IBM C1000-172 IBM Cloud Professional Architect v6 Online Training
IBM C1000-172 Online Training
The questions for C1000-172 were last updated at Feb 17,2025.
- Exam Code: C1000-172
- Exam Name: IBM Cloud Professional Architect v6
- Certification Provider: IBM
- Latest update: Feb 17,2025
What describes the comprehensive security and compliance standard organization that IBM Cloud follows the standards and regulations for the United States government?
- A . Federal Risk and Authorization Management Program (FedRAMP)
- B . Center for Internet Security (CIS)
- C . Federal Information Processing Standard (FIPS)
- D . National Institute of Standards and Technology (NIST)
Which solution provides high availability for Power Systems Virtual Server on the IBM Cloud?
- A . Veeam on IBM Cloud
- B . PowerHA System Mirror
- C . Power Systems autoscaling group
- D . Multi-zone Power Server Clusters
Which of the following can be monitored with IBM Cloud Monitoring with Sysdig?
- A . Cloud Functions Applications
- B . Cloud Foundry Applications
- C . Containers within IKS
- D . Windows Virtual Servers
A CIO is concerned about a major regional disaster.
Which IBM Cloud Code Engine deployment architecture ensures workloads are resilient to such events?
- A . Deploy workloads across multiple MZR regions and use Cloud Internet Service
- B . Deploy workloads across multiple data centers and use Citrix Netscaler
- C . Deploy workloads across multiple VPC and use the Load Balancer for VPC
- D . Deploy workloads across multiple zones in a region and use Load Balancer for VPC
Vulnerability Advisor is pre-integrated into several toolchain templates.
What does the Vulnerability Advisor do?
- A . Continuously monitors and analyzes network communications
- B . Scans source code for potential threats and vulnerabilities
- C . Tests databases for SQL injection vulnerabilities
- D . Scans container images for potential security issues
What’s the correct architectural network topology in IBM Cloud?
- A . Region > Zone > VPC > Subnet
- B . VPC > Zone > Region > Subnet
- C . Region > VPC > Zone > Subnet
- D . VPC > Region > Zone > Subnet
Which statement describes a key-value database?
- A . Each item in the database is stored as an attribute name (referred to as a key) with its corresponding value
- B . Each item in the database is encrypted with public-key cryptography
- C . Each item in the database is a document with lists of key-value pairs
- D . Each item in the database is stored in a column named key with values in each row
There is a request to architect a hybrid VMware solution in IBM Cloud to address failures in the on-premise data centers.
What additional VMware component would allow for seamless network access for workloads from the VMware Cluster on-premise to the VMware Cluster in IBM Cloud to facilitate resiliency into existing solutions?
- A . NSX-T
- B . HCX
- C . NCX
- D . NSX-C
What are two benefits of using IBM Cloud Container Registry?
- A . Set up your own single-tenant image namespace in a highly available, scalable, encrypted private registry that is hosted and managed by IBM
- B . Benefit from unlimited free storage and pull traffic to your private images for an unlimited term
- C . Store your private images and share them with users in your IBM Cloud account
- D . ILMT is built-in to ensure compliance with IBM Licensing terms
- E . The built-in Vulnerability Advisor feature that scans for potential security issues and vulnerabilities
A VP of Security wants to find a solution to host Linux workloads in IBM Cloud with a requirement that no external access to the data is allowed, including privileged users such as cloud administrators.
Which service would meet this requirement?
- A . Power Virtual Servers
- B . Virtual Server in VPC
- C . Hyper Protect Virtual Servers
- D . High Security Bare Metal Servers