Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > EMC > DCA-CIS > DEA-2TT4

DEA-2TT4 Associate - Cloud Infrastructure and Services v4 Exam Question and Answers

Question # 4

What is a benefit of application virtualization?

A.

Allows inclusion of standard applications into an end-point image

B.

Eliminates the need for OS modifications

C.

Enables online data migrations between storage systems

Full Access
Question # 5

What involves the automated arrangement, coordination, and management of various systems components that enable a user to make a service request using the self-service portal?

A.

Orchestrated service catalog updates

B.

Automated service catalog management

C.

Automated portfolio management

D.

Orchestrated service delivery

Full Access
Question # 6

An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient.

Which cloud characteristic enables the consumer to handle such variations in workloads and IT resource requirements?

A.

Resource pooling

B.

On-demand self-service

C.

Rapid elasticity

Full Access
Question # 7

What type of cloud security control is log auditing?

A.

Detective control

B.

Corrective control

C.

Preventive control

D.

Technical control

Full Access
Question # 8

Which compute system component runs software programs?

A.

RAM

B.

OS

C.

GPU

D.

CPU

Full Access
Question # 9

Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment?

A.

Service demand management

B.

Service capacity management

C.

Service portfolio management

D.

Service operation management

Full Access
Question # 10

What is a characteristic of a best-of-breed infrastructure?

A.

Provides limited flexibility to choose components

B.

Prevents vendor lock-in

C.

Provides single management software to control multi-vendor components

D.

Requires less time to integrate all the components to build as an appliance

Full Access
Question # 11

How is application functionality segmented when using a microservices approach in an application development environment?

A.

Dependent and tightly coupled services

B.

Independent and tightly coupled services

C.

Dependent and loosely coupled services

D.

Independent and loosely coupled services

Full Access
Question # 12

Which role is responsible for designing, planning, managing, maintaining, and supporting the cloud infrastructure when transforming IT?

A.

Cloud DevOps Engineer

B.

Cloud Automation Engineer

C.

Cloud Architect

D.

Cloud Engineer

Full Access
Question # 13

Which APEX custom solution allows customers to choose their hardware, software, services, capacity, and offers usage-based payments?

A.

Flex on Demand

B.

Data Center Utility

C.

Backup Services

D.

Private and Hybrid Cloud

Full Access
Question # 14

What is a key responsibility of a security governance board?

A.

Defining the cloud service catalog

B.

Assessing assets with realistic valuations

C.

Assessing the cloud provider’s capability to provide logs

D.

Defining access rights for users

Full Access
Question # 15

What is a benefit of link aggregation?

A.

Saves bandwidth by restricting traffic to a specific potentially congested ISL

B.

Improves performance by combining two or more parallel ISLs into a single physical ISL

C.

Optimizes fabric performance by distributing network traffic across ISL

D.

Improves ISL utilization by increasing the network traffic on a specific ISL

Full Access
Question # 16

What does a service attribute specify?

A.

Relationships between services

B.

Configurations of service components

C.

Structure of a service

Full Access
Question # 17

What is true about application virtualization?

A.

Resolves application conflicts and compatibility issues

B.

Allows for OS modifications on host machines

C.

Prevents the use of conflicting applications on the same end-point device

D.

Increases the complexity of application deployment

Full Access
Question # 18

Which is a characteristic of the chargeback model?

A.

Financial systems require agent plug-in.

B.

Service costs reporting to the business.

C.

Customers are billed for services that are consumed.

Full Access
Question # 19

When implementing an initial IT service center using ITILframework. In service strategy state which process needs to be considered for automation?

A.

Business relationship management

B.

Information security management

C.

Knowledge management

D.

Problem Management

Full Access
Question # 20

What condition can result in the development of a "shadow IT" organization?

A.

Lack of cloud extensibility inside an organization

B.

Increasing number of end user devices and different access points

C.

Bypassing of internal IT and looking elsewhere for IT services

D.

Aging facilities, and outdated policies and technology

Full Access
Question # 21

Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?

A.

VMware vCenter Manager

B.

VMware vRealize Operations Management Suite

C.

VMware vRealize Automation Suite

D.

VMware vSphere with Operations Management

Full Access
Question # 22

What benefit is provided in subscription by peak usage chargeback model?

A.

Can start small with minimal cost

B.

Easy to implement - track user authentication

C.

Clear cost justification

D.

Easier to manage financially with a predetermined, reoccurring billing cycle

Full Access
Question # 23

Which type of cloud tool controls resources such as compute, storage, and network?

A.

Management and operation

B.

Automation and orchestration

C.

Collaboration and communication

D.

Monitoring and alerting

Full Access
Question # 24

Which tool should be recommended to customers for Infrastructure automation?

A.

GitHub

B.

Docker

C.

Chef

D.

JARVIS

Full Access
Question # 25

What is used to update information in a configuration management database?

A.

Discovery tool

B.

Capacity management tool

C.

Configuration manager

D.

Performance management tool

Full Access
Question # 26

What is a benefit of synchronous remote replication?

A.

Saves network bandwidth by replicating only deduplicated data

B.

Replicates data across any geographic location without impacting response time

C.

Ensures that source and replica always have identical data

D.

Supports repeated write I/O to the same location to improve replication performance

Full Access
Question # 27

Which network feature enables dynamic distribution of applications I/O traffic across VMs?

A.

NIC Teaming

B.

Erasure Coding

C.

Link Aggregation

D.

Load Balancing

Full Access
Question # 28

An organization must deploy remote replication between two sites that are 1200 km (745 miles) apart, without impacting application response time.

Which solution should be recommended?

A.

Hypervisor-based synchronous replication

B.

Synchronous replication

C.

Asynchronous replication

Full Access
Question # 29

An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into nine data segments and three coding segments.

What is the maximum number of drive failures supported in the storage system?

A.

6

B.

3

C.

12

D.

9

Full Access
Question # 30

Which plane in a software-defined storage environment manages and provisions storage?

A.

control

B.

Data

C.

Application

D.

Service

Full Access
Question # 31

What is a responsibility of the Service Manager role?

A.

Understanding consumers’ needs and industry trends to drive an effective product strategy

B.

Coordinating with the architecture team to define technology road maps

C.

Provide architectural oversight over individual domains

D.

Designing, planning, managing, maintaining, and supporting the cloud infrastructure

Full Access
Question # 32

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

A.

Service Planning

B.

Service Creation

C.

Service Operation

D.

Service Termination

Full Access
Question # 33

Which compute system component contains boot firmware?

A.

Operating System

B.

Hard Disk Drive

C.

Read Only Memory

D.

Random Access Memory

Full Access
Question # 34

What activity is performed during the service planning phase of the cloud service lifecycle?

A.

Defining Orchestration Workflow

B.

Discovering Service Assets

C.

Developing Service Proposal

D.

Defining Service Offering

Full Access
Question # 35

Which platform provides a converged infrastructure solution?

A.

VxRail

B.

PowerStore

C.

VxBlock

D.

PowerFlex

Full Access
Question # 36

Identify a threat caused, when an attacker sends massive quantities of data to the target with the intention of consuming bandwidth.

A.

Advanced persistent threat

B.

Denial-of-service

C.

Malicious insider

D.

Account hijacking

Full Access