A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the following migration strategies is best approach for this use case?
A cloud infrastructure administrator updated the IP tables to block incoming connections and outgoing responses to 104.225.110.203. Which of the following vulnerability management steps is this an example of?
A systems administrator needs to configure a script that will monitor whether an application is healthy and stop the VM if an unsuccessful code is returned. Which of the following scripts should the systems administrator use to achieve this goal?
A company recently set up a CDN for its photography and image -sharing website. Which of the following is the most likely reason for the company's action?
A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?
An engineer made a change to an application and needs to select a deployment strategy that meets the following requirements: • Is simple and fast • Can be performed on two Identical platforms Which of the following strategies should the engineer use?