Given this scenario, which of the following should the architect implement?

A cloud architect is tasked with isolating traffic between subnets in an IaaS platform. The networks should be able to statefully communicate with each other. Given this scenario, which of the following should the architect implement?A . Configure security groups.B . Configure HIPS policies.C . Configure IDS policies.D . Configure...

September 22, 2021 No Comments READ MORE +

Which of the following would be the MOST effective way to move all the data to the new cloud provider?

An entertainment company with a very large movie library is moving all of its production systems to an IaaS cloud. The current lease is expiring in the next month, and the company made a last-minute decision not to renew the lease. Which of the following would be the MOST effective...

September 22, 2021 No Comments READ MORE +

Which of the following BEST describes where the administrator would define this?

An administrator defines a backup as follows: ✑ One weekly full backup ✑ Daily incremental backup Which of the following BEST describes where the administrator would define this?A . Backup SLA documentB . Backup orchestration workflowC . Backup scheduleD . Provisioning scheduleView AnswerAnswer: C

September 22, 2021 No Comments READ MORE +

Which of the following would be the MOST likely reason the QA team did not catch the issue?

A company is required to ensure all access to its cloud instance for all users to utilize two-factor authentication. The QA team confirms all functional requirements successfully test. After deployment, all business users report the two-factor authentication is not enforced while accessing the instance. Which of the following would be...

September 22, 2021 No Comments READ MORE +

Which of the following should be deployed to secure the personal information?

A company is using storage-as-a-service from an IaaS provider for application services. The company has a mandate to protect personal information being stored on the cloud. The service provided includes encryption for in-transit data and requires a security solution for data-at-rest. Which of the following should be deployed to secure...

September 22, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause?

A cloud administrator has finished building a virtual server template in a public cloud environment. The administrator is now cloning six servers from that template. Each server is configured with one private IP address and one public IP address. After starting the server instances, the cloud administrator notices that two...

September 22, 2021 No Comments READ MORE +

An organization just went through a substantial audit, and the top findings were orphaned and inactive privileged accounts. Given the scenario, which of the following would be the BEST method for addressing these findings?

An organization just went through a substantial audit, and the top findings were orphaned and inactive privileged accounts. Given the scenario, which of the following would be the BEST method for addressing these findings?A . SSO with federation integrationB . ACLs and permissions verificationC . Multifactor authenticationD . Time-bound, just-in-time...

September 21, 2021 No Comments READ MORE +

Which of the following should the technician consider doing FIRST?

A company has hired a technician to build a cloud infrastructure for a massively parallel application. Which of the following should the technician consider doing FIRST?A . Add a GPU to the VMsB . Configure the VMs to scale up automaticallyC . Allocate maximum bandwidth to the VMsD . Select...

September 21, 2021 No Comments READ MORE +

Which of the following would BEST help to mitigate the risk?

An organization is replacing its internal human resources system with a SaaS-based application. The solution is multi-tenant, and the organization wants to ensure ubiquitous access while preventing password replay attacks. Which of the following would BEST help to mitigate the risk?A . Implement destination resources authentication.B . Require and implement...

September 21, 2021 No Comments READ MORE +

To minimize the effect to the existing system, which of the following schedules is MOST suitable for the load test?

A company uses its own private cloud, which has few available resources. Mission-critical systems and other information systems are running on it. A new system will be deployed on the private cloud. The following tests are included in the test plan: ✑ Load test (2h) ✑ Backup/restore test (6h) ✑...

September 21, 2021 No Comments READ MORE +