What is a key requirement of a resilient architecture?
What is a key requirement of a resilient architecture?A . High rate of resource utilizationB . Low rate of resource utilizationC . High tolerance level for interruptionD . Low tolerance level for interruptionView AnswerAnswer: D
In the context of the Key Protect service, which of the following statements is correct?
In the context of the Key Protect service, which of the following statements is correct?A . Key Protect allows you to manage keys as well as SSL/TLS Digital CertificatesB . Key Protect allows you to import keys for other CloudsC . Key Protect allows you to manage service accountsD ....
What’s the correct architectural network topology in IBM Cloud?
What’s the correct architectural network topology in IBM Cloud?A . VPC > Zone > Region > SubnetB . VPC > Region > Zone > SubnetC . Region > VPC > Zone > SubnetD . Region > Zone > VPC > SubnetView AnswerAnswer: D Explanation: Reference: https://cloud.ibm.com/docs/vpc-on-classic?topic=vpc-on-classic-about
Which of the following IBM Cloud services is integrated with Certificate Manager?
Which of the following IBM Cloud services is integrated with Certificate Manager?A . IBM Bare Metal ServerB . Red Hat OpenStack on IBM CloudC . IBM Cloud for Power SolutionsD . IBM Cloud Kubernetes ServiceView AnswerAnswer: D Explanation: Reference: https://www.ibm.com/cloud/blog/announcements/use-ibm-cloud-certificate-manager-ibm-cloudcontainer-service-deploy-custom-domain-tls-certificates
Which two of the following can be managed by IBM Cloud SSL Certificates? (Choose two.)
Which two of the following can be managed by IBM Cloud SSL Certificates? (Choose two.)A . Self-signed SSL certificatesB . SSL certificates ordered in IBM CloudC . SSL certificates not imported into IBM CloudD . SSL certificates imported into IBM CloudE . Certificate Service Requests (CSR)View AnswerAnswer: DE
Which statement describes a key-value database?
Which statement describes a key-value database?A . Each item in the database is encrypted with public-key cryptographyB . Each item in the database is stored in a column named key with values in each rowC . Each item in the database is a document with lists of key-value pairsD ....
Which file extension does the LogDNA agent monitor by default?
Which file extension does the LogDNA agent monitor by default?A . .logdnaB . .logC . .varlogD . .logvarView AnswerAnswer: B Explanation: Reference: https://cloud.ibm.com/docs/Log-Analysis-with-LogDNA?topic=Log-Analysis-with-LogDNAlogdna_agent
In order to provide a highly resilient and highly available network with ECMP and diversity connections to IBM Cloud, how many Direct Link circuits should be recommended?
In order to provide a highly resilient and highly available network with ECMP and diversity connections to IBM Cloud, how many Direct Link circuits should be recommended?A . 4B . 2C . 6D . 3View AnswerAnswer: B Explanation: Reference: https://cloud.ibm.com/docs/direct-link?topic=direct-link-faqs
Select the unique key features of Hyper Protect Crypto Services on the IBM Cloud?
Select the unique key features of Hyper Protect Crypto Services on the IBM Cloud?A . Built on IBM Red Hat OpenShift technology, on single-tenant key management service with key vaulting provided by dedicated customer-controlled HSMB . Hyper Protect Crypto Services provide state-of-the-art encryption using DM-CRYPTC . IBM Cloud administrators have...
How is access to the IBM Cloud Container Registry controlled?
How is access to the IBM Cloud Container Registry controlled?A . A platform-built using Docker to run and manage your applicationsB . Watson service credentialsC . An open-source system named Cloud FoundryD . IBM Cloud Identity and Access Management (IAM)View AnswerAnswer: D Explanation: Reference: https://cloud.ibm.com/docs/Registry?topic=Registry-iam