Which of the following best describes what the company should implement?

A company wants to combine solutions in a central and scalable environment to achieve the following goals: • Control • Visibility • Automation • Cost efficiency Which of the following best describes what the company should implement?A . Batch processingB . Workload orchestrationC . ContainerizationD . Application modernizationView AnswerAnswer: B...

August 24, 2024 No Comments READ MORE +

Which of the following types of storage provides the greatest performance advantage for a traditional relational database?

Which of the following types of storage provides the greatest performance advantage for a traditional relational database?A . FileB . ObjectC . BlockD . EphemeralView AnswerAnswer: C Explanation: Block storage provides the greatest performance advantage for traditional relational databases due to its high performance and low-latency characteristics. Block storage allows...

August 23, 2024 No Comments READ MORE +

Which of the following options best describes how the software engineer can access the cloud resources?

A software engineer at a cybersecurity company wants to access the cloud environment. Per company policy, the cloud environment should not be directly accessible via the internet. Which of the following options best describes how the software engineer can access the cloud resources?A . SSHB . Bastion hostC . Token-based...

August 23, 2024 No Comments READ MORE +

Which of the following backup features should the administrator lest for?

A cloud administrator shortens the amount of time a backup runs. An executive in the company requires a guarantee that the backups can be restored with no data loss. Which of the following backup features should the administrator lest for?A . EncryptionB . RetentionC . ScheduleD . IntegrityView AnswerAnswer: D...

August 23, 2024 No Comments READ MORE +

Which of the following steps should the security analyst take next to resolve this issue?

A security analyst reviews the daily logs and notices the following suspicious activity: The analyst investigates the firewall logs and identities the following: Which of the following steps should the security analyst take next to resolve this issue? (Select two).A . Submit an IT support ticket and request Kali Linux...

August 23, 2024 No Comments READ MORE +

Which of the following is a major advantage of this type of architecture?

A company has decided to adopt a microservices architecture for its applications that are deployed to the cloud. Which of the following is a major advantage of this type of architecture?A . Increased securityB . Simplified communicationC . Reduced server costD . Rapid feature deploymentView AnswerAnswer: D Explanation: A major...

August 22, 2024 No Comments READ MORE +

Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match?

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).A . Resource taggingB ....

August 22, 2024 No Comments READ MORE +

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?

Which of the following application migration strategies will best suit a customer who wants to move a simple web application from an on-premises server to the cloud?A . RehostB . RearchitectC . RefactorD . RetainView AnswerAnswer: A Explanation: Rehosting, often referred to as a "lift and shift" strategy, is the...

August 22, 2024 No Comments READ MORE +

Which of the following would be the best algorithm to replace Base64?

An organization's security policy states that software applications should not exchange sensitive data in cleartext. The security analyst is concerned about a software application that uses Base64 to encode credit card data. Which of the following would be the best algorithm to replace Base64?A . 3DESB . AESC . RC4D...

August 22, 2024 No Comments READ MORE +

Which of the following should the organization enable?

A healthcare organization must follow strict compliance requirements to ensure that Pll is not leaked. The cloud administrator needs to ensure the cloud email system can support this requirement. Which of the following should the organization enable?A . IPSB . OLPC . ACLD . WAFView AnswerAnswer: B Explanation: To ensure...

August 21, 2024 No Comments READ MORE +