Morgan has hardened the virtual machines in the subnet he’s…

Morgan has hardened the virtual machines in the subnet he’s just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment?

Fictional Corp’s vice president of sales has just returned f…

Fictional Corp’s vice president of sales has just returned from a conference where he learned about a great customer relationship management platform that he would like for the company to begin using. This platform doesn’t require any investment in hardware, operating systems, or any other software, and only requires administration of user accounts and configuration of the types of data that it needs to store. Users would access it through their web browser, and the administration and maintenance tasks for the IT department would be minimal. Which of the following is the VP suggesting that the company use?

Applications and data from Fictional Corp.’s on-premises phy…

Applications and data from Fictional Corp.’s on-premises physical servers are now being transferred to a cloud service provider. Although they successfully transferred the application code, they still need to move the servers that host the underlying database. Which of the following might provide the most risk when moving database servers?

One of the internal company-developed cloud apps has receive…

One of the internal company-developed cloud apps has received updates from Cara. She opened the internal tracking program and noticed that the change evaluation stage had just been completed. What stage of the change management process should it be at right now?

Instead of outsourcing the infrastructure to a third -party…

Instead of outsourcing the infrastructure to a third -party provider, Craig wants to establish a computer infrastructure that would enable developers within his organization to build apps on a platform that is mostly hosted internally. He does, however, desire simple access to AWS goods. Craig might utilize which of the following to do this.

Laurel is selecting a VPN protocol for her company’s network…

Laurel is selecting a VPN protocol for her company’s network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?