Which method is used to send application logs to IBM Cloud Log Analysis?
Which method is used to send application logs to IBM Cloud Log Analysis?A . REST APIB . SOAP APIC . Log Analysis SDKD . SFTPView AnswerAnswer: A
What additional VMware component would allow for seamless network access for workloads from the VMware Cluster on-premise to the VMware Cluster in IBM Cloud to facilitate resiliency into existing solutions?
There is a request to architect a hybrid VMware solution in IBM Cloud to address failures in the on-premise data centers. What additional VMware component would allow for seamless network access for workloads from the VMware Cluster on-premise to the VMware Cluster in IBM Cloud to facilitate resiliency into existing...
Which is a Cloud Functions best practice?
Which is a Cloud Functions best practice?A . Make each function perform only one actionB . Define long-running processes as a Cloud Functions workloadC . Define stateful applications as cloud functionsD . Use Go-lang or Java to implement a functionView AnswerAnswer: C
What is one of the advantages of the adjustable Input/Output Operations Per Second (IOPS) feature on IBM Cloud File Storage?
What is one of the advantages of the adjustable Input/Output Operations Per Second (IOPS) feature on IBM Cloud File Storage?A . Use file storage IOPS only when neededB . Manage file storage performance as neededC . Manage file storage IOPS only when provisionedD . Manage IOPS on file storage as...
What is the first customer-u address assuming a VPC subnet has the CIDR range 10.10.10.0/24?
What is the first customer-u address assuming a VPC subnet has the CIDR range 10.10.10.0/24?A . 10.10.10.0B . 10.10.10.4C . 10.10.10.24D . 10.10.10.1View AnswerAnswer: A
Which statement describes a key-value database?
Which statement describes a key-value database?A . Each item in the database is stored as an attribute name (referred to as a key) with its corresponding valueB . Each item in the database is encrypted with public-key cryptographyC . Each item in the database is a document with lists of...
What is required to provide this functionality?
A customer has defined a requirement to enable all virtual server instances in the proposed VPC to be able to access automatic operating system updates via the Internet. What is required to provide this functionality?A . Each subnet must have a Public GatewayB . A subscription to the IBM Auto...
Which service would meet this requirement?
A VP of Security wants to find a solution to host Linux workloads in IBM Cloud with a requirement that no external access to the data is allowed, including privileged users such as cloud administrators. Which service would meet this requirement?A . Power Virtual ServersB . Virtual Server in VPCC...
Which of the following statements describes Helm?
Which of the following statements describes Helm?A . Helm is used to describe the network of microservices that make up applications in KubernetesB . Helm is an OpenStack package manager that uses Heat templates to define, install, and upgrade complex applicationsC . Helm is a Kubernetes package manager that uses...
In the context of the Key Protect service, which of the following statements is correct?
In the context of the Key Protect service, which of the following statements is correct?A . Key Protect allows you to import keys for other CloudsB . Key Protect allows you to create a new key or import your own key (BYOK)C . Key Protect allows you to manage service...