A DevOps engineer is integrating multiple systems. Each system has its own API that exchanges data based on different application-level transactions. Which of the following delivery mechanisms would best support this integration?
A. Enterprise service bus
B. Socket
C. RPC
D. Queue
For compliance purposes, a cloud developer at an insurance company needs to save all customer policies for more than ten years. Which of the following options is the most cost-efficient tier to save the data in the cloud?
A. Archive
B. Hot
C. Cold
D. Warm
A cloud consultant needs to modernize a legacy application that can no longer address user demand and is expensive to maintain. Which of the following is the best migration strategy?
A. Retain
B. Rehost
C. Refactor
D. Replatform
A security engineer recently discovered a vulnerability in the operating system of the company VMs. The operations team reviews the issue and decides all VMs need to be updated from version 3.4.0 to 3.4.1. Which of the following best describes the type of update that will be applied?
A. Consistent
B. Major
C. Minor
D. Ephemeral
A cloud solutions architect needs to design a solution that will collect a report and upload it to an object storage service every time a virtual machine is gracefully or non-gracefully stopped. Which of the following will best satisfy this requirement?
A. An event-driven architecture that will send a message when the VM shuts down to a log- collecting function that extracts and uploads the log directly from the storage volume
B. Creating a webhook that will trigger on VM shutdown API calls and upload the requested files from the volume attached to the VM into the object-defined storage service
C. An API of the object-defined storage service that will scrape the stopped VM disk and self-upload the required files as objects
D. A script embedded on the stopping VM's OS that will upload the logs on system shutdown
An organization has been using an old version of an Apache Log4j software component in its critical software application.
Which of the following should the organization use to calculate the severity of the risk from using this component?
A. CWE
B. CVSS
C. CWSS
D. CVE
Which of the following container storage types loses data after a restart?
A. Object
B. Persistent volume
C. Ephemeral
D. Block
An organization needs to retain its data for compliance reasons but only when required. Which of the following would be the most cost-effective type of tiered storage?
A. Warm
B. Hot
C. Archive
D. Cold
A systems administrator is informed that a database server containing PHI and PII is unencrypted. The environment does not support VM encryption, nor does it have a key management system. The server needs to be able to be rebooted for patching without manual intervention.
Which of the following will BEST resolve this issue?
A. Ensure all database queries are encrypted
B. Create an IPSec tunnel between the database server and its clients
C. Enable protocol encryption between the storage and the hypervisor
D. Enable volume encryption on the storage
E. Enable OS encryption
A systems administrator created several new VMs on a private cloud and wants to ensure the new baseline still meets corporate guidelines. The administrator finds the following new load numbers on the hosts:
If corporate policy requires N+1 host capacity, which of the following metrics is MOST likely to present a problem?
A. CPU
B. RAM
C. DISK
D. NETWORK