Which of the following best describe the benefits of a microservices architecture when compared to a monolithic architecture? (Select two).
After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?
Which of the following would a systems administrator follow when upgrading the firmware of an organization's router?
A certificate authority needs to post information about expired certificates. Which of the following would accomplish this task?
A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?
Which of the following types of identification methods can be performed on a deployed application during runtime?
An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?
A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?