Which of the following is a workload that best fits the Cloud Functions processing model?
Which of the following is a workload that best fits the Cloud Functions processing model?A . High-volume, independent, and parallel workloadsB . Backup/recoveryC . Web hosting applicationsD . Complex business processesView AnswerAnswer: A
Which IBM Cloud security feature scans images stored in IBM Cloud Container Registry?
Which IBM Cloud security feature scans images stored in IBM Cloud Container Registry?A . Threat AdvisorB . Trusted AdvisorC . Security ScannerD . Vulnerability AdvisorView AnswerAnswer: D
What is meant by the practice of Continuous Integration?
What is meant by the practice of Continuous Integration?A . Automating data change replication between data sources at short intervals, for example, every 5 minutes via synchronous or asynchronous methodsB . Automating the process that moves software through the software development lifecycleC . A technique in which application logs are...
Which is an example of A/B Testing?
Which is an example of A/B Testing?A . A new software release is deployed to production and tested before the previous release is removedB . Different versions of a website are presented online to see which one performs betterC . A new software release is deployed to different geographic regions...
How is this possible?
A retail company has issued an RFP to transform an existing on premise publicly accessible application to Cloud Native using IBM Kubernetes Service and Cloud Internet Services. The customer brought up an additional non-functional requirement around performance at the edge. It is explained that the solution will be able to...
What does the Vulnerability Advisor do?
Vulnerability Advisor is pre-integrated into several toolchain templates. What does the Vulnerability Advisor do?A . Continuously monitors and analyzes network communicationsB . Scans source code for potential threats and vulnerabilitiesC . Tests databases for SQL injection vulnerabilitiesD . Scans container images for potential security issuesView AnswerAnswer: A
Which of the following services in IBM Cloud could the design include that specifically addresses this requirement?
A customer has requested an architecture design for a system capable of running deep learning and Al. Which of the following services in IBM Cloud could the design include that specifically addresses this requirement?A . HyperProtect Virtual ServerB . IBM Log Analysis with Log DNAC . POWER VSls in VPCD...
What's the correct architectural network topology in IBM Cloud?
What's the correct architectural network topology in IBM Cloud?A . Region > Zone > VPC > SubnetB . VPC > Zone > Region > SubnetC . Region > VPC > Zone > SubnetD . VPC > Region > Zone > SubnetView AnswerAnswer: A
What benefit does the global load balancer provide during transformation?
A company is looking to transform their three-tier application to cloud. The stack uses physical servers on-premises and will use virtual server instances (VSIs) on IBM Cloud. The company has also added global load balancing through Cloud Internet Services and a pair of Gateway Appliances to the environment. What benefit...
What is a key requirement of a resilient architecture?
What is a key requirement of a resilient architecture?A . Low tolerance level for interruptionB . High rate of resource utilizationC . Low rate of resource utilizationD . High tolerance level for interruptionView AnswerAnswer: A