A cloud engineer needs to perform a database migration. The database has a restricted SLA and cannot be offline for more than ten minutes per month. The database stores 800GB of data, and the network bandwidth to the CSP is 100MBps Which of the following is the best option to perform the migration?
A systems administrator automates a series of tasks in a playbook and receives the following error during testing:
"Unable to find any of pip2, pip to use. pip needs to be installed."
The administrator verifies that pip is installed correctly. Which of the following actions will most likely resolve this issue?
An organization's security team must determine the likelihood of a breach on its external-facing websites. Which of the following would be best to identify the organization’s chances of incurring a breach?
A cloud administrator needs to reduce storage costs. Which of the following would best help the administrator reach that goal?
A cloud administrator must ensure all servers are in compliance with the company's security policy Which of the following should the administrator check FIRST?
Following the deployment of a new VM, a cloud engineer notices the backup platform has not added the machine to the appropriate job. The backup platform uses a text-based variable for job configuration. This variable is based on the RPO requirements for the workload. Which of the following did the cloud engineer forget to configure when deploying the virtual machine?
Tags
A systems administrator is reviewing the logs from a company's IDS and notices a large amount of outgoing traffic from a particular server. The administrator then runs a scan on the server, which detects malware that cannot be removed. Which of the following should the administrator do first?
The Chief Information Officer of a financial services company wants to ensure stringent security measures are maintained while migrating customer financial information from a private cloud to the public cloud. The cloud engineer must deploy automated validation and verification checks to prevent unauthorized disclosure of financial information. Which of the following should be configured during the migration?
A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:
secure connectivity that minimizes user login
tracks user activity and monitors for anomalous activity
requires secondary authentication
INSTRUCTIONS
Select controls and servers for the proper control points.
Which of the following should be enabled to reduce cloud compute costs when planning hardware capacity?