CompTIA Cloud Essentials v1.0 (CLO-001)

Page:    1 / 19   
Total 275 questions

How does cloud computing influence service operations?

  • A. Cloud computing is more cost effective
  • B. The provisioning of servers and services is quicker or ceases to be an issue
  • C. The provisioning of servers and services can be much slower
  • D. The security level will increase


Answer : B

Cloud computing brings new challenges to ___________ management, because traditional licensing models do not fit well with scalable resources.

  • A. commercial
  • B. financial
  • C. legal
  • D. service


Answer : B

Which of the following is indicated by a high number of variations of different virtual servers?

  • A. Lack of an automated provisioning process of the virtual machines
  • B. Lack of automation of virtual machine image manufacturing
  • C. Lack of manpower to monitor the virtual machines
  • D. Lack of physical servers to accommodate the different virtual servers


Answer : B

Cloud computing is priced according to ___________ or has ___________, rather than having upfront costs.

  • A. recurring subscription, a yearly contract
  • B. a yearly contract, usage-based charges
  • C. recurring subscription, usage-based charges
  • D. number of users, a yearly contract


Answer : C

Which change in the security processes is introduced by cloud computing?

  • A. Increased security of accessing credit card information
  • B. Regulations need to be updated more frequently
  • C. Storing passwords in the Configuration Management Database (CMDB)
  • D. Working with multiple providers of user identities


Answer : D

Who is responsible for granting access to a user in federated identity management?

  • A. Identity provider
  • B. Relying party
  • C. SaaS provider
  • D. User


Answer : B

Which of the following is a definition of virtualization?

  • A. Virtualization is a method to organize servers in a more efficient manner to double the number of accessible users
  • B. Virtualization is a set of techniques for hiding software resources behind hardware abstractions.
  • C. Virtualization is a set of techniques for hiding hardware resources behind software abstractions.
  • D. Virtualization is a method to structure data in a more efficient manner with less cost to the user.


Answer : C

Which of the following confidentiality risks is introduced by cloud computing?

  • A. Company information can be transmitted electronically
  • B. Digitizing information makes it easier to copy
  • C. Government regulations require data to be disclosed
  • D. Having files stored on the servers of a cloud provider


Answer : D

Which of the following processes needs to be changed to better handle Change Management in the cloud?

  • A. Financial chargeback
  • B. Security management
  • C. Hardware maintenance
  • D. Software distribution


Answer : D

In which of the following ways do IT outsourcing and cloud computing differ?

  • A. Cloud computing services are typically much more scalable.
  • B. Cloud computing is much cheaper.
  • C. Hardware and software assets are typically customizable.
  • D. IT outsourcing promotes innovation.


Answer : A

How can an organization successfully implement an IaaS strategy?

  • A. Standardize on a limited set of virtual machines
  • B. Continuously execute performance analytics
  • C. Open up internal databases with Web service access
  • D. Take inventory of the application portfolio and select external suppliers


Answer : A

Which of the following are strategic exit options?

  • A. Change the system applications
  • B. Change the cloud provider
  • C. Re-host in-house
  • D. All of the above


Answer : C

All of the following are important design decisions when deploying SaaS EXCEPT:

  • A. How existing company data is integrated in or migrated to the application.
  • B. How the application will be integrated with other applications.
  • C. The number of users that will access the application simultaneously
  • D. Where or by whom will digital identities be issued for logging on to the application.


Answer : C

Which of the following application types is suitable for a cloud computing pilot?

  • A. Desktop productivity applications
  • B. Marginal applications
  • C. Mission-critical applications
  • D. Legacy applications


Answer : A

A military facility is NOT able to fully embrace cloud computing because of which of the following?

  • A. High degree of confidentiality and operational assurance
  • B. The associates cost and infrastructure needs
  • C. Constantly changing and unpredictable workloads
  • D. Constantly changing data and accessibility needs


Answer : A

Page:    1 / 19   
Total 275 questions