Which of the following is an example of outsourcing administration in the context of the cloud?

Which of the following is an example of outsourcing administration in the context of the cloud?A . Managed servicesB . Audit by a third partyC . Community supportD . Premium supportView AnswerAnswer: A

June 17, 2021 No Comments READ MORE +

Monthly cloud service costs are BEST described as:

Monthly cloud service costs are BEST described as:A . operating expenditures.B . fixed expenditures.C . capital expenditures.D . personnel expenditures.View AnswerAnswer: A

June 16, 2021 No Comments READ MORE +

Which of the following is true about the use of technologies such as JSON and XML for cloud data interchange and automation tasks?

Which of the following is true about the use of technologies such as JSON and XML for cloud data interchange and automation tasks?A . It can cause cloud vendor lock-inB . The company needs to define a specific programming language for cloud management.C . The same message format can be...

June 16, 2021 No Comments READ MORE +

Which of the following cloud characteristics helps transform from a typical capital expenditure model to an operating expenditure model?

Which of the following cloud characteristics helps transform from a typical capital expenditure model to an operating expenditure model?A . Pay-as-you-goB . ElasticityC . Self-serviceD . AvailabilityView AnswerAnswer: A

June 15, 2021 No Comments READ MORE +

Which of the following must be generated while the application is running on-premises to predict the cloud budget for this project better?

A company is planning to use cloud computing to extend the compute resources that will run a new resource- intensive application. A direct deployment to the cloud would cause unexpected billing. Which of the following must be generated while the application is running on-premises to predict the cloud budget for...

June 15, 2021 No Comments READ MORE +

Which of the following would be expected from a security consultant who has been hired to investigate a data breach of a private cloud instance?

Which of the following would be expected from a security consultant who has been hired to investigate a data breach of a private cloud instance?A . Incident reportB . Application scan resultsC . Request for informationD . Risk registerView AnswerAnswer: A

June 15, 2021 No Comments READ MORE +

Which of the following BEST describes this procedure?

An IT team documented the procedure for upgrading an existing IT resource within the cloud. Which of the following BEST describes this procedure?A . Security procedureB . Incident managementC . Change managementD . Standard operating procedureView AnswerAnswer: D

June 14, 2021 No Comments READ MORE +

Which of the following should be included in the SLA to satisfy this requirement?

A requirement states that an application must be restored within six hours. Which of the following should be included in the SLA to satisfy this requirement?A . MTTRB . RPOC . ROID . RTOView AnswerAnswer: D

June 14, 2021 No Comments READ MORE +

Which of the following will be leveraged?

A company is moving to the cloud and wants to enhance the provisioning of compute, storage, security, and networking. Which of the following will be leveraged?A . Infrastructure as codeB . Infrastructure templatesC . Infrastructure orchestrationD . Infrastructure automationView AnswerAnswer: D

June 14, 2021 No Comments READ MORE +

Which of the following is the BEST solution?

A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment. All users require the ability to modify personal working environments. Which of the following is the BEST solution?A . SSOB . VDIC . SSHD . VPNView AnswerAnswer: D

June 13, 2021 No Comments READ MORE +