Which of the following authentication method types would include using a password in combination with a hardware token?
Which type of cloud computing combines on-premise infrastructure with a public cloud?
What software application architecture allows teams to iterate quickly and to develop software applications to scale rapidly?
What technology could be used to address software dependency conflicts between applications on the same host operating system?
An IT associate has a web application running on multiple servers, configured to scale based on CPU usage. The current configuration has a minimum size of 1 and a maximum size of 5 servers, designed to launch and spread the instances across 3 Availability Zones (AZ). During a low utilization period, an entire AZ went down, and the application experienced downtime. What can the IT associate do to increase the availability of the application?