________ services can be used to protect data in use.
- A . Storage
- B . Observability
- C . Networking
- D . Compute
Why would a developer choose IBM Cloud Functions for a particular workload?
- A . When they need continuous monitoring and adjustment of their environment.
- B . For workloads that require dedicated, single-tenant hardware.
- C . When the workload is event-driven and requires execution of functions in response to specific triggers.
- D . For applications that need persistent storage with high IOPS.
Which of the following technologies is considered an emerging trend that enhances cloud computing capabilities?
- A . Quantum computing
- B . Mainframe computing
- C . Grid computing
- D . Edge computing
Which benefit is most directly associated with cloud-native application development?
- A . Reduced operational cost
- B . Enhanced vendor lock-in
- C . Slower time-to-market
- D . Decreased scalability
Which architecture style does messaging and event streaming directly support in cloud-native applications?
- A . Monolithic architecture
- B . Event-driven architecture
- C . Traditional layered architecture
- D . Client-server architecture
Which service provides a document database that uses JSON files to store and index documents?
- A . Db2
- B . Cloudant
- C . Databases for MYSQL
- D . DataStage
What is the primary reason an organization using IBM Cloud would use software-defined storage?
- A . Being extremely fast, it is ideal for custom cloud native database services.
- B . It allows developers to trial disk layouts and IOPS configs where applications have demanding storage requirements.
- C . It has the ability to store application data across different availability zones, increasing resilience.
- D . It is the lowest cost of storage available, so it reduces total cost of ownership.
An organization is leveraging IBM Cloud Power Systems Virtual Servers for their IBM i workloads.
Which disaster recovery mechanism could be used?
- A . Veeam
- B . Geographic Logical Volume Manager
- C . PowerHA Geographic Mirroring
- D . IBM Spectrum Protect
Which IBM Cloud service offers a fully managed, cloud-native data warehouse solution?
- A . IBM Db2 Warehouse on Cloud
- B . IBM Cloudant
- C . IBM Watson Studio
- D . IBM Analytics Engine
To access and manage objects when they are stored on IBM Cloud Object Storage, a client would use?
- A . SQL
- B . CIFS
- C . API
- D . SMB
How does IBM Cloud File Storage differentiate itself with its snapshot and replication features?
- A . It offers unlimited data storage capacity.
- B . It enables data encryption with customer-managed keys.
- C . It provides point-in-time snapshots and data replication for disaster recovery.
- D . It allows direct access from IBM Cloud Kubernetes Service.
Which three scenarios are best suited for IBM Cloud Virtual Servers?
- A . DevOps environments
- B . High-performance computing
- C . E-commerce platforms
- D . Media streaming
- E . Batch processing
In IBM Cloud, what is the purpose of a Content Delivery Network (CDN)?
- A . Enhance security
- B . Manage network traffic
- C . Reduce latency
- D . Data analytics
Which feature is a key benefit of IBM Cloud Bare Metal Servers?
- A . Multi-tenancy
- B . Deep learning integrations
- C . Customizable hardware
- D . Automated scaling
The __________ ensures that IBM has designed the cloud controls as per the appropriate Trust Service Principles and is operating effectively for the reporting period.
- A . Security Reports
- B . Data Reports
- C . Service Organization Control Reports
- D . Compliance Reports
MongoDB is considered a document database.
What is another example of a document database?
- A . EnterpriseDB Postgres
- B . IBM Event Streams
- C . etcd
- D . Elasticsearch
When running VMware Solutions Dedicated, which disaster recovery and protection option on IBM Cloud uses continuous data replication with journaling versus snapshots?
- A . IBM Spectrum Protect Plus
- B . CommVault
- C . Zerto
- D . IBM Cloud Backup
Who is responsible for handling upgrades, backups, and other maintenance tasks with IBM Cloud’s Database-as-a-Service offerings?
- A . Database vendor
- B . Shared responsibility
- C . Application owner
- D . Service provider
Which of the following is NOT a deployment model for cloud computing?
- A . Public cloud
- B . Distributed cloud
- C . Community cloud
- D . Exclusive cloud
If a company deployed five virtual server instances in an IBM Cloud VPC, and these instances require outbound connectivity to an external service over the internet, which IBM Cloud VPC offering would be the best solution?
- A . Direct Link
- B . Transit Gateway
- C . Public Gateway
- D . Floating IP
A client is filtering for pricing plans while searching in the IBM Cloud Catalog.
Which filters are available in the pricing plan?
- A . Enterprise and Personal plans
- B . Corporate plans
- C . Lite and Free plans
- D . Premium plans
Which principle is a core component of DevSecOps practices integrated into IBM Cloud services?
- A . Continuous Integration/Continuous Deployment (CI/CD) automation
- B . Manual security reviews
- C . Post-deployment testing only
- D . Limited team access to production environments
How does using DevOps methodologies benefit cloud-native application development?
- A . It prolongs the software development life cycle.
- B . It enhances collaboration and automation in the software delivery process.
- C . It restricts frequent and reliable software delivery.
- D . It increases the dependency on manual processes.
An organization wants to deploy an online tool to their employees’ questions in realtime based on its bank of questions and natural language processing to cover all the supported languages.
Which IBM Cloud service can be used in this case?
- A . Watson Assistant
- B . Watson OpenScale
- C . AI Explainability 360
- D . Watson Tone Analyzer
_______ encryption protects data on IBM Cloud that is in the process of being transferred.
- A . Data in use
- B . Data in stasis
- C . Data in motion
- D . Data at rest
Cloud native applications can be defined as:
- A . Applications that can be lifted and shifted to the cloud and run on similar hardware
- B . Applications where all necessary code is run on a single instance hosted in the cloud
- C . Applications that are designed to run exclusively in the public or private cloud
- D . Applications that are available to deploy directly from the IBM Cloud Catalog
Which deployment model is typically preferred by organizations that require a high level of data isolation and security?
- A . Public cloud
- B . Private cloud
- C . Hybrid cloud
- D . Community cloud
Hosts, links, location, and _______ are the four main components of an IBM Cloud Satellite solution.
- A . Endpoints
- B . API
- C . Direct Link
- D . Client server
In which scenario would Confidential Computing be most critical?
- A . Public web blogging platform
- B . Open-source software development
- C . Financial data processing
- D . Static website hosting
What use case is particularly suitable for IBM Cloud’s VMware solutions?
- A . Edge computing
- B . Legacy application migration
- C . Lightweight container deployment
- D . IoT device management
Which of the following can be used to track and measure the performance of machine models that can safeguard data models against biases?
- A . Watson OpenScale
- B . Watson Studio
- C . Watson Assistant
- D . Watson Discovery
A client is leveraging IBM Cloud Power Systems Virtual Servers for their IBM i workloads. The ___________ disaster recovery mechanism could be used.
- A . PowerHA Geographic Mirroring
- B . Veeam
- C . IBM Spectrum Protect
- D . Geographic Logical Volume Manager
If a client wants to migrate an on-premises LPAR running AIX to IBM Cloud, which type of service should they migrate to?
- A . IBM VMware Shared Solutions
- B . VSIs on IBM Classic
- C . IBM Power Virtual Servers
- D . Bare Metal Servers for VPC
Which process ensures the right resources have access to the right assets?
- A . Identity and Access Management (IAM)
- B . Change Management
- C . Security and Regulatory Compliance
- D . Incident and Operations Management
What are the benefits of using IBM Cloud Backup Solutions? (Choose Two)
- A . Real-time data analytics on backup data
- B . Support for both virtual and physical resources
- C . Automated backup scheduling and policy management
- D . Exclusive use of SSD storage to speed up backup processes
What distinguishes IBM Cloud Virtual Servers from Bare Metal Servers?
- A . Physical access to the server
- B . Multi-tenancy capability
- C . Fixed performance
- D . Lack of network options
______ can be used to encrypt data in motion.
- A . File Transport Protocol (FTP)
- B . Transport Layer Security (TLS)
- C . Hyper Text Transport Protocol (HTTP)
- D . Transport Security Layer (TSL)
The goal of the twelve-factor app methodology for creating cloud native applications is to:
- A . Use a declarative approach to programming.
- B . Use an imperative approach to programming.
- C . Minimize the need to scale up quickly by deploying replicas.
- D . Minimize portability between execution environments.
What role does an API Gateway play in microservices architecture?
- A . Decreases the number of API endpoints
- B . Increases direct inter-service communication
- C . Acts as a single entry point for defined APIs
- D . Reduces the need for authentication mechanisms
Which year is often cited as the birth of modern cloud computing, marked by the release of a major cloud service product?
- A . 1996
- B . 2002
- C . 2006
- D . 2010
Which of the following are key security features of the IBM Cloud Platform? (Choose Two)
- A . Dedicated Hardware Security Modules
- B . Identity and Access Management (IAM)
- C . Physical security at data center locations
- D . Publicly accessible API endpoints for all services
What is a primary advantage of using Infrastructure as Code (IaC) in cloud-native environments?
- A . Increased physical infrastructure dependency
- B . Slower infrastructure provisioning processes
- C . Improved consistency and repeatability
- D . Enhanced manual configuration processes
Which of the following elements are typically included in a business case study for cloud computing adoption? (Choose Three)
- A . Cost-benefit analysis
- B . Regulatory compliance assessment
- C . Future technology predictions
- D . Risk assessment
- E . Historical data analysis
Which principle of the Twelve-Factor App methodology emphasizes the strict separation of build and run stages?
- A . Codebase
- B . Dependencies
- C . Config
- D . Build, release, run
What key values do IBM Cloud Managed Database options offer? (Choose Three)
- A . Homogeneous data replication
- B . Automated backups and high availability
- C . Built-in AI for database management
- D . Multi-region deployment for disaster recovery
- E . Seamless scaling of compute and storage resources
Which workload is best suited for IBM Cloud Power Systems Virtual Servers?
- A . High-performance computing
- B . Lightweight web applications
- C . Large scale data mining
- D . AI and machine learning
Which container orchestration tools are available on IBM Cloud? (Choose Three)
- A . Docker Swarm
- B . Kubernetes
- C . IBM Cloud Continuous Delivery
- D . Red Hat OpenShift
- E . Apache Mesos
Which IBM Cloud service is primarily used to enhance network security by filtering traffic based on a set of security rules?
- A . IBM Cloud Internet Services
- B . IBM Cloud Virtual Servers
- C . IBM Cloud Activity Tracker
- D . IBM Cloud Security Groups
Regarding IBM Cloud’s compute offerings, which of the following statements are true? (Choose Two)
- A . IBM Cloud Bare Metal Servers provide exclusive access to physical servers.
- B . IBM Cloud Functions is ideal for long-running complex computational tasks.
- C . IBM Cloud Kubernetes Service simplifies container management and orchestration.
- D . IBM Cloud Foundry is primarily used for blockchain-based applications.
Which IBM service facilitates the integration of IoT data into edge computing solutions?
- A . IBM Watson IoT Platform
- B . IBM Cloud Satellite
- C . IBM Cloud Object Storage
- D . IBM Cloud Kubernetes Service
Data that is stored on block storage is secured on IBM Cloud by allowing clients to do what?
- A . Clients can store their data in databases.
- B . Clients can use Bring Your Own Key to encrypt their data.
- C . Clients can move their data from one server to another.
- D . Clients can perform processing or analysis on their data.
What is a key compliance certification that IBM Cloud has obtained to demonstrate its commitment to security?
- A . ISO 9001
- B . PCI DSS
- C . COPPA
- D . ISO 27001
Efficiency, autonomy, and modernization are attributes of what cloud model?
- A . Concurrent
- B . Private
- C . Hybrid
- D . Public
In the context of IBM Cloud, which options are considered when implementing IBM Backup, Recovery, and Replication solutions? (Choose Three)
- A . VMware backup solutions
- B . Cold storage for long-term data retention
- C . Active-Active replication for high availability
- D . Direct-to-tape backup for legacy systems
- E . Automated disaster recovery orchestration
A client needs a key management solution on IBM Cloud that meets FIPS 140-2 Level 4 certification.
Which option should be recommended?
- A . IBM Cloud HSM
- B . IBM Blockchain Platform
- C . IBM Hyper Protect Crypto Services
- D . IBM Key Protect
Key Protect is a key management solution on IBM Cloud.
What is another key management solution on IBM Cloud?
- A . Block Storage
- B . Object Storage
- C . Identity and Access Management
- D . Hyper Protect Crypto Services
Which IBM Cloud service is a serverless platform that enables developers to execute code in response to events without managing servers?
- A . IBM Cloud Foundry
- B . IBM Cloud Functions
- C . IBM Cloud Kubernetes Service
- D . IBM Cloud Virtual Servers
Which IBM Cloud feature allows you to create a dedicated, private connection between your remote network environments and IBM Cloud?
- A . IBM Cloud VPN for VPC
- B . IBM Cloud Direct Link
- C . IBM Cloud Internet Services
- D . IBM Cloud Subnet
In the context of DevSecOps, what is a primary objective?
- A . Decreasing deployment frequency
- B . Increasing code deployment lead time
- C . Integrating security practices into the DevOps pipeline
- D . Focusing solely on functional feature development
In IBM Cloud VPC, a security group acts as a _______.
- A . Virtual private cloud
- B . Gateway
- C . Firewall
- D . Router