New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment?

A.

Service demand management

B.

Service capacity management

C.

Service portfolio management

D.

Service operation management

What activity is performed during the service creation phase of the cloud service lifecycle?

A.

Defining Service Template

B.

Developing Service Enablement Roadmap

C.

Assessing Service Requirements

D.

Establishing Billing Policy

What condition can result in the development of a "shadow IT" organization?

A.

Lack of cloud extensibility inside an organization

B.

Increasing number of end user devices and different access points

C.

Bypassing of internal IT and looking elsewhere for IT services

D.

Aging facilities, and outdated policies and technology

Which data storage type uses a non-hierarchical address space to store data?

A.

Block

B.

Object

C.

File

Which type of cloud tool controls resources such as compute, storage, and network?

A.

Management and operation

B.

Automation and orchestration

C.

Collaboration and communication

D.

Monitoring and alerting

How is application functionality segmented when using a microservices approach in an application development environment?

A.

Dependent and tightly coupled services

B.

Independent and tightly coupled services

C.

Dependent and loosely coupled services

D.

Independent and loosely coupled services

What is a benefit of synchronous remote replication?

A.

Saves network bandwidth by replicating only deduplicated data

B.

Replicates data across any geographic location without impacting response time

C.

Ensures that source and replica always have identical data

D.

Supports repeated write I/O to the same location to improve replication performance

Which platform provides a converged infrastructure solution?

A.

VxRail

B.

PowerStore

C.

VxBlock

D.

PowerFlex

What are the benefits of modern applications compared to traditional applications?

A.

Designed to run independently and use a linear, continuous approach in development, build, test, and deploy

B.

Distributed system architecture, designed to run independently, and use multiple programming languages

C.

Single programming language and framework and scale by growing vertically

D.

Monolithic, built with interdependent modules, and use distributed system architecture

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth