Question 61

A cloud developer chooses to use private key encryption for all traffic in a new application. Which of the following security concerns does this BEST describe?
  • Question 62

    A systems administrator is reviewing a disaster recovery option that requires little to no downtime in the event of a natural disaster.
    Which of the following BEST meets this requirement?
  • Question 63

    After a cloud migration, a company hires a third party to conduct an assessment to detect any cloud infrastructure vulnerabilities. Which of the following BEST describes this process?
  • Question 64

    A web application was deployed, and files are available globally to improve user experience. Which of the following technologies is being used?