Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Note! The C90.03 Exam is no longer valid. To find out more, please contact us through our Live Chat or email us.

SOA C90.03 Exam With Confidence Using Practice Dumps

Exam Code:
C90.03
Exam Name:
Cloud Technology Lab
Certification:
Vendor:
Questions:
21
Last Updated:
Dec 1, 2024
Exam Status:
Stable
SOA C90.03

C90.03: SOA Other Certification Exam 2024 Study Guide Pdf and Test Engine

Are you worried about passing the SOA C90.03 (Cloud Technology Lab) exam? Download the most recent SOA C90.03 braindumps with answers that are 100% real. After downloading the SOA C90.03 exam dumps training , you can receive 99 days of free updates, making this website one of the best options to save additional money. In order to help you prepare for the SOA C90.03 exam questions and verified answers by IT certified experts, CertsTopics has put together a complete collection of dumps questions and answers. To help you prepare and pass the SOA C90.03 exam on your first attempt, we have compiled actual exam questions and their answers. 

Our (Cloud Technology Lab) Study Materials are designed to meet the needs of thousands of candidates globally. A free sample of the CompTIA C90.03 test is available at CertsTopics. Before purchasing it, you can also see the SOA C90.03 practice exam demo.

Cloud Technology Lab Questions and Answers

Question 1

Cloud Consumer A (the organization that owns Cloud Service Consumer A) needs regular access to an external, cloud-based Weather Service that provides up-to-date weather forecast information. Cloud Providers X, Y and Z are competing public cloud providers, each offering a Weather Service with the features required by Cloud Consumer A.

Based on the provided statistics, which cloud provider can offer a Weather Service with the least amount of projected downtime?

Options:

A.

Cloud Provider X

B.

Cloud Provider Y

C.

Cloud Provider Z

D.

Any of the three cloud providers, because their availability ratings are identical.

Buy Now
Question 2

Cloud X (owned by Cloud Provider X) provides Physical Server A which hosts Virtual Servers A and B. Virtual Server B hosts Ready-Made Environments A and B. Cloud Service Consumer A uses Virtual Server A as part of an IaaS leasing agreement in which Cloud Consumer A is charged a fixed monthly fee for unlimited access. Cloud Service Consumers B and C use Ready-Made Environments A and B respectively as part of a PaaS leasing agreement based on per-minute usage fees. In both cases, access is monitored via Pay-For-Use Monitor A, which keeps track of log-in and log-out times in order to calculate the usage charges that are billed to Cloud Consumers B and C.

Virtual Server A begins generating a series of exceptions. Soon thereafter, Virtual Server B becomes destabilized, resulting in further exceptions being raised in Ready-Made Environments A and B. Cloud Service Consumers B and C receive a series of error messages until both of their connections are dropped Finally, Physical Server A shuts down completely. A subsequent investigation reveals that Virtual Server A was the victim of a security attack performed by a malicious cloud service consumer, the attacker generated increased loads of external communication requests on Virtual Server A and the underlying network, causing Physical Server A (along with Virtual Server B) to eventually shut down.

Which of the following statements accurately identifies the type of security threat that corresponds to the described attack - and -provides a solution that can directly mitigate this type of security threat within Cloud X?

Options:

A.

Virtual Server A was subjected to a denial of service attack that can be mitigated by implementing the encryption and digital signature mechanisms.

B.

Virtual Server A was subjected to an insufficient authorization attack that can be mitigated by implementing the digital signature and hardened virtual server image mechanisms.

C.

Virtual Server A was subjected to a denial of service attack that can be mitigated by implementing the hardened virtual server image and identity and access management mechanisms.

D.

Virtual Server A was subjected to an insufficient authorization attack that can be mitigated by implementing the single sign-on mechanism.