Which of the following is essential to ensure an e-commerce application can receive orders without any downtime?
Which of the following will improve availability and performance in a web application?
A. Load balancing
D. Single sign-on
Which of the following are factors in a gap analysis when considering a CSP? (Select TWO).
A cloud administrator needs to provision a database server in a public cloud provider's environment. The administrator chooses the option to pay for the database software on a monthly basis. Which of the following licensing models does this describe?
C. Bring your own
A SaaS application requires users to log in using the same password as their local network password. This is an example of:
A. single sign-on.
B. access control list.
C. remote desktop protocol.
D. multifactor authentication.
Which of the following is a data management aspect of operation in a cloud environment?
A. Object storage
A company identifies a risk, considers the business impact, and then decides to assume the risk. Which of the following risk response strategies is represented in this example?
Due to a breach, a cloud provider needs to locate a document that defines the appropriate actions to take. Which of the following BEST describes the process the cloud provider needs to follow?
A. Risk register
C. Change management
D. Incident response
To comply with industry standards, an organization must hire a third-party vendor to determine if its cloud environment can be breached. Which of the following is the BEST for the organization to conduct?
A. Application scan
B. Integrity test
C. Penetration test
D. Vulnerability scan
Which of the following is the networking technology that will automatically direct traffic to the host that is currently using the LEAST amount of resources?
A. Round-robin DNS
B. Load balancing
C. Software-defined networking
D. Split DNS
Question 1) A. Availability
Question 2) A. Load balancing
Question 3) A. Technical & F. Business
Question 4) B. Subscription
Question 5) A. single sign-on.
Question 6) C. Locality
Question 7) B. Acceptance
Question 8) D. Incident response
Question 9) C. Penetration test
Question 10) B. Load balancing