What is a key responsibility of a security governance board?
What is a key responsibility of a security governance board?A . Defining the cloud service catalogB . Assessing assets with realistic valuationsC . Assessing the cloud provider’s capability to provide logsD . Defining access rights for usersView AnswerAnswer: D
Which product can identify deviations and performance impacts?
A customer has expressed an interest in using AI or ML to obtain improved data analytics from their PowerEdge servers and PowerMax storage. Which product can identify deviations and performance impacts?A . CloudIQB . eLAB NavigatorC . SyncIQD . Storage ManagerView AnswerAnswer: A
What is the correct sequence of steps in the service catalog design and implementation process?
DRAG DROP What is the correct sequence of steps in the service catalog design and implementation process? View AnswerAnswer: Explanation:
Which condition triggers a warning level alert?
Which condition triggers a warning level alert?A . Service has failed.B . Service has been created.C . Service instance is ready to use.D . Service is approaching resource usage limit.View AnswerAnswer: D
What is a benefit of synchronous remote replication?
What is a benefit of synchronous remote replication?A . Saves network bandwidth by replicating only deduplicated dataB . Replicates data across any geographic location without impacting response timeC . Ensures that source and replica always have identical dataD . Supports repeated write I/O to the same location to improve replication...
Which are core attributes to a modern infrastructure?
Which are core attributes to a modern infrastructure?A . Adaptable, software-defined, and scale-outB . Resilient, scale-out, and cloud-enabledC . Flash, software-defined, and cloud-enabledD . Consolidation, flash, and scale-outView AnswerAnswer: B
What is true about the Infrastructure as a code function?
What is true about the Infrastructure as a code function?A . Develops and deploys applications using CI/CD toolsB . Develops and deploys applications using script filesC . Manually manages and provisions IT resourcesD . Manages and provisions IT resources using script filesView AnswerAnswer: D
What term refers to the entry points from which an attack can be launched?
What term refers to the entry points from which an attack can be launched?A . Attack surfaceB . Attack factorC . Attack vectorView AnswerAnswer: A
What provides workflows for performing automated tasks to accomplish a desired outcome?
What provides workflows for performing automated tasks to accomplish a desired outcome?A . Cloud servicesB . OrchestrationC . Software defined infrastructureD . Virtual infrastructureView AnswerAnswer: B
What term refers to businesses that cautiously and gradually embrace digital transformation?
What term refers to businesses that cautiously and gradually embrace digital transformation?A . Digital EvaluatorsB . Digital LaggardsC . Digital LeadersD . Digital AdoptersView AnswerAnswer: A