DEA-2TT3 - Associate - Cloud Infrastructure and Services v.3 Exam

  1. What is a key element of a cloud portal?

    A. Unified manager

    B. Element manager

    C. Orchestrator

    D. Management interface
    C. Orchestrator
  2. What is a function of the discovery operation during the service operation phase of the cloud service lifecycle?

    A. Collects information about people involved in the service operations

    B. Collects information about services available in the catalog

    C. Provides visibility into each Cloud service asset employed

    D. Restores service levels while continuously optimizing operations
    A. Collects information about people involved in the service operations
  3. What is a characteristic of storage resource pools?

    A. Resource pools should always be created by different types of storage devices

    B. Resources are reserved by the application after being released by the consumer

    C. Resources are dynamically released to the pool when the consumer exceeds their quota

    D. Resources are dynamically allocated based on consumer demand
    D. Resources are dynamically allocated based on consumer demand
  4. What is a responsibility of the Service Account Manager?

    A. Maintaining day-to-day contact that consumers"™ needs are met

    B. Designing, planning, managing, maintaining, and supporting the cloud infrastructure

    C. Understanding consumers"™ needs and industry trends to drive an affective product strategy

    D. Streaming service delivery and execution, and handling early warnings for service issues
    A. Maintaining day-to-day contact that consumers"™ needs are met
  5. What is a benefit of synchronous remote replication?

    A. Replicates data across any geographic location without impacting response time

    B. Ensures source and replica have identical data at all times

    C. Supports locality of reference to improve replication performance

    D. Saves network bandwidth by replicating only deduplicated data
    A. Replicates data across any geographic location without impacting response time
  6. A cloud service provider uses a resource pooling approach to improve the utilization of resources by sharing them with multiple customers. What mechanism should the cloud provider deploy to prevent one consumer from accessing the virtual machines of another consumer?

    A. Hypervisor-based resource pooling

    B. Secure multitenancy through isolation

    C. Pooling of resources through multitenancy

    D. Virtual machine-based resource pooling
    C. Pooling of resources through multitenancy
  7. What are the key approaches to application transformation?

    A. Restore, Reuse, Retain, Retire

    B. Refactor, Revise, Retain, Retire

    C. Retain, Refactor, Reuse, Revise

    D. Revise, Restore, Retain, Re-iterate
    B. Refactor, Revise, Retain, Retire
  8. Image Upload 1
    Refer to the exhibit.

    Which type of hypervisor is installed in this environment?


    A. Hosted Hypervisor-Type 1

    B. Bare Metal Hypervisor-Type 1

    C. Hosted Hypervisor-Type 2

    D. Bare Metal Hypervisor-Type 2
    C. Hosted Hypervisor-Type 2
  9. What is a key function of the cloud service component?

    A. Allows consumers to create service offerings for a service catalog

    B. Enables service providers to request the purchase of new IT resources

    C. Presents cloud infrastructure for use of services by consumers

    D. Allows consumers to modify the existing service offerings in a service catalog
    A. Allows consumers to create service offerings for a service catalog
  10. Which method compares observed events with normal activities to identify abnormal patterns in a system?


    A. Encryption-based authentication

    B. Anomaly-based intrusion detection

    C. Multi-factor authentication

    D. Signature-based intrusion detection
    B. Anomaly-based intrusion detection
  11. DRAG DROP -
    What is the correct sequence of steps involved in synchronous remote replication?
    Select and Place:

    Image Upload 2
    Image Upload 3
  12. In which technique does an application maintain limited functionality, even when some of the modules or supporting services of that application become unavailable?


    A. Retry logic

    B. Persistent state model

    C. Graceful degradation

    D. Checkpointing
    C. Graceful degradation
  13. To implement a new service desk management tool, the capacity of the servers has to be extended. Who is responsible for managing the request for additional capacity?

    A. Change Manager

    B. Financial Manager

    C. Capacity Manager

    D. Service Level Manager
    A. Change Manager
  14. Which Dell EMC product provides a converged infrastructure solution?

    A. XC Series Appliance

    B. VxBlock

    C. VxRail Appliance

    D. XtremIO
    C. VxRail Appliance
  15. What is a service contract?

    A. Agreement between provider and consumer that states the terms of service usage

    B. Agreement between provider and supplier that describes the service template specifics

    C. Agreement between provider and consumer that lists the conditions for greenfield service deployment

    D. Agreement between provider and supplier that states the terms and conditions of a balanced scorecard
    A. Agreement between provider and consumer that states the terms of service usage
  16. What refers to an agreement between provider and consumer that states the terms of service usage?

    A. Service contract

    B. Service template

    C. Chargeback

    D. Showback
    A. Service contract
  17. What is an advantage of adopting a microservices strategy in an application development environment?

    A. All microservices of an application are always updated at the same time for maintaining consistency in the application

    B. Every microservice can be deployed, upgraded, scaled, and restarted independent of other services in the application

    C. Microservices are tightly coupled so it is easy to scale all the services at once to meet business demands

    D. Microservices provide the application platform to implement DevOps in the organization easily and at low cost
    B. Every microservice can be deployed, upgraded, scaled, and restarted independent of other services in the application
  18. Which role in service portfolio management determines and delivers the services that provide value and strategic advantage to the provider?

    A. Cloud Service Account Manager

    B. Cloud Automation Engineer

    C. Cloud Administrator

    D. Cloud Auditor
    C. Cloud Administrator
  19. Image Upload 4

    Refer to the exhibit, which represents a consumer environment consisting of multiple VMs running Windows operating systems (OSs).
    For compliance reasons, the cloud service provider maintains version control over the OS provided to the consumer. The service provider also ensures that the configurations of the VMs comply with the configuration policy for the OS version. The configuration policy includes the two conditions shown in the exhibit. A monitoring tool verifies VM configurations against the configuration policy and provides the compliance results shown.
    What is the percentage of compliance non-adherence?


    A. 30.12%

    B. 33.34%

    C. 58.33%

    D. 66.67%
    D. 66.67%
  20. Which management process ensures business continuity by eliminating single points of failure in a data center?

    A. Availability management

    B. Security management

    C. Capacity management

    D. Performance management
    A. Availability management
  21. Which Dell EMC product is used for a disk-based backup and recovery solution that provides inherent source-based data deduplication?

    A. NetWorker

    B. ProtectPoint

    C. Data Domain

    D. Avamar
    D. Avamar
  22. Which phase of the cloud service lifecycle involves making business use case decisions for the cloud service offering portfolio?

    A. Service Termination

    B. Service Planning

    C. Service Creation

    D. Service Operation
    C. Service Creation
  23. Which software-defined storage controller function gathers data about the components and brings them under its control and management?

    A. Storage provisioning

    B. Storage discovery

    C. Resource abstraction and pooling

    D. Storage component management
    C. Resource abstraction and pooling
  24. The incident management team is unable to determine the root cause of an incident. To which team should the error-correction activity be transferred?

    A. Performance Management

    B. Change Management

    C. Availability Management

    D. Problem Management
    D. Problem Management
  25. What capability is provided by the "Open and extensible" attribute of software-defined infrastructure (SDI)?

    A. Uses APIs to integrate multivendor resources into the SDI environment

    B. Optimizes resource usage and generates value reports about the SDI environment

    C. Provides a control point for the entire SDI environment

    D. Provides multitenancy that enables consumers to share resources in the SDI environment
    A. Uses APIs to integrate multivendor resources into the SDI environment
  26. What mechanism does RSA SecurID use?

    A. Single sign-on authentication

    B. Policy-based authorization

    C. Multi-factor authentication

    D. Role-based authorization
    C. Multi-factor authentication
  27. What is the function of a monitoring and alerting tool?

    A. Focus on examining the usage of resources by customers and service providers and provide notification to optimize and manage workloads

    B. Control charges for cloud usage by optimizing cloud resource utilization

    C. Automate tasks and IT processes and manage the IT environment

    D. Enable people to work closely together on a common project, in real time, by making communication among them easier
    A. Focus on examining the usage of resources by customers and service providers and provide notification to optimize and manage workloads
  28. DRAG DROP -
    Match each information security concept with its description.
    Select and Place:

    Image Upload 5
    Image Upload 6
  29. What capability does an orchestration workflow provide?

    A. Helps administer the cloud infrastructure, such as adding resources to a resource pool, billing, and reporting

    B. Helps to consolidate all the IT resources in the cloud environment

    C. Enables the administrator to control the underlying physical infrastructure using a single unified management console

    D. Creates an automated set of tasks to update the service catalog by cloud consumers without requiring manual intervention
    C. Enables the administrator to control the underlying physical infrastructure using a single unified management console
  30. What can an IT department do to better meet IT challenges and support digital businesses?

    A. Become more technology centric

    B. Focus on delivery and management of digital assets

    C. Become more service centric within cost constraints

    D. Focus on providing services without being distracted by costs
    A. Become more technology centric
  31. What is a characteristic of thin LUNs?

    A. When a thin LUN is destroyed, its allocated capacity is automatically reclaimed to the pool.

    B. When a thin LUN is created, physical storage is fully allocated for it

    C. Once a thin LUN is created it cannot be destroyed until all data is deleted from it

    D. When a thin LUN is destroyed, its allocated capacity is reserved until an administrator reclaims it
    A. When a thin LUN is destroyed, its allocated capacity is automatically reclaimed to the pool.
  32. Which product provides key management and a data-at-rest encryption mechanism for private, public, and hybrid clouds?

    A. RSA SecurID

    B. Dell EMC CloudArray

    C. RSA Archer eGRC

    D. Dell EMC CloudLink
    D. Dell EMC CloudLink
  33. What is a key benefit of using containers?
    A. Eliminates any long-term commitments to a technology stack

    B. Helps speed up software release cycles and improve software quality

    C. Enables services to be delivered in hour or days, not weeks

    D. Provides better probability without requiring code changes
    B. Helps speed up software release cycles and improve software quality
  34. What is the purpose of a bitmap in snapshot creation?

    A. Keeps track of blocks that have changed in the filesystem

    B. Indicates the exact address from which data has to be read

    C. Indicates the exact address to where data has to be written

    D. Keeps track of the number of blocks that are highly utilized
    D. Keeps track of the number of blocks that are highly utilized
  35. An organization needs to deploy remote replication between two sites that are 100 km (62 miles) apart. The organization requires a near zero recovery point objective.
    Which solution would you recommend?

    A. Hypervisor-based asynchronous replication

    B. Synchronous replication

    C. Snapshot replication

    D. Asynchronous replication
    B. Synchronous replication
  36. Which method optimizes network performance by distributing network traffic across the shared bandwidth of all the ISLs?

    A. Link aggregation

    B. Network zoning

    C. Network segmentation

    D. Link failover
    A. Link aggregation
  37. Which product is a single-instance, multitenant integration platform as a service that provides a unified online development and management environment?

    A. MyService 360

    B. ViPR SRM

    C. Data Protection Advisor

    D. Dell Boomi
    D. Dell Boomi
  38. Image Upload 7

    Which cloud service model is represented in the exhibit?

    A. Software as a Service

    B. Infrastructure as a Service

    C. Platform as a Service

    D. Database as a Service
    B. Infrastructure as a Service
  39. What is an organizational benefit of adopting modern applications?

    A. Enhances competitiveness

    B. Removes dependency on IT completely

    C. Eliminates CAPEX

    D. Removes dependency on service provider
    A. Enhances competitiveness
  40. Which process involves determining the optimal resources required to meet seasonal spikes in resource demand?

    A. Configuration management

    B. Change management

    C. Capacity management

    D. Incident management
    C. Capacity management
Author
maryguerrero
ID
353692
Card Set
DEA-2TT3 - Associate - Cloud Infrastructure and Services v.3 Exam
Description
DEA-2TT3 - Associate - Cloud Infrastructure and Services v.3 Exam
Updated