A company is using laaS services from two different providers: one for its primary site, and the other for a secondary site. The primary site is completely inaccessible, and the management team has decided to run through the BCP procedures. Which of the following will provide the complete asset information?
Email users report that it takes more than one minute to open emails, including those without attachments. There are three email instances in three different regions hosted by the same CSP.
Other applications hosted by the same CSP have no reported issues. Which of the following solutions BEST resolves the issue?
A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:
* secure connectivity that minimizes user login
* tracks user activity and monitors for anomalous activity
* requires secondary authentication
INSTRUCTIONS
Select controls and servers for the proper control points.

A cloud administrator has finished setting up an application that will use RDP to connect. During testing, users experience a connection timeout error.
Which of the following will MOST likely solve the issue?
Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?