Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A cloud engineer is concerned about command-and-control (C2) communication leaving a cloud network over HTTPS. Which of the following should the cloud engineer implement to most efficiently identify this type of communication?

A.

Inline IPS

B.

Cloud flow logs

C.

Hourly cron jobs listing connections

D.

Traffic mirroring

Which of the following strategies requires the development of new code before an application can be successfully migrated to a cloud provider?

A.

Refactor

B.

Rearchitect

C.

Rehost

D.

Replatform

A company recently migrated to a public cloud provider. The company's computer incident response team needs to configure native cloud services tor detailed logging. Which of the following should the team implement on each cloud service to support root cause analysis of past events? {Select two).

A.

Log retention

B.

Tracing

C.

Log aggregation

D.

Log rotation

E.

Hashing

F.

Encryption

A systems administrator needs to configure backups for the company's on-premises VM cluster. The storage used for backups will be constrained on free space until the company

can implement cloud backups. Which of the following backup types will save the most space, assuming the frequency of backups is kept the same?

A.

Snapshot

B.

Ful

C.

Differential

D.

Incremental

An organization's security policy states that software applications should not exchange sensitive data in cleartext. The security analyst is concerned about a software application that uses Base64 to encode credit card data. Which of the following would be the best algorithm to replace Base64?

A.

3DES

B.

AES

C.

RC4

D.

SHA-3

Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?

A.

Scanning

B.

Assessment

C.

Remediation

D.

Identification

A company uses containers to implement a web application. The development team completed internal testing of a new feature and is ready to move the feature to the production

environment. Which of the following deployment models would best meet the company's needs while minimizing cost and targeting a specific subset of its users?

A.

Canary

B.

Blue-green

C.

Rolling

D.

In-place

A company uses containers stored in Docker Hub to deploy workloads (or its laaS infrastructure. The development team releases changes to the containers several times per hour. Which of the following should a cloud engineer do to prevent the proprietary code from being exposed to third parties?

A.

Use laC to deploy the laaS infrastructure.

B.

Convert the containers to VMs.

C.

Deploy the containers over SSH.

D.

Use private repositories for the containers.

A web server hosted in a PaaS public cloud platform has been the target of DDoS attacks. A cloud engineer needs to protect the server from future volumetric DDoS attacks. Which of the following are the best actions for the engineer to take? (Select two.)

A.

Add a CDN in front of the web server.

B.

Add a DLP on the PaaS platform.

C.

Add a hardened web server instance.

D.

Add an ACL to the web server network.

E.

Add an IDS in-line on the web server network.

F.

Add a WAF in front of the web server.

A company recently set up a CDN for its photography and image-sharing website. Which of the following is the most likely reason for the company's action?

A.

To eliminate storage costs

B.

To improve site speed

C.

To enhance security of static assets

D.

To prevent unauthorized access