Loading questions...
Updated
After a cloud migration, a company hires a third party to conduct an assessment to detect any cloud infrastructure vulnerabilities. Which of the following BEST describes this process?
For which of the following reasons is the infrastructure as code technique used?
Which of the following strategies allows an organization to plan for cloud expenditures in a way that most closely aligns with the capital expenditure model?
An organization determines it cannot go forward with a cloud migration due to the risks involved. Which of the following types of risk response does this describe?
A cloud developer chooses to use private key encryption for all traffic in a new application. Which of the following security concerns does this BEST describe?
A cloud administrator is reviewing the requirements for a SaaS application and estimates downtime will be very expensive for the organization. Which of the following should the administrator configure to minimize downtime? (Choose two.)
Which of the following allows for the management of network policies from a central portal while maintaining a hardware-agnostic approach?
A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?
Which of the following cloud migration methods would be BEST suited for disaster recovery scenarios?
Which of the following BEST explains why there should be an established communication policy between CSPs and clients?
Which of the following documents has the sole purpose of outlining a professional services engagement that governs a proposed cloud migration?
Which of the following explains why a cloud provider would establish and publish a format data sanitization policy for its clients?
A small online retailer is looking for a solution to handle the high load on its servers during the holiday season. The retailer is not currently ready to move its IT operations completely to the cloud.
Which of the following will BEST fit these requirements?
Monthly cloud service costs are BEST described as:
An architect recently discovered new opportunities the cloud can provide to the company. A business analyst is currently working with the architect to document the business use-case scenarios. Which of the following should be the architect's NEXT step?
Which of the following cloud migration methods would take full advantage of the cloud computing model?
A cloud service provider is marketing its new PaaS offering to potential clients. Which of the following companies would MOST likely be interested?
A software developer wants to ensure a packaged application can be deployed in different environments without modifying anything but the application settings.
The developer creates an image and provides instructions for the systems administrator to use for deployment. This is an example of:
A business analyst is drafting a risk assessment.
Which of the following components should be included in the draft? (Choose two.)
Which of the following is used to build and manage interconnections between cloud resources within the same cloud environment?
A business analyst is examining a report and notices compute costs are very high for four cloud-based, load-balanced virtual machines hosting an application. The application will be in use for at least two more years, but there are no developers available to help optimize it. Which of the following should the analyst recommend to BEST reduce costs without impacting performance?
A project manager is interested in the notification process a CSP follows after discovering a breach of customer data. Which of the following is MOST likely to provide the necessary information?
A cloud risk assessment indicated possible outages in some regions. In response, the company enabled geo-redundancy for its cloud environment. Which of the following did the company adopt?
A company is moving to the cloud and wants to enhance the provisioning of compute, storage, security, and networking. Which of the following will be leveraged?
A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied?