A security analyst is investigating a recurring alert. The alert is reporting an insecure firewall configuration state after every cloud application deployment. The process of identifying the issue, requesting a fix, and waiting for the developers to manually patch the environment is being repeated multiple times. In an effort to identify the root issue, the following logs were collected:
Deploying template app prod. •yaml
Instance DB successfully created
DB keys successfully stored on vault
Instance WebApp successfully created
Access rules successfully applied
Access—keys successfully created
Which of the following options will provide a permanent fix for the issue?
A company's web servers are scheduled for patching and quarterly updates. A cloud administrator must prevent the monitoring systems from logging outage alerts and negatively impacting company SLA targets. Which of the following is the best action for the administrator to take?
A cloud administrator needs to deploy a security virtual appliance in a private cloud environment, but this appliance will not be part of the standard catalog of items for other users to request. Which of the following is the BEST way to accomplish this task?
Developers report that the time needed in the current build process to deploy a VM, install an OS, and configure an application is too long. The developers want a more optimized solution that allows portability of the application across environments and can be deployed more quickly and efficiently. Which of the following should be used to optimize the environment?