Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

DEA-2TT4 Questions and Answers

Question # 6

What activity is performed during the service planning phase of the cloud service lifecycle?

A.

Defining Orchestration Workflow

B.

Discovering Service Assets

C.

Developing Service Proposal

D.

Defining Service Offering

Full Access
Question # 7

Which cloud security design principle prevents an individual from improper access or system misuse?

A.

Least privilege

B.

Data privacy and ownership

C.

Separation of duties

D.

Secure multitenancy

Full Access
Question # 8

What activity is included in a compliance checklist when moving data to the cloud?

A.

Determine if appropriate governance processes are available to meet consumers' requirements

B.

Ensure that IT infrastructure and data adhere to specific rules and regulations

C.

Review the financial stability of the provider to ensure its longevity

D.

Review and evaluate the usage of encryption to protect consumers' data

Full Access
Question # 9

What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Adopters

D.

Digital Leaders

Full Access
Question # 10

Which risk management process is in the correct order

A.

Monitoring, Risk identification, Risk mitigation, Risk assessment.

B.

Risk identification, Risk assessment, Monitoring, Risk mitigation

C.

Monitoring, Risk identification, Risk assessment, Risk mitigation.

D.

Risk Identification, Risk assessment, Risk mitigation, Monitoring

Full Access
Question # 11

Which two are key requirements for fault tolerance?

A.

Document SPOF and Fault Elimination

B.

Fault Isolation and Eliminate SPOF

C.

Network Isolation and Eliminate SPOF

D.

RAID Storage and Fault Isolation

Full Access
Question # 12

A consumer is interested in a service that provides multiple operating systems and programming frameworks for application development and deployment.

Which cloud service model meets these requirements?

A.

Storage as a Service

B.

Platform as a Service

C.

Software as a Service

D.

Data as a Service

Full Access
Question # 13

What is a benefit of application virtualization?

A.

Allows inclusion of standard applications into an end-point image

B.

Eliminates the need for OS modifications

C.

Enables online data migrations between storage systems

Full Access
Question # 14

What is a benefit of secure multitenancy?

A.

Reduces unauthorized access to resources

B.

Blocks unauthorized access to resources

C.

Eliminates data breach risks

D.

Protects cloud infrastructure

Full Access
Question # 15

What enables resource pooling and multi-tenancy in a cloud environment?

A.

Rapid elasticity

B.

On-demand provisioning

C.

Scalability

D.

Virtualization

Full Access
Question # 16

What is a responsibility of the Service Manager role?

A.

Understanding consumers’ needs and industry trends to drive an effective product strategy

B.

Coordinating with the architecture team to define technology road maps

C.

Provide architectural oversight over individual domains

D.

Designing, planning, managing, maintaining, and supporting the cloud infrastructure

Full Access
Question # 17

What is the objective of Confidentiality in information security?

A.

Prevents an unauthorized user from changing data

B.

Non-repudiation and authenticity of information

C.

Ensures that identify credentials are used to verify cloud assets

D.

Restricts user access to data held within the cloud

Full Access
Question # 18

What involves the automated arrangement, coordination, and management of various systems components that enable a user to make a service request using the self-service portal?

A.

Orchestrated service catalog updates

B.

Automated service catalog management

C.

Automated portfolio management

D.

Orchestrated service delivery

Full Access
Question # 19

What is a characteristic of a best-of-breed infrastructure?

A.

Provides limited flexibility to choose components

B.

Prevents vendor lock-in

C.

Provides single management software to control multi-vendor components

D.

Requires less time to integrate all the components to build as an appliance

Full Access
Question # 20

Which is true about a type 2 hypervisor?

A.

Installed as an application on an operating system

B.

Installed on bare-metal hardware

C.

Hypervisor vendor must certify the hardware

Full Access
Question # 21

What is true about change management?

A.

Defines SLA compliance

B.

Triggers alerts

C.

Monitors compliance

Full Access
Question # 22

What is true of a cloud service design best practice?

A.

Services should be readily available and dependent on one another.

B.

Services are inherently more complex and reduce administrative costs.

C.

Services should operate dependently.

D.

Services must be loosely coupled.

Full Access
Question # 23

An organization wants to deliver applications quickly and effectively. They believe that it is the only way to stay competitive in this ever-changing digital world. The organization wants to adopt practices that promote collaboration across teams during various phases of the software development lifecycle.

Which practice will meet the organization’s requirements?

A.

Continuous Integration

B.

Waterfall model

C.

DevOps

D.

Continuous Delivery

Full Access
Question # 24

What is a benefit of the active-active cluster implementation?

A.

Enhances performance and availability of a service

B.

Lower total cost of ownership for providing services

C.

Improves security of application running on the cluster

D.

Ability to run multiple services on one physical compute system

Full Access
Question # 25

Which are core attributes to a modern infrastructure?

A.

Adaptable, software-defined, and scale-out

B.

Resilient, scale-out, and cloud-enabled

C.

Flash, software-defined, and cloud-enabled

D.

Consolidation, flash, and scale-out

Full Access
Question # 26

What is a benefit of synchronous remote replication?

A.

Saves network bandwidth by replicating only deduplicated data

B.

Replicates data across any geographic location without impacting response time

C.

Ensures that source and replica always have identical data

D.

Supports repeated write I/O to the same location to improve replication performance

Full Access
Question # 27

What is an example of OS hardening?

A.

Deleting unused programs and installing current updates

B.

Changing OS frequently to run applications

C.

Encrypting application data at rest

D.

Disallowing unauthorized modifications to application settings

Full Access
Question # 28

What does a service attribute specify?

A.

Relationships between services

B.

Configurations of service components

C.

Structure of a service

Full Access
Question # 29

How is a container different from a virtual machine?

A.

Containers are stateful.

B.

Virtual machines are transportable.

C.

Virtual machines start faster.

D.

Containers share an operating system.

Full Access
Question # 30

What is a function of a cloud portal?

A.

Updates IT resources database

B.

Replicates container resources in a web portal

C.

Interacts with the orchestration layer

D.

Creates workflows for automated scheduling

Full Access
Question # 31

What is a benefit of link aggregation?

A.

Saves bandwidth by restricting traffic to a specific potentially congested ISL

B.

Improves performance by combining two or more parallel ISLs into a single physical ISL

C.

Optimizes fabric performance by distributing network traffic across ISL

D.

Improves ISL utilization by increasing the network traffic on a specific ISL

Full Access
Question # 32

A customer has expressed an interest in using AI or ML to obtain improved data analytics from their PowerEdge servers and PowerMax storage.

Which product can identify deviations and performance impacts?

A.

CloudIQ

B.

eLAB Navigator

C.

SyncIQ

D.

Storage Manager

Full Access
Question # 33

What is a key responsibility of a security governance board?

A.

Defining the cloud service catalog

B.

Assessing assets with realistic valuations

C.

Assessing the cloud provider’s capability to provide logs

D.

Defining access rights for users

Full Access
Question # 34

What is a key function of service operation management?

A.

Analyze customer feedback.

B.

Perform market research.

C.

Enable problem resolution.

D.

Establish pricing and budgeting

Full Access
Question # 35

Which backup service deployment is utilized when a backup is performed in a consumer location and then the backup data is sent to the cloud for DR purpose?

A.

Remote Backup Service

B.

Cloud-to-cloud Backup Service

C.

Managed Backup Service

D.

Replication Backup Service

Full Access
Question # 36

Which role is responsible for designing, planning, managing, maintaining, and supporting the cloud infrastructure when transforming IT?

A.

Cloud DevOps Engineer

B.

Cloud Automation Engineer

C.

Cloud Architect

D.

Cloud Engineer

Full Access