Which of the following are considered secure access types of hosts in the cloud? (Choose two.)
Answer : A, C
Which of the following is true about the use of technologies such as JSON and XML for cloud data interchange and automation tasks?
Answer : C
Which of the following explains why a cloud provider would establish and publish a format data sanitization policy for its clients?
Answer : D
Which of the following documents has the sole purpose of outlining a professional services engagement that
governs a proposed cloud migration?
Answer : D
Which of the following cloud migration methods would be BEST suited for disaster recovery scenarios?
Answer : A
Which of the following stores transactions in a distributed ledger of which all users have a copy?
Answer : B
A systems administrator must select a CSP while considering system uptime and access to critical servers. Which of the following is the MOST important criterion when choosing the CSP?
Answer : C