I'm not sure about the difference between SSE-S3 and SSE-KMS. Do we need to use a customer-managed key, or can we just use the AWS-managed keys? I'm leaning towards option D, but I'm not 100% sure.
I'm pretty confident on this one. The correct answer is B - making sure the BIG-IP isn't under heavy load. The SNAT pool configuration itself doesn't need any special preparation as long as it's already in use.
I'm a little confused by all the background information on the training program. Does that really matter for answering the question? I feel like I'm getting bogged down in the details instead of focusing on the core issue of how to respond to the security breach.
I believe it's C) Define an application boundary and provides consistent traffic routing, connectivity, resiliency, and security for applications across multiple clusters.
I agree with Francine. C) Define an application boundary and provides consistent traffic routing, connectivity, resiliency, and security for applications across multiple clusters seems to fit the concept of Global Namespace.
I see where you're coming from, Francine. But I think D) Provide distributed ingress and egress services to support multiple namespaces across multiple clusters is the right option.
I disagree, I believe the correct answer is C) Define an application boundary and provides consistent traffic routing, connectivity, resiliency, and security for applications across multiple clusters.
Jeanice
5 months agoJutta
5 months agoJoanne
5 months agoVivan
5 months agoKristel
6 months agoSherly
6 months agoAdolph
6 months agoArthur
6 months agoDortha
6 months agoHyman
6 months agoErick
6 months agoFrankie
6 months agoFelicia
7 months agoBeckie
7 months agoMalcom
7 months agoAlisha
7 months agoShay
7 months agoJules
7 months agoDarrel
2 years agoElke
2 years agoCathern
2 years agoBethanie
2 years agoOretha
2 years agoTracey
2 years agoFrancine
2 years agoOretha
2 years ago