A cloud engineer needs to migrate an application from on premises to a public cloud. Due to timing constraints, the application cannot be changed prior to migration. Which of the
following migration strategies is best approach for this use case?
Rehosting, often referred to as 'lift-and-shift,' is the process of migrating an application or workload to the cloud without modifying it. This approach is suitable when there are timing constraints that prevent making changes to the application prior to migration. Rehosting can be the quickest migration strategy since it involves moving the existing applications to the cloud with minimal changes.
A cloud consultant needs to modernize a legacy application that can no longer address user demand and is expensive to maintain. Which of the following is the best migration
strategy?
Refactoring is the process of restructuring existing computer code without changing its external behavior. In cloud computing, it often means modifying the application to better leverage cloud-native features and services. This can address user demand and reduce maintenance costs by making the application more scalable, resilient, and manageable. Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg
The company's IDS has reported an anomaly. The cloud engineer remotely accesses the cloud instance, runs a command, and receives the following information:
Which of the following is the most likely root cause of this anomaly?
The output from the 'ps' command indicates there is a process running under the UID (User ID) of 0, which is the root user, and the command that was run is '/var/www/command.py'. Given that the normal Apache processes are running under their own UID (65535), this suggests that a command was executed with root privileges that typically should not have such high-level access. This is a strong indicator of privilege escalation, where an unauthorized user or process gains elevated access to resources that are normally protected from an application or user. Reference: CompTIA Cloud+ Certification Study Guide (Exam CV0-004) by Scott Wilson and Eric Vanderburg
Following a ransomware attack, the legal department at a company instructs the IT administrator to store the data from the affected virtual machines for a minimum of one year.
Which of the following is this an example of?
The instruction by the legal department to store data from the affected virtual machines for a minimum of one year is an example of data Retention. Retention policies are often driven by regulatory compliance requirements and dictate how long certain types of data must be kept before they can be securely disposed of. Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson
A cloud service provider requires users to migrate to a new type of VM within three months. Which of the following is the best justification for this requirement?
The best justification for a cloud service provider requiring users to migrate to a new type of VM within a specific time frame is that the equipment is reaching end of life and end of support (EOL/EOS). This means that the older type of VM will no longer receive updates or support, which could include important security patches, so it is necessary to move to newer VM types to maintain security and performance. Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson
Rozella
14 hours agoMaryrose
9 days agoMaurine
16 days agoCordie
27 days agoLasandra
30 days agoStephania
1 months agoGilbert
1 months agoErnestine
2 months agoRima
2 months agoMy
2 months agoDominga
2 months agoTruman
3 months agoPaul
3 months agoThaddeus
3 months agoJamika
4 months agoChi
5 months agoIlene
5 months agoLindsey
5 months agoKarrie
5 months agoVashti
6 months agoelishaa
6 months agoMark james
6 months agokallisa
6 months agomelivish
6 months agoMaryann
6 months agoAntonio
7 months agobavigi
7 months ago