A cloud engineer recently set up a container image repository. The engineer wants to ensure that downloaded images are not modified in transit. Which of the following is the best method to achieve this goal?
SHA-256 is the best method to ensure that downloaded images are not modified in transit. SHA-256 is a type of cryptographic hash function that can generate a unique and fixed-length digest for any input data. The digest can be used to verify the integrity and authenticity of the data, as any modification or tampering of the data would result in a different digest.SHA-256 is more secure and reliable than MD5, which is an older and weaker hash function that has been proven to be vulnerable to collisions and attacks12. AES-256 and serpent-256 are types of encryption algorithms, not hash functions, and they are used to protect the confidentiality of the data, not the integrity.IPSec is a network security protocol that can use encryption and hashing to secure data in transit, but it is not a method by itself
A cloud administrator is supporting an application that has several reliability issues. The administrator needs visibility into the performance characteristics of the application. Which of the following will MOST likely be used in a reporting dashboard?
The best answer is D. Metrics and time-series data measuring key performance indicators.
Metrics and time-series data are numerical values that represent the state and behavior of a system over time. They can measure key performance indicators (KPIs) such as availability, latency, throughput, error rate, and resource utilization. Metrics and time-series data can help a cloud administrator to monitor, analyze, and troubleshoot the performance characteristics of an application .
Metrics and time-series data are most likely to be used in a reporting dashboard, because they can provide a clear and concise overview of the application's performance. A reporting dashboard is a graphical user interface that displays the most important information about a system or a process in a single view. A reporting dashboard can help a cloud administrator to:
Visualize the trends and patterns of the metrics and time-series data using charts, graphs, tables, or gauges .
Compare the actual performance of the application with the expected or desired performance based on the defined service level objectives (SLOs) or service level agreements (SLAs) .
Identify and diagnose any performance issues or anomalies that may affect the reliability of the application .
Communicate and report the performance status and results to the stakeholders or customers.
The other options are not as likely to be used in a reporting dashboard, because they are either too detailed, too outdated, or too irrelevant for measuring the performance characteristics of the application. For example:
Data from files containing error messages from the application (A) may help to identify and debug some specific errors or exceptions that occur in the application. However, they are not sufficient to measure the overall performance or reliability of the application. They are also too verbose and unstructured to be displayed in a reporting dashboard.
Results from the last performance and workload testing (B) may help to evaluate and optimize the performance of the application under different scenarios and conditions. However, they are not representative of the current or real-time performance of the application in production. They are also too static and outdated to be displayed in a reporting dashboard.
Detail log data from syslog files of the application may help to record and track the events and activities that happen in the application. However, they are not designed to measure the key performance indicators or metrics of the application. They are also too complex and voluminous to be displayed in a reporting dashboard.
A company recently subscribed to a SaaS collaboration service for its business users. The company also has an on-premises collaboration solution and would like users to have a seamless experience regardless of the collaboration solution being used.
Which of the following should the administrator implement?
Single sign-on (SSO) is a type of authentication mechanism that allows users to access multiple systems or applications with a single login credential. SSO can help users have a seamless experience regardless of the collaboration solution being used, as it can eliminate the need for multiple logins and passwords for different systems or applications. SSO can also improve user convenience, productivity, and security, as it can simplify the login process, reduce login errors, and enhance password management. Reference:CompTIA Cloud+ Certification Exam Objectives, page 14, section 2.7
A systems administrator wants to verify the word "qwerty" has not been used as a password on any of the administrative web consoles in a network. Which of the following will achieve this goal?
A default and common credentialed scan is what the administrator should use to verify the word ''qwerty'' has not been used as a password on any of the administrative web consoles in a network. A credentialed scan is a type of vulnerability scan that uses valid credentials or accounts to access and scan target systems or devices. A credentialed scan can provide more accurate and detailed results than a non-credentialed scan, as it can perform more actions and tests on target systems or devices. A default and common credentialed scan is a type of credentialed scan that uses default or common credentials or accounts, such as admin/admin, root/root, etc., to access and scan target systems or devices. A default and common credentialed scan can help to identify weak or insecure passwords on administrative web consoles, such as ''qwerty'', and recommend stronger passwords.
A cloud security engineer needs to design an IDS/IPS solution for a web application in a single virtual private network. The engineer is considering implementing IPS protection for traffic coming from the internet. Which of the following should the engineer consider to meet this requirement?
AnIntrusion Detection System (IDS)is a software or hardware system that monitors network traffic for malicious activity and alerts the administrator of any potential threats. AnIntrusion Prevention System (IPS)is a software or hardware system that not only detects but also blocks or mitigates the malicious activity.Both IDS and IPS are essential for securing a web application in a cloud environment1.
A web proxy server is a server that acts as an intermediary between the client and the web server. It can provide caching, filtering, and authentication services, but it does not offer IDS/IPS functionality. Therefore, option A is incorrect.
Load balancing using SSI (Server Side Includes) is a technique that distributes the workload among multiple web servers by inserting dynamic content into web pages. It can improve the performance and availability of a web application, but it does not provide IDS/IPS protection. Therefore, option B is incorrect.
Implementing IDS/IPS agents on each instance running in that virtual private network is a valid solution for providing IPS protection for traffic coming from the internet. The agents can monitor and inspect the network traffic on each instance and block or report any suspicious activity to a central management console. This can prevent attacks from reaching the web application or spreading to other instances in the same network. Therefore, option C is correct.
Implementing dynamic routing is a technique that allows routers to select the best path for forwarding packets based on network conditions. It can enhance the reliability and efficiency of a network, but it does not offer IDS/IPS functionality. Therefore, option D is incorrect.
Erasmo
11 days agoYan
27 days agoFreeman
2 months agoFlo
2 months agoKing
3 months agoLashonda
4 months agoJuliann
4 months agoNakisha
4 months agoMertie
5 months agoRosenda
5 months agoRessie
5 months agoBethanie
6 months agoDorthy
6 months agoNoah
6 months agoTamie
6 months agoLelia
7 months agoShenika
7 months agoOllie
7 months agoRhea
7 months agoShawn
7 months agoCathrine
8 months agoTyisha
8 months agoKiley
8 months agoMiesha
8 months agoDana
9 months agoChu
9 months agoValene
9 months agoStevie
9 months agoTasia
9 months agoJovita
10 months agoRashida
10 months agoJennifer
10 months agoLezlie
11 months agoLuke
11 months agoTasia
12 months agoCeleste
12 months agoLayla
1 years agoCheryl
1 years agoJerrod
1 years ago