An organization has experienced repeated occurrences of system configurations becoming incorrect over time. After implementing corrections on all system configurations across the enterprise, the Chief Information Security Officer (CISO) purchased an automated tool that will monitor system configurations and identify any deviations. In the future, whic' if th following should be used to identify incorrectly configured systems?
A. Baseline
B. Gap analysis
C. Benchmark
D. Current and future requirements
A business analysis team is reviewing a report to try to determine the costs for a cloud application. The report does not allow separating costs by application.
Which of the following should the team use to BEST report on the costs of the specific cloud application?
A. Right-sizing
B. Content management
C. Optimization
D. Resource tagging
An architect recently discovered new opportunities the cloud can provide to the company. A business analyst is currently working with the architect to document the business use-case scenarios. Which of the following should be the architect's NEXT step?
A. Initialize a PoC.
B. Conduct a feasibility study.
C. Perform a gap analysis.
D. Gather cloud requirements.
Which of the following policies dictates when to grant certain read/write permissions?
A. Access control
B. Communications
C. Department-specific
D. Security
For security reasons, a cloud service that can be accessed from anywhere would make BEST use of:
A. replication.
B. multifactor authentication.
C. single sign-on.
D. data locality
An incident response team requires documentation for an email phishing campaign against a company's email server. Which of the following is the BEST resource to use to start the investigation?
A. Audit and system logs
B. Change management procedures
C. Departmental policies
D. Standard operating procedures
Which of the following is MOST likely to use a CDN?
A. Realty listing website
B. Video streaming service
C. Email service provider
D. Document management system
Which of the following is a limitation of the SaaS cloud model?
A. Users cannot choose the global location where their data will be stored
B. It does not support integration with pre-existing identity engines.
C. It does not scale to allow additional users.
D. Users do not have full control over the software version and roadmap of the cloud solution.
Which of the following aspects of cloud design enables a customer to continue doing business after a major data center incident?
A. Replication
B. Disaster recovery
C. Scalability
D. Autoscaling
Before conducting a cloud migration, a compliance team requires confirmation that sensitive data will remain close to their users. Which of the following will meet this requirement during the cloud design phase?
A. Data locality
B. Data classification
C. Data certification
D. Data validation
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CLO-002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.