Which of the following are the most likely causes for this error?
A cloud engineer was deploying the company's payment processing application, but it failed with the following error log: ERFOR: root: Transaction failed http 429 response, please try again. Which of the following are the most likely causes for this error? (Select two).A . API throttlingB . API gateway outageC ....
Which of the following approaches should the cloud security engineer take?
A critical security patch is required on a network load balancer in a public cloud. The organization has a major sales conference next week, and the Chief Executive Officer does not want any interruptions during the demonstration of an application behind the load balancer. Which of the following approaches should...
Which of the following service options would provide the best availability for critical applications in the event of a disaster?
Which of the following service options would provide the best availability for critical applications in the event of a disaster?A . Edge computingB . Cloud burstingC . Availability zonesD . Multicloud tenancyView AnswerAnswer: C Explanation: Availability zones provide the best availability for critical applications in the event of a disaster....
Which of the following is used to detect signals and measure physical properties, such as the temperature of the human body?
Which of the following is used to detect signals and measure physical properties, such as the temperature of the human body?A . BeaconB . Transmission protocolsC . SensorsD . GatewaysView AnswerAnswer: C Explanation: Sensors are used to detect signals and measure physical properties, such as temperature. They are devices that...
Which of the following should the team implement on each cloud service to support root cause analysis of past events?
A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).A . Log retentionB ....
Which of the following concepts should the engineer use to design the system to best meet these requirements?
A cloud engineer is designing a cloud-native, three-tier application. The engineer must adhere to the following security best practices: • Minimal services should run on all layers of the stack. • The solution should be vendor agnostic. • Virealization could be used over physical hardware. Which of the following concepts...
Which of the following is the best way for the cloud engineer to authenticate the application?
A cloud engineer is provisioning a new application that requires access to the organization's public cloud resources. Which of the following is the best way for the cloud engineer to authenticate the application?A . Access keyB . APIC . MFA tokenD . Username and PasswordView AnswerAnswer: A Explanation: The best...
Which of the following should the company implement that will minimize administrative overhead?
A company wants to use a solution that will allow for quick recovery from ransomware attacks, as well as intentional and unintentional attacks on data integrity and availability. Which of the following should the company implement that will minimize administrative overhead?A . Object versioningB . Data replicationC . Off-site backupsD...
Which of the following would be the most cost-effective type of tiered storage?
An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?A . WarmB . HotC . ArchiveD . ColdView AnswerAnswer: C Explanation: Archive storage is the most cost-effective type of tiered storage for retaining...
Which of the following is an auditing procedure that ensures service providers securely manage the data to protect the interests of the organization and the privacy of its clients?
Which of the following is an auditing procedure that ensures service providers securely manage the data to protect the interests of the organization and the privacy of its clients?A . CISB . ITILC . SOC2D . ISO 27001View AnswerAnswer: C Explanation: SOC2 (Service Organization Control 2) is an auditing procedure...