What is a key consideration when designing a hybrid cloud architecture?

What is a key consideration when designing a hybrid cloud architecture?A . Using a single cloud provider for all workloadsB . Avoiding network connectivity between on-premises and cloud resourcesC . Ensuring seamless data and application mobility between environmentsD . Minimizing scalability options in the cloudView AnswerAnswer: C

March 27, 2024 No Comments READ MORE +

Which design consideration applies to object storage?

Which design consideration applies to object storage?A . Multi-tenancy is supported through file and directory permissionsB . It is best suited for high performance and low latency applicationsC . A RAID controller on the host computer handles redundancyD . A common authentication mechanism is accessible by all tenantsView AnswerAnswer: D

March 26, 2024 No Comments READ MORE +

What type of infrastructure would meet these requirements?

A company has the following requirements: - Modular building blocks - Scalability - In-house management solution - No physical SAN What type of infrastructure would meet these requirements?A . Cloud-in-a-BoxB . ConvergedC . TraditionalD . Hyper-ConvergedView AnswerAnswer: D

March 26, 2024 No Comments READ MORE +

Which requirement(s) will support the addition of this component to the design?

A cloud architect has included an SDS controller in a cloud design. Which requirement(s) will support the addition of this component to the design?A . Monitor storage performance and manually provision storage resourcesB . Provide the ability to programmatically deploy virtual storage resourcesC . Switch array functionality from active/passive to...

March 26, 2024 No Comments READ MORE +

What is a key consideration for security?

An organization has chosen to build a platform using a packaged PaaS Solution. This will support its primary consumer Internet application. What is a key consideration for security?A . Authentication services cannot be allowed to affect availability or latency.B . Authentication and authorization standards must be supported.C . There must...

March 26, 2024 No Comments READ MORE +

An organization is developing a cloud-native social-media website. The website will be written using elastic principles. When the website scales, it can add additional web, application and database instances to meet dynamic workload demand.

An organization is developing a cloud-native social-media website. The website will be written using elastic principles. When the website scales, it can add additional web, application and database instances to meet dynamic workload demand. Which additional resources will be consumed by replication as the database layer expands.A . Public IP...

March 26, 2024 No Comments READ MORE +

How does the information impact the cloud management platform infrastructure sizing?

A cloud architect discovers that an organization wants to deploy 500 consumer applications initially and grow to over 2000 consumer applications in three years. These applications will use block storage only. How does the information impact the cloud management platform infrastructure sizing?A . Influences proxy server data storage requirementsB ....

March 26, 2024 No Comments READ MORE +

Which storage category and feature is represented by EMC XtremIO?

Which storage category and feature is represented by EMC XtremIO?A . Central storage and full redundancyB . Distributed storage and FlashC . Central storage and active/passiveD . Distributed storage and full redundancyView AnswerAnswer: A

March 26, 2024 No Comments READ MORE +

What will be included in the design to support these capabilities?

An organization wants to deploy virtual machines from a service catalog. These virtual machines have software and libraries installed that are used to develop applications. Each virtual machine will be configured with the same IP address and receive OS patches from the Internet. What will be included in the design...

March 26, 2024 No Comments READ MORE +

Which type of encryption allows the deletion of data on disk by simply deleting the encryption key?

A cloud architect is evaluating an organization's need for encryption. Which type of encryption allows the deletion of data on disk by simply deleting the encryption key?A . EmbeddedB . ApplicationC . FileD . File systemView AnswerAnswer: A

March 26, 2024 No Comments READ MORE +