What refers to an agreement between provider and consumer that states the terms of service usage?
- A . Service contract
- B . Service template
- C . Chargeback
- D . Showback
What is an advantage of adopting a microservices strategy in an application development environment?
- A . All microservices of an application are always updated at the same time for maintaining consistency in the application
- B . Every microservice can be deployed, upgraded, scaled, and restarted independent of other services in the application
- C . Microservices are tightly coupled so it is easy to scale all the services at once to meet business demands
- D . Microservices provide the application platform to implement DevOps in the organization easily and at low cost
Which role in service portfolio management determines and delivers the services that provide value and strategic advantage to the provider?
- A . Cloud Service Account Manager
- B . Cloud Automation Engineer
- C . Cloud Administrator
- D . Cloud Auditor
Refer to the exhibit, which represents a consumer environment consisting of multiple VMs running Windows operating systems (OSs).
For compliance reasons, the cloud service provider maintains version control over the OS provided to the consumer. The service provider also ensures that the configurations of the VMs comply with the configuration policy for the OS version. The configuration policy includes the two conditions shown in the exhibit. A monitoring tool verifies VM configurations against the configuration policy and provides the compliance results shown.
What is the percentage of compliance non-adherence?
- A . 30.12%
- B . 33.34%
- C . 58.33%
- D . 66.67%
Which management process ensures business continuity by eliminating single points of failure in a data center?
- A . Availability management
- B . Security management
- C . Capacity management
- D . Performance management
Which Dell EMC product is used for a disk-based backup and recovery solution that provides inherent source-based data deduplication?
- A . NetWorker
- B . ProtectPoint
- C . Data Domain
- D . Avamar
Which phase of the cloud service lifecycle involves making business use case decisions for the cloud service offering portfolio?
- A . Service Termination
- B . Service Planning
- C . Service Creation
- D . Service Operation
Which software-defined storage controller function gathers data about the components and brings them under its control and management?
- A . Storage provisioning
- B . Storage discovery
- C . Resource abstraction and pooling
- D . Storage component management
The incident management team is unable to determine the root cause of an incident.
To which team should the error-correction activity be transferred?
- A . Performance Management
- B . Change Management
- C . Availability Management
- D . Problem Management
What capability is provided by the “Open and extensible” attribute of software-defined infrastructure (SDI)?
- A . Uses APIs to integrate multivendor resources into the SDI environment
- B . Optimizes resource usage and generates value reports about the SDI environment
- C . Provides a control point for the entire SDI environment
- D . Provides multitenancy that enables consumers to share resources in the SDI environment
What mechanism does RSA SecurID use?
- A . Single sign-on authentication
- B . Policy-based authorization
- C . Multi-factor authentication
- D . Role-based authorization
What is the function of a monitoring and alerting tool?
- A . Focus on examining the usage of resources by customers and service providers and provide notification to optimize and manage workloads
- B . Control charges for cloud usage by optimizing cloud resource utilization
- C . Automate tasks and IT processes and manage the IT environment
- D . Enable people to work closely together on a common project, in real time, by making communication among them easier
DRAG DROP
Match each information security concept with its description.
What capability does an orchestration workflow provide?
- A . Helps administer the cloud infrastructure, such as adding resources to a resource pool, billing, and reporting
- B . Helps to consolidate all the IT resources in the cloud environment
- C . Enables the administrator to control the underlying physical infrastructure using a single unified management console
- D . Creates an automated set of tasks to update the service catalog by cloud consumers without requiring manual intervention
What can an IT department do to better meet IT challenges and support digital businesses?
- A . Become more technology centric
- B . Focus on delivery and management of digital assets
- C . Become more service centric within cost constraints
- D . Focus on providing services without being distracted by costs
What is a characteristic of thin LUNs?
- A . When a thin LUN is destroyed, its allocated capacity is automatically reclaimed to the pool.
- B . When a thin LUN is created, physical storage is fully allocated for it
- C . Once a thin LUN is created it cannot be destroyed until all data is deleted from it
- D . When a thin LUN is destroyed, its allocated capacity is reserved until an administrator reclaims it
Which product provides key management and a data-at-rest encryption mechanism for private, public, and hybrid clouds?
- A . RSA SecurID
- B . Dell EMC CloudArray
- C . RSA Archer eGRC
- D . Dell EMC CloudLink
What is a key benefit of using containers?
- A . Eliminates any long-term commitments to a technology stack
- B . Helps speed up software release cycles and improve software quality
- C . Enables services to be delivered in hour or days, not weeks
- D . Provides better probability without requiring code changes
What is the purpose of a bitmap in snapshot creation?
- A . Keeps track of blocks that have changed in the filesystem
- B . Indicates the exact address from which data has to be read
- C . Indicates the exact address to where data has to be written
- D . Keeps track of the number of blocks that are highly utilized
An organization needs to deploy remote replication between two sites that are 100 km (62 miles) apart. The organization requires a near zero recovery point objective.
Which solution would you recommend?
- A . Hypervisor-based asynchronous replication
- B . Synchronous replication
- C . Snapshot replication
- D . Asynchronous replication
Which method optimizes network performance by distributing network traffic across the shared bandwidth of all the ISLs?
- A . Link aggregation
- B . Network zoning
- C . Network segmentation
- D . Link failover
Which product is a single-instance, multitenant integration platform as a service that provides a unified online development and management environment?
- A . MyService 360
- B . ViPR SRM
- C . Data Protection Advisor
- D . Dell Boomi
Which cloud service model is represented in the exhibit?
- A . Software as a Service
- B . Infrastructure as a Service
- C . Platform as a Service
- D . Database as a Service
What is an organizational benefit of adopting modern applications?
- A . Enhances competitiveness
- B . Removes dependency on IT completely
- C . Eliminates CAPEX
- D . Removes dependency on service provider
Which process involves determining the optimal resources required to meet seasonal spikes in resource demand?
- A . Configuration management
- B . Change management
- C . Capacity management
- D . Incident management
Which task describes adherence to compliance?
- A . Ensure security policies are being enforced
- B . Define access rights to users
- C . Assess the cloud provider’s capability to provide logs
- D . Assess assets with realistic valuations