CompTIA CLO-001 Dumps and Practice Tests
CompTIA Cloud Essentials Exam: CLO-001 Exam
- CLO-001 Questions & Answers
- Exam Code: CLO-001
- Exam Name: CompTIA Cloud Essentials Exam
- Updated: March 10, 2012
- Q & A: 99 Q&As
QUESTION NO: 1
Digital identities for logging onto SaaS solutions should be issued by all the following EXCEPT:
A. A third-party identity provider.
B. The customer organization.
C. The SaaS provider.
D. A user.
Answer: D
QUESTION NO: 2
Why is it important to consider the cloud ecosystem when developing applications?
A. Cloud providers will do application development.
B. The development process needs to change.
C. The role of the IT department will change.
D. This can speed up the development process.
Answer: D
QUESTION NO: 3
Which of the following actions should a company take if a cloud computing provider ceases to uphold their contract?
A. Consult the company's exit plan.
B. Move the company data to the backup provider that was selected earlier.
C. Re-host all critical applications on the company's internal servers.
D. Evaluate the company's strategic options for an alternative provider
Answer: A
QUESTION NO: 4
Which of the following consequences does IT outsourcing and cloud computing have in common?
A. Involvement of external staff
B. Improved flexibility
C. Reduced expense
D. Shorter time to market
Answer: A
QUESTION NO: 5
Which of the following is an important new skill for an IT organization to develop in the context of cloud computing?
A. Provisioning services
B. Incident management
C. Technology upgrade monitoring
D. Security and risk management
Answer: A
QUESTION NO: 6
Which of the following is the function of orchestration services?
A. Assemble functional requirements for application development
B. Configure application clusters with Web services
C. Enable and disable load balancers
D. Manage the starting and stopping of application server clusters
Answer: D
QUESTION NO: 7
Which of the following is a reason for business users lo be interested in cloud computing?
A. Desire for vendor lock-in reduction
B. Desire for improved security
C. Desire for improved user experience
D. Desire for reducing compliance issues
Answer: C
QUESTION NO: 8
Which of the following is important to standardize?
A. Information standards and applications
B. User names and hardware providers
C. Virtual machine images and applications
D. Virtual machine images and identity information standards
Answer: D
QUESTION NO: 9
Cloud computing _____________capital cost to variable cost.
A. increases
B. reduces
C. shifts
D. equates
Answer: C
QUESTION NO: 10
Privacy is the right of________ to selectively disclose information about _________ and restrict the further use of that information by any party.
A. companies, others
B. companies, themselves
C. individuals, others
D. individuals, themselves
Answer: D
QUESTION NO: 11
Which of the following IT processes is likely to become more important due to the adoption of cloud computing?
A. Capacity management
B. Troubleshooting management
C. Project management
D. Request fulfillment management
Answer: A
QUESTION NO: 12
Which of the following is the primary way to access PaaS?
A. Web services
B. Websites
C. Web hosting providers
D. Data integrations
Answer: A
QUESTION NO: 13
How can an organization successfully implement a SaaS strategy?
A. Manage the risks associated with bringing in external providers
B. Continuously execute performance analytics to monitor providers
C. Open up internal databases with Web service access for easier access
D. Standardize on a limited set of virtual machines to increase security
Answer: A
QUESTION NO: 14
Which of the following is the MOST important service management consequence of elastic
capacity?
A. The need for better application development
B. The need for better security management
C. The need for good performance monitoring and management
D. The need to improve the fulfillment and provisioning process
Answer: C
QUESTION NO: 15
Which of the following is a typical concern for business and IT leaders when adopting cloud
computing?
A. Current cost structure of IT
B. Quality of web-based user interfaces
C. Security of current IT solutions
D. Technical maintenance of current IT assets
Answer: C
QUESTION NO: 16
Which of the following does IT outsourcing and cloud computing typically have in common?
A. Pay as you go agreements
B. Short-term financial commitment
C. Tailor-made applications based on client needs
D. Vendor lock-in potential
Answer: D
QUESTION NO: 17
Which of the following does the server virtualization layer do?
A. It allows the underling physical server hardware to be shared
B. It allows the virtual machines to be dependent on each other
C. It allows the virtual machines to be load balanced
D. It prohibits the use of virtual machines by unauthorized users
Answer: A
QUESTION NO: 18
Which of the following are essential steps to take when creating a virtual server?
A. Select a machine image to run, select an application set to run, select security credentials.
B. Select a machine image to run, select an application set to run, select the size of the virtual machine.
C. Select a machine image to run, select security credentials, select the size of the virtual
machine.
D. Select an application set to run, select security credentials, select the size of the virtual
machine.
Answer: C
QUESTION NO: 19
Which of the following technologies are related to Web services?
A. HTML, IDM, JSON
B. HTML, IDM, XML
C. HTML, JSON, XML
D. DM, JSON, XML
Answer: C
QUESTION NO: 20
Web hosting is a service that enables customers to deploy a website quickly. This is an example of:
A. IaaS.
B. SaaS
C. PaaS.
D. On-demand software.
E. None of the above.
Answer: C
QUESTION NO: 21
Which of the following describes the amount of data that can be sent across a link in a given time?
A. Network bandwidth
B. Network QoS
C. Network latency
D. Network speed
Answer: A
QUESTION NO: 22
How can the internal IT department successfully react to cloud computing?
A. By becoming an external cloud provider
B. By becoming an internal cloud provider
C. By outsourcing all IT services
D. By solely focusing on security issues
Answer: B
QUESTION NO: 23
Which of the following is a business reason for IT outsourcing and cloud computing?
A. Improving cost structure
B. Improving customer satisfaction
C. Increasing control over IT systems
D. Decrease of security issues
Answer: A
QUESTION NO: 24
Which of the following applications is MOST suitable for a cloud computing pilot?
A. Applications that are currently expensive to maintain because of interconnections
B. Applications that are easy to migrate and have some business value
C. Applications with high risk and little business value
D. Legacy applications that are coupled to specific hardware and systems software
Answer: B
QUESTION NO: 25
Which of the following is an important skill for an organization wanting to adopt an IaaS strategy?
A. Visualization technology
B. Application service procurement
C. Customer relations
D. Security and risk management
Answer: A
QUESTION NO: 26
Which of the following is an example of a cloud-related security risk?
A. Losing network connectivity
B. Not having enough software licenses
C. Not knowing what the cloud provider will charge
D. Storing customer data at a provider
Answer: D
QUESTION NO: 27
Why do management tools introduce a risk?
A. The management tools present a vendor lock-in
B. The management tools are indispensible above a specific scale of operation
C. The migration may not be successful
D. Too many software licenses are needed
Answer: A
QUESTION NO: 28
How do demand management processes change with the introduction of SaaS?
A. New vendors have to be accommodated
B. Users can procure SaaS solutions themselves
C. The number of virtual machines can fluctuate with demand
D. Maintenance will become easier
Answer: B
QUESTION NO: 29
Why does hardware and operating system maintenance take less effort with SaaS?
A. Maintenance becomes irrelevant
B. Cloud provider takes care of it
C. Hardware vendor takes care of it
D. Operating system vendor takes care of it
Answer: B
QUESTION NO: 30
Which of the following is a unique characteristic of virtualization?
A. Security features
B. Federated identities
C. Shared hardware
D. Sourcing challenges
Answer: C