Selma serves as the Chief Information Officer for her organi…

Selma serves as the Chief Information Officer for her organization and must ensure that security objectives for visibility, auditability, control, and agility are met during the AWS cloud migration. Which AWS Cloud Adoption Framework (CAF) perspective would be most appropriate for someone in her position?

Nelson is evaluating two different IT infrastructure options…

Nelson is evaluating two different IT infrastructure options for his business. Option A requires him to purchase and install equipment on his own premises, while Option B allows him to pay a cloud provider based on actual usage. Which statement best describes the key difference between these two approaches?

A polymer beam was designed to sit on three supports, but th…

A polymer beam was designed to sit on three supports, but the middle support was accidentally placed 0.2 mm lower than the others. Determine the magnitude of the vertical reaction force at B after moment M = 0.80 N·m is applied and causes the beam to rest on all three supports. Let a = 50 mm, b = 50 mm, and EI = 0.85 N·m2. Assume that the supports allow rotation, no deflection at A and C, and no additional deflection at B.

A polymer beam was designed to sit on three supports, but th…

A polymer beam was designed to sit on three supports, but the middle support was accidentally placed 0.4 mm lower than the others. Determine the magnitude of the vertical reaction force at B after moment M = 0.78 N·m is applied and causes the beam to rest on all three supports. Let a = 56 mm, b = 56 mm, and EI = 1.00 N·m2. Assume that the supports allow rotation, no deflection at A and C, and no additional deflection at B.

Willie works for a company that is considering moving their…

Willie works for a company that is considering moving their customer data to a public cloud service in the United States. Willie’s company is based in the Great Britain and handles personal data of British citizens. What is the most significant legal concern they should consider?

Martin’s application is currently handling both its core bus…

Martin’s application is currently handling both its core business logic and generic logging functionality within the same container. The logging is causing performance issues and making the main application less reliable. Which multi-container pattern should Martin implement to resolve this problem?

Homer works as an IT security manager for a company that rec…

Homer works as an IT security manager for a company that recently migrated several applications to the cloud. During a security audit, Marge from the compliance team asks him to clarify who is responsible for securing the customer data stored in their cloud-based databases. Homer explains that while the cloud provider manages the underlying infrastructure security, his company must handle data encryption, access controls, and user permissions for their applications. Which of the following best describes the security arrangement Homer is explaining?