Which of the following services would restrict connectivity to cloud resources?

Which of the following services would restrict connectivity to cloud resources?A . Security listsB . FirewallC . VPND . Intrusion detection systemView AnswerAnswer: A

June 20, 2021 No Comments READ MORE +

Which of the following BEST describes how a cloud provider helps a company with security risk responses?

Which of the following BEST describes how a cloud provider helps a company with security risk responses?A . AcceptanceB . MitigationC . AvoidanceD . TransferenceView AnswerAnswer: D

June 19, 2021 No Comments READ MORE +

Which of the following should the business analyst do FIRST?

A Chief Information Officer (CIO) wants to identify two business units to be pilots for a new cloud project. A business analyst who was recently assigned to this project will be selecting a cloud provider. Which of the following should the business analyst do FIRST?A . Conduct a feasibility study...

June 19, 2021 No Comments READ MORE +

Which of the following should be considered to ensure the availability of data that is accessed across multiple sites? (Choose two.)

Which of the following should be considered to ensure the availability of data that is accessed across multiple sites? (Choose two.)A . Auto-scalingB . Geo-redundancyC . BackupD . ProvisioningE . LocalityF . ZonesView AnswerAnswer: B,C

June 19, 2021 No Comments READ MORE +

Which of the following explains why a cloud provider would establish and publish a format data sanitization policy for its clients?

Which of the following explains why a cloud provider would establish and publish a format data sanitization policy for its clients?A . To establish guidelines for how the provider will cleanse any data being imported during a cloud migrationB . To be transparent about how the CSP will handle malware...

June 19, 2021 No Comments READ MORE +

Which of the following is the BEST option for the administrator to configure?

A cloud administrator notices users call to report application performance degradation between 1:00 p.m. and 3:00 p.m. every day. Which of the following is the BEST option for the administrator to configure?A . LocalityB . Block storageC . Right-sizingD . Auto-scalingView AnswerAnswer: D

June 19, 2021 No Comments READ MORE +

Which of the following is the company trying to avoid as part of its risk mitigation strategy?

Following a risk assessment, a company decides to adopt a multicloud strategy for its IT applications. Which of the following is the company trying to avoid as part of its risk mitigation strategy?A . Geo-redundancyB . Vendor lock-inC . High availabilityD . Data sovereigntyView AnswerAnswer: B

June 18, 2021 No Comments READ MORE +

Which of the following is an example of multifactor authentication?

Which of the following is an example of multifactor authentication?A . A password policy that requires both upper and lowercase lettersB . A short message service (SMS) message sent to a phone and an access PINC . Encryption of cached password information and a challenge QUESTION NO:D . A password...

June 18, 2021 No Comments READ MORE +

Which of the following security concerns does this BEST describe?

A cloud developer chooses to use private key encryption for all traffic in a new application. Which of the following security concerns does this BEST describe?A . IntegrityB . ConfidentialityC . AvailabilityD . AuthorizationView AnswerAnswer: B

June 18, 2021 No Comments READ MORE +

Which of the following should a DevOps engineer do to meet these requirements?

In a DevOps environment there is a requirement to start building application solutions in an efficient manner without any dependent components. Which of the following should a DevOps engineer do to meet these requirements?A . Build the applications in QA, and then enable resource tagging.B . Build the applications in...

June 17, 2021 No Comments READ MORE +