Exam4Training

IBM C1000-172 IBM Cloud Professional Architect v6 Online Training

Question #1

What is the first customer-u address assuming a VPC subnet has the CIDR range 10.10.10.0/24?

  • A . 10.10.10.0
  • B . 10.10.10.4
  • C . 10.10.10.24
  • D . 10.10.10.1

Reveal Solution Hide Solution

Correct Answer: A
Question #2

A customer RFP is requesting a solution to run a scalable, elastic, and managed analytics focused database with in-memory capabilities.

Which service should be included in the response?

  • A . Analytics Engine
  • B . DB2 Warehouse on Cloud
  • C . Mongo Cluster Service
  • D . SQL Query

Reveal Solution Hide Solution

Correct Answer: B
Question #3

Which of the following is a workload that best fits the Cloud Functions processing model?

  • A . High-volume, independent, and parallel workloads
  • B . Backup/recovery
  • C . Web hosting applications
  • D . Complex business processes

Reveal Solution Hide Solution

Correct Answer: A
Question #4

Which technology does IBM Cloud Direct Link use to achieve high availability with two connections?

  • A . Using Equal-Cost MultiPath (ECMP) with diversity
  • B . Using Equal-Path MultiCost (EPMC) with diversity
  • C . Using GRE Tunneling
  • D . Using VPN connections with diversity

Reveal Solution Hide Solution

Correct Answer: A
Question #5

Which of the following IBM Cloud Paks help to accelerate the build of cloud-native apps by leveraging built-in developer tools and processes?

  • A . IBM Cloud Pak for Microservices
  • B . IBM Cloud Pak for Developers
  • C . IBM Cloud Pak for Applications
  • D . IBM Cloud Pak for Data

Reveal Solution Hide Solution

Correct Answer: C
Question #6

Which Cloud Pak provides a data transfer tool utilizing the FASP protocol to provide significantly faster throughput than typical FTP?

  • A . Cloud Pak for Applications
  • B . Cloud Pak for Integration
  • C . Cloud Pak for Automation
  • D . Cloud Pak for Migration

Reveal Solution Hide Solution

Correct Answer: B
Question #7

IBM Log Analysis with LogDNA can be used to manage which of the following?

  • A . Cloud native applications logs on any Cloud
  • B . Service Mesh in IBM Cloud
  • C . Only application logs in the IBM Cloud
  • D . System and application logs in the IBM Cloud

Reveal Solution Hide Solution

Correct Answer: D
Question #8

Identify the component marked as B in the Cloud Connection scenario that shows a persistent connection established between the customer’s environment and the IBM Cloud.

  • A . Cloud Gateway Appliance
  • B . Secure Gateway Service
  • C . Virtual Router Appliance
  • D . Secure Gateway Client

Reveal Solution Hide Solution

Correct Answer: D
Question #9

Which is a Cloud Functions best practice?

  • A . Make each function perform only one action
  • B . Define long-running processes as a Cloud Functions workload
  • C . Define stateful applications as cloud functions
  • D . Use Go-lang or Java to implement a function

Reveal Solution Hide Solution

Correct Answer: C
Question #10

What is the key technology that makes IBM Cloud Analytics Engine run jobs at a remarkable processing speed?

  • A . Resilient Distributed Datasets (RDD)
  • B . Resourceful Distributed Datasets (RDD)
  • C . Rapid Divided Datasets (RDD)
  • D . Rapid Distributed Datasets (RDD)

Reveal Solution Hide Solution

Correct Answer: A

Question #11

A customer has defined a requirement to enable all virtual server instances in the proposed VPC to be able to access automatic operating system updates via the Internet.

What is required to provide this functionality?

  • A . Each subnet must have a Public Gateway
  • B . A subscription to the IBM Auto Update proxy service
  • C . Each server must have a Floating IP address
  • D . The pre-defined Automatic Updates Security Group must be enabled

Reveal Solution Hide Solution

Correct Answer: C
Question #12

Which is an example of A/B Testing?

  • A . A new software release is deployed to production and tested before the previous release is removed
  • B . Different versions of a website are presented online to see which one performs better
  • C . A new software release is deployed to different geographic regions over a period of days or weeks
  • D . New functionality is released to a small set of customers to test that it is functioning properly

Reveal Solution Hide Solution

Correct Answer: B
Question #13

Which of the following statements is correct?

  • A . VMware Solutions Shared can be deployed at any IBM Cloud Data Centers
  • B . VMware Solutions Shared is a hosted private cloud that delivers the VMware vSphere stack as a service
  • C . VMware Solutions Shared is a streamlined and optimized ordering platform for VMware
  • D . VMware Solutions Shared requires a Pay As You Go or Subscription IBM Cloud account

Reveal Solution Hide Solution

Correct Answer: C
Question #14

A customer has requested an architecture design for a system capable of running deep learning and Al.

Which of the following services in IBM Cloud could the design include that specifically addresses this requirement?

  • A . HyperProtect Virtual Server
  • B . IBM Log Analysis with Log DNA
  • C . POWER VSls in VPC
  • D . Cloud HSM

Reveal Solution Hide Solution

Correct Answer: B
Question #15

How is access to the IBM Cloud Container Registry controlled?

  • A . IBM Cloud Identity and Access Management (IAM)
  • B . A platform-built using Docker to run and manage your applications
  • C . Watson service credentials
  • D . An open-source system named Cloud Foundry

Reveal Solution Hide Solution

Correct Answer: A
Question #16

The customer decided to remove the Caveonix RiskForesight all-in-one service from the IBM Cloud and move to a distributed model for VMware Solutions. By default, IBM automatically deletes only the single deployed all-in-one Caveonix VM and the dedicated private subnet that was ordered for it.

What are the key considerations?

(Select Two)

  • A . If you used the IP addresses of the dedicated private subnet on additional VMs, those VMs must be ^ assigned new IP addresses to continue to function
  • B . Old configurations can be deleted and migrated to a new environment
  • C . If you scaled out the Caveonix VM into multiple VMs, those additional VMs are not removed
  • D . Delete the VM and Storage allocation, Cavenoix RiskForesight will discontinue data gathering and services are deemed stopped
  • E . Unsubscribe the license and remove the instance of all-in-one deployment in the VMware solutions, release the IP address to DHCP, DNS servers

Reveal Solution Hide Solution

Correct Answer: AC
Question #17

Which method is used to send application logs to IBM Cloud Log Analysis?

  • A . REST API
  • B . SOAP API
  • C . Log Analysis SDK
  • D . SFTP

Reveal Solution Hide Solution

Correct Answer: A
Question #18

Which VMware application mobility technology seamlessly extends on-premises data center networks into IBM Cloud?

  • A . VMware vSphere
  • B . VMware HCX
  • C . VMware NSX
  • D . VMware Horizon

Reveal Solution Hide Solution

Correct Answer: B
Question #19

Which policy type isolates microservices in Red Hat OpenShift on IBM Cloud?

  • A . VPC Security Groups
  • B . Kubernetes Network Policies
  • C . Pod Security Policies (PSP
  • D . VPC Access Control Lists (ACLs)

Reveal Solution Hide Solution

Correct Answer: B
Question #20

The Db2 service on IBM Cloud use which type of data model?

  • A . Relational
  • B . Document
  • C . Graph
  • D . Columnar

Reveal Solution Hide Solution

Correct Answer: A

Question #21

What must be completed before adding a new network interface to a virtual server instance on IBM Cloud VPC?

  • A . Select the security group to be associated with the network interface
  • B . Select the access control list to be associated with the network interface
  • C . Create a public gateway to be associated with the network interface
  • D . Select the resource group to be associated with the network interface

Reveal Solution Hide Solution

Correct Answer: A
Question #22

Which IBM Cloud for VMware Solutions shared component has visibility to backup VMs from any Virtual Data Center in the organization?

  • A . Veeam Cloud Connect
  • B . Veeam Availability Suite
  • C . Veeam Backup Essentials
  • D . Veeam Availability Orchestrator

Reveal Solution Hide Solution

Correct Answer: B
Question #23

A solution architect would like to deploy a containerized AI application that involves highly sensitive data.

Which infrastructure choice must the architect choose for the IBM Cloud Kubernetes Service to obtain the most secure isolation?

  • A . Shared VPC infrastructure
  • B . Bare Metal Classic infrastructure
  • C . Shared Classic infrastructure
  • D . Public VPC infrastructure

Reveal Solution Hide Solution

Correct Answer: B
Question #24

Which VMware Solutions component is used for infrastructure management?

  • A . VMware vCenter
  • B . VMware vSphere
  • C . VMware SAN
  • D . VMware NSX

Reveal Solution Hide Solution

Correct Answer: A
Question #25

In the context of the Key Protect service, which of the following statements is correct?

  • A . Key Protect allows you to import keys for other Clouds
  • B . Key Protect allows you to create a new key or import your own key (BYOK)
  • C . Key Protect allows you to manage service accounts
  • D . Key Protect allows you to manage keys as well as SSL/TLS Digital Certificates

Reveal Solution Hide Solution

Correct Answer: B
Question #26

When using Application Load Balancer for VPC, what two methods are used for distributing traffic across the back-end application servers?

  • A . Round-robin
  • B . Fixed Weighting
  • C . Least connections
  • D . Weighted Response Time
  • E . Resource Based (Adaptive)

Reveal Solution Hide Solution

Correct Answer: AC
Question #27

What is one of IBM’s Operational Responsibilities for managing the IBM Cloud Object Storage Service?

  • A . Provision and manage the VSIs required to serve the data using NFS
  • B . Ensure data backup if necessary
  • C . Monitor and restore data backups
  • D . Monitor and manage service health and availability

Reveal Solution Hide Solution

Correct Answer: D
Question #28

Which approach must be used to access worker nodes in an IBM Cloud Red Hat OpenShift Kubernetes Service (ROKS)?

  • A . SSH
  • B . telnet
  • C . IBM Cloud management console
  • D . OpenStack API server

Reveal Solution Hide Solution

Correct Answer: A
Question #29

What is the function of the IBM Cloud File Storage Capacity Expansion feature?

  • A . It is used by IBM Cloud Storage users to manage data flow
  • B . It is used by IBM Cloud Storage users to expand their file storage immediately
  • C . It is used by the IBM Cloud Management team to manage file storage capacity
  • D . It is used by the IBM Cloud Storage users to regenerate data storage that may have been deleted

Reveal Solution Hide Solution

Correct Answer: B
Question #30

Which IBM Cloud service makes it possible to troubleshoot logs in real time to diagnose issues?

  • A . API Gateway
  • B . Portworx Enterprise
  • C . IBM Log Analysis with LogDNA
  • D . IBM Cloud Monitoring with Sysdig

Reveal Solution Hide Solution

Correct Answer: C

Question #31

What describes the comprehensive security and compliance standard organization that IBM Cloud follows the standards and regulations for the United States government?

  • A . Federal Risk and Authorization Management Program (FedRAMP)
  • B . Center for Internet Security (CIS)
  • C . Federal Information Processing Standard (FIPS)
  • D . National Institute of Standards and Technology (NIST)

Reveal Solution Hide Solution

Correct Answer: A
Question #32

Which solution provides high availability for Power Systems Virtual Server on the IBM Cloud?

  • A . Veeam on IBM Cloud
  • B . PowerHA System Mirror
  • C . Power Systems autoscaling group
  • D . Multi-zone Power Server Clusters

Reveal Solution Hide Solution

Correct Answer: B
Question #33

Which of the following can be monitored with IBM Cloud Monitoring with Sysdig?

  • A . Cloud Functions Applications
  • B . Cloud Foundry Applications
  • C . Containers within IKS
  • D . Windows Virtual Servers

Reveal Solution Hide Solution

Correct Answer: C
Question #34

A CIO is concerned about a major regional disaster.

Which IBM Cloud Code Engine deployment architecture ensures workloads are resilient to such events?

  • A . Deploy workloads across multiple MZR regions and use Cloud Internet Service
  • B . Deploy workloads across multiple data centers and use Citrix Netscaler
  • C . Deploy workloads across multiple VPC and use the Load Balancer for VPC
  • D . Deploy workloads across multiple zones in a region and use Load Balancer for VPC

Reveal Solution Hide Solution

Correct Answer: A
Question #35

Vulnerability Advisor is pre-integrated into several toolchain templates.

What does the Vulnerability Advisor do?

  • A . Continuously monitors and analyzes network communications
  • B . Scans source code for potential threats and vulnerabilities
  • C . Tests databases for SQL injection vulnerabilities
  • D . Scans container images for potential security issues

Reveal Solution Hide Solution

Correct Answer: A
Question #36

What’s the correct architectural network topology in IBM Cloud?

  • A . Region > Zone > VPC > Subnet
  • B . VPC > Zone > Region > Subnet
  • C . Region > VPC > Zone > Subnet
  • D . VPC > Region > Zone > Subnet

Reveal Solution Hide Solution

Correct Answer: A
Question #37

Which statement describes a key-value database?

  • A . Each item in the database is stored as an attribute name (referred to as a key) with its corresponding value
  • B . Each item in the database is encrypted with public-key cryptography
  • C . Each item in the database is a document with lists of key-value pairs
  • D . Each item in the database is stored in a column named key with values in each row

Reveal Solution Hide Solution

Correct Answer: A
Question #38

There is a request to architect a hybrid VMware solution in IBM Cloud to address failures in the on-premise data centers.

What additional VMware component would allow for seamless network access for workloads from the VMware Cluster on-premise to the VMware Cluster in IBM Cloud to facilitate resiliency into existing solutions?

  • A . NSX-T
  • B . HCX
  • C . NCX
  • D . NSX-C

Reveal Solution Hide Solution

Correct Answer: B
Question #39

What are two benefits of using IBM Cloud Container Registry?

  • A . Set up your own single-tenant image namespace in a highly available, scalable, encrypted private registry that is hosted and managed by IBM
  • B . Benefit from unlimited free storage and pull traffic to your private images for an unlimited term
  • C . Store your private images and share them with users in your IBM Cloud account
  • D . ILMT is built-in to ensure compliance with IBM Licensing terms
  • E . The built-in Vulnerability Advisor feature that scans for potential security issues and vulnerabilities

Reveal Solution Hide Solution

Correct Answer: CE
Question #40

A VP of Security wants to find a solution to host Linux workloads in IBM Cloud with a requirement that no external access to the data is allowed, including privileged users such as cloud administrators.

Which service would meet this requirement?

  • A . Power Virtual Servers
  • B . Virtual Server in VPC
  • C . Hyper Protect Virtual Servers
  • D . High Security Bare Metal Servers

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version