Morgan has hardened the virtual machines in the subnet he’s just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment?
Fictional Corp’s vice president of sales has just returned f…
Fictional Corp’s vice president of sales has just returned from a conference where he learned about a great customer relationship management platform that he would like for the company to begin using. This platform doesn’t require any investment in hardware, operating systems, or any other software, and only requires administration of user accounts and configuration of the types of data that it needs to store. Users would access it through their web browser, and the administration and maintenance tasks for the IT department would be minimal. Which of the following is the VP suggesting that the company use?
Thelonius has just created a new virtual machine. By default…
Thelonius has just created a new virtual machine. By default, the cloud service provider automatically configured it as part of a class C private network. Which of the following is the default subnet mask expressed in CIDR notation that was configured?
Jan has just migrated a virtual machine from the company’s p…
Jan has just migrated a virtual machine from the company’s private cloud to the cloud service provider his company uses. He wants to see how the system responds as well as compare the original and new baselines. What type of testing should he perform?
Applications and data from Fictional Corp.’s on-premises phy…
Applications and data from Fictional Corp.’s on-premises physical servers are now being transferred to a cloud service provider. Although they successfully transferred the application code, they still need to move the servers that host the underlying database. Which of the following might provide the most risk when moving database servers?
One of the internal company-developed cloud apps has receive…
One of the internal company-developed cloud apps has received updates from Cara. She opened the internal tracking program and noticed that the change evaluation stage had just been completed. What stage of the change management process should it be at right now?
Instead of outsourcing the infrastructure to a third -party…
Instead of outsourcing the infrastructure to a third -party provider, Craig wants to establish a computer infrastructure that would enable developers within his organization to build apps on a platform that is mostly hosted internally. He does, however, desire simple access to AWS goods. Craig might utilize which of the following to do this.
Laurel is selecting a VPN protocol for her company’s network…
Laurel is selecting a VPN protocol for her company’s network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?
Len has identified encrypted files in the network databases…
Len has identified encrypted files in the network databases that contain sensitive information but are configured with access permissions that allow almost everyone access. What type of security issue is this?
Adrienne wants to be able to analyze the traffic coming into…
Adrienne wants to be able to analyze the traffic coming into a Linux server’s network interface. Which of the following command line utilities will allow her to see this information?