A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?
A startup company that provides streaming media services is considering a new CSP. The company sees an average volume of 5000TB daily and high QoS. It has received the following bids:
Based on the information above, which of the following CSPs offers the MOST cost-effective solution for streaming?
A large database needs to be hosted in a cloud environment with little to no downtime while minimizing any loss of content. Which of the following will BEST facilitate these requirements?
An IT company is planning to migrate its current infrastructure to the cloud due to support no longer being available and dependence on some legacy databases. Which of the following would be the BEST migration approach?
For which of the following reasons is the infrastructure as code technique used?
Which of the following BEST specifies how software components interoperate in a cloud environment?
A company’s current billing agreement is static. If the company were to migrate to an entirely IaaS-based setup, which of the following billing concepts would the company be adopting?
Due to local natural disaster concerns, a cloud customer is transferring all of its cold storage data to servers in a safer geographic region. Which of the following risk response techniques is the cloud customer employing?
A company has defined a multicloud model.
Which of the following is the MOST important aspect to consider when defining the company's needs?
A SaaS provider specifies in a user agreement that the customer agrees that any misuse of the service will be the responsibility of the customer. Which of the following risk response methods was applied?
A web developer configured an application to have a local user database option to ensure the application can still be used if the corporate directory is not responsive to login requests. Which of the following security concepts BEST describes having this second database?
A company is in its second year of a three-year agreement with a cloud vendor. After the initial phase of the cloud migration, resource consumption has stabilized.
Which of the following would help the company reduce the cost of infrastructure?
Which of the following is a valid mechanism for achieving interoperability when extracting and pooling data among different CSPs?
A contract that defines the quality and performance metrics that are agreeable to both parties is called an:
An organization plans to keep three of its cloud servers online for another nine months and a fourth server online for a year. The current pricing is $200 per month per server. The cloud provider announced the sale price of $1,500 per year per reserved instance.
Which of the following represents the cost savings by converting all four of the cloud servers to reserved instances?
Which of the following concepts is the backup and recovery of data considered?
An IT team documented the procedure for upgrading an existing IT resource within the cloud. Which of the following BEST describes this procedure?
A company is migrating its e-commerce platform to a cloud service provider. The e-commerce site has a significant number of images. Which of the following is the BEST storage type for storing the images?
A company wants to ensure its existing functionalities are not compromised by the addition of a new functionality.
Which of the following is the BEST testing technique?
A large enterprise has the following invoicing breakdown of current cloud consumption spend:
The level of resources consumed by each department is relatively similar. Which of the following is MOST likely affecting monthly costs?
A systems administrator is reviewing a disaster recovery option that requires little to no downtime in the event of a natural disaster.
Which of the following BEST meets this requirement?
Which of the following should be enforced for billing recognition to allow department members to provision their own cloud resource?
Which of the following technologies allows a social media application to authenticate access to resources that are available in the cloud?
After a cloud migration, a company hires a third party to conduct an assessment to detect any cloud infrastructure vulnerabilities. Which of the following BEST describes this process?
A company migrated all of its infrastructure to the cloud. The cloud security team must review the security post-migration.
Which of the following is the MOST appropriate task for the cloud security team to perform?
Which of the following policies dictates when to grant certain read/write permissions?
Which of the following allows an IP address to be referenced via an easily remembered name for a SaaS application?
Which of the following BEST represents a successful presentation to a customer of the working result of a new cloud feature?
Which of the following aspects of cloud design enables a customer to continue doing business after a major data center incident?
For security reasons, a cloud service that can be accessed from anywhere would make BEST use of:
Which of the following BEST describes the open-source licensing model for application software?
An on-premises, business-critical application is used for financial reporting and forecasting. The Chief Financial Officer requests options to move the application to cloud. Which of the following would be BEST to review the options?
An online retailer wants to ensure its inventory for the holiday season is correct. The company does not have a large IT infrastructure or staff to collect and analyze sales information, customer analytics, marketing information, or trends. Which of the following cloud services will help the company analyze these metrics without a large investment in human capital?
Which of the following techniques helps an organization determine benchmarks for application performance within a set of resources?
Which of the following is an example of outsourcing administration in the context of the cloud?
A company is required to move its human resources application to the cloud to reduce capital expenses. The IT team does a feasibility analysis and learns the application requires legacy infrastructure and cannot be moved to the cloud.
Which of the following is the MOST appropriate cloud migration approach for the company?
An organization's servers are experiencing performance degradation from oversubscription of memory in the virtual environment and exhausted physical RAM.
Which of the following cloud computing characteristics would BEST address the issue?
A company with a variable number of employees would make good use of the cloud model because of:
A vendor wants to distribute a cloud management application in a format that can be used on both public and private clouds, but one that does not include an underlying OS that would require patching and management. Which of the following would BEST meet this need?
An architect recently discovered new opportunities the cloud can provide to the company. A business analyst is currently working with the architect to document the business use-case scenarios. Which of the following should be the architect’s NEXT step?
Which of the following risks is MOST likely to be accepted as a result of transferring business to a single CSP?
A DevOps team wants to document the upgrade steps for its public database solution. The team needs a dedicated virtual environment separate from the production systems to replicate multiple installations. Which of the following BEST represents what the team needs?
A company would like to improve its current DR plan with an emphasis on high availability. Which of the following metrics should the company focus on?
A cloud developer chooses to use private key encryption for all traffic in a new application. Which of the following security concerns does this BEST describe?
A company is sending copies of its information to an off-site server managed by a CSR Which of the following BEST describes this strategy?
A company wants to migrate mission-critical applications to the cloud. In order for technicians to build, decommission, and perform other routine functions, which of the following cloud characteristics would BEST satisfy this business requirement?
Which of the following can be used to achieve automation, environment consistency, and standardization of computer resources in a cloud environment?
A software company that develops mobile applications is struggling with the complicated process of deploying the development, testing. QA. and staging environments. Which of the following cloud service models offers the BEST automated development environment for the software company?
Which of the following BEST explains why there should be an established communication policy between CSPs and clients?
A human resources department is considering a SaaS-based human resources portal and requires a risk analysis.
Which of the following are requirements to consider? (Choose two.)
A business analyst is examining a report and notices compute costs are very high for four cloud-based, load- balanced virtual machines hosting an application. The application will be in use for at least two more years, but there are no developers available to help optimize it. Which of the following should the analyst recommend to BEST reduce costs without impacting performance?
A business analyst is comparing used vs. allocated storage cost for each reserved instance on a financial expenditures report related to the cloud. The CSP is currently billing at the following rates for storage:
The operating expenditures the analyst is reviewing are as follows:
Given this scenario, which of the following servers is costing the firm the least, and which should have storage increased due to over 70% utilization?
Which of the following stores transactions in a distributed ledger of which all users have a copy?
Which of the following allows for the management of network policies from a central portal while maintaining a hardware-agnostic approach?
Which of the following results from implementing a proprietary SaaS solution when an organization does not ensure the solution adopts open standards? (Choose two.)
A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment. All users require the ability to modify personal working environments. Which of the following is the BEST solution?
A document that outlines the scope of a project, specific deliverables, scheduling, and additional specific details from the client/buyer is called a:
An incident response team requires documentation for an email phishing campaign against a company's email server. Which of the following is the BEST resource to use to start the investigation?
A cloud administrator is reviewing the requirements for a SaaS application and estimates downtime will be very expensive for the organization. Which of the following should the administrator configure to minimize downtime? (Choose two.)