Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

A.

Resource tagging

B.

Discretionary access control

C.

Multifactor authentication

D.

Role-based access control

E.

Token-based authentication

F.

Bastion host

Which of the following describes what CRUD is typically used for?

A.

Relational databases

B.

Time series databases

C.

Graph databases

D.

NoSQL databases

A cloud deployment uses three different VPCs. The subnets on each VPC need to communicate with the others over private channels. Which of the following will achieve this objective?

A.

Deploying a load balancer to send traffic to the private IP addresses

B.

Creating peering connections between all VPCs

C.

Adding BGP routes using the VPCs' private IP addresses

D.

Establishing identical routing tables on all VPCs

The PMO wants to streamline the routing and approval of project activities to provide up-to-date visibility of the status. Which of the following collaboration tools would be most appropriate to use?

A.

Real-time, multi-authoring tool

B.

Wiki knowledge base and search engine

C.

Workflow and e-signature platform

D.

File-sharing platform and storage system

A system surpasses 75% to 80% of resource consumption. Which of the following scaling approaches is the most appropriate?

A.

Trending

B.

Manual

C.

Load

D.

Scheduled

Two CVEs are discovered on servers in the company's public cloud virtual network. The CVEs are listed as having an attack vector value of network and CVSS score of 9.0. Which

of the following actions would be the best way to mitigate the vulnerabilities?

A.

Patching the operating systems

B.

Upgrading the operating systems to the latest beta

C.

Encrypting the operating system disks

D.

Disabling unnecessary open ports

A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?

A.

Analyze

B.

Report

C.

Remediation

D.

identification

A developer is deploying a new version of a containerized application. The DevOps team wants:

• No disruption

• No performance degradation

* Cost-effective deployment

• Minimal deployment time

Which of the following is the best deployment strategy given the requirements?

A.

Canary

B.

In-place

C.

Blue-green

D.

Rolling

A company wants to build its new platform using a public cloud. The workload requirements include the following:

• Implementation of custom CIS compliance

• Patch for vulnerabilities within 24 hours

• Warrant at least 1,800 IOPS per volume

Which of the following meets the requirements?

A.

SaaS

B.

laaS

C.

FaaS

D.

PaaS

Which of the following network types allows the addition of new features through the use of network function virtualization?

A.

Local area network

B.

Wide area network

C.

Storage area network

D.

Software-defined network