Which of the following AI/ML technologies consumes text input to discern tone?
#61
Answer: D✅ Correct❌ Incorrect
A cloud solutions architect needs to design a solution that will collect a report and upload it to an object storage service every time a virtual machine is gracefully or non-gracefully stopped. Which of the following will best satisfy this requirement?
#62
Answer: A✅ Correct❌ Incorrect
A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?
#63
Answer: B✅ Correct❌ Incorrect
A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?
#64
Answer: D✅ Correct❌ Incorrect
A cloud service provider requires users to migrate to a new type of VM within three months. Which of the following is the best justification for this requirement?
#65
Answer: D✅ Correct❌ Incorrect
An organization has been using an old version of an Apache Log4j software component in its critical software application. Which of the following should the organization use to calculate the severity of the risk from using this component?
#66
Answer: B✅ Correct❌ Incorrect
A company wants to build its new platform using a public cloud. The workload requirements include the following:• Implementation of custom CIS compliance• Patch for vulnerabilities within 24 hours• Warrant at least 1 8001OPS per volumeWhich of the following meets the requirements?
#67
Answer: B✅ Correct❌ Incorrect
A cloud security analyst is concerned about security vulnerabilities in publicly available container images. Which of the following is the most appropriate action for the analyst to recommend?
#68
Answer: A✅ Correct❌ Incorrect
A critical security patch is required on a network load balancer in a public cloud. The organization has a major sales conference next week, and the Chief Executive Officer does not want any interruptions during the demonstration of an application behind the load balancer. Which of the following approaches should the cloud security engineer take?
#69
Answer: C✅ Correct❌ Incorrect
A cloud engineer is troubleshooting a connectivity issue. The application server with IP 192.168.1.10 in one subnet is not connecting to the MySQL database server with IP 192.168.2.20 in a different subnet. The cloud engineer reviews the following information:Which of the following should the cloud engineer address to fix the communication issue?
#70
Answer: C✅ Correct❌ Incorrect
A cloud engineer is migrating a company-hosted application to a cloud provider. The data needs to be secure while stored on the third-party system. Which of the following would best ensure that the data is secure?
#71
Answer: A✅ Correct❌ Incorrect
A cloud consultant needs to modernize a legacy application that can no longer address user demand and is expensive to maintain. Which of the following is the best migration strategy?
#72
Answer: C✅ Correct❌ Incorrect
A cloud solution needs to be replaced without interruptions. The replacement process can be completed in phases, but the cost should be kept as low as possible. Which of the following is the best strategy to implement?
#73
Answer: B✅ Correct❌ Incorrect
A cloud administrator is working on the deployment of an e-commerce website. The administrator evaluates the scaling methods to be implemented when seasonal or flash sales are launched. Which of the following scaling approaches should the administrator use to best manage this scenario?
#74
Answer: A✅ Correct❌ Incorrect
A cloud security analyst is investigating the impact of a recent cyberattack. The analyst is reviewing the following information:Which of the following has occurred?
#75
Answer: D✅ Correct❌ Incorrect
A security analyst confirms a zero-day vulnerability was exploited by hackers who gained access to confidential customer data and installed ransomware on the server. Which of the following steps should the security analyst take?
#76
Answer: D✅ Correct❌ Incorrect
A software engineer is integrating an application to the cloud that is web socket based. Which of the following applications is the engineer most likely deploying?
#77
Answer: C✅ Correct❌ Incorrect
A cloud engineer needs to deploy a new version of a web application to 100 servers. In the past, new version deployments have caused outages. Which of the following deployment types should the cloud engineer implement to prevent the outages from happening this time?
#78
Answer: B✅ Correct❌ Incorrect
Which of the following package managers would most likely be used with Ubuntu Linux?
#79
Answer: D✅ Correct❌ Incorrect
A cloud server needs to automatically allocate more resources during sudden peak times. This allocation does not need to occur in regular intervals. Which of the following scaling approaches should be used?
#80
Answer: A✅ Correct❌ Incorrect
A company recently set up a CDN for its photography and image-sharing website. Which of the following is the most likely reason for the company's action?
#81
Answer: B✅ Correct❌ Incorrect
The company's IDS has reported an anomaly. The cloud engineer remotely accesses the cloud instance, runs a command, and receives the following information:Which of the following is the most likely root cause of this anomaly?
#82
Answer: A✅ Correct❌ Incorrect
A developer is building a new application version using a CI/CD pipeline. The developer receives the following error message log when the build fails.Which of the following is the most likely cause of this failure?
#83
Answer: D✅ Correct❌ Incorrect
A company wants to implement a work environment that will have low operational overhead and highly accessible enterprise resource planning, email, and data resources. Which of the following cloud service models should the company implement?
#84
Answer: D✅ Correct❌ Incorrect
A company receives files daily from a bank. The company requires that the files must be copied from the cloud storage resource to another cloud storage resource for further processing. Which of the following methods requires the least amount of effort to achieve the task?
#85
Answer: C✅ Correct❌ Incorrect
An on-premises data center is located in an earthquake-prone location. The workload consists of real-time, online transaction processing. Which of the following data protection strategies should be used to back up on-premises data to the cloud while also being cost-effective?
#86
Answer: A✅ Correct❌ Incorrect
Which of the following communication methods between on-premises and cloud environments would ensure minimal-to-low latency and overhead?
#87
Answer: C✅ Correct❌ Incorrect
A cloud engineer is collecting web server application logs to troubleshoot intermittent issues. However, the logs are piling up and causing storage issues. Which of the following log mechanisms should the cloud engineer implement to address this issue?
#88
Answer: B✅ Correct❌ Incorrect
A cloud security analyst is looking for existing security vulnerabilities on software applications. Which of the following describes this vulnerability management phase?
#89
Answer: D✅ Correct❌ Incorrect
A new application that will be deployed to cloud VMs has the following requirements:• Low inter-VM latency• Horizontal scaling support• 98.5% availability• 8vCPU and 16GB• Ability to split jobs across VMsWhich of the following will best meet these requirements?