New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

EMC DEA-2TT4 Associate - Cloud Infrastructure and Services v4 Exam Exam Practice Test

Demo: 36 questions
Total 122 questions

Associate - Cloud Infrastructure and Services v4 Exam Questions and Answers

Question 1

Which cloud service management option defines the suite of service offerings and aligns it to the service provider's strategic business goals?

Options:

A.

Portfolio

B.

Capacity

C.

Demand

D.

Operation

Question 2

What is a key responsibility of a security governance board?

Options:

A.

Defining the cloud service catalog

B.

Assessing assets with realistic valuations

C.

Assessing the cloud provider’s capability to provide logs

D.

Defining access rights for users

Question 3

What is the correct sequence of steps in the service catalog design and implementation process?

Options:

Question 4

Refer to the exhibit.

Which associates labels A, B, C, and D with planes within the software-defined infrastructure.

What set of labels is correct?

Options:

A.

A = Data plane B = Service plane C = Management plane D = Control plane

B.

A = Control plane B = Management plane C = Service plane D = Data plane

C.

A = Management plane B = Service plane C = Data plane D = Control plane

D.

A = Data plane B = Control plane C = Management plane D= Service plane

Question 5

What is the primary goal of a business continuity solution?

Options:

A.

Reduce the amount of investment in protecting an organization’s business-related data

B.

Decreases likelihood of a disaster in a data protection environment to control the loss of data

C.

Ensure data availability that is required to conduct vital business operations

D.

Eliminate security threats in a data protection environment for continuous access to data

Question 6

Which data protection solution enables organizations to protect, manage, and recover data at scale across diverse environments?

Options:

A.

Dell PowerProtect DD Series Appliances

B.

Dell Avamar

C.

Dell PowerProtect DP Series Appliances

D.

Dell Data Domain

Question 7

Which is true about a type 2 hypervisor?

Options:

A.

Installed as an application on an operating system

B.

Installed on bare-metal hardware

C.

Hypervisor vendor must certify the hardware

Question 8

What involves the automated arrangement, coordination, and management of various systems components that enable a user to make a service request using the self-service portal?

Options:

A.

Orchestrated service catalog updates

B.

Automated service catalog management

C.

Automated portfolio management

D.

Orchestrated service delivery

Question 9

Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment?

Options:

A.

Service demand management

B.

Service capacity management

C.

Service portfolio management

D.

Service operation management

Question 10

What refers to an agreement between provider and consumer that states the terms of service usage?

Options:

A.

Service contract

B.

Service template

C.

Chargeback

D.

Showback

Question 11

What enables resource pooling and multi-tenancy in a cloud environment?

Options:

A.

Rapid elasticity

B.

On-demand provisioning

C.

Scalability

D.

Virtualization

Question 12

An organization wants to deliver applications quickly and effectively. They believe that it is the only way to stay competitive in this ever-changing digital world. The organization wants to adopt practices that promote collaboration across teams during various phases of the software development lifecycle.

Which practice will meet the organization’s requirements?

Options:

A.

Continuous Integration

B.

Waterfall model

C.

DevOps

D.

Continuous Delivery

Question 13

What are the benefits of modern applications compared to traditional applications?

Options:

A.

Designed to run independently and use a linear, continuous approach in development, build, test, and deploy

B.

Distributed system architecture, designed to run independently, and use multiple programming languages

C.

Single programming language and framework and scale by growing vertically

D.

Monolithic, built with interdependent modules, and use distributed system architecture

Question 14

Which is a characteristic of the chargeback model?

Options:

A.

Financial systems require agent plug-in.

B.

Service costs reporting to the business.

C.

Customers are billed for services that are consumed.

Question 15

What is a characteristic of an object-based storage system?

Options:

A.

Extends a single file system across all storage nodes

B.

Consolidates block and file access in one storage platform

C.

Capable of dynamically creating multiple object IDs for each object

D.

Uses a flat, non-hierarchical address space

Question 16

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

Options:

A.

Service Planning

B.

Service Creation

C.

Service Operation

D.

Service Termination

Question 17

What is used to update information in a configuration management database?

Options:

A.

Discovery tool

B.

Capacity management tool

C.

Configuration manager

D.

Performance management tool

Question 18

Which type of attack can be controlled by imposing restrictions and limiting on-network resource consumption?

Options:

A.

Advanced persistent threat

B.

Phishing

C.

Side-channel

D.

Distributed denial of service

Question 19

Which network feature enables dynamic distribution of applications I/O traffic across VMs?

Options:

A.

NIC Teaming

B.

Erasure Coding

C.

Link Aggregation

D.

Load Balancing

Question 20

Which tool should be recommended to customers for Infrastructure automation?

Options:

A.

GitHub

B.

Docker

C.

Chef

D.

JARVIS

Question 21

What steps appear in the service enablement roadmap?

Options:

A.

Define, Create, Plan, Enable, Terminate

B.

Understand, Plan, Build, Enable, Optimize

C.

Define, Observe, Understand, Enable, Act

D.

Plan, Action, Condition, Enable, End

Question 22

What is an advantage of asynchronous remote replication?

Options:

A.

Ensures source LUN and replica have identical data at all times

B.

Supports replication across any geographic location without impacting response time

C.

Provides a near zero recovery point objective without impacting response time

D.

Requires less storage space for the replica than the source LUN

Question 23

Why do organizations take advantage of virtual infrastructure?

Options:

A.

Require more data center space -

Resource underprovisioning -

Organizations have overutilized resources

B.

Organizations have underutilized resources

Ability to overprovision resources

Require more data center space

C.

Require no data center space -

Organizations have underutilized resources

Ability to overprovision resources

D.

Resource underprovisioning -

Organizations have overutilized resources

Require no data center space

Question 24

An organization must deploy remote replication between two sites that are 1200 km (745 miles) apart, without impacting application response time.

Which solution should be recommended?

Options:

A.

Hypervisor-based synchronous replication

B.

Synchronous replication

C.

Asynchronous replication

Question 25

What is the objective of Confidentiality in information security?

Options:

A.

Prevents an unauthorized user from changing data

B.

Non-repudiation and authenticity of information

C.

Ensures that identify credentials are used to verify cloud assets

D.

Restricts user access to data held within the cloud

Question 26

Which fault-tolerant mechanism, in a highly available application design is implemented within a code to handle service that is temporarily down?

Options:

A.

Checkpointing

B.

Monitoring Application Availability

C.

Graceful Degradation

D.

Retry Logic

Question 27

What is a characteristic of a converged infrastructure?

Options:

A.

Eliminates CAPEX

B.

Eliminates OPEX

C.

Does not require a separate storage array

D.

Enables rapid scalability

Question 28

What does a service attribute specify?

Options:

A.

Relationships between services

B.

Configurations of service components

C.

Structure of a service

Question 29

Identify a threat caused, when an attacker sends massive quantities of data to the target with the intention of consuming bandwidth.

Options:

A.

Advanced persistent threat

B.

Denial-of-service

C.

Malicious insider

D.

Account hijacking

Question 30

What happens when a link in a link aggregation group is lost?

Options:

A.

All the network traffic is held in the queue until the link is repaired.

B.

All network traffic on that link is redistributed to another link aggregation group.

C.

All the network traffic is resent by the sender after the link is repaired.

D.

All network traffic on that link is redistributed across the remaining links in that group.

Question 31

What is a benefit of secure multitenancy?

Options:

A.

Reduces unauthorized access to resources

B.

Blocks unauthorized access to resources

C.

Eliminates data breach risks

D.

Protects cloud infrastructure

Question 32

Which backup service deployment is utilized when a backup is performed in a consumer location and then the backup data is sent to the cloud for DR purpose?

Options:

A.

Remote Backup Service

B.

Cloud-to-cloud Backup Service

C.

Managed Backup Service

D.

Replication Backup Service

Question 33

Which cloud role has the responsibility to perform independent cloud service assessments?

Options:

A.

Architect

B.

Broker

C.

Consumer

D.

Auditor

Question 34

When implementing an initial IT service center using ITILframework. In service strategy state which process needs to be considered for automation?

Options:

A.

Business relationship management

B.

Information security management

C.

Knowledge management

D.

Problem Management

Question 35

What helps to recover the cost of providing the service, ensuring profitability, and meeting the provider’s return on investment and reinvestment goals?

Options:

A.

Service negotiation

B.

Service level objective

C.

Service valuation

D.

Service level agreement

Question 36

Which compute system component runs software programs?

Options:

A.

RAM

B.

OS

C.

GPU

D.

CPU

Demo: 36 questions
Total 122 questions