Do you know that you can access more real exam questions via Premium Access? ()
CyTech Private Ltd. is an IT company located in Jacksonville. Florid
a. The organization would like to eliminate a single point of failure: therefore. In 2017. the organization adopted a cloud computing service model in which the cloud service provider completely handles the failover. CyTech Private Ltd. added automated failover capabilities to its cloud environment and it has boon testing the functionality to ensure that it is working efficiently. In which of the following cloud computing service models, failover is completely handled by the cloud service provider?
Answer : C
An Azure subscription owner, Arial Solutions, gets notified by Microsoft (by default} when a high-severity alert (email notification) is triggered. The cloud security engineer would like to send these security alerts to a specific Individual or anyone with particular Azure roles for a subscription, and modify the severity levels for which alerts are sent. How con the cloud security engineer configure these alerts?
Answer : D
Dave Allen works as a cloud security engineer in an IT company located in Baltimore, Maryland. His organization uses cloud-based services; it also uses the Network Watcher regional service to monitor and diagnose problems at the network level. It contains network diagnostic and visualization tools that help in understanding, diagnosing, and obtaining visibility into the network in a cloud environment. This service helped Dave in detecting network vulnerabilities, monitoring network performance, and ensuring secure cloud operations. Which of the following cloud service providers offers the Network Watcher service?
Answer : B
Azure Network Watcher is a regional service provided by Microsoft Azure that offers network monitoring, diagnostic, and visualization tools. It helps in detecting network vulnerabilities, monitoring network performance, and ensuring secure operations in a cloud environment.
Other cloud providers such as Google Cloud, IBM, and AWS have their own network monitoring tools, but Network Watcher is specific to Azure.
For securing data, an AWS customer created a key in the Alabama region to encrypt their data in the California region. Two users were added to the key along with an external AWS account. When the AWS customer attempted to encrypt an S3 object, they observed that the key is not listed. What is the reason behind this?
Answer : B
AWS Key Management Service (KMS) keys are region-specific. An encryption key created in one region (e.g., Alabama) cannot be used to encrypt data in another region (e.g., California).
When attempting to encrypt an S3 object, the KMS key must reside in the same region as the S3 bucket. This is a limitation designed to ensure data locality and security.
TechGloWorld is an IT company that develops cybersecurity software and applications for various customers across the globe. Owing to the cost-effective security and storage services provided by AWS. TechGloWorld has adopted AWS cloud-based services. A new employee, named Tom Harrison, has joined TechGloWorld as a cloud security engineer. The team leader of cloud security engineers would like to add an 1AM user named Tom to the 1AM group named Admins. Which of the following commands should be used by the TechGloWorld security team leader?
Answer : C
The AWS CLI command to add a user to a group follows this syntax:
aws iam add-user-to-group --user-name <UserName> --group-name <GroupName>
The correct command with proper syntax for adding the user 'Tom' to the group 'Admins' is:
aws iam add-user-to-group --user-name Tom --group-name Admins
Options A, B, and D contain incorrect syntax or misspellings.