Which of the following cloud migration methods would take full advantage of the cloud computing model?
Which of the following BEST describes how a cloud provider helps a company with security risk responses?
Which of the following risks is MOST likely to be accepted as a result of transferring business to a single CSP?
A startup company wants to develop a new voice assistant that leverages technology that can improve its product based on end user input. Which of the following would MOST likely accomplish this goal?
A cloud administrator needs to enable users to access business applications remotely while ensuring these applications are only installed on company-controlled equipment. All users require the ability to modify personal working environments. Which of the following is the BEST solution?
Which of the following technologies allows a social media application to authenticate access to resources that are available in the cloud?
A business analyst is comparing used vs. allocated storage cost for each reserved instance on a financial expenditures report related to the cloud. The CSP is currently billing at the following rates for storage:
The operating expenditures the analyst is reviewing are as follows:
Given this scenario, which of the following servers is costing the firm the least, and which should have storage increased due to over 70% utilization?
A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?
A company is moving its long-term archive data to the cloud. Which of the following storage types will the company MOST likely use?