1.
A company with critical resources in the cloud needs to ensure data is available in multiple datacenters around the world. Which of the following BEST meets the company's needs?
2.
Which of the following can be used by a client's finance department to identify the cost of cloud use in a public cloud environment shared by different projects and departments?
3.
A company is migrating a legacy application to the cloud. Two C-level executives are currently engaged in the initial stages of the migration, and they are planning a rip-and-replace approach. Before initiating the project, the FIRST step should be to identify:
4.
A company migrated all of its infrastructure to the cloud. The cloud security team must review the security post-migration. Which of the following is the MOST appropriate task for the cloud security team to perform?
5.
A company wants to migrate mission-critical applications to the cloud. In order for technicians to build, decommission, and perform other routine functions, which of the following cloud characteristics would BEST satisfy this business requirement?
6.
A company deploys a data management capability that reduces RPO. Which of the following BEST describes the capability needed?
7.
A company is required to move its human resources application to the cloud to reduce capital expenses. The IT team does a feasibility analysis and learns the application requires legacy infrastructure and cannot be moved to the cloud. Which of the following is the MOST appropriate cloud migration approach for the company?
8.
An IT team documented the procedure for upgrading an existing IT resource within the cloud. Which of the following BEST describes this procedure?
9.
A business analysis team is reviewing a report to try to determine the costs for a cloud application. The report does not allow separating costs by application. Which of the following should the team use to BEST report on the costs of the specific cloud application?
10.
A cloud administrator configures a server to insert an entry into a log file whenever an administrator logs in to the server remotely. Which of the following BEST describes the type of policy being used?