Enjoy 15% Discount With Coupon 15off

Monthly Archives - October 2020

Which pricing construct would provide the MOST cost-effective solution?

A company is migrating an application that is running non-interruptible workloads for a three-year time frame. Which pricing construct would provide the MOST cost-effective solution?A . Amazon EC2 Spot InstancesB . Amazon EC2 Dedicated InstancesC . Amazon EC2 On-Demand InstancesD . Amazon EC2 Reserved InstancesView AnswerAnswer: D

Read more...

Which of the following commands replaces each occurrence of ‘bob’ in the file letter with ‘Bob’ and writes the result to the file newletter?

Which of the following commands replaces each occurrence of 'bob' in the file letter with 'Bob' and writes the result to the file newletter?A . sed '/bob/Bob' letter > newletterB . sed s/bob/Bob/ letter < newletterC . sed 's/bob/Bob' letter > newletterD . sed 's/bob/Bob/g' letter > newletterE . sed...

Read more...

What should you do first?

You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You are assigned the Global administrator role for the tenant. You are responsible for managing Azure Security Center settings. You need to create a custom sensitivity label. What should you...

Read more...

A solutions architect has created a new AWS account and must secure AWS account root user access Which combination of actions will accomplish this? (Select TWO.)

A solutions architect has created a new AWS account and must secure AWS account root user access Which combination of actions will accomplish this? (Select TWO.)A . Ensure the root user uses a strong passwordB . Enable multi-factor authentication to the root userC . Store root user access keys in...

Read more...

If the destination is not reachable, which one of the following are generated?

Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gateway does not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs)...

Read more...

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

Read more...

Which scenario below will provide full site functionality, while helping to improve the ability of your application in the short timeframe required?

Your company has an on-premises multi-tier PHP web application, which recently experienced downtime due to a large burst in web traffic due to a company announcement Over the coming days, you are expecting similar announcements to drive similar unpredictable bursts, and are looking to find ways to quickly improve your...

Read more...