. C. To capture the system configurations to track changes and remediate configuration drift. D. To assign server administration responsibilities to software developers for application deployments.
B. To specify the hardware configuration and system installation procedures in machine-readable formats.
Which type of hypervisor requires an existing operating system? A. Type 1 B. Type 2 C. Type 3 D. Type 4
B. Type 2
Which factor has the most influence on which regulations apply to your organization? A. Operating system used for cloud virtual machines B. Type of industry C. Cloud storage encryption strength D. Type of cloud media sanitization in use
B. Type of industry
Following a risk assessment, a company decides to adopt a multi-cloud strategy for its IT applications. Which of the following is the company trying to avoid as part of its risk mitigation strategy? A. Geo-redundancy B. Vendor lock-in C. High availability D. Data sovereignty
B. Vendor lock-in
For security reasons, a cloud service that can be accessed from anywhere would make BEST use of: A. replication. B. multifactor authentication. C. single sign-on. D. data locality
B. multifactor authentication.
Transferring all of a customer's on-premises data and virtual machines to an appliance, and then shipping it to a cloud provider is a technique used in a: A. phased migration approach. B. replatforming migration approach. C. rip and replace migration approach. D. lift and shift migration approach.
B. replatforming migration approach.
A software developer wants to ensure a packaged application can be deployed in different environments without modifying anything but the application settings. The developer creates an image and provides instructions for the systems administrator to use for deployment. This is an example of: A. application versioning. B. source code control. C. containerization. D. deployment automation.
B. source code control.
A network team establishes a new connection to an IaaS CSP that is more efficient and has networking costs that are 25% less than previous monthly expenditures. The bill outlines the following costs: Storage: $10000 - Compute: $12000 - Network: $7000 - Which of the following will be the total cloud expenditure for the following month? A. $26000 B. $26250 C. $27250 D. $29000
C. $27250
A business is experiencing an outage of a customer-facing e-commerce website after a SaaS-based CDN upgrade. The RTO is 5 minutes or less, but it has already been 10 minutes since the outage. After 15 minutes, the CDN recovers for the outage. The business loses $25000 in revenue per minute of the outage.Which of the following is the financial impact to the business? A. $250000 B. $350000 C. $375000 D. $400000
C. $375000
Which statements regarding a CSP's legal and regulatory compliance are correct? (Choose two.) A. All security responsibilities fall upon the CSP. B. A CSP's service level agreements list independent third-party auditors. C. A CSP provides documentation about its security standards compliance. D. Cloud customers also bear some responsibility in securing their use of cloud computing.
C. A CSP provides documentation about its security standards compliance. D. Cloud customers also bear some responsibility in securing their use of cloud computing.
Which cloud feature automatically adds or removes virtual machines based on how busy an application is? A. Load balancing B. Elasticity C. Autoscaling D. Monitoring
C. Autoscaling
A systems administrator must select a CSP while considering system uptime and access to critical servers. Which of the following is the MOST important criterion when choosing the CSP? A. Elasticity B. Scalability C. Availability D. Serviceability
C. Availability
An organization determines it cannot go forward with a cloud migration due to the risks involved. Which of the following types of risk response does this describe? A. Acceptance B. Transference C. Avoidance D. Mitigation
C. Avoidance
A company is planning to use cloud computing to extend the compute resources that will run a new resource-intensive application. A direct deployment to the cloud would cause unexpected billing. Which of the following must be generated while the application is running on-premises to predict the cloud budget for this project better? A. Proof or concept B. Benchmark C. Baseline D. Feasibility study
C. Baseline
A company's finance team is reporting increased cloud costs against the allocated cloud budget. Which of the following is the BEST approach to match some of the cloud operating costs with the appropriate departments? A. Right-sizing B. Scaling C. Chargeback D. Showback
C. Chargeback
Which common VPN type links a single device to a private network over the Internet? A. Point-to-site B. Branch-to-branch C. Client-to-site D. Site-to-site
C. Client-to-site
You want to be made aware of cloud computing charges when a certain dollar amount is reached. What should you configure? A. Reserved instances B. Cloud pricing calculator C. Cloud templates D. Billing alerts
D. Billing alerts
Which statements regarding cloud computing are correct? (Choose two.) A. Virtualization relies on cloud computing. B. Cloud-hosted virtual machines normally run on type 2 hypervisors. C. Cloud computing relies on virtualization. D. Cloud-hosted virtual machines normally run on type 1 hypervisors.
C. Cloud computing relies on virtualization. D. Cloud-hosted virtual machines normally run on type 1 hypervisors.
A business analyst is examining a report and notices compute costs are very high for four cloud-based, load-balanced virtual machines hosting an application. The application will be in use for at least two more years, but there are no developers available to help optimize it. Which of the following should the analyst recommend to BEST reduce costs without impacting performance? A. Decommission a virtual machine. B. Change to a pay-as-you-go plan. C. Convert the application to a SaaS solution. D. Switch the virtual machines to reserved instances.
C. Convert the application to a SaaS solution.
A company has defined a multi-cloud model. Which of the following is the MOST important aspect to consider when defining the company's needs? A. Change management B. Data sovereignty C. Data portability D. Data classification
C. Data portability
Which term refers to the applicable laws based on the location of where data is collected, stored, and used? A. Special Publication B. Security control C. Data sovereignty D. PKI
C. Data sovereignty
Which data storage characteristic is the most closely related to minimizing data redundancy? A. IOPS B. Replication C. Deduplication D. RAID
C. Deduplication
Which data privacy standard is a legislative act of the European Union? A. HIPAA B. PCI DSS C. GDPR D. COTS
C. GDPR
You have decided to deploy your own cloud-based virtual machines hosting a Microsoft SQL Server database. Which type of cloud service model is this? A. CaaS B. PaaS C. IaaS D. SaaS
C. IaaS
When selecting a cloud provider, which of the following is MOST likely to be a financial consideration? A. Proof of concept B. Request for information C. Licensing models D. Request for proposal
C. Licensing models
A cloud systems administrator needs to migrate several corporate applications to a public cloud provider and decommission the internal hosting environment. This migration must be completed by the end of the month. Because these applications are internally developed to meet specific business accounting needs, the administrator cannot use an alternative application. Which of the following BEST describes the approach the administrator should use? A. Hybrid deployment B. Phased migration C. Lift and shift D. Rip and replace
C. Lift and shift
Which cloud migration strategy is best suited for commercial off-the-shelf software? A. Rip and replace B. On-premises assessment C. Lift and shift D. Rip and shift
C. Lift and shift
Which of the following is commonly used to forecast market trends? A. Serverless computing B. Data warehouse C. Machine learning D. Accelerated computing
C. Machine learning
What is another term for DBaaS? A. Unmanaged database B. NoSQL C. Managed database D. SQL
C. Managed database
Which cloud computing characteristic is most closely related to OPEX? A. Broad network access B. Elasticity C. Pay-as-you-go D. Self-service
C. Pay-as-you-go
Which term is most closely related to ensuring that cloud solutions improve the customer experience and increase efficiencies? A. Proof of concept (PoC) B. Return on investment (ROI) C. Proof of value (PoV) D. Total cost of ownership (TCO)
C. Proof of value (PoV)
When scaling in for a cloud-based web application, what are you doing? A. Decreasing the compute power B. Increasing the compute power C. Removing virtual machine instances D. Adding virtual machine instances
C. Removing virtual machine instances
Which of the following can be used by a client's finance department to identify the cost of cloud use in a public cloud environment shared by different projects and departments? A. Reserved instances B. Service level agreement C. Resource tagging D. RFI from the CSP
C. Resource tagging
Which of the following should be enforced for billing recognition to allow department members to provision their own cloud resource? A. Sandboxing B. BYOL C. Resource tagging D. Reserved instances
C. Resource tagging
Which of the following BEST describes decreasing the resources assigned to a system to avoid paying for unused capacity? A. Orchestration B. Auto-scaling C. Right-sizing D. Scalability
C. Right-sizing
A cloud systems administrator needs to log in to a remote Linux server that is hosted in a public cloud. Which of the following protocols will the administrator MOST likely use? A. HTTPS B. RDP C. Secure Shell D. Virtual network computing
C. Secure Shell
Which of the following is the cloud storage technology that would allow a company with 12 nearly identical servers to have the SMALLEST storage footprint? A. Capacity on demand B. Compression C. Software-defined storage D. Deduplication
C. Software-defined storage
You are planning how cloud storage will address business needs. Choosing which cloud storage option will have the largest positive impact on performance? A. Capacity B. Storage media brand C. Solid state drives D. FTP access
C. Solid state drives
From the cloud customer's perspective, to which business role does the CSP apply? A. Cloud tenant B. Regulator C. Supplier D. Enforcer
C. Supplier
You need to configure your on-premises perimeter firewall to allow outbound Linux remote management. Which port should you open? A. TCP 80 B. UDP 161 C. TCP 22 D. TCP 3389
C. TCP 22
Which U.S. federal government security standard is most closely related to cloud security? A. HIPAA B. ISO/IEC 27017:2015 C. FedRAMP D. Sarbanes-Oxley Act
C. The Federal Risk and Authorization Management Program (FedRAMP)
You need to create a DNS record that redirects a custom domain name for a CDN configuration. What type of record should you create? A. MX B. A C. PTR D. CNAME
D. CNAME
A cloud administrator suggested using spot instances to reduce cloud costs for part of a new cloud infrastructure. Which of the following conditions must be addressed by the application that will run on these instances? A. The application needs to store data in a database. B. There is a restriction for distributed network communications. C. The application needs to handle unpredictable instance termination. D. Resource-intensive compute loads will be forbidden.
C. The application needs to handle unpredictable instance termination.
What normally occurs when a load balancer back-end server is unresponsive? A. The load balancer deletes and re-creates the failed server. B. The load balancer uses vertical scaling to add servers. C. The load balancer does not route client requests to the unresponsive server. D. The load balancer prevents client connections to the app.
C. The load balancer does not route client requests to the unresponsive server.
Which of the following is true about the use of technologies such as JSON and XML for cloud data interchange and automation tasks? A. It can cause cloud vendor lock-in B. The company needs to define a specific programming language for cloud management. C. The same message format can be used across different cloud platforms. D. It is considered an unsafe format of communication.
C. The same message format can be used across different cloud platforms.
Which of the following BEST explains why there should be an established communication policy between CSPs and clients? A. To set guidelines for securing network traffic for all communications with endpoints on the corporate local area network B. To ensure all staff know the acceptable guidelines for representing themselves on social media. C. To have protocols in place for notifying staff when a cloud outage occurs. D. To have proper procedures in place for interactions between internal departments and cloud vendors submitting bids for software or service.
C. To have protocols in place for notifying staff when a cloud outage occurs.
A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied? A. Acceptance B. Avoidance C. Transference D. Mitigation
C. Transference
A developer is leveraging a public cloud service provider to provision servers using the templates created by the company's cloud engineer. Which of the following does this BEST describe? A. Subscription services B. Containerization C. User self-service D. Autonomous environments
C. User self-service
A company wants to process a batch job in a faster, cost-effective manner. Which of the following is the BEST solution? A. Implement right-sizing. B. Increase CPU usage. C. Utilize spot instances. D. Add storage.
C. Utilize spot instances.
A company's current billing agreement is static. If the company were to migrate to an entirely IaaS-based setup. Which of the following billing concepts would the company be adopting? A. Enterprise agreement B. Perpetual C. Variable cost D. Fixed cost
C. Variable cost
You are configuring a CDN that will be used to serve media files to users. What should you configure to use the CDN most efficiently? A. Increased TTL B. Reduced TTL C. Wildcard path for media files D. Custom encryption keys
C. Wildcard path for media files
When designing a new cloud-enabled application, an organization that is considering RTO and RPO is MOST likely concerned about: A. redundancy. B. load balancing. C. disaster recovery. D. high availability.
C. disaster recovery.
A company is migrating a legacy application to the cloud. Two C-level executives are currently engaged in the initial stages of the migration, and they are planning a rip-and-replace approach. Before initiating the project, the FIRST step should be to identify: A. the required network performance. B. the key stakeholders. C. the desired CSP. D. the required cloud services. E. the required amount of storage.
C. the desired CSP. D. the required cloud services.
Your Microsoft Azure virtual machine has been deployed into an Azure VNet that uses default DNS settings. You are unable to connect to www.site.com from within the VM. What is the most likely problem? A. The VNet is configured with custom DNS servers. B. Outbound TCP port 22 traffic is blocked. C. www.site.com is down. D. Azure virtual machines do not support Internet name resolution.
C. www.site.com is down.
A company deploys a data management capability that reduces RPO. Which of the following BEST describes the capability needed? A. Locality B. Replication C. Portability D. Archiving
D. Archiving
A cloud administrator notices users call to report application performance degradation between 1:00 p.m. and 3:00 p.m. every day. Which of the following is theBEST option for the administrator to configure? A. Locality B. Block storage C. Right-sizing D. Auto-scaling
D. Auto-scaling
Your manager has asked you to review the storage SLA for a public cloud provider to determine the potential amount of annual downtime. Which of the following cloud characteristics is most closely related to this scenario? A. Broad network access B. Pay-as-you-go C. Scalability D. Availability
D. Availability
A company has a perpetual license for a database application. Which of the following is the MOST cost-effective option when moving to the cloud? A. Fixed B. Subscription C. EULA D. BYOL
D. BYOL
A business analyst is comparing used vs. allocated storage cost for each reserved instance on a financial expenditures report related to the cloud. The CSP is currently billing at the following rates for storage: ✑ $1.50 per GB of used space ✑ $0.75 per GB of allocated space The operating expenditures the analyst is reviewing are as follows: Given this scenario, which of the following servers is costing the firm the least, and which should have storage increased due to over 70% utilization? A. Least: File server Optimize: Application server B. Least: Application server Optimize: Mail server C. Least: Mail server Optimize: File server D. Least: Application server Optimize: File server
D. Least: Application server Optimize: File server
Which of the following is a benefit of microservice applications in a cloud environment? A. Microservices are dependent on external shared databases found on cloud solutions. B. Federation is a mandatory component for an optimized microservice deployment. C. The architecture of microservice applications allows the use of auto-scaling. D. Microservice applications use orchestration solutions to update components in each service.
D. Microservice applications use orchestration solutions to update components in each service.
You want to know the specific physical addresses of a CSP's data centers. What should you do? A. Run a DNS domain name lookup for the CSP domain suffix. B. Send an information request to the CSP. C. Review the CSP service level agreement. D. Nothing. CSPs do not voluntarily disclose data center physical addresses.
D. Nothing. CSPs do not voluntarily disclose data center physical addresses.
Which type of migration converts a physical server to a virtual machine? A. Virtual to Virtual (V2V) B. Virtual to Physical (V2P) C. Physical to Physical (P2P) D. Physical to Virtual (P2V)
D. Physical to Virtual (P2V)
Which of the following BEST describes a pay-as-you-go licensing model within a cloud service? A. Subscription agreement B. Perpetual agreement C. Enterprise agreement D. Promotional agreement
D. Promotional agreement
A requirement states that an application must be restored within six hours. Which of the following should be included in the SLA to satisfy this requirement? A. MTTR B. RPO C. ROI D. RTO
D. RTO
A business analysis team is reviewing a report to try to determine the costs for a cloud application. The report does not allow separating costs by application. Which of the following should the team use to BEST report on the costs of the specific cloud application? A. Right-sizing B. Content management C. Optimization D. Resource tagging
D. Resource tagging
A cloud risk assessment indicated possible outages in some regions. In response, the company enabled geo-redundancy for its cloud environment. Which of the following did the company adopt? A. Risk mitigation B. Risk acceptance C. Risk transference D. Risk avoidance
D. Risk avoidance
A contract that defines the quality and performance metrics that are agreeable to both parties is called an: A. SOP. B. SOA. C. SOW. D. SLA.
D. SLA.
A company wants to deploy an application in a public cloud. Which of the following service models gives the MOST responsibility to the provider? A. PaaS B. IaaS C. BPaaS D. SaaS
D. SaaS
A startup company wants to use a CRM application to manage its sales and support organizations. The company does not have any IT staff. Which of the following cloud computing models is MOST appropriate for this company to use? A. CaaS B. PaaS C. IaaS D. SaaS
D. SaaS
A company is discontinuing its use of a cloud provider. Which of the following should the provider do to ensure there is no sensitive data stored in the company's cloud? A. Replicate the data. B. Encrypt the data. C. Lock in the data. D. Sanitize the data.
D. Sanitize the data.
Which U.S. regulation is designed to mitigate financial document reporting fraud? A. HIPAA B. ISO/IEC 27017:2015 C. FedRAMP D. Sarbanes-Oxley Act
D. Sarbanes-Oxley Act
Which of the following documents has the sole purpose of outlining a professional services engagement that governs a proposed cloud migration? A. Gap analysis B. Statement of work C. Feasibility study D. Service level agreement
D. Service level agreement
A vendor stipulates it will provide incident response within two hours of a severity level A incident. Which of the following does this describe? A. Maintenance agreement B. Managed service agreement C. Operating level agreement D. Service level agreement
D. Service level agreement (SLA)
Which type of VPN links two networks together over the Internet? A. Point-to-site B. Branch-to-branch C. Client-to-site D. Site-to-site
D. Site-to-site
What must be configured within a cloud-based network to allow cloud resources to communicate on the network? A. Public IP address B. VPN C. Load balancer D. Subnet
D. Subnet
Which of the following explains why a cloud provider would establish and publish a format data sanitization policy for its clients? A. To establish guidelines for how the provider will cleanse any data being imported during a cloud migration B. To be transparent about how the CSP will handle malware infections that may impact systems housing client data C. To provide a value add for clients that will assist in cleansing records at no additional charge D. To ensure clients feel comfortable about the handling of any leftover data after termination of the contract
D. To ensure clients feel comfortable about the handling of any leftover data after termination of the contract
A company purchased insurance due to the risks involved with a cloud migration project. Which of the following risk response strategies is this an example of? A. Mitigation B. Avoidance C. Acceptance D. Transference
D. Transference
Which of the following BEST describes how a cloud provider helps a company with security risk responses? A. Acceptance B. Mitigation C. Avoidance D. Transference
D. Transference
Which risk is the most prevalent when adopting cloud computing? A. The use of deprecated encryption algorithms B. Cloud tenant centralized data storage C. Lack of cloud tenant isolation D. Trust placed in outsourcing
D. Trust placed in outsourcing
In a DevOps environment there is a requirement to start building application solutions in an efficient manner without any dependent components. Which of the following should a DevOps engineer do to meet these requirements? A. Build the applications in QA, and then enable resource tagging. B. Build the applications in QA, and then clone and deploy them in production. C. Use templates for building the applications. D. Use templates and enable auto-scaling.
D. Use templates and enable auto-scaling.
Which of the following strategies allows an organization to plan for cloud expenditures in a way that most closely aligns with the capital expenditure model? A. Simplifying contract requirements B. Implementing consolidated billing C. Considering a BYOL policy D. Using reserved cloud instances
D. Using reserved cloud instances
A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment. All users require the ability to modify personal working environments. Which of the following is the BEST solution? A. SSO B. VDI C. SSH D. VPN
D. VPN
You are evaluating CSPs because your organization has decided to adopt cloud computing for some of its IT service needs. What is the quickest way to determine which security standards the CSP is compliant with? A. Send an e-mail message to the CSP inquiring about compliance. B. Call the CSP to inquire about compliance. C. View government legislative bill details. D. View the CSP's compliance web page.
D. View the CSP's compliance web page.
Which of the following cloud resource deployments is an example of IaaS? A. Web e-mail B. Instant messaging C. Managed database D. Virtual machines
D. Virtual machines
Which type of security testing identifies weaknesses but does not attempt to exploit them? A. Penetration test B. Regression test C. Load test D. Vulnerability test
D. Vulnerability test
A business analyst is comparing utilization for a company's cloud servers on a financial expenditures report. The usage report is as follows: Which of the following instances represents the highest utilization? A. Mail server B. Application server C. File server D. Web server
D. Web server
Which of the following are aspects of cloud data availability? (Choose two.) A. Resource tagging B. Data sovereignty C. Locality D. Zones E. Geo-redundancy F. Auto-scaling
D. Zones E. Geo-redundancy
A document that outlines the scope of a project, specific deliverables, scheduling, and additional specific details from the client/buyer is called a: A. statement of work. B. standard operating procedure. C. master service document. D. service level agreement.
D. service level agreement.
A low-budget project with a flexible completion time can become financially feasible via the use of: A. right-sizing. B. resource tagging. C. reserved instances. D. spot instances.
D. spot instances.
A company is considering moving all of its VMs to reserved instances, which would save 20% on each instance. The instances the company would move are shown below: Which of the following is the amount the company would save annually be converting all of these VMs to reserved instances? A. $1110 B. $1600 C. $3840 D. $5550 E. $13320 F. $53280
E. $13320
Which of the following metrics defines how much data loss a company can tolerate? A. RTO B. TCO C. MTTR D. ROI E. RPO
E. RPO