Which of the following is the best way to identify the root cause?
A junior cloud administrator was recently promoted to cloud administrator and has been added to the cloud administrator group. The cloud administrator group is the only one that can access the engineering VM. The new administrator unsuccessfully attempts to access the engineering VM. However, the other administrators can access it...
Which of the following refers to the idea that data should stay within certain borders or territories?
Which of the following refers to the idea that data should stay within certain borders or territories?A . Data classificationB . Data retentionC . Data sovereigntyD . Data ownershipView AnswerAnswer: C Explanation: Data sovereignty refers to the concept that data is subject to the laws and governance structures within the...
Which of the following is the best deployment strategy given the requirements?
A developer is deploying a new version of a containerized application. The DevOps team wants: • No disruption • No performance degradation * Cost-effective deployment • Minimal deployment time Which of the following is the best deployment strategy given the requirements?A . CanaryB . In-placeC . Blue-greenD . RollingView AnswerAnswer:...
Which of the following applications is the engineer most likely deploying?
A software engineer is integrating an application lo The cloud that is web socket based. Which of the following applications is the engineer most likely deploying?A . Image-sharingB . Data visualizationC . ChatD . File transferView AnswerAnswer: C Explanation: A chat application is most likely to be deployed when integrating...
Which of the following will best help the engineer to complete this task?
A software engineer needs to transfer data over the internet using programmatic access while also being able to query the data. Which of the following will best help the engineer to complete this task?A . SQLB . Web socketsC . RPCD . GraphQLView AnswerAnswer: D Explanation: GraphQL is the best...
Which of the following is the most likely cause of this failure?
A developer is building a new application version using a CI/CD pipeline. The developer receives the following error message log when the build fails: Which of the following is the most likely cause of this failure?A . Incorrect versionB . Test case failureC . Broken build pipelineD . Dependency issueView...
Which of the following describes this vulnerability management stage?
A list of CVEs was identified on a web server. The systems administrator decides to close the ports and disable weak TLS ciphers. Which of the following describes this vulnerability management stage?A . ScanningB . IdentificationC . AssessmentD . RemediationView AnswerAnswer: D Explanation: Closing the ports and disabling weak TLS...
Which of the following should the company choose?
A company is developing a new web application that requires a relational database management system with minimal operational overhead. Which of the following should the company choose?A . A database installed on a virtual machineB . A managed SQL database on the cloudC . A database migration serviceD . A...
Which of the following is the most likely cause of this leak?
A company experienced a data leak through its website. A security engineer, who is investigating the issue, runs a vulnerability scan against the website and receives the following output: Which of the following is the most likely cause of this leak?A . RTMP port openB . SQL injectionC . Privilege...
Which of the following should the developer do to fix this issue?
A developer is testing code that will be used to deploy a web farm in a public cloud. The main code block is a function to create a load balancer and a loop to create 1.000 web servers, as shown below: The developer runs the code against the company's cloud...