Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

DEA-2TT4 Exam Dumps - Associate - Cloud Infrastructure and Services v4 Exam

Question # 4

Which attribute of software-defined infrastructure is responsible for providing abstracted view of the IT infrastructure?

A.

Abstraction and Polling

B.

Unified Management

C.

Self-Service Portal

D.

Metering

Full Access
Question # 5

What does a service attribute specify?

A.

Relationships between services

B.

Configurations of service components

C.

Structure of a service

Full Access
Question # 6

What is a characteristic of reporting?

A.

Provides tabular or graphical views of monitored information

B.

Provides information about events or impending threats or issues

C.

Displays a personalized functional interface

D.

Presents service instances to consumers in real time

Full Access
Question # 7

What is true about change management?

A.

Defines SLA compliance

B.

Triggers alerts

C.

Monitors compliance

Full Access
Question # 8

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth

Full Access
Question # 9

Which backup service deployment is utilized when a backup is performed in a consumer location and then the backup data is sent to the cloud for DR purpose?

A.

Remote Backup Service

B.

Cloud-to-cloud Backup Service

C.

Managed Backup Service

D.

Replication Backup Service

Full Access
Question # 10

What is a benefit of data archiving?

A.

Increases deduplication ratio and reduces storage costs

B.

Avoids performing data backups frequently

C.

Preserves data for future reference and adherence to regulatory compliance

D.

Moves frequently accessed data to lower-cost archive storage

Full Access
Question # 11

What is a benefit of application virtualization?

A.

Allows inclusion of standard applications into an end-point image

B.

Eliminates the need for OS modifications

C.

Enables online data migrations between storage systems

Full Access
Question # 12

What does the management interface in a cloud portal enable consumers to do?

A.

Interact with the business application using a graphical user interface.

B.

Code, compile, and run their applications on the cloud platform.

C.

Modify, start, and stop rented service instances without manual interaction with the service provider.

D.

Perform computing activities by presenting the functional content of a service instance.

Full Access
Question # 13

What type of cloud security control is log auditing?

A.

Detective control

B.

Corrective control

C.

Preventive control

D.

Technical control

Full Access
Question # 14

Which component presents service catalog and cloud interfaces, enabling consumers to order and manager cloud services?

A.

Cloud Operating System

B.

Orchestor

C.

Cloud Portal

D.

Service automation

Full Access
Question # 15

An organization wants to deliver applications quickly and effectively. They believe that it is the only way to stay competitive in this ever-changing digital world. The organization wants to adopt practices that promote collaboration across teams during various phases of the software development lifecycle.

Which practice will meet the organization’s requirements?

A.

Continuous Integration

B.

Waterfall model

C.

DevOps

D.

Continuous Delivery

Full Access
Question # 16

Which type of attack can be controlled by imposing restrictions and limiting on-network resource consumption?

A.

Advanced persistent threat

B.

Phishing

C.

Side-channel

D.

Distributed denial of service

Full Access
Question # 17

An organization must deploy remote replication between two sites that are 1200 km (745 miles) apart, without impacting application response time.

Which solution should be recommended?

A.

Hypervisor-based synchronous replication

B.

Synchronous replication

C.

Asynchronous replication

Full Access
Question # 18

What type of infrastructure is defined as, "All the sources are bundled together and virtualized?

A.

Software-Defined

B.

Hyper-Converged

C.

Converged

Full Access
Question # 19

Which compute system component contains boot firmware?

A.

Operating System

B.

Hard Disk Drive

C.

Read Only Memory

D.

Random Access Memory

Full Access
Question # 20

Which type of cloud tool controls resources such as compute, storage, and network?

A.

Management and operation

B.

Automation and orchestration

C.

Collaboration and communication

D.

Monitoring and alerting

Full Access
Question # 21

Which cloud security design principle prevents an individual from improper access or system misuse?

A.

Least privilege

B.

Data privacy and ownership

C.

Separation of duties

D.

Secure multitenancy

Full Access
Question # 22

How is application functionality segmented when using a microservices approach in an application development environment?

A.

Dependent and tightly coupled services

B.

Independent and tightly coupled services

C.

Dependent and loosely coupled services

D.

Independent and loosely coupled services

Full Access
Question # 23

Which is a lightweight, stand-alone, executable package that consists of whole runtime environment to execute the application?

A.

Container

B.

Orchestrator

C.

Hypervisor

D.

Microservice

Full Access
Question # 24

Which plane in a software-defined storage environment manages and provisions storage?

A.

control

B.

Data

C.

Application

D.

Service

Full Access
Question # 25

Which concept ensures accountability for security breaches or misuse of resources?

A.

Compliance

B.

Governance

C.

Risk management

Full Access
Question # 26

What describes network-attached storage (NAS)?

A.

File storage that stores data in the form of objects based on the content and other attributes of the data

B.

Dedicated file server that maintains the mapping between the object IDs and the file system namespace

C.

Storage system used for creation and assignment of block storage volumes to compute systems

D.

High-performance file server that either has integrated storage or is connected to external storage

Full Access
Question # 27

What is true of a cloud service design best practice?

A.

Services should be readily available and dependent on one another.

B.

Services are inherently more complex and reduce administrative costs.

C.

Services should operate dependently.

D.

Services must be loosely coupled.

Full Access
Question # 28

What is the effect of a denial-of-service attack?

A.

Privileges are misused to compromise data security.

B.

User credentials are captured and sent to the attacker

C.

Unauthorized access is gained to user accounts and data.

D.

Legitimate users are prevented from accessing services.

Full Access
Question # 29

What is a key responsibility of a security governance board?

A.

Defining the cloud service catalog

B.

Assessing assets with realistic valuations

C.

Assessing the cloud provider’s capability to provide logs

D.

Defining access rights for users

Full Access
Question # 30

What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Adopters

D.

Digital Leaders

Full Access
Question # 31

An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into nine data segments and three coding segments.

What is the maximum number of drive failures supported in the storage system?

A.

6

B.

3

C.

12

D.

9

Full Access
Question # 32

What is true about the Infrastructure as a code function?

A.

Develops and deploys applications using CI/CD tools

B.

Develops and deploys applications using script files

C.

Manually manages and provisions IT resources

D.

Manages and provisions IT resources using script files

Full Access
Question # 33

What term describes the ability of a system to continue functioning, even when a few of its components fail?

A.

Checkpointing

B.

Disaster recovery

C.

Fault tolerance

D.

Replication

Full Access
Question # 34

Which solution can be used for automation of a customer environment?

A.

Ansible

B.

CloudWatch

C.

GitHub

D.

OpenStack

Full Access
Question # 35

Which compute system component runs software programs?

A.

RAM

B.

OS

C.

GPU

D.

CPU

Full Access
Question # 36

Which cloud service management option defines the suite of service offerings and aligns it to the service provider's strategic business goals?

A.

Portfolio

B.

Capacity

C.

Demand

D.

Operation

Full Access