DEA-2TT4 Dumps DEA-2TT4 Braindumps

DEA-2TT4 Real Questions DEA-2TT4 Practice Test DEA-2TT4 Actual Questions


killexams.com


DELL-EMC


DEA-2TT4


Associate - Cloud Infrastructure and Services (DCA-CIS)


https://killexams.com/pass4sure/exam-detail/DEA-2TT4

Question: 156


What type of cloud security control is log auditing?


  1. Detective control

  2. Corrective control

  3. Preventive control

  4. Technical control


Answer: A Question: 157

Which risk management step deploys various security mechanisms that minimize risks impacts?


  1. Identification

  2. Mitigation

  3. Assessment

  4. Monitoring


Answer: B Question: 158

Which cloud security design principle prevents an individual from improper access or system misuse?


  1. Least privilege

  2. Data privacy and ownership

  3. Separation of duties

  4. Secure multitenancy


Answer: C Question: 159

Which function collects information about competing service offerings?


  1. Service performance management

  2. Service portfolio management

  3. Service operations management

  4. Service demand management


Answer: B Question: 160

Which compute system component contains boot firmware?


  1. Operating System

  2. Hard Disk Drive

  3. Read Only Memory

  4. Random Access Memory

Question: 161


What is the primary goal of a business continuity solution?


  1. Reduce the amount of investment in protecting an organizationâs business-related data

  2. Decreases likelihood of a disaster in a data protection environment to control the loss of data

  3. Ensure data availability that is required to conduct vital business operations

  4. Eliminate security threats in a data protection environment for continuous access to data


Answer: C Question: 162

An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient.


Which cloud characteristic enables the consumer to handle such variations in workloads and IT resource requirements?


  1. Resource pooling

  2. On-demand self-service

  3. Rapid elasticity


Answer: C Question: 163

Which is true about a type 2 hypervisor?


  1. Installed as an application on an operating system

  2. Installed on bare-metal hardware

  3. Hypervisor vendor must certify the hardware


Answer: A Question: 164

What is a benefit of link aggregation?


  1. Saves bandwidth by restricting traffic to a specific potentially congested ISL

  2. Improves performance by combining two or more parallel ISLs into a single physical ISL

  3. Optimizes fabric performance by distributing network traffic across ISL

  4. Improves ISL utilization by increasing the network traffic on a specific ISL


Answer: C Question: 165

What enables resource pooling and multi-tenancy in a cloud environment?

  1. Rapid elasticity

  2. On-demand provisioning

  3. Scalability

  4. Virtualization


Answer: D Question: 166

Which tool should be recommended to customers for Infrastructure automation?


  1. GitHub

  2. Docker

  3. Chef

  4. JARVIS


Answer: C Question: 167

An organization must deploy remote replication between two sites that are 1200 km (745 miles) apart, without impacting application response time.


Which solution should be recommended?


  1. Hypervisor-based synchronous replication

  2. Synchronous replication

  3. Asynchronous replication


Answer: C Question: 168 DRAG DROP

What is the correct sequence of steps in the service catalog design and implementation process?



wrong

Explanation:


Question: 169


Why do organizations take advantage of virtual infrastructure?


  1. Require more data center space - Resource underprovisioning - Organizations have overutilized resources

  2. Organizations have underutilized resources Ability to overprovision resources

    Require more data center space

  3. Require no data center space - Organizations have underutilized resources Ability to overprovision resources

  4. Resource underprovisioning - Organizations have overutilized resources Require no data center space


Answer: B Question: 170

What helps to recover the cost of providing the service, ensuring profitability, and meeting the providerâs return on investment and reinvestment goals?


  1. Service negotiation

  2. Service level objective

  3. Service valuation

  4. Service level agreement


Answer: C Question: 171

Which type of cloud tool controls resources such as compute, storage, and network?


  1. Management and operation

  2. Automation and orchestration

  3. Collaboration and communication

  4. Monitoring and alerting


Answer: B Question: 172

What provides workflows for performing automated tasks to accomplish a desired outcome?

  1. Cloud services

  2. Orchestration

  3. Software defined infrastructure

  4. Virtual infrastructure


Answer: B Question: 173

An administrator must design a fault-tolerant IT environment for applications. Which techniques meet this requirement?

  1. Active/Passive for Compute - NIC Teaming for Network - Dual disks for storage

  2. Active/Active for Compute - Link Aggregation for Network - Erasure Coding for storage

  3. Active/Passive for Compute - Spanning for Network -

    Dynamic Disk Sparing for storage

  4. Active/Standby for Compute - Multipathing for Network - RAID for storage


Answer: B Question: 174

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?


  1. Integrity

  2. Authorization

  3. Authentication

  4. Confidentiality


Answer: D Question: 175

What activity is performed during the service creation phase of the cloud service lifecycle?


  1. Defining Service Template

  2. Developing Service Enablement Roadmap

  3. Assessing Service Requirements

  4. Establishing Billing Policy


Answer: C