Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which data protection solution enables organizations to protect, manage, and recover data at scale across diverse environments?

A.

Dell PowerProtect DD Series Appliances

B.

Dell Avamar

C.

Dell PowerProtect DP Series Appliances

D.

Dell Data Domain

Full Access
Question # 5

What involves the automated arrangement, coordination, and management of various systems components that enable a user to make a service request using the self-service portal?

A.

Orchestrated service catalog updates

B.

Automated service catalog management

C.

Automated portfolio management

D.

Orchestrated service delivery

Full Access
Question # 6

Which tool should be recommended to customers for Infrastructure automation?

A.

GitHub

B.

Docker

C.

Chef

D.

JARVIS

Full Access
Question # 7

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

A.

Service Creation

B.

Service Operation

C.

Service Termination

D.

Service Planning

Full Access
Question # 8

What is a function of a cloud portal?

A.

Updates IT resources database

B.

Replicates container resources in a web portal

C.

Interacts with the orchestration layer

D.

Creates workflows for automated scheduling

Full Access
Question # 9

Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?

A.

Virtual machine hardening

B.

Application hardening

C.

Operating system hardening

D.

Hypervisor hardening

Full Access
Question # 10

What is a benefit of secure multitenancy?

A.

Reduces unauthorized access to resources

B.

Blocks unauthorized access to resources

C.

Eliminates data breach risks

D.

Protects cloud infrastructure

Full Access
Question # 11

Which Dell Technologies product can automate and centralize the collection and analysis of data across physical and virtual environments?

A.

NetWorker

B.

Data Protection Advisor

C.

SourceOne

D.

Avamar

Full Access
Question # 12

Which key service management function modifies and aligns services according to consumer needs in the cloud environment?

A.

Service operation management

B.

Service demand management

C.

Service capacity management

D.

Service portfolio management

Full Access
Question # 13

What enables resource pooling and multi-tenancy in a cloud environment?

A.

Rapid elasticity

B.

On-demand provisioning

C.

Scalability

D.

Virtualization

Full Access
Question # 14

What does a service attribute specify?

A.

Relationships between services

B.

Configurations of service components

C.

Structure of a service

Full Access
Question # 15

What is the correct sequence of steps in the service catalog design and implementation process?

Full Access
Question # 16

Which compute system component contains boot firmware?

A.

Operating System

B.

Hard Disk Drive

C.

Read Only Memory

D.

Random Access Memory

Full Access
Question # 17

What is a characteristic of a best-of-breed infrastructure?

A.

Provides limited flexibility to choose components

B.

Prevents vendor lock-in

C.

Provides single management software to control multi-vendor components

D.

Requires less time to integrate all the components to build as an appliance

Full Access
Question # 18

What is a key function of service operation management?

A.

Analyze customer feedback.

B.

Perform market research.

C.

Enable problem resolution.

D.

Establish pricing and budgeting

Full Access
Question # 19

An organization has deployed a cloud infrastructure. They frequently experience power outages that result in their service offerings being periodically unavailable.

What type of unavailability are they experiencing?

A.

Ephemeral

B.

Permanent

C.

Intermittent

Full Access
Question # 20

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?

A.

Integrity

B.

Authorization

C.

Authentication

D.

Confidentiality

Full Access
Question # 21

Which APEX custom solution allows customers to choose their hardware, software, services, capacity, and offers usage-based payments?

A.

Flex on Demand

B.

Data Center Utility

C.

Backup Services

D.

Private and Hybrid Cloud

Full Access
Question # 22

How is application functionality segmented when using a microservices approach in an application development environment?

A.

Dependent and tightly coupled services

B.

Independent and tightly coupled services

C.

Dependent and loosely coupled services

D.

Independent and loosely coupled services

Full Access
Question # 23

Which is a lightweight, stand-alone, executable package that consists of whole runtime environment to execute the application?

A.

Container

B.

Orchestrator

C.

Hypervisor

D.

Microservice

Full Access
Question # 24

What is true of a cloud service design best practice?

A.

Services should be readily available and dependent on one another.

B.

Services are inherently more complex and reduce administrative costs.

C.

Services should operate dependently.

D.

Services must be loosely coupled.

Full Access
Question # 25

Which programmatically integrates and sequences various system functions into automated workflows for executing higher-level service provisioning and management functions?

A.

Self-service portal

B.

Application Programming Interface

C.

Orchestrator

D.

Service Catalog

Full Access
Question # 26

Which compute system component runs software programs?

A.

RAM

B.

OS

C.

GPU

D.

CPU

Full Access
Question # 27

Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment?

A.

Service demand management

B.

Service capacity management

C.

Service portfolio management

D.

Service operation management

Full Access
Question # 28

Which cloud security control mechanism monitors activity using video surveillance cameras and detects unusual activities using sensors and alarms?

A.

Administrative control

B.

Technical control

C.

Corrective control

D.

Physical control

Full Access
Question # 29

Which risk management step deploys various security mechanisms that minimize risks impacts?

A.

Identification

B.

Mitigation

C.

Assessment

D.

Monitoring

Full Access
Question # 30

Which solution can be used for automation of a customer environment?

A.

Ansible

B.

CloudWatch

C.

GitHub

D.

OpenStack

Full Access
Question # 31

What condition can result in the development of a "shadow IT" organization?

A.

Lack of cloud extensibility inside an organization

B.

Increasing number of end user devices and different access points

C.

Bypassing of internal IT and looking elsewhere for IT services

D.

Aging facilities, and outdated policies and technology

Full Access
Question # 32

What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Adopters

D.

Digital Leaders

Full Access
Question # 33

Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?

A.

VMware vCenter Manager

B.

VMware vRealize Operations Management Suite

C.

VMware vRealize Automation Suite

D.

VMware vSphere with Operations Management

Full Access
Question # 34

Identify a threat caused, when an attacker sends massive quantities of data to the target with the intention of consuming bandwidth.

A.

Advanced persistent threat

B.

Denial-of-service

C.

Malicious insider

D.

Account hijacking

Full Access
Question # 35

Why do organizations take advantage of virtual infrastructure?

A.

Require more data center space -

Resource underprovisioning -

Organizations have overutilized resources

B.

Organizations have underutilized resources

Ability to overprovision resources

Require more data center space

C.

Require no data center space -

Organizations have underutilized resources

Ability to overprovision resources

D.

Resource underprovisioning -

Organizations have overutilized resources

Require no data center space

Full Access
Question # 36

What term refers to businesses that cautiously and gradually embrace digital transformation?

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Leaders

D.

Digital Adopters

Full Access