CompTIA Cloud Essentials Cert Exam Prep CL0-002 Set 3

Web hosting is a service that enables customers to deploy a website quickly. This is an example of:


Options are :

  • None of the above
  • IaaS
  • SaaS
  • PaaS (Correct)
  • On-demand software.

Answer : PaaS

Synchronization of updates is ___________ than replicating data across locations because it gives better assurance that data is always ___________ everywhere


Options are :

  • Better, secure
  • better, up to date (Correct)
  • Worse, up to date
  • worse, secure

Answer : better, up to date

Amazon Elastic Cloud Computing (EC2) is a facility for quickly providing virtual servers. This is an example of:


Options are :

  • IAAS (Correct)
  • QoS
  • PAAS
  • SAAS

Answer : IAAS

Which of the following is the function of orchestration services?


Options are :

  • Enable and disable load balancers
  • Manage the starting and stopping of application server clusters (Correct)
  • Assemble functional requirements for application development
  • Configure application clusters with Web services

Answer : Manage the starting and stopping of application server clusters

Which of the following is important to standardize?


Options are :

  • Virtual machine images and identity information standards (Correct)
  • Virtual machine images and applications
  • User names and hardware providers
  • Information standards and applications

Answer : Virtual machine images and identity information standards

Which of the following applications is MOST suitable for a cloud computing pilot?


Options are :

  • Applications that are easy to migrate and have some business value
  • Applications with high risk and little business value
  • Legacy applications that are coupled to specific hardware and systems software
  • Applications that are currently expensive to maintain because of interconnections (Correct)

Answer : Applications that are currently expensive to maintain because of interconnections

Which of the following is the MOST complex security provisioning problem in a cloud environment?


Options are :

  • Managing users and their rights across multiple providers (Correct)
  • Software assets that are introduced and can expire
  • Handling credit cards for purchasing cloud services
  • Keeping track of cloud provider performance

Answer : Managing users and their rights across multiple providers

Which of the following is a limitation of owning servers?


Options are :

  • Inability to deploy new services quickly
  • Additional resources must be hired to maintain each server
  • Capital tied up in hardware that might become obsolete (Correct)
  • Inability to rapidly change to a different technology

Answer : Capital tied up in hardware that might become obsolete

Private clouds are operated solely for _______________ organization(s)


Options are :

  • Governmental
  • For-profit
  • Multiple
  • Specific (Correct)

Answer : Specific

How can cloud-related financial risks be managed?


Options are :

  • Renegotiating license agreements
  • Making sure that cloud assets are generating revenue (Correct)
  • Credit cards must be used for handling transactions
  • Eliminating legacy IT systems

Answer : Making sure that cloud assets are generating revenue

Which of the following IT processes is likely to become more important due to the adoption of cloud computing?


Options are :

  • Capacity Management (Correct)
  • Project management
  • Request fulfillment management
  • Troubleshooting management

Answer : Capacity Management

Why is it important to consider the cloud ecosystem when developing applications?


Options are :

  • This can speed up the development process. (Correct)
  • The development process needs to change.
  • Cloud providers will do application development.
  • The role of the IT department will change.

Answer : This can speed up the development process.

How can the internal IT department successfully react to cloud computing?


Options are :

  • By outsourcing all IT services
  • By solely focusing on security issues
  • By becoming an internal cloud provider (Correct)
  • By becoming an external cloud provider

Answer : By becoming an internal cloud provider

Which of the following does IT outsourcing and cloud computing typically have in common?


Options are :

  • Pay as you go agreements
  • Short-term financial commitment
  • Vendor lock-in potential (Correct)
  • Tailor-made applications based on client needs

Answer : Vendor lock-in potential

Which of the following are essential steps to take when creating a virtual server?


Options are :

  • Select an application set to run, select security credentials, select the size of the virtual machine.
  • Select a machine image to run, select security credentials, select the size of the virtual machine. (Correct)
  • Select a machine image to run, select an application set to run, select security credentials.
  • Select a machine image to run, select an application set to run, select the size of the virtual machine.

Answer : Select a machine image to run, select security credentials, select the size of the virtual machine.

Which of the following is a business reason for adapting IT outsourcing and cloud computing?


Options are :

  • Increasing control over IT systems
  • Improving cost structure (Correct)
  • Improving customer satisfaction
  • Decrease of security issues

Answer : Improving cost structure

Which of the following risk results if cloud computing providers limit their Service Level Agreement (SLA) liabilities?


Options are :

  • Privacy risk
  • Security risk
  • Compliance risk
  • Legal risk (Correct)

Answer : Legal risk

Which of the following roles can the IT department play in the selection process of cloud computing providers?


Options are :

  • Help understand provider quality
  • All of the above are correct (Correct)
  • Help understand performance parameters
  • Help understand and explain the application lifecycle

Answer : All of the above are correct

Which of the following is a typical concern for business and IT leaders when adopting cloud computing?


Options are :

  • Current cost structure of IT
  • Quality of web-based user interfaces
  • Security of current IT solutions (Correct)
  • Technical maintenance of current IT assets

Answer : Security of current IT solutions

Which of the following is a reason for business users to be interested in cloud computing?


Options are :

  • Desire for reducing compliance issues
  • Desire for improved security
  • Desire for improved user experience (Correct)
  • Desire for vendor lock-in reduction

Answer : Desire for improved user experience

Digital identities for logging onto SaaS solutions should be issued by all the following EXCEPT:


Options are :

  • A user. (Correct)
  • A third-party identity provider.
  • The SaaS provider.
  • The customer organization.

Answer : A user.

Why are traditional charge back systems not compatible with cloud computing?


Options are :

  • Resources that are used can fluctuate throughout the budget cycle (Correct)
  • Cloud computing is low cost and does not accommodate charge back fees
  • Licensing models can become outdated quickly
  • Cloud computing can be more expensive than in-house capacity

Answer : Resources that are used can fluctuate throughout the budget cycle

Which of the following is a private SaaS?


Options are :

  • An application for internal use only, on public cloud-based systems.
  • An application for external use only, on company-owned assets.
  • An application for external use only, on public cloud-based systems.
  • An application for internal use only, on company-owned assets. (Correct)

Answer : An application for internal use only, on company-owned assets.

Which of the following is an example of a cloud-related security risk?


Options are :

  • Not knowing what the cloud provider will charge
  • Losing network connectivity
  • Storing customer data at a provider (Correct)
  • Not having enough software licenses

Answer : Storing customer data at a provider

Which of the following is a unique characteristic of virtualization?


Options are :

  • Federated identities
  • Shared hardware (Correct)
  • Sourcing challenges
  • Security features

Answer : Shared hardware

Which of the following does the server virtualization layer do?


Options are :

  • It prohibits the use of virtual machines by unauthorized users
  • It allows the virtual machines to be load balanced
  • It allows the underling physical server hardware to be shared (Correct)
  • It allows the virtual machines to be dependent on each other

Answer : It allows the underling physical server hardware to be shared

How can an organization successfully implement a SaaS strategy?


Options are :

  • Continuously execute performance analytics to monitor providers
  • Open up internal databases with Web service access for easier access
  • Manage the risks associated with bringing in external providers (Correct)
  • Standardize on a limited set of virtual machines to increase security

Answer : Manage the risks associated with bringing in external providers

Why does hardware and operating system maintenance take less effort with SaaS?


Options are :

  • Operating system vendor takes care of it
  • Maintenance becomes irrelevant
  • Cloud provider takes care of it (Correct)
  • Hardware vendor takes care of it

Answer : Cloud provider takes care of it

Which of the following technologies are related to Web services?


Options are :

  • HTML, IDM, JSON
  • DM, JSON, XML
  • HTML, IDM, XML
  • HTML, JSON, XML (Correct)

Answer : HTML, JSON, XML

Why do business users prefer to deal with cloud providers directly, instead of via the IT department?


Options are :

  • The IT department does not accommodate variable costs (Correct)
  • They can better measure the provider's quality
  • They can use their own payment options
  • It reduces financial risks to the business

Answer : The IT department does not accommodate variable costs

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions