A new browser version has been deployed to all users at a company. After the deployment, users report that they can no longer access the company's secure time-card system, which is hosted by a SaaS provider. A technician investigates and discovers a security error is received upon opening the site. If the browser is rolled back to the older version, the site is accessible again. Which of the following is the MOST likely cause of the security error users are seeing?
A. SSL certificate expiration on the SaaS load balancers
B. Federation issues between the SaaS provider and the company
C. Obsolete security technologies implemented on the SaaS servers
D. Unencrypted communications between the users and the application
A company security policy mandates education and training for new employees. The policy must outline acceptable use policies for SaaS applications. Given these requirements, which of the following security controls is BEST suited?
A. Preventive
B. Detective
C. Corrective
D. Physical
Which of the following is an access control type that requires a username and password along with a hardware token?
A. SSO
B. Single-factor
C. RBAC
D. ACL
E. Multifactor
A company has decided to replace hypervisors to reduce licensing costs. An administrator has been tasked with migrating VMs to the new hypervisor. Which of the following migration types will be used?
A. P2P
B. V2V
C. V2P
D. P2V
A hosting company provides 10 VM web servers for a financial institution. The financial institution recently introduced a new web application and now their web traffic has significantly increased. Which of the following could the administrator implement to assist in reducing the load on the web servers?
A. Clustering
B. Virtual switching
C. Load balancing
D. Site mirroring
A cloud administrator is configuring block-level storage. The storage must be configured to be resistant from faults. Given this scenario, which of the following would aid in establishing fault tolerance with asynchronous redundancy?
A. NAS with cloning
B. DAS with mirroring
C. JBOD with mirroring
D. SAN with replication
A company moved its on-premises applications to several SaaS providers. As a result, the security team is concerned about accounts being compromised. Which of the following should the security tem implement to reduce this risk?
A. Multifactor authentication
B. Single sign-on
C. Federation
D. Role-based access control
E. Virtual private network
Company A acquires Company B. The resources need to be added accordingly to the SaaS environment. Which of the following resources should be changed by the tenant?
A. Compute
B. Storage
C. Users
D. Application
All the virtual server instances within an organization's private cloud environment are having trouble logging into the Kerberos realm. Upon investigation, the CSA notices the time stamps are different on the server virtual instances. Which of the following should be the CSA's NEXT step to resolve this issue?
A. Check the Kerberos token time stamp.
B. Check the NTP server to see when it last rebooted.
C. Check the NTP server synchronization.
D. Check the virtual server time display format.
A company is migrating a website to a CSP to improve availability and performance. After testing the application, the systems engineer realizes the website stores the session state in a database system. Which of the following is the BEST way to ensure a successful migration?
A. Configure the new website to use the database system.
B. Migrate to a DBaaS and keep the session state.
C. Implement a new database system to store the session state.
D. Deploy a load balancer to store the session state.