Which cloud security design principle prevents an individual from improper access or system misuse?

Which cloud security design principle prevents an individual from improper access or system misuse?A . Least privilegeB . Data privacy and ownershipC . Separation of dutiesD . Secure multitenancyView AnswerAnswer: C

December 15, 2023 No Comments READ MORE +

What activity is performed during the service creation phase of the cloud service lifecycle?

What activity is performed during the service creation phase of the cloud service lifecycle?A . Defining Service TemplateB . Developing Service Enablement RoadmapC . Assessing Service RequirementsD . Establishing Billing PolicyView AnswerAnswer: C

December 15, 2023 No Comments READ MORE +

Which cloud role has the responsibility to perform independent cloud service assessments?

Which cloud role has the responsibility to perform independent cloud service assessments?A . ArchitectB . BrokerC . ConsumerD . AuditorView AnswerAnswer: D

December 14, 2023 No Comments READ MORE +

Which is a characteristic of the chargeback model?

Which is a characteristic of the chargeback model?A . Financial systems require agent plug-in.B . Service costs reporting to the business.C . Customers are billed for services that are consumed.View AnswerAnswer: C

December 14, 2023 No Comments READ MORE +

What is a benefit of cloud automation?

What is a benefit of cloud automation?A . Reduced service provisioning timeB . Improved physical infrastructure deployment timeC . Decreased capital expenseView AnswerAnswer: A

December 14, 2023 No Comments READ MORE +

Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?

Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?A . VMware vCenter ManagerB . VMware vRealize Operations Management SuiteC . VMware vRealize Automation SuiteD . VMware vSphere with Operations ManagementView AnswerAnswer: B

December 14, 2023 No Comments READ MORE +

Which tool should be recommended to customers for Infrastructure automation?

Which tool should be recommended to customers for Infrastructure automation?A . GitHubB . DockerC . ChefD . JARVISView AnswerAnswer: C

December 14, 2023 No Comments READ MORE +

What enables resource pooling and multi-tenancy in a cloud environment?

What enables resource pooling and multi-tenancy in a cloud environment?A . Rapid elasticityB . On-demand provisioningC . ScalabilityD . VirtualizationView AnswerAnswer: D

December 13, 2023 No Comments READ MORE +

What is the correct order of the business continuity plan principles?

DRAG DROP What is the correct order of the business continuity plan principles? View AnswerAnswer:

December 13, 2023 No Comments READ MORE +

What are the key functions of a control plane?

What are the key functions of a control plane?A . User and role access - Configuration baselines - Services executionB . Configuration messaging - Statistics - StatusC . Asset discovery - Resource abstraction and pooling Resource provisioningD . Data processing - Asset discovery - Resource abstraction and poolingView AnswerAnswer: B

December 13, 2023 No Comments READ MORE +