Which of the following is a customer responsible for in a provider-managed database service?
#91
Answer: B✅ Correct❌ Incorrect
A database administrator performs a full backup periodically and keeps several versions in a cloud instance with increasing storage costs. Which of the following should the administrator consider doing to manage backup retention?
#92
Answer: B✅ Correct❌ Incorrect
A cloud administrator is provisioning infrastructure to run an application with the following requirements:• Ten midsize instances need to run as a cluster most of the day.• Sixteen midsize instances are required during peak hours.• Costs must be kept low.• The instances must be deployed in an IaaS model.• The application has no tolerance for service disruptions.Which of the following steps should the cloud architect take to host the application?
#93
Answer: C✅ Correct❌ Incorrect
An IT manager is planning a cloud deployment for a new company. The company does not want on-premises servers or applications. Which of the following is the best approach for the manager to take?
#94
Answer: B✅ Correct❌ Incorrect
Which of the following files should be used to install software with a package manager?
#95
Answer: C✅ Correct❌ Incorrect
An application that is running on containers writes files to the operating system after processing data. The produced output files are stored under /project-files owned by root. A cloud engineer needs to make sure no output files are owned by root. Which of the following actions should the engineer take to best achieve this objective?
#96
Answer: B✅ Correct❌ Incorrect
A cloud engineer is implementing a deployment strategy with the following requirements:• At least two environments for production and development must be supported.• Changes in one environment must not impact the other environment.• The highest possible availability must be achieved.Which of the following deployment strategies should the engineer implement?
#97
Answer: B✅ Correct❌ Incorrect
Which of the following interfaces is most commonly used for SSDs but not for HDDs?
#98
Answer: A✅ Correct❌ Incorrect
A company experienced a data leak through its website. A security engineer, who is investigating the issue, runs a vulnerability scan against the website and receives the following output:Which of the following is the most likely cause of this leak?
#99
Answer: D✅ Correct❌ Incorrect
A company recently experienced a ransomware attack. The recovery process was slow because the on-site backups were compromised and off-site backups were required. Which of the following features would enable a faster recovery if a ransomware attack would happen again?
#100
Answer: C✅ Correct❌ Incorrect
A SaaS provider introduced new software functionality for customers as part of quarterly production enhancements. After an update is implemented, users cannot locate certain transactions from an inbound integration. During the investigation, the application owner finds the following error in the logs:Error: REST API - Deprecated call is no longer supported in this release.Which of the following is the best action for the application owner to take to resolve the issue?
#101
Answer: A✅ Correct❌ Incorrect
A developer is building a tool on the cloud that needs to allow other developers to programmatically read and write to the web application resources. Which of the following should the developer do to meet these requirements with the least complexity?
#102
Answer: A✅ Correct❌ Incorrect
Users report being unable to access an application that uses TLS 1.1. The users are able to access other applications on the internet. Which of the following is the most likely reason for this issue?
#103
Answer: B✅ Correct❌ Incorrect
A customer is migrating applications to the cloud and wants to grant authorization using the classification levels of each system. Which of the following should the customer implement to ensure authorization to systems is granted when the user and system classification properties match?
#104
Answer: A✅ Correct❌ Incorrect
A bank was recently hacked. The bank reviews the logs to see how the attack occurred. The security administrator suspects the logs were manipulated because no traces of the attack can be found in them. Which of the following should have been enabled before the attack occurred?
#105
Answer: D✅ Correct❌ Incorrect
A healthcare provider contacts a MSP about moving an on-premises infrastructure to the cloud. Which of the following requirements are most important for the MSP to consider when migrating this customer?
#106
Answer: A✅ Correct❌ Incorrect
A cloud engineer is provisioning a new application that requires access to the organization’s public cloud resources. Which of the following is the best way for the cloud engineer to authenticate the application?
#107
Answer: A✅ Correct❌ Incorrect
Which of the following protocols is often used in IoT to reduce the amount of data exchanged?
#108
Answer: A✅ Correct❌ Incorrect
Which of the following is the correct order of the steps to take when a system is suspected of being vulnerable?
#109
Answer: A✅ Correct❌ Incorrect
A cloud developer resigned from an organization and gave a two-week notice. Within the first week since the developer resigned, a security analyst identifies large volumes of file downloads to the developer’s laptop from the source code repository. Which of the following security controls would be the best way to mitigate the organization’s risk of data loss? E. Prohibiting files on the local drive from being transferred to USB drives
#110
Answer: C✅ Correct❌ Incorrect
Which of the following facilitates the continuous deployment of cloud applications without performing a clean install on each iteration?
#111
Answer: C✅ Correct❌ Incorrect
Which of the following container commands implements network port mapping?
#112
Answer: D✅ Correct❌ Incorrect
An organization’s large e-commerce website requires high availability and cannot have degraded performance. Which of the following should a cloud administrator do to best meet the requirements?
#113
Answer: A✅ Correct❌ Incorrect
A cloud engineer proposes a solution to migrate a finance application to the cloud. The environment can be shared to reduce costs. Which of the following models would best meet this requirement?
#114
Answer: B✅ Correct❌ Incorrect
A cloud engineer tries to deploy five new cloud instances using code. An error occurs, and the instances are not created. The configuration fails to run. The engineer then receives the following error message:ERROR:Parse error on json line x in configGiven the following snippet from the config.json file:{ "instance_count": 5,"ssd_options" : ["100GB","200GB","300GB"],"instance_region": apac,"instance_code": 255,"start_instance" : true}Which of the following oversights created the error in the configuration file?
#115
Answer: C✅ Correct❌ Incorrect
A company’s cybersecurity team receives the following alert that a production VM was deleted from the virtual network:21 September 09:19:08 (GMT-5)Resource with ID: PROD-WEB001 was deleted by User: LoggingService -The console to manage virtual network resources uses directory authentication. Only users in a particular directory group can interactively access the virtual network management console. The logging service account is not part of this group and requires some local administration privileges to aggregate logs from various resources. The cybersecurity team discovers that the logging service account was previously given full directory administration privileges and they see the following entry:21 September 09:10:55 (GMT-5)User with ID: Logging Service was added to the Group: VNetConsole Administrators by actor: Logging Service.The cybersecurity team removes the compromised service account from the directory group. Which of the following should the cybersecurity team do next to prevent repeat instances of this issue?
#116
Answer: D✅ Correct❌ Incorrect
A developer is sending requests to a SaaS application. The developer becomes unable to send anymore requests after sending a number of them, but other developers can still send requests. Which of the following is most likely causing the issue?
#117
Answer: C✅ Correct❌ Incorrect
Which of the following should be used on containers to process data and keep the output in files for later review?