What is the first customer-u address assuming a VPC subnet has the CIDR range 10.10.10.0/24?
- A . 10.10.10.0
- B . 10.10.10.4
- C . 10.10.10.24
- D . 10.10.10.1
A customer RFP is requesting a solution to run a scalable, elastic, and managed analytics focused database with in-memory capabilities.
Which service should be included in the response?
- A . Analytics Engine
- B . DB2 Warehouse on Cloud
- C . Mongo Cluster Service
- D . SQL Query
Which of the following is a workload that best fits the Cloud Functions processing model?
- A . High-volume, independent, and parallel workloads
- B . Backup/recovery
- C . Web hosting applications
- D . Complex business processes
Which technology does IBM Cloud Direct Link use to achieve high availability with two connections?
- A . Using Equal-Cost MultiPath (ECMP) with diversity
- B . Using Equal-Path MultiCost (EPMC) with diversity
- C . Using GRE Tunneling
- D . Using VPN connections with diversity
Which of the following IBM Cloud Paks help to accelerate the build of cloud-native apps by leveraging built-in developer tools and processes?
- A . IBM Cloud Pak for Microservices
- B . IBM Cloud Pak for Developers
- C . IBM Cloud Pak for Applications
- D . IBM Cloud Pak for Data
Which Cloud Pak provides a data transfer tool utilizing the FASP protocol to provide significantly faster throughput than typical FTP?
- A . Cloud Pak for Applications
- B . Cloud Pak for Integration
- C . Cloud Pak for Automation
- D . Cloud Pak for Migration
IBM Log Analysis with LogDNA can be used to manage which of the following?
- A . Cloud native applications logs on any Cloud
- B . Service Mesh in IBM Cloud
- C . Only application logs in the IBM Cloud
- D . System and application logs in the IBM Cloud
Identify the component marked as B in the Cloud Connection scenario that shows a persistent connection established between the customer’s environment and the IBM Cloud.
- A . Cloud Gateway Appliance
- B . Secure Gateway Service
- C . Virtual Router Appliance
- D . Secure Gateway Client
Which is a Cloud Functions best practice?
- A . Make each function perform only one action
- B . Define long-running processes as a Cloud Functions workload
- C . Define stateful applications as cloud functions
- D . Use Go-lang or Java to implement a function
What is the key technology that makes IBM Cloud Analytics Engine run jobs at a remarkable processing speed?
- A . Resilient Distributed Datasets (RDD)
- B . Resourceful Distributed Datasets (RDD)
- C . Rapid Divided Datasets (RDD)
- D . Rapid Distributed Datasets (RDD)
A customer has defined a requirement to enable all virtual server instances in the proposed VPC to be able to access automatic operating system updates via the Internet.
What is required to provide this functionality?
- A . Each subnet must have a Public Gateway
- B . A subscription to the IBM Auto Update proxy service
- C . Each server must have a Floating IP address
- D . The pre-defined Automatic Updates Security Group must be enabled
Which is an example of A/B Testing?
- A . A new software release is deployed to production and tested before the previous release is removed
- B . Different versions of a website are presented online to see which one performs better
- C . A new software release is deployed to different geographic regions over a period of days or weeks
- D . New functionality is released to a small set of customers to test that it is functioning properly
Which of the following statements is correct?
- A . VMware Solutions Shared can be deployed at any IBM Cloud Data Centers
- B . VMware Solutions Shared is a hosted private cloud that delivers the VMware vSphere stack as a service
- C . VMware Solutions Shared is a streamlined and optimized ordering platform for VMware
- D . VMware Solutions Shared requires a Pay As You Go or Subscription IBM Cloud account
A customer has requested an architecture design for a system capable of running deep learning and Al.
Which of the following services in IBM Cloud could the design include that specifically addresses this requirement?
- A . HyperProtect Virtual Server
- B . IBM Log Analysis with Log DNA
- C . POWER VSls in VPC
- D . Cloud HSM
How is access to the IBM Cloud Container Registry controlled?
- A . IBM Cloud Identity and Access Management (IAM)
- B . A platform-built using Docker to run and manage your applications
- C . Watson service credentials
- D . An open-source system named Cloud Foundry
The customer decided to remove the Caveonix RiskForesight all-in-one service from the IBM Cloud and move to a distributed model for VMware Solutions. By default, IBM automatically deletes only the single deployed all-in-one Caveonix VM and the dedicated private subnet that was ordered for it.
What are the key considerations?
(Select Two)
- A . If you used the IP addresses of the dedicated private subnet on additional VMs, those VMs must be ^ assigned new IP addresses to continue to function
- B . Old configurations can be deleted and migrated to a new environment
- C . If you scaled out the Caveonix VM into multiple VMs, those additional VMs are not removed
- D . Delete the VM and Storage allocation, Cavenoix RiskForesight will discontinue data gathering and services are deemed stopped
- E . Unsubscribe the license and remove the instance of all-in-one deployment in the VMware solutions, release the IP address to DHCP, DNS servers
Which method is used to send application logs to IBM Cloud Log Analysis?
- A . REST API
- B . SOAP API
- C . Log Analysis SDK
- D . SFTP
Which VMware application mobility technology seamlessly extends on-premises data center networks into IBM Cloud?
- A . VMware vSphere
- B . VMware HCX
- C . VMware NSX
- D . VMware Horizon
Which policy type isolates microservices in Red Hat OpenShift on IBM Cloud?
- A . VPC Security Groups
- B . Kubernetes Network Policies
- C . Pod Security Policies (PSP
- D . VPC Access Control Lists (ACLs)
The Db2 service on IBM Cloud use which type of data model?
- A . Relational
- B . Document
- C . Graph
- D . Columnar
What must be completed before adding a new network interface to a virtual server instance on IBM Cloud VPC?
- A . Select the security group to be associated with the network interface
- B . Select the access control list to be associated with the network interface
- C . Create a public gateway to be associated with the network interface
- D . Select the resource group to be associated with the network interface
Which IBM Cloud for VMware Solutions shared component has visibility to backup VMs from any Virtual Data Center in the organization?
- A . Veeam Cloud Connect
- B . Veeam Availability Suite
- C . Veeam Backup Essentials
- D . Veeam Availability Orchestrator
A solution architect would like to deploy a containerized AI application that involves highly sensitive data.
Which infrastructure choice must the architect choose for the IBM Cloud Kubernetes Service to obtain the most secure isolation?
- A . Shared VPC infrastructure
- B . Bare Metal Classic infrastructure
- C . Shared Classic infrastructure
- D . Public VPC infrastructure
Which VMware Solutions component is used for infrastructure management?
- A . VMware vCenter
- B . VMware vSphere
- C . VMware SAN
- D . VMware NSX
In the context of the Key Protect service, which of the following statements is correct?
- A . Key Protect allows you to import keys for other Clouds
- B . Key Protect allows you to create a new key or import your own key (BYOK)
- C . Key Protect allows you to manage service accounts
- D . Key Protect allows you to manage keys as well as SSL/TLS Digital Certificates
When using Application Load Balancer for VPC, what two methods are used for distributing traffic across the back-end application servers?
- A . Round-robin
- B . Fixed Weighting
- C . Least connections
- D . Weighted Response Time
- E . Resource Based (Adaptive)
What is one of IBM’s Operational Responsibilities for managing the IBM Cloud Object Storage Service?
- A . Provision and manage the VSIs required to serve the data using NFS
- B . Ensure data backup if necessary
- C . Monitor and restore data backups
- D . Monitor and manage service health and availability
Which approach must be used to access worker nodes in an IBM Cloud Red Hat OpenShift Kubernetes Service (ROKS)?
- A . SSH
- B . telnet
- C . IBM Cloud management console
- D . OpenStack API server
What is the function of the IBM Cloud File Storage Capacity Expansion feature?
- A . It is used by IBM Cloud Storage users to manage data flow
- B . It is used by IBM Cloud Storage users to expand their file storage immediately
- C . It is used by the IBM Cloud Management team to manage file storage capacity
- D . It is used by the IBM Cloud Storage users to regenerate data storage that may have been deleted
Which IBM Cloud service makes it possible to troubleshoot logs in real time to diagnose issues?
- A . API Gateway
- B . Portworx Enterprise
- C . IBM Log Analysis with LogDNA
- D . IBM Cloud Monitoring with Sysdig
What describes the comprehensive security and compliance standard organization that IBM Cloud follows the standards and regulations for the United States government?
- A . Federal Risk and Authorization Management Program (FedRAMP)
- B . Center for Internet Security (CIS)
- C . Federal Information Processing Standard (FIPS)
- D . National Institute of Standards and Technology (NIST)
Which solution provides high availability for Power Systems Virtual Server on the IBM Cloud?
- A . Veeam on IBM Cloud
- B . PowerHA System Mirror
- C . Power Systems autoscaling group
- D . Multi-zone Power Server Clusters
Which of the following can be monitored with IBM Cloud Monitoring with Sysdig?
- A . Cloud Functions Applications
- B . Cloud Foundry Applications
- C . Containers within IKS
- D . Windows Virtual Servers
A CIO is concerned about a major regional disaster.
Which IBM Cloud Code Engine deployment architecture ensures workloads are resilient to such events?
- A . Deploy workloads across multiple MZR regions and use Cloud Internet Service
- B . Deploy workloads across multiple data centers and use Citrix Netscaler
- C . Deploy workloads across multiple VPC and use the Load Balancer for VPC
- D . Deploy workloads across multiple zones in a region and use Load Balancer for VPC
Vulnerability Advisor is pre-integrated into several toolchain templates.
What does the Vulnerability Advisor do?
- A . Continuously monitors and analyzes network communications
- B . Scans source code for potential threats and vulnerabilities
- C . Tests databases for SQL injection vulnerabilities
- D . Scans container images for potential security issues
What’s the correct architectural network topology in IBM Cloud?
- A . Region > Zone > VPC > Subnet
- B . VPC > Zone > Region > Subnet
- C . Region > VPC > Zone > Subnet
- D . VPC > Region > Zone > Subnet
Which statement describes a key-value database?
- A . Each item in the database is stored as an attribute name (referred to as a key) with its corresponding value
- B . Each item in the database is encrypted with public-key cryptography
- C . Each item in the database is a document with lists of key-value pairs
- D . Each item in the database is stored in a column named key with values in each row
There is a request to architect a hybrid VMware solution in IBM Cloud to address failures in the on-premise data centers.
What additional VMware component would allow for seamless network access for workloads from the VMware Cluster on-premise to the VMware Cluster in IBM Cloud to facilitate resiliency into existing solutions?
- A . NSX-T
- B . HCX
- C . NCX
- D . NSX-C
What are two benefits of using IBM Cloud Container Registry?
- A . Set up your own single-tenant image namespace in a highly available, scalable, encrypted private registry that is hosted and managed by IBM
- B . Benefit from unlimited free storage and pull traffic to your private images for an unlimited term
- C . Store your private images and share them with users in your IBM Cloud account
- D . ILMT is built-in to ensure compliance with IBM Licensing terms
- E . The built-in Vulnerability Advisor feature that scans for potential security issues and vulnerabilities
A VP of Security wants to find a solution to host Linux workloads in IBM Cloud with a requirement that no external access to the data is allowed, including privileged users such as cloud administrators.
Which service would meet this requirement?
- A . Power Virtual Servers
- B . Virtual Server in VPC
- C . Hyper Protect Virtual Servers
- D . High Security Bare Metal Servers
An architect needs to select a firewall solution that can provide public and private network protection and VPN termination.
Which two services provide this capability?
(Choose two.)
- A . Juniper vSRX
- B . Cloud Internet Services
- C . Fortigate Appliance
- D . VPC Security Groups
- E . Dedicated Hardware firewall
What is one of the advantages of the adjustable Input/Output Operations Per Second (IOPS) feature on IBM Cloud File Storage?
- A . Use file storage IOPS only when needed
- B . Manage file storage performance as needed
- C . Manage file storage IOPS only when provisioned
- D . Manage IOPS on file storage as needed
Which IBM Analytics product helps you make your data ready for an Al and hybrid cloud world?
- A . IBM Cloud Pak for Data
- B . IBM Watson Studio Desktop
- C . IBM Watson OpenScale
- D . IBM StoredlQ Suite
A company is looking to transform their three-tier application to cloud. The stack uses physical servers on-premises and will use virtual server instances (VSIs) on IBM Cloud. The company has also added global load balancing through Cloud Internet Services and a pair of Gateway Appliances to the environment.
What benefit does the global load balancer provide during transformation?
- A . Allows traffic to simultaneously flow to both the on-premises bare metal servers and on-cloud VSIs
- B . Client can distribute traffic using weights to ramp up to the new environment
- C . Balances traffic across multiple clouds
- D . Provides secure network connectivity between the existing environment and the new environment
What is meant by the practice of Continuous Integration?
- A . Automating data change replication between data sources at short intervals, for example, every 5 minutes via synchronous or asynchronous methods
- B . Automating the process that moves software through the software development lifecycle
- C . A technique in which application logs are constantly tailed and records are forwarded to a central console
- D . Frequently committing code to prevent significant drift and competing changes
Which of the following statements describes Helm?
- A . Helm is used to describe the network of microservices that make up applications in Kubernetes
- B . Helm is an OpenStack package manager that uses Heat templates to define, install, and upgrade complex applications
- C . Helm is a Kubernetes package manager that uses Helm charts to define, install, and upgrade complex Kubernetes apps in your cluster
- D . Helm is an open source project to connect, secure, control, and observe Kubernetes services
What best describes a single zone region in IBM Cloud?
- A . A region with multiple data centers spread across different geographic locations
- B . A region with a single data center located in a specific geographic location
- C . A region that allows the deployment of applications in multiple availability zones
- D . A region that provides high availability and fault tolerance for applications
To get the most out of Endurance File Storage, which option specifies performance?
- A . Choose IOPS catalog items from NFS that manage performance configuration settings
- B . Choose IOPS storage tier that feature pre-defined performance limits
- C . Choose configuration items from NFS that configure performance levels to fit workloads
- D . Choose from NFS catalog items from that manage performance configuration settings
An airline company wants to build a complete solution for updating aircraft data, related maintenance schedules, working hours, and routes defined in an application.
Which IBM Cloud database service is best suited for this application?
- A . Db2
- B . Db2 Warehouse
- C . Databases for Snowflake
- D . Databases for Elasticsearch
A retail company has issued an RFP to transform an existing on premise publicly accessible application to Cloud Native using IBM Kubernetes Service and Cloud Internet Services.
The customer brought up an additional non-functional requirement around performance at the edge. It is explained that the solution will be able to accommodate the concern without additional service.
How is this possible?
- A . Cloud Internet Service has Page Rules
- B . IKS can scale across the globe
- C . Cloud Internet Server has a 32TB Network
- D . IKE provides a built in Content Delivery Network
How does a client ensure high availability for master nodes in a Red Hat OpenShift on IBM Cloud cluster?
- A . Users can decide how master nodes should be distributed across zones used in the cluster
- B . Master node replicas are automatically spread evenly across zones
- C . Users must deploy the application nodes evenly across zones, then IBM deploys the master nodes in the same way
- D . Master nodes have six replicas for high availability
A customer, who is implementing VMware vCenter Server in IBM Cloud, is keen that it is protected with replication and disaster recovery capabilities.
What single product meets the requirement?
- A . IBM Cloud backup
- B . IBM Tivoli for Cloud
- C . Veeam-DR
- D . Zerto
On IBM Cloud, what are the two types of pipelines and how are they specified?
- A . Classic pipelines are specified graphically. Tekton pipelines are specified in YAML.
- B . Tekton pipelines are specified in YAML. Codewind pipelines are specified in XMI.
- C . Simple pipelines are specified with XML. Complex pipelines are specified in JSON.
- D . Legacy pipelines are specified with CSV files. NextGen pipelines are specified in JSON
Which IBM Cloud servers can run AIX and IBM i?
- A . Reserved Virtual Servers
- B . Dedicated Virtual Servers
- C . Power Systems Virtual Server
- D . Bare Metal Servers
Which of the following is the dedicated virtual software appliance that provides local load balancing on both the public and private IBM Cloud network?
- A . Secure Gateway Service
- B . Virtual Router Appliance
- C . Citrix Netscaler VPX
- D . Cloud Juniper Vsrx
Which IBM Cloud security feature scans images stored in IBM Cloud Container Registry?
- A . Threat Advisor
- B . Trusted Advisor
- C . Security Scanner
- D . Vulnerability Advisor
Why would IBM Spectrum Protect Plus form part of an overall system design in IBM Cloud?
- A . It provides a solution for system log analysis and alerting, protecting systems from unplanned downtime
- B . It provides a A~Premium PIusa™ support package for customers with ultra-business critical workloads
- C . It provides a dedicated government-only compute environment with built-in quantum-level encryption
- D . It provides a solution for data protection, data reuse, and data recovery for virtual environments
The Chief Data Officer (CDO) wants to build a new data solution for his clients. This application needs access to a Spark cluster on IBM Cloud without the Spark Cluster being accessible over the Internet.
If IBM Analytics Engine (IAE) is selected, what must be enabled to allow the application server to securely access IAE?
- A . Gateway Endpoint
- B . Transverse Endpoint
- C . Transit Endpoint
- D . Service Endpoint
What is a key requirement of a resilient architecture?
- A . Low tolerance level for interruption
- B . High rate of resource utilization
- C . Low rate of resource utilization
- D . High tolerance level for interruption
What is IBM Cloud Functions?
- A . An IBM Cloud service for implementing multi-stage business processes involving users and systems
- B . The low-code/no-code development environment for data replication and systems integration in App Connect
- C . A capability of Cloudant for triggering an action as data is updated, for example, sending data updates to systems
- D . A polyglot functions-as-a-service (FaaS) programming platform for lightweight code that executes on demand