Which of the following would be expected from a security consultant who has been hired to investigate a data breach of a private cloud instance?
- A. Incident report
- B. Application scan results
- C. Request for information
- D. Risk register
Free CLO-002 sample questions for the CompTIA Cloud Essentials+ exam. No account required: study at your own pace.
Want an interactive quiz? Take the full CLO-002 practice testLooking for more? Click here to get the full PDF with 94+ practice questions for $10 for offline study and deeper preparation.
Which of the following would be expected from a security consultant who has been hired to investigate a data breach of a private cloud instance?
A company wants to deploy an application in a public cloud. Which of the following service models gives the MOST responsibility to the provider?
A systems administrator is reviewing a disaster recovery option that requires little to no downtime in the event of a natural disaster. Which of the following BEST meets this requirement?
An architect recently discovered new opportunities the cloud can provide to the company. A business analyst is currently working with the architect to document the business use-case scenarios. Which of the following should be the architect's NEXT step?
Volume, variety, velocity, and veracity are the four characteristics of:
Which of the following is used to build and manage interconnections between cloud resources within the same cloud environment?
Which of the following are the appropriate responses to risks?
Which of the following should be considered to ensure the availability of data that is accessed across multiple sites? (Choose two.)
Which of the following allows for the management of network policies from a central portal while maintaining a hardware-agnostic approach?
A report identified that several of a company's SaaS applications are against corporate policy. Which of the following is the MOST likely reason for this issue?
Which of the following stores transactions in a distributed ledger of which all users have a copy?
Which of the following DevOps options is used to integrate with cloud solutions?
A company with critical resources in the cloud needs to ensure data is available in multiple datacenters around the world. Which of the following BEST meets the company's needs?
Which of the following is a benefit of microservice applications in a cloud environment?
A document that outlines the scope of a project, specific deliverables, scheduling, and additional specific details from the client/buyer is called a:
Which of the following would MOST likely trigger a compliance audit?
Which of the following BEST explains the concept of RTOs for restoring servers to operational use?
An incident response team requires documentation for an email phishing campaign against a company's email server. Which of the following is the BEST resource to use to start the investigation?
Which of the following cloud characteristics helps transform from a typical capital expenditure model to an operating expenditure model?
A software developer wants to ensure a packaged application can be deployed in different environments without modifying anything but the application settings. The developer creates an image and provides instructions for the systems administrator to use for deployment. This is an example of:
Download the complete CLO-002 study bundle with 94+ questions in a single printable PDF.