option
Questions
ayuda
daypo
search.php
ERASED TEST, YOU MAY BE INTERESTED ON DEA-2TT3
COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
DEA-2TT3

Description:
DEA-2TT3

Author:
AVATAR
AY
Other tests from this author

Creation Date:
17/02/2022

Category: Computers

Number of questions: 163
Share the Test:
New CommentNuevo Comentario
No comments about this test.
Content:
What refers to an agreement between provider and consumer that states the terms of service usage? Service contract Service template Chargeback Showback.
What is an advantage of adopting a microservices strategy in an application development environment? All microservices of an application are always updated at the same time for maintaining consistency in the application Every microservice can be deployed, upgraded, scaled, and restarted independent of other services in the application Microservices are tightly coupled so it is easy to scale all the services at once to meet business demands Microservices provide the application platform to implement DevOps in the organization easily and at low cost.
Which role in service portfolio management determines and delivers the services that provide value and strategic advantage to the provider? Cloud Service Account Manager Cloud Automation Engineer Cloud Administrator Cloud Auditor.
Refer to the exhibit, which represents a consumer environment consisting of multiple VMs running Windows operating systems (OSs). For compliance reasons, the cloud service provider maintains version control over the OS provided to the consumer. The service provider also ensures that the configurations of the VMs comply with the configuration policy for the OS version. The configuration policy includes the two conditions shown in the exhibit. A monitoring tool verifies VM configurations against the configuration policy and provides the compliance results shown. What is the percentage of compliance non-adherence? 30.12% 33.34% 58.33% 66.67%.
Which management process ensures business continuity by eliminating single points of failure in a data center? Availability management Security management Capacity management Performance management.
Which Dell EMC product is used for a disk-based backup and recovery solution that provides inherent source-based data deduplication? NetWorker ProtectPoint Data Domain Avamar.
Which phase of the cloud service lifecycle involves making business use case decisions for the cloud service offering portfolio? Service Termination Service Planning Service Creation Service Operation.
Which software-defined storage controller function gathers data about the components and brings them under its control and management? Storage provisioning Storage discovery Resource abstraction and pooling Storage component management.
The incident management team is unable to determine the root cause of an incident. To which team should the error-correction activity be transferred? Performance Management Change Management Availability Management Problem Management.
What capability is provided by the “Open and extensible” attribute of software-defined infrastructure (SDI)? Uses APIs to integrate multivendor resources into the SDI environment Optimizes resource usage and generates value reports about the SDI environment Provides a control point for the entire SDI environment Provides multitenancy that enables consumers to share resources in the SDI environment.
What mechanism does RSA SecurID use? Single sign-on authentication Policy-based authorization Multi-factor authentication Role-based authorization.
What is the function of a monitoring and alerting tool? Focus on examining the usage of resources by customers and service providers and provide notification to optimize and manage workloads Control charges for cloud usage by optimizing cloud resource utilization Automate tasks and IT processes and manage the IT environment Enable people to work closely together on a common project, in real time, by making communication among them easier.
Match each information security concept with its description Availability Integrity Accountability Confidentiality.
What capability does an orchestration workflow provide? Helps administer the cloud infrastructure, such as adding resources to a resource pool, billing, and reporting Helps to consolidate all the IT resources in the cloud environment Enables the administrator to control the underlying physical infrastructure using a single unified management console Creates an automated set of tasks to update the service catalog by cloud consumers without requiring manual intervention.
What can an IT department do to better meet IT challenges and support digital businesses? Become more technology centric Focus on delivery and management of digital assets Become more service centric within cost constraints Focus on providing services without being distracted by costs.
What is a characteristic of thin LUNs? When a thin LUN is destroyed, its allocated capacity is automatically reclaimed to the pool. When a thin LUN is created, physical storage is fully allocated for it Once a thin LUN is created it cannot be destroyed until all data is deleted from it When a thin LUN is destroyed, its allocated capacity is reserved until an administrator reclaims it.
Which product provides key management and a data-at-rest encryption mechanism for private, public, and hybrid clouds? RSA SecurID Dell EMC CloudArray RSA Archer eGRC Dell EMC CloudLink.
What is a key benefit of using containers? Eliminates any long-term commitments to a technology stack Helps speed up software release cycles and improve software quality Enables services to be delivered in hour or days, not weeks Provides better probability without requiring code changes.
What is the purpose of a bitmap in snapshot creation? Keeps track of blocks that have changed in the filesystem Indicates the exact address from which data has to be read Indicates the exact address to where data has to be written Keeps track of the number of blocks that are highly utilized.
An organization needs to deploy remote replication between two sites that are 100 km (62 miles) apart. The organization requires a near zero recovery point objective. Which solution would you recommend? Hypervisor-based asynchronous replication Synchronous replication Snapshot replication Asynchronous replication.
Which method optimizes network performance by distributing network traffic across the shared bandwidth of all the ISLs? Link aggregation Network zoning Network segmentation Link failover.
Which product is a single-instance, multitenant integration platform as a service that provides a unified online development and management environment? MyService 360 ViPR SRM Data Protection Advisor Dell Boomi.
Which cloud service model is represented in the exhibit? Software as a Service Infrastructure as a Service Platform as a Service Database as a Service.
What is an organizational benefit of adopting modern applications? Enhances competitiveness Removes dependency on IT completely Eliminates CAPEX Removes dependency on service provider.
Which process involves determining the optimal resources required to meet seasonal spikes in resource demand? Configuration management Change management Capacity management Incident management.
Which task describes adherence to compliance? Ensure security policies are being enforced Define access rights to users Assess the cloud provider’s capability to provide logs Assess assets with realistic valuations.
Which activity is conducted during the service termination phase of the cloud service lifecycle? De-provisioning the service instance Asking for the service contract Establishing the billing policy Providing the final service assessment report.
What is a function of service portfolio management? Ensure compliance to industry standards Enable capacity and availability management Perform market research and collect information about competitors Collect information about cloud services and their constituent elements.
A compute system is configured to access files from a network-attached storage system. What is a characteristic of the file system? Managed by the object-based storage device node Managed by the compute system Managed by the storage system Part of the storage area network.
What refers to the logging of all transactions when assessing the effectiveness of security controls in a cloud computing environment? Accounting Monitoring Auditing Metering.
What is a benefit of the active-active cluster implementation? Enhances performance and availability of a service Lower total cost of ownership for providing services Improves security of application running on the cluster Ability to run multiple services on one physical compute system.
An organization has deployed a cloud infrastructure. They frequently experience power outages that result in their service offerings being unavailable from time to time. What term refers to this condition? Transient unavailability In-transient unavailability Permanent unavailability Intermittent unavailability.
A new service has been created and the service instance is ready to use. What type of an alert is generated to notify the user about this event? Instructional Informational Warning Caution.
What ensures that the cloud services and service creation processes adhere to relevant policies and legal requirements? Problem management Risk management Audit management Compliance management.
What term refers to businesses that cautiously and gradually embrace digital transformation? Digital Laggards Digital Evaluators Digital Leaders Digital Adopters.
A service is offered to consumers from 9 A.M. to 5 P.M., Monday through Friday. The service experiences downtime from 3 P.M. to 5 P.M. on Wednesday of a given week. What is the service availability for that week? 95.00% 95.88% 96.42% 98.33%.
Match each virtual network type with its characteristics. VLAN Stretched VLAN Private VLAN Virtual SAN.
Which activity is a part of people transformation? Automation of IT tasks that reduces manpower needs Adoption of a modern IT infrastructure Communication between IT staff and business leaders Adoption of a standard framework such as ITL.
Which compliance standard provides policies and procedures to optimize the security of credit card transactions? HIPAA ENISA CSA CCM PCI DSS.
What is specified by a service attribute? Relationships between services Configurations of service components Management operations Structure of a service.
A specific intrusion detection and prevention system (IDPS) scans events against known attack patterns. Which technique is the IDPS using? Plug-in-based detection Signature-based detection Device-based detection Anomaly-based detection.
What term refers to the entry points from which an attack can be launched? Work factor Velocity of attack Attack vector Attack surface.
Which backup method type is represented in the exhibit? Direct backup Guest VM level backup Image-level backup Guest OS level backup.
What is a function of business relationship management? Determine if the capacity of IT services can deliver the agreed upon service levels Identify requirements and ensure that the appropriate services are provided Identify accurate information for all operational services Determine what the sufficient capacity is to meet business demand.
Match each service management phase with its process. Service Transition Service Design Service Operation Service Strategy.
What is a key element of a cloud portal? Unified manager Element manager Orchestrator Management interface.
47.What is a function of the discovery operation during the service operation phase of the cloud service lifecycle? Collects information about people involved in the service operations Collects information about services available in the catalog Provides visibility into each Cloud service asset employed Restores service levels while continuously optimizing operations.
What is a characteristic of storage resource pools? Resource pools should always be created by different types of storage devices Resources are reserved by the application after being released by the consumer Resources are dynamically released to the pool when the consumer exceeds their quota Resources are dynamically allocated based on consumer demand.
What is a responsibility of the Service Account Manager? Maintaining day-to-day contact that consumers’ needs are met Designing, planning, managing, maintaining, and supporting the cloud infrastructure Understanding consumers’ needs and industry trends to drive an affective product strategy Streaming service delivery and execution, and handling early warnings for service issues.
What is a benefit of synchronous remote replication? Replicates data across any geographic location without impacting response time Ensures source and replica have identical data at all times Supports locality of reference to improve replication performance Saves network bandwidth by replicating only deduplicated data.
A cloud service provider uses a resource pooling approach to improve the utilization of resources by sharing them with multiple customers. What mechanism should the cloud provider deploy to prevent one consumer from accessing the virtual machines of another consumer? Hypervisor-based resource pooling Secure multitenancy through isolation Pooling of resources through multitenancy Virtual machine-based resource pooling.
What are the key approaches to application transformation? Restore, Reuse, Retain, Retire Refactor, Revise, Retain, Retire Retain, Refactor, Reuse, Revise Revise, Restore, Retain, Re-iterate.
Refer to the exhibit. Which type of hypervisor is installed in this environment? Hosted Hypervisor-Type 1 Bare Metal Hypervisor-Type 1 Hosted Hypervisor-Type 2 Bare Metal Hypervisor-Type 2.
What is a key function of the cloud service component? Allows consumers to create service offerings for a service catalog Enables service providers to request the purchase of new IT resources Presents cloud infrastructure for use of services by consumers Allows consumers to modify the existing service offerings in a service catalog.
Which method compares observed events with normal activities to identify abnormal patterns in a system? Encryption-based authentication Anomaly-based intrusion detection Multi-factor authentication Signature-based intrusion detection.
In which technique does an application maintain limited functionality, even when some of the modules or supporting services of that application become unavailable? Retry logic Persistent state model Graceful degradation Checkpointing.
What is the correct sequence of steps involved in synchronous remote replication? Source storage system sends an acknowledgement back to the production compute system Write I/O is transmitted to the cache of the target storage Receipt acknowledgement is provided by target storage back to the cache of the source Write I/O is received from the production compute system into cache of source and placed in queue.
To implement a new service desk management tool, the capacity of the servers has to be extended. Who is responsible for managing the request for additional capacity? Change Manager Financial Manager Capacity Manager Service Level Manager.
Which Dell EMC product provides a converged infrastructure solution? XC Series Appliance VxBlock VxRail Appliance XtremIO.
What is a service contract? Agreement between provider and consumer that states the terms of service usage Agreement between provider and supplier that describes the service template specifics Agreement between provider and consumer that lists the conditions for greenfield service deployment Agreement between provider and supplier that states the terms and conditions of a balanced scorecard.
An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into five data segments and two coding segments. What is the maximum number of drive failures supported in the storage system? 2 5 7 10.
An organization wants to deploy performance sensitive applications to meet their business requirements. Which type of storage device is suitable? SATA drive Solid-state drive SAS drive Optical disk drive.
An e-card company uses the Cloud to enable chat services between its sales representatives and consumers. Holiday periods create seasonal demand on IT resources. The e-card company wants to select a billing model that optimizes IT resource costs. Which billing model should the company choose? Recurring User-based Pay-as-you-go Subscription.
Match each key functions of service operation management with its objective Problem management Incident management Information security management Service asset and configuration management.
What is a common characteristic of organizations that have adopted modern applications to unlock digital business advantage? They focus on compelling user experiences and responsive designs They leverage only their internal IT infrastructure to develop and deploy applications They leverage only the public cloud to develop and deploy applications They focus on meeting internal users’ demands rather than customers’ expectations.
An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient. Which cloud characteristics enables the consumer to handle such variations in workloads and IT resource requirements? Rapid elasticity Resource pooling Measured service On-demand self-service.
Which cloud service model is represented in the exhibit? Software as a Service Infrastructure as a Service Platform as a Service Database as a Service.
Which cloud service model is represented in the exhibit? Software as a Service Infrastructure as a Service Platform as a Service Database as a Service.
What is the goal of lean practices in a software development methodology? Create quality software with the minimum number of team members Create quality software in the shortest time period at the lowest cost Develop software using 12-Factor modern application practices Develop and deploy software using third platform technologies.
Which component of the cloud reference architecture provides automated policy-driven management and delivery of heterogeneous resources? Software-defined infrastructure Orchestration Business continuity Cloud service.
What is a characteristic of traditional applications? Monolithic architecture Support only multi-tier architecture Availability is managed only by the application Horizontally scalable.
Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services? Service Creation Service Operation Service Planning Service Termination.
What is a possible cause for incurring high capital expenditures for IT, even though resources may remain underutilized for a majority of the time in a traditional data center? Resources IT resources are provisioned as self-service IT resources are configured for peak usage IT resources are rented as services.
What condition can result in the development of a "shadow IT" organization? Aging facilities, and outdated policies and technology Bypassing of internal IT and looking elsewhere for IT services Increasing number of end user devices and different access points Lack of cloud extensibility inside an organization.
A Cloud Service Brokerage combines cloud services provided by multiple cloud service providers into one or more new services. The specific number of services they combine varies based on user logic. Which type of Cloud Service Brokerage is it? Integration Aggregation Intermediation Arbitrage.
What is a common characteristic of organizations that have adopted modern applications to unlock digital business advantage? They bring new services to market quicker and more often than competitors They leverage only the public cloud to develop and deploy applications They leverage only their internal IT infrastructure to develop and deploy applications They focus on meeting internal users’ demands rather than satisfying their customers.
What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation? Digital Leaders Digital Adopters Digital Laggards Digital Evaluators.
What workflow software enables automation of complex IT tasks? Dell EMC XtremIO VMware HA Dell EMC ScaleIO VMware vRealize Orchestrator.
What term refers Amount of time and effort required to exploit an attack vector Attack Surface Work factor Velocity of attacker Attack Vector.
What term refers step or a series of steps necessary to complete an attack. Attack Surface Work factor Velocity of attacker Attack Vector.
What is a responsability of Service manager Understand what consumers needs and industry trends to drive an effective product strategy Creating detailed designs for the cloud infrastructure. Streamline service delivery and execution. Design and implementation of cloud provisioning processes for delivering cloud services.
What is a responsability of Cloud architect Creating detailed designs for the cloud infrastructure. Understand what consumers’needs and industry trends to drive an effective product strategy Streamline service delivery and execution Design and implementation of cloud provisioning processes for delivering cloud services.
What is a responsability of Service operations manager? Streamline service delivery and execution. Creating detailed designs for the cloud infrastructure. Understand what consumers’needs and industry trends to drive an effective product strategy Design and implementation of cloud provisioning processes for delivering cloud services.
What is a responsibility of Cloud engineer? Design, planning, managing, maintaining, and supporting the cloud infrastructure. Creating detailed designs for the cloud infrastructure. Understand what consumers needs and industry trends to drive an effective product strategy Streamline service delivery and execution.
What is a responsability of Cloud automation engineer? Design and implementation of cloud provisioning processes for delivering cloud services. Creating detailed designs for the cloud infrastructure. Understand what consumers’needs and industry trends to drive an effective product strategy Streamline service delivery and execution.
What is a responsability of vendor relationship manager? Understand service needs of LOBs, determines which needs are good candidates for CSP, and also works with service managers Creating detailed designs for the cloud infrastructure. Understand what consumers’needs and industry trends to drive an effective product strategy Streamline service delivery and execution.
What is a responsability of DevOps engineer? Development, testing, and operation of an application or service as part of continuous delivery. Creating detailed designs for the cloud infrastructure. Understand what consumers’needs and industry trends to drive an effective product strategy Streamline service delivery and execution.
What is a responsability of Cloud administrator? Configure, monitor, and manage the services of the provider Creating detailed designs for the cloud infrastructure. Understand what consumers’ needs and industry trends to drive an effective product strategy Streamline service delivery and execution.
Which storage-defined controller function abstract physical storage systems into virtual storage systems and virtual storage pools as per policies? Storage discovery Resource abstraction and pooling Storage Provisioning Storage component management.
Which storage-defined controller function automates the storage provisioning task and delivers virtual storage resources? Storage discovery Resource abstraction and pooling Service Provisioning Storage component management.
Which EMC security product measures the risk associated with a user’s login and post-login activities by evaluating a variety of risk indicators? RSA Security Analytics RSA Adaptive Authentication RSA Archer eGRC RSA SecurID.
What is a service template? Collection of interrelated hardware and software components that constitute a service Source-code-based specification used by services as an interface to communicate with each other Entry in the service catalog that describes constraints, policies, rules, price, and SLA Specification related to the terms of service usage, configuration options, and termination of a service.
An organization is looking for a cloud solution for application development, testing, and deployment. They do not want to invest in application development tools. Which cloud service model will address the requirements? Platform as a Service Infrastructure as a Service Software as a Service Storage as a Service.
An organization has a private cloud infrastructure. They want to leverage the capabilities of a public cloud by using the hybrid cloud model. Which security mechanism would enable them to establish a secure connection to the public cloud? Zoning OAuth Sandboxing VPN.
Dynamic virtual machine (VM) load balancing across storage volumes is enabled. Which parameter is used to intelligently place newly created VMs on a storage volume? I/O load on the storage volume Type of the storage volume Location of the storage volume Size of the storage volume.
Which encapsulation function is performed by a Fibre Channel Host Bus Adapter? SCSI data into FC frames FC frames into IP packets Ethernet frames into FC frames FC frames into Ethernet frames.
Refer to the exhibit, which associates labels A, B, C, and D with planes within the software-defined infrastructure. What set of labels is correct? Response: A = Data plane B = Control plane C = Management plane D= Service plane A = Data plane B = Service plane C = Management plane D = Control plane A = Management plane B = Service plane C = Data plane D = Control plane A = Control plane B = Management plane C = Service plane D = Data plane.
Refer to the exhibit Labels X, Y, and Z represent placeholders for security concepts (terms) in the exhibit. What is the correct mapping of these security concepts? X = Risk, Y = Threat, Z = Policies X = Threat, Y = Risk, Z = Policies X = Threat, Y = Risk, Z = Asset X = Risk, Y =Threat, Z = Asset.
What is an advantage of the in-service software upgrade technique? Reduces software maintenance costs for devices on the network Helps ensure high levels of network device availability Increases performance of devices on the network Enables failover traffic from one network switch to another.
Which document specifies the quality and reliability of Cloud services? Service Level Agreement Regulatory Compliance Document Service Charge Rate Specification Service Termination Agreement.
What characterizes an uplink NIC used in a virtual machine network on a physical compute system running a hypervisor? It does not have assigned IP addresses It is used as a link between virtual machines It offloads iSCSI processing from the hypervisor It encapsulates SCSI data into Ethernet frames.
What is a characteristic of the subscription by time chargeback model? Cost of providing a cloud service for a period of time is divided among a predefined number of consumers Easier to manage financially with a predetermined, reoccurring billing cycle Heavy service usage by one line of business over another does not automatically incur penalties Controls the service usage by using electronic tickets over a short period.
An organization plans to deploy remote replication between two sites for disaster recovery without affecting the application response time. The two sites are 1000 miles (1600 km) apart. Which solution would you recommend to the organization? Snapshot replication Image-based replication Synchronous replication Asynchronous replication.
Which identifier is used to physically recognize a Fibre Channel network adapter in a Fibre Channel SAN? Domain identifier MAC address World Wide Node Name Fibre Channel address.
What is an advantage of asynchronous remote replication? Supports replication across any geographic location without impacting response time Ensures source LUN and replica have identical data at all times Requires less storage space for the replica than the source LUN Provides a near zero recovery point objective without impacting response time.
What is a characteristic of Simple Object Access Protocol (SOAP)? Uses XML for formatting messages Specifies binding of FC and Ethernet frames Identifies resources based on URIs Provides 64-bit World Wide Node Name.
What describes network-attached storage (NAS)? High-performance file server that either has integrated storage or is connected to external storage Dedicated file server that maintains the mapping between the object IDs and the file system namespace Storage system used for creation and assignment of block storage volumes to compute systems File storage that stores data in the form of objects based on the content and other attributes of the data.
Which mechanism restricts external users from accessing an organization’sinternal IT resources while still allowing the organization’s application server to access internal IT resources? Virtual private network Intrusion detection Demilitarized zones Digital signatures.
Which EMC product provides a solution for software-defined storage? ViPR Vblock VMAX VSPEX.
What is the personalization of a cloud portal? Presenting structured information on service attributes Customizing the functional interface for each service provider Displaying information based on user identity and role Establishing conformity to a specific feature set or quality level.
Which Dell EMC product provides a converged infrastructure solution? XC Series Appliance VxBlock VxRail Appliance XtremlO.
Which network virtualization technique enables nodes at two different sites to be part of the same virtual LAN (VLAN)? Stretched VLAN Virtual Extensible LAN Private VLAN Community VLAN.
What is a function of the control layer of a cloud infrastructure? Configuring resource pools Pooling resources Communicating across computer systems Providing workflows for executing tasks.
Which Dell EMC product provides software-defined object storage? Isilon XtremIO Data Domain Elastic Cloud Storage (ECS).
What is a key benefit of grading resource pools in a cloud environment? Ability to discover the infrastructure resources rapidly Ability to easily create workflows for service creation Ability to perform compliance checks during resource configuration Ability to create a variety of services, providing choices to consumers.
Which Dell EMC product provides archiving software that helps organizations to archive aging emails and files to appropriate storage tiers? SourceOne Avamar RecoverPoint NetWorker.
Which cloud standard provides organizations with the required structure, detail, and clarity related to information security, personalized to the cloud industry? HIPAA CCM CSA HITRUST PCI DSS.
What activity is performed during service planning? Discovering service assets Establishing billing policy Creating orchestration workflow Creating service contract.
What is a function of financial management? Provide necessary business cases for investment Evaluate quality and cost of supplied products against the SLA Procure capacity in the most cost-effective manner Meet availability needs with a justifiable return on investment.
A cloud service provider is concerned about the security risks due to velocity-of attack. What can the cloud service provider deploy to mitigate the impact of this attack? Containment mechanisms Role-based access control Multi-factor authentication Shredding data-at-rest.
What workflow software enables automation of complex IT tasks? VMware vRealize Orchestrator Dell EMC XtremIO VMware HA Dell EMC ScaleIO.
What is an advantage of synchronous remote replication? Provides near zero recovery point objective Replicates data across any geographic location without impacting response time Supports locality of reference to improve replication performance Saves network bandwidth by replicating only deduplicated data.
When does an incident turn into a problem? If the incident is raised by an external customer If incident is critical and needs immediate attention If the incident is raised by an internal customer If the incident is not addressable by the incident management team.
What allows an orchestrator to interact with other software components and devices in a cloud infrastructure? Service template Cloud portal Unified manager Application programming interface.
What is a common characteristic of organizations that have adopted modern applications to unlock digital business advantage? They focus on meeting internal users’ demands rather than satisfying their customers They leverage only their internal IT infrastructure to develop and deploy applications They bring new services to market quicker and more often than competitors They leverage only the public cloud to develop and deploy applications.
What helps the service provider to meet the required service availability in a cloud environment? Creating additional cloud services Building a resilient cloud infrastructure Increasing the storage resources in the data center Creating cloud services using limited resources.
What is used to update information in a configuration management database? Performance management tool Capacity management tool Configuration manager Discovery tool.
What activity is included in a compliance checklist when moving data to the cloud? Ensure adherence to the security demands that are expressed in contracts Review the financial stability of the provider to ensure its longevity Review and evaluate the usage of encryption to protect consumers’ data Determine if appropriate governance processes are available to meet consumers’ requirements .
What is a characteristic of reporting? Displays a personalized functional interface Presents service instances to consumers in real time Provides tabular or graphical views of monitored information Provides information about events or impending threats or issues.
Match each replication type with the appropriate description. Continuous Data Protection (CDP) Snapshot Asynchronous Synchronous.
When using a digital signature, what is the correct sequence of steps to authenticate a user? If hash values match, the user is authenticated to access the requested API Hash value for API request is generated Cloud provider runs hash algorithm to obtain hash value and decrypts it User signs an API request Encrypted hash value is sent to cloud provider to verify identity of the user.
What is an example of operating system (OS) hardening? Changing OS frequently to run applications Disallowing unauthorized modifications to application settings Encrypting application data at rest Deleting unused programs and installing current updates .
Two departments of an organization have their own volumes created on the same storage system. What can the organization implement to prevent unauthorized access to the volumes owned by the other department? LUN masking LUN shredding Thin LUN Thick LUN.
Match the 12-Factor App rule names with the corresponding practice definitions. Disposability Config Port binding Codebase.
What is a benefit of the software-defined approach for managing resources? Provides a framework to list services, attributes of services, service-level commitments, terms and conditions for service provisioning Enables centralized control of IT infrastructure without regard to physical location Provides a set of component functions that can be called from a software component to interact with other software components Enables automated arrangement and coordination of system functions to manage cloud services .
What enables IT organizations to manage, monitor, and track resources used to provide services while also enabling the infrastructure to function normally and adhere to promised SLAs? Cloud management tool Cloud service tool Automation tool Orchestration tool.
Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services? Service Operation Service Termination Service Planning Service Creation.
Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment? Service demand management Service operation management Service capacity management Service portfolio management .
What is the function of a software-defined network controller? Provides instructions for the control plane to handle network traffic based on external management interactions Provides instructions for the data plane to handle network traffic based on external management interactions Provides instructions for the control plane to handle network traffic based on policies Provides instructions for the data plane to handle network traffic based on policies.
Which Dell EMC product provides software-defined object storage? Isilon XtremIO Data Domain Elastic Cloud Storage (ECS).
Which security mechanism would enable them to establish a secure connection to the public cloud? VPN OAuth Zoning Sandboxing.
A healthcare organization has an innovative idea of providing personalized medicine to their patients. But the organization does not have the required infrastructure and skill set to develop the product that provides this capability. Which strategy would you suggest that helps the organization to release the product quickly and bring competitive advantage in the marketplace? Build-your-own infrastructure Bring-your-own infrastructure Buy the integrated infrastructure Buy best-of-breed infrastructure.
Which Dell EMC product provides archiving software that helps organizations to archive aging emails and files to appropriate storage tiers? RecoverPoint SourceOne NetWorker Avamar.
Which data protection solution enables direct backup from primary storage? Dell EMC ProtectPoint Dell EMC Avamar Dell EMC Data Domain Dell EMC NetWorker.
How is the fulfillment process of a service request implemented in a cloud environment? Workflows defined in the orchestrator direct the process Element manager collects service requests directly from the catalog Orchestrator allocates the same amount of resources to all service requests Cloud Administrator manually handles service requests.
What is a characteristic of the subscription by time chargeback model? Controls the service usage by using electronic tickets over a short period Cost of providing a cloud service for a period of time is divided among a predefined number of consumers Easier to manage financially with a predetermined, reoccurring billing cycle Heavy service usage by one line of business over another does not automatically incur penalties.
What is the purpose of a configuration management tool? Enable automatic provisioning of infrastructure or services Enable automation and coordination of building multiple components and collectively tested as a system Enable testing of individual components of the service and infrastructure Enable the construction of the individual components of a service or infrastructure based on predefined scripts.
A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment. Which strategy did the cloud provider use to mitigate the risk of security threats? Defense-in-depth Information assurance framework Trusted computing base Adaptive security.
What is a cloud management product? VMware vRealize Suite VMware NSX VMware FT VMware vRealize Automation.
What involves the automated arrangement, coordination, and management of various systems or components that enable a user to make a service request using the self-service portal? Orchestrated service delivery Automated service catalog management Orchestrated service catalog updates Automated portfolio management.
What is the correct sequence of steps to determine service pricing? Aggregate all costs (CAPEX and OPEX) per service Calculate per-unit service cost Establish a stable per-unit cost baseline Add margin over service cost.
What workflow software enables automation of complex IT tasks? Dell EMC ScaleIO Dell EMC XtremIO VMware vRealize Orchestrator VMware HA.
What condition can result in the development of a "shadow IT" organization? Bypassing of internal IT and looking elsewhere for IT services Aging facilities, and outdated policies and technology Lack of cloud extensibility inside an organization Increasing number of end user devices and different access points.
Which component of the cloud reference architecture provides automated policy-driven management and delivery of heterogeneous resources? Cloud service Business continuity Software-defined infrastructure Orchestration.
Match the tools with their respective functions Continuous integration tools Configuration management tools Build automation tools Unit test automation tools.
What is a characteristic of an object-based storage system? Capable of dynamically creating multiple object IDs for each object Consolidates block and file access in one storage platform Uses a flat, non-hierarchical address space Extends a single file system across all storage nodes.
What activity is performed during the service planning phase of the cloud service lifecycle? Developing Service Enablement Roadmap Defining Orchestration Workflow Discovering Service Assets Defining Service Offering.
What is a characteristic of a best-of-breed infrastructure? Requires less time to integrate all the components to build as an appliance Provides single management software to control multi-vendor components Provides limited flexibility to choose components Prevents vendor lock-in.
What is a goal of IT transformation? Managing security risks involved with mobile data. Empowering the workforce to take advantage of opportunities that improve collaboration and productivity Managing Big Data projects to provide analytics that help drive organizational growth Spending more time on strategic value-adding initiatives .
Which malware detection technique involves examining suspicious behavior of files? Resource-based Heuristics-based Signature-based Sandbox-based.
In which phase of the cloud service lifecycle are service instances de-provisioned? Service planning Service operation Service creation Service termination.
Which statement describes the OAuth mechanism? A mechanism designed to examine data packets traversing a network and compare them to a set of filtering rules An open authorization mechanism that allows a client to access protected resources from a resource server on behalf of a resource owner A network authentication protocol that provides strong authentication for client/server applications by using secret-key cryptography An open authentication standard in which a service provider uses authentication services from an OpenID provider.
What is the effect of network broadcast traffic reaching the configured network storm control threshold on a switch port? The switch port is disabled. Administrator intervention is required to enable it. Switch port bandwidth increases automatically to accommodate the traffic. Broadcast traffic is allowed partially, maintaining the traffic rate below the threshold level. Broadcast traffic is blocked. Subsequent broadcast frames are dropped for a specific interval.
Report abuse