Secure Remote Access and Personalized Environments | CompTIA Cloud Essentials+ Exam CLO-002

Enable Remote Access to Business Applications with Personalized Environments | CompTIA Cloud Essentials+ Exam CLO-002

Question

A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment.

All users require the ability to modify personal working environments.

Which of the following is the BEST solution?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

The best solution for the cloud administrator to enable remote access to business applications while ensuring that they are only installed on company-controlled equipment and allowing users to modify their personal working environments would be to use a Virtual Desktop Infrastructure (VDI).

VDI is a technology that enables users to access a desktop environment on a remote server or cloud instance. With VDI, the user's desktop environment is hosted on a server in the cloud or data center and accessed remotely using a client device such as a laptop, tablet, or smartphone. This allows users to access their desktop environment from any location and device, as long as they have an internet connection.

VDI ensures that business applications are only installed on company-controlled equipment because the desktop environment is hosted on a server in the cloud or data center, and the user is only accessing it remotely. This means that the applications are not installed on the user's device, but rather on the server in the cloud or data center. Therefore, the administrator has control over the applications and can ensure that they are only installed on company-controlled equipment.

Additionally, VDI allows users to modify their personal working environments, as they can customize their desktop environment by adding or removing applications, changing the layout, and adjusting settings to their preferences. The changes made by users are saved to their individual virtual machines and are not visible to other users.

In contrast, the other options are not suitable for this scenario. SSO (Single Sign-On) is a technology that enables users to access multiple applications with a single set of login credentials. While SSO can simplify the login process, it does not address the requirements for remote access, ensuring that applications are only installed on company-controlled equipment, and allowing users to modify their personal working environments.

SSH (Secure Shell) is a protocol used for secure remote access to a server or device. While SSH can provide secure access to the server or device, it does not address the requirements for remote access to business applications, ensuring that applications are only installed on company-controlled equipment, and allowing users to modify their personal working environments.

VPN (Virtual Private Network) is a technology used to establish a secure connection between a client device and a remote network. While VPN can provide secure remote access to the network, it does not address the requirements for ensuring that applications are only installed on company-controlled equipment and allowing users to modify their personal working environments.