Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A vendor wants to distribute a cloud management application in a format that can be used on both public and private clouds, but one that does not include an underlying OS that would require patching and management. Which of the following would BEST meet this need?

A.

Containerization

B.

Federation

C.

Collaboration

D.

Microservices

A cloud administrator needs to ensure as much uptime as possible for an application. The application has two database servers. If both servers go down simultaneously, the application will go down. Which of the following must the administrator configure to ensure the CSP does not bring both servers down for maintenance at the same time?

A.

Backups

B.

Availability zones

C.

Autoscaling

D.

Replication

A company would like to improve its current DR plan with an emphasis on high availability. Which of the following metrics should the company focus on?

A.

MTTR

B.

RTO

C.

QoS

D.

RPO

A Chief Information Officer is starting a cloud migration plan for the next three years of growth and requires an understanding of IT initiatives. Which of the following will assist in the assessment?

A.

Technical gap analysis

B.

Cloud architecture diagram review

C.

Current and future business requirements

D.

Feasibility study

Which of the following results from implementing a proprietary SaaS solution when an organization does not ensure the solution adopts open standards? (Choose two.)

A.

Vendor lock-in

B.

Inability to enforce the SLA

C.

Lack of technical support

D.

Higher ongoing operational expenditure

E.

Integration issues

F.

Higher initial capital expenditure

A business analyst has been drafting a risk response for a vulnerability that was identified on a server. After considering the options, the analyst decides to decommission the server. Which of the following describes this approach?

A.

Mitigation

B.

Transference

C.

Acceptance

D.

Avoidance

Which of the following activities in a cloud environment requires a defined scope and formal authorization from the CSP?

A.

Orchestration

B.

Penetration testing

C.

Sandboxing

D.

Vulnerability scanning

A company migrated all of its infrastructure to the cloud. The cloud security team must review the security post-migration.

Which of the following is the MOST appropriate task for the cloud security team to perform?

A.

Risk register

B.

Threat assessment

C.

Application scan

D.

Vulnerability scan

Which of the following should be enforced for billing recognition to allow department members to provision their own cloud resource?

A.

Sandboxing

B.

BYOL

C.

Resource tagging

D.

Reserved instances

Which of the following is the BEST way to secure a web session to a hosted e-commerce website?

A.

SSL

B.

VPN

C.

Firewall

D.

DNS