Which of the following access control rules should be changed?
A cloud administrator is reviewing the authentication and authorization mechanism implemented within the cloud environment. Upon review, the administrator discovers the sales group is part of the finance group, and the sales team members can access the financial application. Single sign-on is also implemented, which makes access much easier. Which...
Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?
A piece of software applies licensing fees on a socket-based model. Which of the following is the MOST important consideration when attempting to calculate the licensing costs for this software?A . The amount of memory in the serverB . The number of CPUs in the serverC . The type of...
Which of the following approaches would BEST meet these requirements?
A DevOps administrator is designing a new machine-learning platform. The application needs to be portable between public and private clouds and should be kept as small as possible. Which of the following approaches would BEST meet these requirements?A . Virtual machinesB . Software as a serviceC . Serverless computingD ....
Which of the following cloud service subscription types would BEST meet these requirements?
A company has an in-house-developed application. The administrator wants to utilize cloud services for additional peak usage workloads. The application has a very unique stack of dependencies. Which of the following cloud service subscription types would BEST meet these requirements?A . PaaSB . SaaSC . DBaaSD . IaaSView AnswerAnswer: D...
Which of the following should the cloud administrator evaluate to troubleshoot the performance of the job?
A database analyst reports it takes two hours to perform a scheduled job after onboarding 10,000 new users to the system. The analyst made no changes to the scheduled job before or after onboarding the users. The database is hosted in an IaaS instance on a cloud provider. Which of...
Which of the following BEST describes this attack?
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company. Which of...
Which of the following should the administrator check NEXT?
A systems administrator has received an email from the virtualized environment's alarms indicating the memory was reaching full utilization. When logging in, the administrator notices that one out of a five-host cluster has a utilization of 500GB out of 512GB of RAM. The baseline utilization has been 300GB for that...
Which of the following should the administrator configure to mitigate the attack?
A systems administrator is responding to an outage in a cloud environment that was caused by a network-based flooding attack. Which of the following should the administrator configure to mitigate the attack?A . NIPSB . Network overlay using GENEVEC . DDoS protectionD . DoHView AnswerAnswer: C Explanation: DDoS protection is...
Which of the following must be considered before the migration?
An organization is hosting its dedicated email infrastructure with unlimited mailbox creation capability. The management team would like to migrate to a SaaS-based solution. Which of the following must be considered before the migration?A . The SaaS provider's licensing modelB . The SaaS provider's reputationC . The number of servers...
Considering all VMs were built from the same templates, which of the following actions should the administrator perform FIRST to speed up the response of the e-commerce platform?
After announcing a big sales promotion, an e-commerce company starts to experience a slow response on its platform that is hosted in a public cloud. When checking the resources involved, the systems administrator sees the following consumption: Considering all VMs were built from the same templates, which of the following...