Which cloud security design principle prevents an individual from improper access or system misuse?
Which cloud security design principle prevents an individual from improper access or system misuse?A . Least privilegeB . Data privacy and ownershipC . Separation of dutiesD . Secure multitenancyView AnswerAnswer: C
What activity is performed during the service creation phase of the cloud service lifecycle?
What activity is performed during the service creation phase of the cloud service lifecycle?A . Defining Service TemplateB . Developing Service Enablement RoadmapC . Assessing Service RequirementsD . Establishing Billing PolicyView AnswerAnswer: C
Which cloud role has the responsibility to perform independent cloud service assessments?
Which cloud role has the responsibility to perform independent cloud service assessments?A . ArchitectB . BrokerC . ConsumerD . AuditorView AnswerAnswer: D
Which is a characteristic of the chargeback model?
Which is a characteristic of the chargeback model?A . Financial systems require agent plug-in.B . Service costs reporting to the business.C . Customers are billed for services that are consumed.View AnswerAnswer: C
What is a benefit of cloud automation?
What is a benefit of cloud automation?A . Reduced service provisioning timeB . Improved physical infrastructure deployment timeC . Decreased capital expenseView AnswerAnswer: A
Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?
Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?A . VMware vCenter ManagerB . VMware vRealize Operations Management SuiteC . VMware vRealize Automation SuiteD . VMware vSphere with Operations ManagementView AnswerAnswer: B
Which tool should be recommended to customers for Infrastructure automation?
Which tool should be recommended to customers for Infrastructure automation?A . GitHubB . DockerC . ChefD . JARVISView AnswerAnswer: C
What enables resource pooling and multi-tenancy in a cloud environment?
What enables resource pooling and multi-tenancy in a cloud environment?A . Rapid elasticityB . On-demand provisioningC . ScalabilityD . VirtualizationView AnswerAnswer: D
What is the correct order of the business continuity plan principles?
DRAG DROP What is the correct order of the business continuity plan principles? View AnswerAnswer:
What are the key functions of a control plane?
What are the key functions of a control plane?A . User and role access - Configuration baselines - Services executionB . Configuration messaging - Statistics - StatusC . Asset discovery - Resource abstraction and pooling Resource provisioningD . Data processing - Asset discovery - Resource abstraction and poolingView AnswerAnswer: B