What term refers to the entry points from which an attack can be launched?
Answer : D
Attack surface refers to the various entry points that an attacker can use to launch an attack, which include people, processes, and technology.
A new service has been created and the service instance is ready to use. What type of an alert is generated to notify the user about this event?
Answer : B
Which method optimizes network performance by distributing network traffic across the shared bandwidth of all the ISLs?
Answer : A
What are the key approaches to application transformation?
Answer : B
What is specified by a service attribute?
Answer : B
Service attribute: It specifies configurations of service components. For example, attributes of a VM provided as a service component are: number of processors of specific processing power, memory size, and number of attached disks of specific size.
What is a characteristic of storage resource pools?
Answer : D
A compute system is configured to access files from a network-attached storage system. What is a characteristic of the file system?
Answer : C
Object storage != block storage or File Storage.
A NAS is a file storage, file storage works with protocol such as NFS or SMB. These protocols are managed at the storage system level