Yeah, that's D. PCI-DSS specifically requires credit card data to be encrypted and never stored or transmitted in cleartext. The other standards don't call this out as directly, pretty sure PCI is the one they want here.
Patching (A) is the most solid approach here since it actually fixes the core vulnerability tied to the CVE. Disabling ports (D) helps limit attack surface but doesn't resolve the flaw itself, especially with a CVSS 9.0 and network vector. I think patching is always top priority for this scenario, unless there's some reason patching isn't possible right away-agree?
I don’t think D fits here. C is the better pick since direct connection (like AWS Direct Connect or ExpressRoute) means dedicated line, much lower latency and overhead compared to anything internet-based. VPN adds encryption overhead and peering is usually just cloud-to-cloud, not on-prem. Pretty sure it’s C unless they throw in some security requirement.
You'd need B for process-level details, since the built-in memory metrics (like in D) usually only show you the whole VM. The cloud-native monitoring agent gets inside the OS and grabs that per-process and memory info. Pretty sure that's how AWS and Azure do it, too. Let me know if I'm missing something from recent updates.
Looks like B is the way to go here. Native memory monitoring (like D) gives you overall usage but won't break it down by process, which is what the question wants. You need the agent installed inside the VM to get process-level stats-it's a classic trap to pick D just because it sounds easy. Pretty sure that's how AWS and Azure do it too, correct me if I'm wrong.
I don't think it's C. B (Persistent volume) should be the one since the word "persistent" can be misleading and trip up people who haven't dealt with container storage nuances. Let me know if you see it differently.
Don’t think it’s B, that’s a common trap. Persistent volume actually keeps data through container restarts. Only C (ephemeral) gets wiped when the container stops or restarts. Seen similar on practice questions, pretty sure about this-disagree?
Not B in this case, it's D. The key is the use of a different location for disaster recovery, which matches the definition of off-site. Replication sounds good but isn't directly what they're describing here.
An administrator is setting up a cloud backup solution that requires the following features:
• Cost effective
• Granular recovery
• Multilocation
Which of the following backup types best meets these requirements?
I would pick B here. "Cloud site" sounds like a better fit for multilocation, and you still get full plus differential backups for some restore flexibility. Not totally sure since granular recovery may not be as good without incrementals. Agree?
Had something like this in a mock, went with A. Off-site gives the multilocation part, and full/incremental/differential gives lots of restore points without blowing up costs. None of the others tick all three boxes.
C is the way to go here since live replication is the only method that meets both the sub-1 second latency and immediate failover needs. Point-in-time and snapshots just can't keep up for instant cutover. Pretty sure about this, but open to pushback.
Pretty sure it's C here. Live replication actually means real-time syncing so failover is instant, which matches the "immediate" requirement. Snapshot and point-in-time have delay, transactional's a trap because it doesn't guarantee zero lag in failover.
C vs D. If "immediate" means zero or near-zero recovery time, then only C (live replication) actually works since point-in-time recovery always has some lag. But if there was even a slight grace period on failover, D could be an option. Seen similar scenarios trip people on exam drills. Pretty sure it's C for strict uptime.