Which is a primary security consideration in a cloud environment?
5. Question 5 Which is a primary security consideration in a cloud environment? 1 point Availability Data Security Identity and Access Management All of the above.
5. Question 5 Which is a primary security consideration in a cloud environment? 1 point Availability Data Security Identity and Access Management All of the above.
4. Question 4 Which type of cloud is the best choice for a company with a robust existing IT infrastructure and very serious data privacy concerns? 1 point Public…
3. Question 3 Which two steps of a cloud deployment are performed after you move your applications to the cloud? 1 point Consolidate and Virtualize Integrate and Optimize Automate…
2. Question 2 What relays requests from the VM to the actual hardware? hypervisor
1. Question 1 Virtualization allows you to create multiple simulated environments or dedicated resources from how many physical hardware systems? 1 point 1 2 unlimited 3
7. Question 7 Application configuration files are usually stored in which directory? 1 point /sbin /root /etc /bin
8. Question 8 The Linux “cat” command does which of the following? 1 point Creates a catalog of all files in the file system. Puts the file system catalog…
7. Question 7 When configuring a new application, in which directory should you have it save log files? 1 point /bin /var /log in the same directory where the…
6. Question 6 What does the nano command do? 1 point nano displays the first 10 lines of any text file. nano deletes all empty files and directories. nano…
5. Question 5 In Linux, a directory is a special type of ____. 1 point File