A developer sends multiple requests to a SaaS application in a short amount of time. The developer realizes that the entire server and all other users can no longer send requests to the application. Which of the following best describes the issue?
A new application that will be deployed to cloud VMs has the following requirements:• Low inter-VM latency• Horizontal scaling support• 98.5% availability• 8vCPU and 16GB• Ability to split jobs across VMsWhich of the following will best meet these requirements?
A cross-site request forgery vulnerability exploited a web application that was hosted in a public IaaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?
Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?
Which of the following is the most cost-effective way to store data that is infrequently accessed?
A company’s content management system (CMS) service runs on an IaaS cluster on a public cloud. The CMS service is frequently targeted by a malicious threat actor using DDoS.Which of the following should a cloud engineer monitor to identify attacks?