exam questions

Exam CLO-002 All Questions

View all questions & answers for the CLO-002 exam

Exam CLO-002 topic 1 question 2 discussion

Actual exam question from CompTIA's CLO-002
Question #: 2
Topic #: 1
[All CLO-002 Questions]

Which of the following services would restrict connectivity to cloud resources?

  • A. Security lists
  • B. Firewall
  • C. VPN
  • D. Intrusion detection system
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
TheAWSGuru
Highly Voted 3 years, 6 months ago
Answer is B - Firewall is the right answer
upvoted 10 times
...
LiviT
Most Recent 2 months, 4 weeks ago
Selected Answer: B
A firewall is a network security mechanism that oversees and regulates both incoming and outgoing network traffic according to established security protocols. It can be tailored to permit or deny certain types of traffic, thereby effectively managing access to cloud resources in accordance with the guidelines established by network administrators.
upvoted 1 times
...
SophyQueenCR82
8 months, 2 weeks ago
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It can be configured to allow or block specific types of traffic, effectively restricting connectivity to cloud resources based on the rules set by the administrators.
upvoted 1 times
...
SophyQueenCR82
8 months, 2 weeks ago
B FIREWALL
upvoted 1 times
...
SecurityGuy
1 year, 7 months ago
Selected Answer: B
"A security list is a virtual firewall used to control traffic at the packet level." This is technically a firewall technology in general. I'd go with Firewall.
upvoted 3 times
...
studyingveryhard
1 year, 9 months ago
Explanation of Correct Answer The correct answer is Firewall. Firewalls are designed to restrict connectivity to cloud resources by filtering incoming and outgoing traffic based on security rules. These rules can be customized to only allow traffic from specific IP addresses, ports, or protocols, effectively limiting access to the resources behind the firewall. By properly configuring a firewall, you can secure your cloud resources from unauthorized access. Source: https://examlab.co/comptia/cloud-essentials-clo-002
upvoted 3 times
...
atlasgooner
2 years, 1 month ago
Selected Answer: A
A should be the answer. Most public clouds will have some implementations of this. Azure has Network Security Groups and Application Security Groups. AWS has Network Access Control Lists and Security Groups.
upvoted 2 times
...
raja3l49
2 years, 2 months ago
Answer is B
upvoted 1 times
...
KingDrew
2 years, 3 months ago
Firewall - B
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago