I'm not sure about the difference between SSE-S3 and SSE-KMS. Do we need to use a customer-managed key, or can we just use the AWS-managed keys? I'm leaning towards option D, but I'm not 100% sure.
I'm pretty confident on this one. The correct answer is B - making sure the BIG-IP isn't under heavy load. The SNAT pool configuration itself doesn't need any special preparation as long as it's already in use.
I'm a little confused by all the background information on the training program. Does that really matter for answering the question? I feel like I'm getting bogged down in the details instead of focusing on the core issue of how to respond to the security breach.
I believe it's C) Define an application boundary and provides consistent traffic routing, connectivity, resiliency, and security for applications across multiple clusters.
I agree with Francine. C) Define an application boundary and provides consistent traffic routing, connectivity, resiliency, and security for applications across multiple clusters seems to fit the concept of Global Namespace.
I see where you're coming from, Francine. But I think D) Provide distributed ingress and egress services to support multiple namespaces across multiple clusters is the right option.
I disagree, I believe the correct answer is C) Define an application boundary and provides consistent traffic routing, connectivity, resiliency, and security for applications across multiple clusters.
Jeanice
3 months agoJutta
3 months agoJoanne
3 months agoVivan
4 months agoKristel
4 months agoSherly
4 months agoAdolph
4 months agoArthur
4 months agoDortha
5 months agoHyman
5 months agoErick
5 months agoFrankie
5 months agoFelicia
5 months agoBeckie
5 months agoMalcom
5 months agoAlisha
5 months agoShay
5 months agoJules
5 months agoDarrel
2 years agoElke
2 years agoCathern
2 years agoBethanie
2 years agoOretha
2 years agoTracey
2 years agoFrancine
2 years agoOretha
2 years ago