Which attribute of software-defined infrastructure is responsible for providing abstracted view of the IT infrastructure?
A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.
Which strategy did the cloud provider use to mitigate the risk of security threats?
Which backup service deployment is utilized when a backup is performed in a consumer location and then the backup data is sent to the cloud for DR purpose?
What does the management interface in a cloud portal enable consumers to do?
Which component presents service catalog and cloud interfaces, enabling consumers to order and manager cloud services?
An organization wants to deliver applications quickly and effectively. They believe that it is the only way to stay competitive in this ever-changing digital world. The organization wants to adopt practices that promote collaboration across teams during various phases of the software development lifecycle.
Which practice will meet the organization’s requirements?
Which type of attack can be controlled by imposing restrictions and limiting on-network resource consumption?
An organization must deploy remote replication between two sites that are 1200 km (745 miles) apart, without impacting application response time.
Which solution should be recommended?
What type of infrastructure is defined as, "All the sources are bundled together and virtualized?
Which type of cloud tool controls resources such as compute, storage, and network?
Which cloud security design principle prevents an individual from improper access or system misuse?
How is application functionality segmented when using a microservices approach in an application development environment?
Which is a lightweight, stand-alone, executable package that consists of whole runtime environment to execute the application?
Which plane in a software-defined storage environment manages and provisions storage?
Which concept ensures accountability for security breaches or misuse of resources?
What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?
An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into nine data segments and three coding segments.
What is the maximum number of drive failures supported in the storage system?
What term describes the ability of a system to continue functioning, even when a few of its components fail?
Which cloud service management option defines the suite of service offerings and aligns it to the service provider's strategic business goals?