What technology could be used to address software dependency conflicts between applications on the same host operating system?
Correct Answer:
C
Which measures can be taken to prevent unauthorized access to cloud instances and services?
Correct Answer:
D
A software development team uses a single physical server for testing the latest code in multiple environments: development, pre-production, and production.
What is the recommended approach to maintain the basic security of these environments?
Correct Answer:
D
An IT associate has a web application running on multiple servers, configured to scale based on CPU usage. The current configuration has a minimum size of 1 and a maximum size of 5 servers, designed to launch and spread the instances across 3 Availability Zones (AZ). During a low utilization period, an entire AZ went down, and the application experienced downtime. What can the IT associate do to increase the availability of the application?
Correct Answer:
A
An IT associate is researching technology options to use at a company. The company??s application requires a Linux server, features a small memory footprint, and runs mostly web services and a few back-end applications. Which of the following would allow for the most efficient use of system resources and fast startup speeds?
Correct Answer:
A