DEA-2TT4 Dumps DEA-2TT4 Braindumps DEA-2TT4 Real Questions DEA-2TT4 Practice Test DEA-2TT4 Actual Questions DELL-EMC DEA-2TT4 Associate - Cloud Infrastructure and Services (DCA-CIS) https://killexams.com/pass4sure/exam-detail/DEA-2TT4 Question: 156 What type of cloud security control is log auditing? A. Detective control B. Corrective control C. Preventive control D. Technical control Answer: A Question: 157 Which risk management step deploys various security mechanisms that minimize risks impacts? A. Identification B. Mitigation C. Assessment D. Monitoring Answer: B Question: 158 Which cloud security design principle prevents an individual from improper access or system misuse? A. Least privilege B. Data privacy and ownership C. Separation of duties D. Secure multitenancy Answer: C Question: 159 Which function collects information about competing service offerings? A. Service performance management B. Service portfolio management C. Service operations management D. Service demand management Answer: B Question: 160 Which compute system component contains boot firmware? A. Operating System B. Hard Disk Drive C. Read Only Memory D. Random Access Memory Answer: C Question: 161 What is the primary goal of a business continuity solution? A. Reduce the amount of investment in protecting an organizationās business-related data B. Decreases likelihood of a disaster in a data protection environment to control the loss of data C. Ensure data availability that is required to conduct vital business operations D. Eliminate security threats in a data protection environment for continuous access to data Answer: C Question: 162 An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient. Which cloud characteristic enables the consumer to handle such variations in workloads and IT resource requirements? A. Resource pooling B. On-demand self-service C. Rapid elasticity Answer: C Question: 163 Which is true about a type 2 hypervisor? A. Installed as an application on an operating system B. Installed on bare-metal hardware C. Hypervisor vendor must certify the hardware Answer: A Question: 164 What is a benefit of link aggregation? A. Saves bandwidth by restricting traffic to a specific potentially congested ISL B. Improves performance by combining two or more parallel ISLs into a single physical ISL C. Optimizes fabric performance by distributing network traffic across ISL D. Improves ISL utilization by increasing the network traffic on a specific ISL Answer: C Question: 165 What enables resource pooling and multi-tenancy in a cloud environment? A. Rapid elasticity B. On-demand provisioning C. Scalability D. Virtualization Answer: D Question: 166 Which tool should be recommended to customers for Infrastructure automation? A. GitHub B. Docker C. Chef D. JARVIS Answer: C Question: 167 An organization must deploy remote replication between two sites that are 1200 km (745 miles) apart, without impacting application response time. Which solution should be recommended? A. Hypervisor-based synchronous replication B. Synchronous replication C. Asynchronous replication Answer: C Question: 168 DRAG DROP What is the correct sequence of steps in the service catalog design and implementation process? wrong Answer: C Explanation: Question: 169 Why do organizations take advantage of virtual infrastructure? A. Require more data center space - Resource underprovisioning - Organizations have overutilized resources B. Organizations have underutilized resources Ability to overprovision resources Require more data center space C. Require no data center space - Organizations have underutilized resources Ability to overprovision resources D. Resource underprovisioning - Organizations have overutilized resources Require no data center space Answer: B Question: 170 What helps to recover the cost of providing the service, ensuring profitability, and meeting the providerās return on investment and reinvestment goals? A. Service negotiation B. Service level objective C. Service valuation D. Service level agreement Answer: C Question: 171 Which type of cloud tool controls resources such as compute, storage, and network? A. Management and operation B. Automation and orchestration C. Collaboration and communication D. Monitoring and alerting Answer: B Question: 172 What provides workflows for performing automated tasks to accomplish a desired outcome? A. Cloud services B. Orchestration C. Software defined infrastructure D. Virtual infrastructure Answer: B Question: 173 An administrator must design a fault-tolerant IT environment for applications. Which techniques meet this requirement? A. Active/Passive for Compute - NIC Teaming for Network - Dual disks for storage B. Active/Active for Compute - Link Aggregation for Network - Erasure Coding for storage C. Active/Passive for Compute - Spanning for Network - Dynamic Disk Sparing for storage D. Active/Standby for Compute - Multipathing for Network - RAID for storage Answer: B Question: 174 Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud? A. Integrity B. Authorization C. Authentication D. Confidentiality Answer: D Question: 175 What activity is performed during the service creation phase of the cloud service lifecycle? A. Defining Service Template B. Developing Service Enablement Roadmap C. Assessing Service Requirements D. Establishing Billing Policy Answer: C 6$03/( 48(67,216 7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV .LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP $FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP ([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP 3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV *XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV 8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV 7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\ 'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU .LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG