Which function collects information about competing service offerings?
Which function collects information about competing service offerings?A . Service performance management B. Service portfolio management C. Service operations management D. Service demand managementView AnswerAnswer: B
Which cloud characteristic enables the consumer to handle such variations in workloads and IT resource requirements?
An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient. Which cloud characteristic enables the consumer to handle such variations in...
Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?
Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?A . Integrity B. Authorization C. Authentication D. ConfidentialityView AnswerAnswer: D
What activity is performed during the service creation phase of the cloud service lifecycle?
What activity is performed during the service creation phase of the cloud service lifecycle?A . Defining Service Template B. Developing Service Enablement Roadmap C. Assessing Service Requirements D. Establishing Billing PolicyView AnswerAnswer: C
Which risk management step deploys various security mechanisms that minimize risks impacts?
Which risk management step deploys various security mechanisms that minimize risks impacts?A . Identification B. Mitigation C. Assessment D. MonitoringView AnswerAnswer: B
What helps to recover the cost of providing the service, ensuring profitability, and meeting the provider’s return on investment and reinvestment goals?
What helps to recover the cost of providing the service, ensuring profitability, and meeting the provider’s return on investment and reinvestment goals?A . Service negotiation B. Service level objective C. Service valuation D. Service level agreementView AnswerAnswer: C
What is the correct sequence of steps in the service catalog design and implementation process?
DRAG DROP What is the correct sequence of steps in the service catalog design and implementation process? View AnswerAnswer: Explanation:
What is a benefit of link aggregation?
What is a benefit of link aggregation?A . Saves bandwidth by restricting traffic to a specific potentially congested ISL B. Improves performance by combining two or more parallel ISLs into a single physical ISL C. Optimizes fabric performance by distributing network traffic across ISL D. Improves ISL utilization by increasing...
What type of cloud security control is log auditing?
What type of cloud security control is log auditing?A . Detective control B. Corrective control C. Preventive control D. Technical controlView AnswerAnswer: A
Which is true about a type 2 hypervisor?
Which is true about a type 2 hypervisor?A . Installed as an application on an operating system B. Installed on bare-metal hardware C. Hypervisor vendor must certify the hardwareView AnswerAnswer: A