Maria would like to recommend a serverless computing solution to her customer. What is one advantage of serverless?
Blog
Fictional Corp. has recently implemented a change management…
Fictional Corp. has recently implemented a change management process where a group of employees, through regular meetings, must approve or deny the changes that are proposed through a formalized process. What is the name of the team of employees that is responsible for approving or denying the requested changes?
Kim is trying to keep the containers used to support the app…
Kim is trying to keep the containers used to support the applications being used by her 80 employees from being overloaded with traffic. She decides to configure the containers to only accept a maximum of 60 requests for work at any one time. What term describes the strategy she is using?
Margaret has designed an application and the underlying syst…
Margaret has designed an application and the underlying systems that it resides on to have a five-nine uptime or 99.999%. Which of the following techniques has she implemented?
Jordan’s manager knows that he is working on implementing a…
Jordan’s manager knows that he is working on implementing a VPN connection between the company’s on-premises data center and the cloud service provider his company uses. The manager was concerned that Jordan used an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following protocols was manager was concerned about?
Bonnie has been charged with doing an investigation of the f…
Bonnie has been charged with doing an investigation of the firewall infrastructure at her workplace. The company employs a lot of employees who work remotely from their homes in addition to having several office sites spread out around the United States. She discovers that a large number of the current firewalls are no longer maintained by the manufacturer and has persuaded the corporation to set aside some funds to acquire a replacement. Which of the following options may she suggest in their place?
Thelonius has just created a new virtual machine. By default…
Thelonius has just created a new virtual machine. By default, the cloud service provider automatically configured it as part of a class C private network. Which of the following is the default subnet mask expressed in CIDR notation that was configured?
Marissa is wanting to implement a VPN at her company but kno…
Marissa is wanting to implement a VPN at her company but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?
Fictional Corp. is in need of a cloud service provider. They…
Fictional Corp. is in need of a cloud service provider. They have whittled down their options to two CSPs that might satisfy their technical requirements after taking into account a number of factors. Which action might they additionally think about doing before committing to any agreements or opening an account on such platforms?
Len has identified encrypted files in the network databases…
Len has identified encrypted files in the network databases that contain sensitive information but are configured with access permissions that allow almost everyone access. What type of security issue is this?