Question 286
A VM was successfully tested in a lab environment. As part of the deployment preparation, the image needs to be backed up for use in the multi-rollout accompanied by orchestration templates.
Which of the following should be used to create the image?
Which of the following should be used to create the image?
Question 287
A new cloud infrastructure needs to meet the following requirements:
Resources are accessible to internal and external clients.
Existing hardware assets are utilized.
Security controls are managed by company employees.
Which of the following deployment models BEST fit these requirements?
Resources are accessible to internal and external clients.
Existing hardware assets are utilized.
Security controls are managed by company employees.
Which of the following deployment models BEST fit these requirements?
Question 288
A CSA needs to apply new OS security patches to the application cluster server farm in a public cloud provider. The CSA wants to ensure the security patch and configuration are consistent for all members of the server farm. Which of the following deployment practices is the BEST approach to do this?
Question 289
A security analyst is reviewing logs and sees a former employee's account has been used to access critical information on a private cloud resource. The analyst examines firewall and IPS logs but does not find traffic that is relevant to the breach. Which of the following is the MOST likely source of the compromise?
Question 290
A consultant is helping a gaming-as-a-service company set up a new cloud. The company recently bought several graphic cards that need to be added to the servers.
Which of the following should the consultant suggest as the MOST cost effective?
Which of the following should the consultant suggest as the MOST cost effective?