Which of the following is MOST likely the cause?

A developer is no longer able to access a public cloud API deployment, which was working ten minutes prior. Which of the following is MOST likely the cause?A . API provider rate limitingB . Invalid API tokenC . Depleted network bandwidthD . Invalid API requestView AnswerAnswer: B

October 7, 2020 No Comments READ MORE +

Which of the following testing techniques would be BEST to use?

A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities. Which of the following testing techniques would be BEST to use?A . Usability testingB...

October 6, 2020 No Comments READ MORE +

Which of the following is the MOST likely cause for this error?

The human resources department was charged for a cloud service that belongs to another department. All other cloud costs seem to be correct. Which of the following is the MOST likely cause for this error?A . Misconfigured templatesB . Misconfigured chargebackC . Incorrect security groupsD . Misconfigured tagsView AnswerAnswer: A

October 4, 2020 No Comments READ MORE +

Which of the following should the systems administrator implement to achieve this objective?

A systems administrator wants to have near-real-time information on the volume of data being exchanged between an application server and its clients on the Internet. Which of the following should the systems administrator implement to achieve this objective?A . A stateful firewallB . DLPC . DNSSECD . Network flowsView AnswerAnswer:...

October 4, 2020 No Comments READ MORE +

Which of the following should the administrator verify NEXT?

After analyzing a web server’s logs, a systems administrator sees that users are connecting to the company’s application through HTTP instead of HTTPS. The administrator then configures a redirect from HTTP to HTTPS on the web server, and the application responds with a connection time-out message. Which of the following...

October 3, 2020 No Comments READ MORE +

Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?

Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?A . Implement whole-disk encryptionB . Deploy the latest OS patchesC . Deploy an anti-malware solutionD . Implement mandatory access controlView AnswerAnswer: D

October 3, 2020 No Comments READ MORE +

A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday

SIMULATION A company has decided to scale its e-commerce application from its corporate datacenter to a commercial cloud provider to meet an anticipated increase in demand during an upcoming holiday. The majority of the application load takes place on the application server under normal conditions. For this reason, the company...

October 2, 2020 No Comments READ MORE +