CompTIA Cloud Essentials Cert Exam Prep CL0-002 Set 4

Which of the following is the risk when an IT department restricts itself to solely being an infrastructure provider?


Options are :

  • All of the above are correct
  • Cloud providers will take over the role of the IT department
  • Business users will bypass the IT department (Correct)
  • Service providers will bypass the IT department

Answer : Business users will bypass the IT department

A military facility is NOT able to fully embrace cloud computing because of which of the following?


Options are :

  • The associates cost and infrastructure needs
  • High degree of confidentiality and operational assurance (Correct)
  • Constantly changing data and accessibility needs
  • Constantly changing and unpredictable workloads

Answer : High degree of confidentiality and operational assurance

Which of the following risks occurs when a cloud provider stops serving the company?


Options are :

  • Confidentiality risk
  • Continuity risk (Correct)
  • Financial risk
  • Legal risk

Answer : Continuity risk

Which of the following is a characteristic of cloud computing?


Options are :

  • 3. Cloud computing is cheaper compared to virtualization
  • 4. Cloud computing typically uses XML or JSON technologies
  • 1. Cloud computing is typically based on open Internet technology (Correct)
  • 2. Cloud computing is typically based on web technology

Answer : 1. Cloud computing is typically based on open Internet technology

How can an organization successfully implement an IaaS strategy?


Options are :

  • Continuously execute performance analytics
  • Take inventory of the application portfolio and select external suppliers
  • Standardize on a limited set of virtual machines (Correct)
  • Open up internal databases with Web service access

Answer : Standardize on a limited set of virtual machines

A specific cloud deployment has been established specifically for financial services companies to consume. Which of the following BEST describes this type of cloud environment?


Options are :

  • Private cloud
  • Hybrid cloud
  • Community cloud (Correct)
  • Public cloud

Answer : Community cloud

Which IT process is likely to take more effort with cloud computing?


Options are :

  • Hardware maintenance
  • Server maintenance
  • Performance monitoring (Correct)
  • Installing operating system patches

Answer : Performance monitoring

Who is responsible for granting access to a user in federated identity management?


Options are :

  • Identity provider
  • Relying party (Correct)
  • User
  • SaaS provider

Answer : Relying party

How does cloud computing influence service operations?


Options are :

  • The provisioning of servers and services is quicker or ceases to be an issue (Correct)
  • The security level will increase
  • Cloud computing is more cost effective
  • The provisioning of servers and services can be much slower

Answer : The provisioning of servers and services is quicker or ceases to be an issue

In order for an organization to have a successful cloud implementation, which of the following must be true?


Options are :

  • The organization must have an in-house IT department
  • The organization must perform and successfully complete a cloud readiness assessment. (Correct)
  • The organization must have used virtualization technology in the past.
  • The organization must have an unlimited budget for allocation of cloud resources

Answer : The organization must perform and successfully complete a cloud readiness assessment.

Which of the following is an essential step in the start-up process of a virtual server?


Options are :

  • Identify the location of the physical machine
  • Select the application set that will run on it
  • Select identity providers
  • Select security credentials (Correct)

Answer : Select security credentials

Which of the following is the MOST important impact of cloud computing on managing service levels?


Options are :

  • Providers measure their own performance
  • External providers can deny a capacity increase when required.
  • Capacity can be more elastic. (Correct)
  • Scarcity of resources can occur if not monitored

Answer : Capacity can be more elastic.

Which of the following business benefits do cloud computing and IT outsourcing have in common?


Options are :

  • Flexible contracts
  • Clarity and budgeting ease of upfront costs
  • Reduction of capital expenditures (Correct)
  • Improvement of employee skills sets

Answer : Reduction of capital expenditures

Which of the following processes needs to be changed to better handle Change Management in the cloud?


Options are :

  • Security management
  • Software distribution (Correct)
  • Hardware maintenance
  • Financial charge back

Answer : Software distribution

Which of the following can cause user response times to deteriorate?


Options are :

  • 1. High CPU usage and low network bandwidth
  • 2. High network latency and high volume of data stored (Correct)
  • 3. Low network bandwidth and high network latency
  • 4. Low network bandwidth and high volume of data stored

Answer : 2. High network latency and high volume of data stored

All of the following are important design decisions when deploying SaaS EXCEPT:


Options are :

  • Where or by whom will digital identities be issued for logging on to the application.
  • How the application will be integrated with other applications.
  • How existing company data is integrated in or migrated to the application.
  • The number of users that will access the application simultaneously (Correct)

Answer : The number of users that will access the application simultaneously

The business benefits of mobile computing are enhanced MOST by which of the following cloud service characteristics?


Options are :

  • Hardware independence
  • Security
  • Time to market
  • Distribution over the Internet (Correct)

Answer : Distribution over the Internet

Which of the following is the BEST example of maintaining 'strategic flexibility'?


Options are :

  • Cloud providers need to provide countermeasures to any consequences of not maintaining flexibility of services in a strategic manner
  • Cloud provisioning models have a risk of not maintaining flexibility once services have been migrated.
  • When choosing services to migrate into the cloud, there should be a focus on ensuring that future migration between different cloud providers can be facilitated. (Correct)
  • When choosing services to migrate into the cloud, it should be ensured that the cloud provider can change underlying hardware platforms in case the customer needs change.

Answer : When choosing services to migrate into the cloud, there should be a focus on ensuring that future migration between different cloud providers can be facilitated.

Which of the following is a relevant component of the cloud ecosystem?


Options are :

  • Hypervisors
  • Trained IT Staff
  • Security procedures
  • Image factory (Correct)

Answer : Image factory

Which of the following early examples of cloud computing was used for software engineering purposes in the form of web-based applications and required inter-operability between different systems?


Options are :

  • Virtual Private Networks (VPNs)
  • Desktop Virtualization
  • Service-Oriented Architecture (SOA) (Correct)
  • Distributed Computing

Answer : Service-Oriented Architecture (SOA)

Which of the following refers to providing a combination of servers, networking components, hosting, provisioning, and basic services needed to run a cloud?


Options are :

  • IaaS (Correct)
  • PaaS
  • SaaS
  • CaaS

Answer : IaaS

Cloud computing brings new challenges to ___________ management, because traditional licensing models do not fit well with scalable resources.


Options are :

  • service
  • financial (Correct)
  • commercial
  • legal

Answer : financial

Which of the following is a definition of virtualization?


Options are :

  • Virtualization is a method to organize servers in a more efficient manner to double the number of accessible users
  • Virtualization is a set of techniques for hiding software resources behind hardware abstractions.
  • Virtualization is a set of techniques for hiding hardware resources behind software abstractions. (Correct)
  • Virtualization is a method to structure data in a more efficient manner with less cost to the user.

Answer : Virtualization is a set of techniques for hiding hardware resources behind software abstractions.

Which of the following application types is suitable for a cloud computing pilot?


Options are :

  • Marginal applications
  • Desktop productivity applications (Correct)
  • Legacy applications
  • Mission-critical applications

Answer : Desktop productivity applications

Which change in the security processes is introduced by cloud computing?


Options are :

  • Working with multiple providers of user identities (Correct)
  • Increased security of accessing credit card information
  • Storing passwords in the Configuration Management Database (CMDB)
  • Regulations need to be updated more frequently

Answer : Working with multiple providers of user identities

Which of the following assets have risks related to a cloud provider going out of business?


Options are :

  • Investment in servers at the provider
  • Machine capacity at the provider
  • Cloud management tools housed at the provider
  • Data stored at the provider (Correct)

Answer : Data stored at the provider

Which of the following is the difference between cloud computing and IT outsourcing?


Options are :

  • Only IT outsourcing works with external staff.
  • The service levels of cloud computing are much better.
  • IT outsourcing is not based on open standards
  • Contracts with cloud providers can be changed much quicker (Correct)

Answer : Contracts with cloud providers can be changed much quicker

A company is adopting a public SAAS cloud based computing system to migrate a mission critical application. Which of the following capabilities will be MOST likely lost?


Options are :

  • Aversion of the software that will be accessed in the cloud.
  • The ability to access the application from the internal company network.
  • Centralized management of user access to the application.
  • The ability to perform fine grained customization to the software. (Correct)

Answer : The ability to perform fine grained customization to the software.

Which of the following cloud computing risks is compliance related?


Options are :

  • Provider reputation
  • Capacity management that is handled by a cloud provider
  • Access rights that are handled by a cloud provider (Correct)
  • Cross-charging policies that are handled by both clients

Answer : Access rights that are handled by a cloud provider

Why can cloud computing be a challenge in relation to compliance risks (e.g. compliance with the Sarbanes-Oxley Act)?


Options are :

  • It makes it harder to know where a company's important assets are (Correct)
  • It is harder to limit the provider's liability in the contract.
  • Industry regulations change more frequently to ensure compliance.
  • It makes it harder to know where a company s physical assets are.

Answer : It makes it harder to know where a company's important assets are

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions