Which of the following is used to deliver code quickly and efficiently across the development, test, and production environments?
A. Snapshot
B. Container image
C. Serverless function
D. VM template
A customer relationship management application, which is hosted in a public cloud laaS network, is vulnerable to a remote command execution vulnerability.
Which of the following is the best solution for the security engineer to implement to prevent the application from being exploited by basic attacks?
A. IPS
B. ACL
C. DLP
D. WAF
A cloud engineer wants to implement a monitoring solution to detect cryptojacking and other cryptomining malware on cloud instances. Which of the following metrics would most likely be used to identify the activity?
A. Disk I/O
B. Network packets
C. Average memory utilization
D. Percent of CPU utilization
An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements:
1.
Is simple and fast
2.
Can be performed on two Identical platforms
Which of the following strategies should the engineer use?
A. Blue-green
B. Canary
C. Rolling
D. in-place
A group of cloud administrators frequently uses the same deployment template to recreate a cloud-based development environment. The administrators are unable to go back and review the history of changes they have made to the template.
Which of the following cloud resource deployment concepts should the administrator start using?
A. Drift detection
B. Repeatability
C. Documentation
D. Versioning
A cloud engineer needs to deploy a new version of a web application to 100 servers. In the past, new version deployments have caused outages.
Which of the following deployment types should the cloud engineer implement to prevent the outages from happening this time?
A. Rolling
B. Blue-green
C. Canary
D. Round-robin
A cloud administrator deploys new VMs in a cluster and discovers they are getting IP addresses in the range of 169.254.0.0/16. Which of the following is the most likely cause?
A. The scope has been exhausted.
B. The network is overlapping.
C. The VLAN is missing.
D. The NAT is Improperly configured.
A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration.
Which of the following migration strategies is best approach for this use case?
A. Retire
B. Rearchitect
C. Refactor
D. Rehost
A company is concerned it will run out of VLANs on its private cloud platform in the next couple months, and the product currently offered to customers requires the company to allocate three dedicated, segmented tiers.
Which of the following can the company implement to continue adding new customers and to maintain the required level of isolation from other tenants?
A. GRE
B. SR-IOV
C. VXLAN
D. IPSec
A systems administrator is implementing a new version of a company's primary human- resources application. An upgrade will be performed on the production server, as there is no development environment. The administrator needs to have a plan in case something goes wrong with the upgrade.
Which of the following will work best to ensure a quick rollback in case an issue arises?
A. An application-level backup
B. A production snapshot
C. A full backup
D. A differential backup