Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCloud V4 - dea-2tt4

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Cloud V4 - dea-2tt4

Description:
Cloud V4 - dea-2tt4

Author:
Maxim
(Other tests from this author)

Creation Date:
01/08/2023

Category:
Computers

Number of questions: 100
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Which provides resilience and is preferred when a small or non-impacting amount of service disruption is acceptable? High Availability Fault Recovery Fault Isolation Defense in Depth.
What is the purpose of a configuration management tool? Enable automation and coordination of building multiple components and collectively tested as a system Enable testing of individual components of the service and infrastructure Enable the construction of the individual components of a service or infrastructure based on predefined scripts Enable automatic provisioning of infrastructure or services.
What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation? Digital Evaluators Digital Leaders Digital Adopters Digital Laggards.
What activity is included in a compliance checklist when moving data to the cloud? Review and evaluate the usage of encryption to protect consumers’ data Ensure that IT infrastructure and data adhere to specific rules and regulations Review the financial stability of the provider to ensure its longevity Determine if appropriate governance processes are available to meet consumers’ requirements.
What is the function of problem management? Document incident history used as input for change management Prevent incidents that share common symptoms from occurring Detect and record all incidents in the cloud infrastructure Track service degradation periods to check for SLA violations.
An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into nine data segments and three coding segments. What is the maximum number of drive failures supported in the storage system? 3 6 9 12.
What is true of a cloud service design best practice? Services are inherently more complex and reduce administrative costs. Services should operate dependently. Services should be readily available and dependent on one another. Services must be loosely coupled.
Which data protection solution enables organizations to protect, manage, and recover data at scale across diverse environments? Dell PowerProtect DD Series Appliances Dell Data Domain Dell Avamar Dell PowerProtect DP Series Appliances.
What activity is performed during the service planning phase of the cloud service lifecycle? Defining Orchestration Workflow Discovering Service Assets Defining Service Offering Developing Service Proposal.
What happens when a link in a link aggregation group is lost? All network traffic on that link is redistributed across the remaining links in that group. All network traffic on that link is redistributed to another link aggregation group. All the network traffic is held in the queue until the link is repaired. All the network traffic is resent by the sender after the link is repaired.
What is a benefit of the software-defined approach for managing resources? Provides a set of component functions that can be called from a software component to interact with other software components Enables automated arrangement and coordination of system functions to manage cloud services Provides a framework to list services, attributes of services, service-level commitments, terms, and conditions for service provisioning Enables unified and centralized management of IT resources.
Which service operation management activity expedites and restores cloud services to normal operations when unplanned events cause an interruption to services? Configuration Management Incident Management Capacity Management Change Management.
Which cloud actor provides connectivity and communication of cloud services between the provider and the consumer? Cloud Dealer Cloud Broker Cloud Auditor Cloud Carrier.
Which plane in a software-defined storage environment manages and provisions storage? Application Service Data Controle.
What is a characteristic of traditional applications? Support only multi-tier architecture Horizontally scalable Monolithic architecture Availability is managed only by the application.
Which Dell Technologies product can automate and centralize the collection and analysis of data across physical and virtual environments? NetWorker Avamar SourceOne Data Protection Advisor.
What workflow software enables automation of complex IT tasks? Dell EMC XtremIO VMware vRealize Orchestrator Dell EMC ScaleIO VMware HA.
An organization has a private cloud infrastructure. They want to leverage the capabilities of a public cloud by using the hybrid cloud model. Zoning OAuth Sandbox VPN.
An organization needs to deploy remote replication between two sites that are 2000 km (1242 miles) apart without impacting application response time. Which solution will meet these requirements? Hypervisor-based synchronous replication Snapshot replication Synchronous replication Asynchronous replication.
What is the effect of a denial-of-service attack? Unauthorized access is gained to user accounts and data. Legitimate users are prevented from accessing services. Privileges are misused to compromise data security. User credentials are captured and sent to the attacker.
What is the function of a software-defined network controller? Provides instructions for the data plane to handle network traffic based on policies Provides instructions for the data plane to handle network traffic based on external management interactions Provides instructions for the control plane to handle network traffic based on policies Provides instructions for the control plane to handle network traffic based on external management interactions.
Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services? Service Termination Service Planning Service Operation Service Creation.
What is the goal of lean practices in a software development methodology? Develop software using 12-Factor modern application practices Develop and deploy software using third platform technologies Create quality software in the shortest time period at the lowest cost Create quality software with the minimum number of team members.
Which APEX custom solution allows customers to choose their hardware, software, services, capacity, and offers usage-based payments? Data Center Utility Backup Services Private and Hybrid Cloud Flex on Demand.
What is a key function of service operation management? Enable problem resolution. Perform market research. Analyze customer feedback. Establish pricing and budgeting.
Which host-based security attribute supports audit, multifactor authentication, and IP address filtering? Virtual machine hardening Hypervisor hardening Application hardening Operating system hardening.
Which network feature enables dynamic distribution of applications I/O traffic across VMs? Load Balancing Link Aggregation Erasure Coding NIC Teaming.
What is a characteristic of reporting? Provides tabular or graphical views of monitored information Provides information about events or impending threats or issues Presents service instances to consumers in real time Displays a personalized functional interface.
How is application functionality segmented when using a microservices approach in an application development environment? Dependent and loosely coupled services Independent and tightly coupled services Independent and loosely coupled services Dependent and tightly coupled services.
What condition can result in the development of a "shadow IT" organization? Bypassing of internal IT and looking elsewhere for IT services Lack of cloud extensibility inside an organization Increasing number of end user devices and different access points Aging facilities, and outdated policies and technology.
Which cloud service objective determines the privileges that a user has to access a particular service or a resource in a cloud computing environment? Confidentiality Accounting Authentication Authorization.
What does the management interface in a cloud portal enable consumers to do? Perform computing activities by presenting the functional content of a service instance. Modify, start, and stop rented service instances without manual interaction with the service provider. Interact with the business application using a graphical user interface. Code, compile, and run their applications on the cloud platform.
Which is an example of a people transformation activity? Automation of IT tasks that reduces manpower needs Adoption of a modern IT infrastructure Communication between IT staff and business leaders Adoption of a standard framework such as ITL.
Which Dell product is a converged infrastructure solution? VxBlock Unity XT PowerEdge PowerMax.
What is the objective of integrity in information security? Ensure data protection against unauthorized alterations Ensure secrecy of stored information Ensure timely and reliable access to resources Ensure users are responsible for actions executed.
Which compute system component runs software programs? CPU RAM OS GPU.
What term describes the ability of a system to continue functioning, even when a few of its components fail? Disaster recovery Replication Fault tolerance Checkpointing.
Which mechanism restricts external users from accessing an organization’s internal IT resources while still allowing the organization’s application server to access internal IT resources? Digital signatures Demilitarized zones Virtual private network Intrusion detection.
Which role is responsible for designing, planning, managing, maintaining, and supporting the cloud infrastructure when transforming IT? Cloud Automation Engineer Cloud DevOps Engineer Cloud Architect Cloud Engineer.
Which defines the maximum amount of data loss that can be tolerated by a business following a disaster? RPO RTO MTTR MTBF.
Which functionality ensures that cloud services are delivered effectively and efficiently? Service Portfolio Management Service Catalog Management Service Operation Management Service Financial Management.
What is a characteristic of an object-based storage system? Consolidates block and file access in one storage platform Extends a single file system across all storage nodes Uses a flat, non-hierarchical address space Capable of dynamically creating multiple object IDs for each object.
How is a container different from a virtual machine? Virtual machines are transportable. Virtual machines start faster. Containers share an operating system. Containers are stateful.
What is a benefit of source-based data deduplication? Reduces recovery times Reduces network bandwidth requirements Reduces compute CPU cycles Increase the frequency of backups.
What allows an orchestrator to interact with other software components and devices in a cloud infrastructure? Cloud portal Application programming interface Unified manager Service template.
A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment. Which strategy did the cloud provider use to mitigate the risk of security threats? Information assurance framework Trusted computing base Defense-in-depth Adaptive security.
What is an example of OS hardening? Encrypting application data at rest Deleting unused programs and installing current updates Disallowing unauthorized modifications to application settings Changing OS frequently to run applications.
Which solution can be used for automation of a customer environment? GitHub Ansible CloudWatch OpenStack.
Which cloud service management option defines the suite of service offerings and aligns it to the service provider’s strategic business goals? Portfolio Capacity Operation Demand.
What is an advantage of asynchronous remote replication? Supports replication across any geographic location without impacting response time Ensures source LUN and replica have identical data at all times Requires less storage space for the replica than the source LUN Provides a near zero recovery point objective without impacting response time.
What is a common characteristic of organizations that have adopted modern applications to unlock digital business advantage? They focus on meeting internal users’ demands rather than satisfying their customers. They leverage only their internal IT infrastructure to develop and deploy applications. They leverage only the public cloud to develop and deploy applications They help to increase insight, market reach, and customer satisfaction.
What is the goal of governance? Adhere to government laws and regulations. Identify gaps in the ability to stand-up cloud services Identify internal and external vulnerabilities. Establish the likelihood of threat occurrence.
What is a possible cause for incurring high capital expenditures for IT, even though resources may remain underutilized for a majority of the time in a traditional data center? IT resources are configured for peak usage IT resources are rented as services IT resources are provisioned as self-service IT resources are provisioned on demand.
Which cloud standard guides who should implement which type of security control in the cloud supply chain? HITRUST HIPAA CCM PCI DSS.
Which activity is associated with Process Transformation? Adoption of Agile methodologies Creating new roles Shift in the IT staff skill set Adoption of modern IT infrastructure.
Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment? Service operation management Service demand management Service portfolio management Service capacity management.
Synchronous backup Write I/O is received from production compute system into cache of source and placed in queue Source storage system need an acknowledgment back to the production compute system Write I/O is transmitted to the cache of the target storage Receipt acknowledgement is provided by target storage back to cache of the source.
Asynchronous backup Target send acknowledgement back to source Write I/O is transmitted to the cache of the target storage The write I/O is received from compute system into cache of source and placed in queue Receipt acknowledgement is provided by the source storage back to the compute system.
drag and drop Service portfolio management Supplier management Service validation and testing Request fulfillment .
What steps appear in the service enablement roadmap? Plan, Action, Condition, Enable, End Define, Create, Plan, Enable, Terminate Understand, Plan, Build, Enable, Optimize Define, Observe, Understand, Enable, Act.
Which Dell EMC product provides archiving software that helpsorganizations to archive aging emails and files to appropriate storage tiers? Avamar NetWorker RecoverPoint SourceOne.
Which cloud standard provides organizationswith the required structure, detail, and clarity related to informationsecurity, personalized to the cloud industry? CCM CSA HIPAA HITRUST PCI DSS.
Which type of attack can be controlled byimposing restrictions and limiting on-network resource consumption? Phishing Side-channel Advanced persistent threat Distributed denial of service.
What is a characteristic of a best-of-breed infrastructure? Provides single management software to control multi-vendor components Prevents vendor lock-in Provides limited flexibility to choose components Requires less time to integrate all the components to build as an appliance.
When does an incident turn into a problem? If the incident is raised by an external customer If the incident is raised by an internal customer If incident is critical and needs immediate attention If the incident is not addressable by the incident management team.
Refer to the exhibit, which associates labels A, B, C, and D with planeswithin the software-defined infrastructure. What set of labels is correct? A = Data plane B = Control plane C = Management plane D= Service plane A = Management plane B = Service plane C = Data plane D = Control plane A = Data plane B = Service plane C = Management plane D = Control plane A = Control plane B = Management plane C = Service plane D = Data plane.
What is the correct sequence of steps todetermine service pricing? (colocar em ordem 1-4) Add margin over service cost Calculate per-unit service cost Establish a stable per-unit cost baseline Aggregate all costs (CAPEX and OPEX) per service.
Which data protection solution enables direct backup from primary storage? Dell EMC NetWorker Dell EMC Avamar Dell EMC ProtectPoint Dell EMC Data Domain.
What is used to update information in aconfiguration management database? Discovery tool Configuration manager Performance management tool Capacity management tool.
What activity is performed during the service planning phase of the cloud service lifecycle? Defining Service Offering Discovering Service Assets Developing Service Enablement Roadmap Defining Orchestration Workflow.
Two departments of an organization have theirown volumes created on the same storage system. What can the organizationimplement to prevent unauthorized access to the volumes owned by the otherdepartment? LUN masking LUN shredding Thick LUN Thin LUN.
Match the tools with their respective functions. Continuous integration tools Configuration management tools Build automation tools Unit test automation tools.
What involves the automated arrangement, coordination, and management of various systems or components that enable a user to make a service request using the self-service portal? Automated portfolio management Orchestrated service catalog updates Automated service catalog management Orchestrated service delivery.
Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services? Service Planning Service Creation Service Operation Service Termination.
What describes network-attached storage (NAS)? Storage system used for creation and assignment of block storage volumes to compute systems File storage that stores data in the form of objects based on the content and other attributes of the data High-performance file server that either has integrated storage or is connected to external storage Dedicated file server that maintains the mapping between the object IDs and the file system namespace.
Why are businesses undergoing digital transformation? To innovate more quickly To meet regulatory requirements To avoid security risks To increase revenue.
What are the key focus areas for IT transformation? People, Technology, and Infrastucture People, Process, and Technology Technology, Infrastructure, and Automation Process, Infrastructure, and Technology.
Which enables consumer to unilaterally provision computing capabilities, such as virtual machines, networks, and storage, as needed automatically without requiring human interaction with each service provide? Resource pooling Rapid elasticity Broad network access On-demand self-service.
Which is a lightweight, stand-alone, executable package thatconsists of whole runtime environment to execute the application? Microservice Hypervisor Orchestrator Container.
Which component presents service catalog and cloud interfaces,enabling consumers to order and manager cloud services? Orchestor Cloud Portal Service automation Cloud Operating System.
Which cloud service lifecycle phase involves discovering services assets Service Planning Service Creation Service Operation Service Termination.
Which programmatically integrates and sequences various system functions into automated workflows for executing higher-level service provisioning and management functions? Service Catalog Application Programming Interface Self service portal Orchestrator.
What type of infrastructure is defined as, “All the sourcesare bundled together and virtualized? Software-Defined Hyper-Converged Converged.
Identify the bare-metal hypervisors? ESXI and Hyper-V Oracle Virtual Box and Hyper-V ESXI and VMware Fusion Solaris Zones and VMware Workstation.
Which attribute of software-defined infrastructure isresponsible for providing abstracted view of the IT infrastructure? Abstraction and Polling Self-Service Portal Metering Unified Management.
Which risk management process is in the correct order Monitoring, Risk identification, Risk assessment, Risk mitigation. Risk Identification, Risk assessment, Risk mitigation, Monitoring Risk identification, Risk assessment, Monitoring, Risk mitigation Monitoring, Risk identification, Risk mitigation, Risk assessment.
Identify the strategy that uses layer-based approach to protectthe cloud environment Trusted computing base Secure multitenancy Defense-in-depth Information assurance framework.
Identify a threat caused, when an attacker sends massivequantities of data to the target with the intention of consuming bandwidth. Malicious insider Account hijacking Advanced persistent threat Denial-of-service.
Which backup service deployment is utilized when a backup is performed in a consumer locationand then the backup data is sent to the cloud for DR purpose? Managed Backup Service Remote Backup Service Replication Backup Service Cloud-to-cloud Backup Service.
Which archiving method is most suitable and cost effective for a large organization having both sensitive data and non-sensitive data? Public Cloud-Only archiving In-House archiving Hybrid archiving IaaS archiving.
Which fault-tolerant mechanism, in a highly available application design is implemented within a code to handle service that is temporarily down? Graceful Degradation Monitoring Application Availability Checkpointing Retry Logic.
Which service operation management activity providesvisibility into the cloud infrastructure and deployed cloud services? Incident management Reporting Change management Monitoring.
What brings in people from different business units having expertise in different areas to work together to achieve a common goal Automation Training New roles Cross-Functional team.
When implementing an initial IT service center using ITILframework. In service strategy state which process needs to be considered forautomation? Knowledge management Business relationship management Information security management Problem Management.
What benefit is provided in subscription by peak usage chargeback model? Easier to manage financially with a predetermined, reoccurring billing cycle Easy to implement – track user authentication Can start small with minimal cost Clear cost justification.
Which attribute of modern infrastructure provide the benefitof automated provisioning and business agility? Software-Defined Scale-Up Scale-Out Flash.
Match each information security concept with its description. (Drag and drop) Ensures the required secrecy of information Ensures that unauthorized changes to information are not allowed Ensures that authorized users have reliable and timely access to cloud resources Ensures users are answerable for the actions executed on the system.
Match each virtual network type with its characteristics Divides a LAN into smaller logical segments Segregates nodes within a VLAN into secondary VLANs Enables nodes in two different sites to communicate over a WAN Enables communication between a group of nodes with a common set of requirements over a FC network.
What is a benefit of the active-active cluster implementation? Enhances performance and availability of a service Lower total cost of ownership for providing services Improves security of application running on the cluster Ability to run multiple services on one physical compute system.
To implement a new service desk management tool, the capacity of the servers has to be extended. Who is responsible for managing the request for additional capacity Change Manager Financial Manager Capacity Manager Service Level Manager.
Report abuse Consent Terms of use