Common Traps on Which Command Should the Administrator Use Practice Questions
- ·Separate verification commands from configuration commands.
- ·Read whether the question asks to identify, verify, fix, permit or deny.
- ·Small command keywords often change the correct answer.
Sample Questions
Practice all 15 →A developer needs to launch a test server for a new application prototype. The developer logs into the AWS Management Console, selects an Amazon EC2 instance type, configures the security group, and starts the instance. The instance is running within two minutes, and the developer did not need to submit a formal request to the company's IT procurement team or wait for approval from a cloud administrator. Which essential characteristic of cloud computing does this scenario best demonstrate?
Explanation: This scenario illustrates the 'on-demand self-service' characteristic, one of the five essential attributes defined by NIST (National Institute of Standards and Technology) for cloud computing. On-demand self-service allows users to provision and manage computing resources (such as virtual machines, storage, or databases) automatically, without requiring human interaction with the service provider. AWS enables this through the Management Console, CLI, SDKs, and APIs, giving developers immediate access to resources when needed. The absence of manual approval or procurement delays is the key feature. The other options represent other core cloud characteristics: broad network access (access from various client devices), resource pooling (multi-tenancy and location independence), and rapid elasticity (automatic scaling based on demand).
A company's development team frequently needs temporary test environments. A developer can log into the AWS Management Console, select an Amazon EC2 instance type, configure storage, and launch the instance within minutes without any interaction with the IT infrastructure team. This capability is an example of which essential characteristic of cloud computing?
Explanation: On-demand self-service is one of the five essential characteristics defined by NIST. It allows users to provision computing resources (like EC2 instances, storage, databases) automatically, without requiring human interaction from the service provider. In this scenario, the developer directly provisions the test environment through the AWS Management Console without needing approval or assistance from the IT team, which directly demonstrates on-demand self-service. Resource pooling refers to multi-tenant sharing of resources. Measured service refers to metering usage for billing and optimization. Rapid elasticity refers to the ability to scale resources up or down quickly. While these are also essential characteristics, the scenario specifically highlights the lack of human interaction required to obtain resources.
A company has 200 IAM users. The security team needs to automatically verify that every IAM user has enabled multi-factor authentication (MFA) for console access. They also need to receive a notification whenever a new user is created without MFA so they can enforce the policy. Which AWS service should the security team use to meet these requirements?
Explanation: AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. It provides managed rules that can automatically check resource configurations against desired policies. The 'iam-user-mfa-enabled' managed rule checks whether IAM users have MFA enabled. AWS Config can also trigger Amazon Simple Notification Service (SNS) notifications when resources become non-compliant. This makes AWS Config the correct choice for continuously monitoring and alerting on MFA compliance. AWS CloudTrail records API activity but does not evaluate compliance against rules. Amazon GuardDuty is a threat detection service that monitors for malicious behavior, not configuration compliance. AWS Trusted Advisor provides best practice checks and recommendations, including MFA for the root account, but it does not provide automated continuous evaluation of all IAM users or event-driven notifications for new non-compliant users.
A company has a global user base that uploads images to an Amazon S3 bucket in the us-east-1 Region. Users report slow upload speeds and frequent timeouts when uploading large files from distant locations. The company wants to use the AWS global network and edge locations to accelerate uploads to the S3 bucket. The solution must require minimal infrastructure changes on the client side and must be configured at the bucket level. Which AWS feature should the company enable?
Explanation: Amazon S3 Transfer Acceleration (TA) is designed to speed up uploads to S3 by using AWS edge locations and optimized network paths. When enabled on a bucket, clients can upload to a distinct URL that routes traffic through edge locations over the AWS backbone network. This reduces latency and improves throughput for geographically dispersed users. Amazon CloudFront is for caching and delivering content, not for accelerating uploads. AWS Global Accelerator improves TCP/UDP traffic for applications like web servers but is not directly integrated with S3 bucket uploads. S3 cross-region replication is an asynchronous copy mechanism for durability or compliance, not for upload acceleration.
A company generates large log files from its application and stores them in an Amazon S3 bucket. During the first 30 days, logs are frequently accessed for troubleshooting. After 30 days, logs are accessed infrequently (a few times per month). After 90 days, logs are rarely accessed but must be retained for compliance for one year, with retrieval possible within minutes if needed. The company wants to minimize storage costs while meeting these access and retention requirements. Which S3 feature should the company configure?
Explanation: Amazon S3 Lifecycle policies allow you to define rules that automatically transition objects between storage classes based on the object's age. In this scenario, logs can be stored in S3 Standard for the first 30 days, then transitioned to S3 Standard-IA (Infrequent Access) for the next 60 days, and finally to S3 Glacier Instant Retrieval for the remaining retention period. This approach optimizes costs while ensuring objects are still retrievable within minutes when needed. S3 Object Lock (A) is used for write-once-read-many (WORM) compliance, not for cost optimization. S3 Transfer Acceleration (C) speeds up uploads over long distances. S3 Replication (D) copies objects across buckets, but does not automatically change storage classes over time.
+10 more scenario questions available
Practice all Which Command Should the Administrator Use Practice QuestionsRelated Topics
Frequently asked questions
How do "Which Command Should the Administrator Use Practice Questions" appear on the real CLF-C02?
Practise command-choice questions where the task is to identify the correct verification, configuration or troubleshooting command. These appear throughout the CLF-C02 and require you to apply your knowledge, not just recall facts.
How many scenario questions are on the CLF-C02 exam?
Cisco doesn't publish an exact breakdown, but scenario-based questions (especially exhibit and command-output formats) make up a significant portion of the CLF-C02. Practicing each scenario type ensures you're ready for any format.
Are these CLF-C02 scenario practice questions free?
Yes — all scenario practice on Courseiva is completely free. Sign up for a free account to track your progress and see which scenario types you've mastered.
Ready to practice this scenario type?
Launch a full Which Command Should the Administrator Use Practice Questions session with instant scoring and detailed explanations.
Start Scenario Practice →