What is the first customer-u address assuming a VPC subnet has the CIDR range 10.10.10.0/24?
- A . 10.10.10.0
- B . 10.10.10.4
- C . 10.10.10.24
- D . 10.10.10.1
A customer RFP is requesting a solution to run a scalable, elastic, and managed analytics focused database with in-memory capabilities.
Which service should be included in the response?
- A . Analytics Engine
- B . DB2 Warehouse on Cloud
- C . Mongo Cluster Service
- D . SQL Query
Which of the following is a workload that best fits the Cloud Functions processing model?
- A . High-volume, independent, and parallel workloads
- B . Backup/recovery
- C . Web hosting applications
- D . Complex business processes
Which technology does IBM Cloud Direct Link use to achieve high availability with two connections?
- A . Using Equal-Cost MultiPath (ECMP) with diversity
- B . Using Equal-Path MultiCost (EPMC) with diversity
- C . Using GRE Tunneling
- D . Using VPN connections with diversity
Which of the following IBM Cloud Paks help to accelerate the build of cloud-native apps by leveraging built-in developer tools and processes?
- A . IBM Cloud Pak for Microservices
- B . IBM Cloud Pak for Developers
- C . IBM Cloud Pak for Applications
- D . IBM Cloud Pak for Data
Which Cloud Pak provides a data transfer tool utilizing the FASP protocol to provide significantly faster throughput than typical FTP?
- A . Cloud Pak for Applications
- B . Cloud Pak for Integration
- C . Cloud Pak for Automation
- D . Cloud Pak for Migration
IBM Log Analysis with LogDNA can be used to manage which of the following?
- A . Cloud native applications logs on any Cloud
- B . Service Mesh in IBM Cloud
- C . Only application logs in the IBM Cloud
- D . System and application logs in the IBM Cloud
Identify the component marked as B in the Cloud Connection scenario that shows a persistent connection established between the customer’s environment and the IBM Cloud.
- A . Cloud Gateway Appliance
- B . Secure Gateway Service
- C . Virtual Router Appliance
- D . Secure Gateway Client
Which is a Cloud Functions best practice?
- A . Make each function perform only one action
- B . Define long-running processes as a Cloud Functions workload
- C . Define stateful applications as cloud functions
- D . Use Go-lang or Java to implement a function
What is the key technology that makes IBM Cloud Analytics Engine run jobs at a remarkable processing speed?
- A . Resilient Distributed Datasets (RDD)
- B . Resourceful Distributed Datasets (RDD)
- C . Rapid Divided Datasets (RDD)
- D . Rapid Distributed Datasets (RDD)
A customer has defined a requirement to enable all virtual server instances in the proposed VPC to be able to access automatic operating system updates via the Internet.
What is required to provide this functionality?
- A . Each subnet must have a Public Gateway
- B . A subscription to the IBM Auto Update proxy service
- C . Each server must have a Floating IP address
- D . The pre-defined Automatic Updates Security Group must be enabled
Which is an example of A/B Testing?
- A . A new software release is deployed to production and tested before the previous release is removed
- B . Different versions of a website are presented online to see which one performs better
- C . A new software release is deployed to different geographic regions over a period of days or weeks
- D . New functionality is released to a small set of customers to test that it is functioning properly
Which of the following statements is correct?
- A . VMware Solutions Shared can be deployed at any IBM Cloud Data Centers
- B . VMware Solutions Shared is a hosted private cloud that delivers the VMware vSphere stack as a service
- C . VMware Solutions Shared is a streamlined and optimized ordering platform for VMware
- D . VMware Solutions Shared requires a Pay As You Go or Subscription IBM Cloud account
A customer has requested an architecture design for a system capable of running deep learning and Al.
Which of the following services in IBM Cloud could the design include that specifically addresses this requirement?
- A . HyperProtect Virtual Server
- B . IBM Log Analysis with Log DNA
- C . POWER VSls in VPC
- D . Cloud HSM
How is access to the IBM Cloud Container Registry controlled?
- A . IBM Cloud Identity and Access Management (IAM)
- B . A platform-built using Docker to run and manage your applications
- C . Watson service credentials
- D . An open-source system named Cloud Foundry
The customer decided to remove the Caveonix RiskForesight all-in-one service from the IBM Cloud and move to a distributed model for VMware Solutions. By default, IBM automatically deletes only the single deployed all-in-one Caveonix VM and the dedicated private subnet that was ordered for it.
What are the key considerations?
(Select Two)
- A . If you used the IP addresses of the dedicated private subnet on additional VMs, those VMs must be ^ assigned new IP addresses to continue to function
- B . Old configurations can be deleted and migrated to a new environment
- C . If you scaled out the Caveonix VM into multiple VMs, those additional VMs are not removed
- D . Delete the VM and Storage allocation, Cavenoix RiskForesight will discontinue data gathering and services are deemed stopped
- E . Unsubscribe the license and remove the instance of all-in-one deployment in the VMware solutions, release the IP address to DHCP, DNS servers
Which method is used to send application logs to IBM Cloud Log Analysis?
- A . REST API
- B . SOAP API
- C . Log Analysis SDK
- D . SFTP
Which VMware application mobility technology seamlessly extends on-premises data center networks into IBM Cloud?
- A . VMware vSphere
- B . VMware HCX
- C . VMware NSX
- D . VMware Horizon
Which policy type isolates microservices in Red Hat OpenShift on IBM Cloud?
- A . VPC Security Groups
- B . Kubernetes Network Policies
- C . Pod Security Policies (PSP
- D . VPC Access Control Lists (ACLs)
The Db2 service on IBM Cloud use which type of data model?
- A . Relational
- B . Document
- C . Graph
- D . Columnar
What must be completed before adding a new network interface to a virtual server instance on IBM Cloud VPC?
- A . Select the security group to be associated with the network interface
- B . Select the access control list to be associated with the network interface
- C . Create a public gateway to be associated with the network interface
- D . Select the resource group to be associated with the network interface
Which IBM Cloud for VMware Solutions shared component has visibility to backup VMs from any Virtual Data Center in the organization?
- A . Veeam Cloud Connect
- B . Veeam Availability Suite
- C . Veeam Backup Essentials
- D . Veeam Availability Orchestrator
A solution architect would like to deploy a containerized AI application that involves highly sensitive data.
Which infrastructure choice must the architect choose for the IBM Cloud Kubernetes Service to obtain the most secure isolation?
- A . Shared VPC infrastructure
- B . Bare Metal Classic infrastructure
- C . Shared Classic infrastructure
- D . Public VPC infrastructure
Which VMware Solutions component is used for infrastructure management?
- A . VMware vCenter
- B . VMware vSphere
- C . VMware SAN
- D . VMware NSX
In the context of the Key Protect service, which of the following statements is correct?
- A . Key Protect allows you to import keys for other Clouds
- B . Key Protect allows you to create a new key or import your own key (BYOK)
- C . Key Protect allows you to manage service accounts
- D . Key Protect allows you to manage keys as well as SSL/TLS Digital Certificates
When using Application Load Balancer for VPC, what two methods are used for distributing traffic across the back-end application servers?
- A . Round-robin
- B . Fixed Weighting
- C . Least connections
- D . Weighted Response Time
- E . Resource Based (Adaptive)
What is one of IBM’s Operational Responsibilities for managing the IBM Cloud Object Storage Service?
- A . Provision and manage the VSIs required to serve the data using NFS
- B . Ensure data backup if necessary
- C . Monitor and restore data backups
- D . Monitor and manage service health and availability
Which approach must be used to access worker nodes in an IBM Cloud Red Hat OpenShift Kubernetes Service (ROKS)?
- A . SSH
- B . telnet
- C . IBM Cloud management console
- D . OpenStack API server
What is the function of the IBM Cloud File Storage Capacity Expansion feature?
- A . It is used by IBM Cloud Storage users to manage data flow
- B . It is used by IBM Cloud Storage users to expand their file storage immediately
- C . It is used by the IBM Cloud Management team to manage file storage capacity
- D . It is used by the IBM Cloud Storage users to regenerate data storage that may have been deleted
Which IBM Cloud service makes it possible to troubleshoot logs in real time to diagnose issues?
- A . API Gateway
- B . Portworx Enterprise
- C . IBM Log Analysis with LogDNA
- D . IBM Cloud Monitoring with Sysdig
What describes the comprehensive security and compliance standard organization that IBM Cloud follows the standards and regulations for the United States government?
- A . Federal Risk and Authorization Management Program (FedRAMP)
- B . Center for Internet Security (CIS)
- C . Federal Information Processing Standard (FIPS)
- D . National Institute of Standards and Technology (NIST)
Which solution provides high availability for Power Systems Virtual Server on the IBM Cloud?
- A . Veeam on IBM Cloud
- B . PowerHA System Mirror
- C . Power Systems autoscaling group
- D . Multi-zone Power Server Clusters
Which of the following can be monitored with IBM Cloud Monitoring with Sysdig?
- A . Cloud Functions Applications
- B . Cloud Foundry Applications
- C . Containers within IKS
- D . Windows Virtual Servers
A CIO is concerned about a major regional disaster.
Which IBM Cloud Code Engine deployment architecture ensures workloads are resilient to such events?
- A . Deploy workloads across multiple MZR regions and use Cloud Internet Service
- B . Deploy workloads across multiple data centers and use Citrix Netscaler
- C . Deploy workloads across multiple VPC and use the Load Balancer for VPC
- D . Deploy workloads across multiple zones in a region and use Load Balancer for VPC
Vulnerability Advisor is pre-integrated into several toolchain templates.
What does the Vulnerability Advisor do?
- A . Continuously monitors and analyzes network communications
- B . Scans source code for potential threats and vulnerabilities
- C . Tests databases for SQL injection vulnerabilities
- D . Scans container images for potential security issues
What’s the correct architectural network topology in IBM Cloud?
- A . Region > Zone > VPC > Subnet
- B . VPC > Zone > Region > Subnet
- C . Region > VPC > Zone > Subnet
- D . VPC > Region > Zone > Subnet
Which statement describes a key-value database?
- A . Each item in the database is stored as an attribute name (referred to as a key) with its corresponding value
- B . Each item in the database is encrypted with public-key cryptography
- C . Each item in the database is a document with lists of key-value pairs
- D . Each item in the database is stored in a column named key with values in each row
There is a request to architect a hybrid VMware solution in IBM Cloud to address failures in the on-premise data centers.
What additional VMware component would allow for seamless network access for workloads from the VMware Cluster on-premise to the VMware Cluster in IBM Cloud to facilitate resiliency into existing solutions?
- A . NSX-T
- B . HCX
- C . NCX
- D . NSX-C
What are two benefits of using IBM Cloud Container Registry?
- A . Set up your own single-tenant image namespace in a highly available, scalable, encrypted private registry that is hosted and managed by IBM
- B . Benefit from unlimited free storage and pull traffic to your private images for an unlimited term
- C . Store your private images and share them with users in your IBM Cloud account
- D . ILMT is built-in to ensure compliance with IBM Licensing terms
- E . The built-in Vulnerability Advisor feature that scans for potential security issues and vulnerabilities
A VP of Security wants to find a solution to host Linux workloads in IBM Cloud with a requirement that no external access to the data is allowed, including privileged users such as cloud administrators.
Which service would meet this requirement?
- A . Power Virtual Servers
- B . Virtual Server in VPC
- C . Hyper Protect Virtual Servers
- D . High Security Bare Metal Servers