Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is used to update information in a configuration management database?

A.

Discovery tool

B.

Capacity management tool

C.

Configuration manager

D.

Performance management tool

What is the goal of lean practices in a software development methodology?

A.

Develop software using 12-Factor modern application practices

B.

Create quality software with the minimum number of team members

C.

Develop and deploy software using third platform technologies

D.

Create quality software in the shortest time period at the lowest cost

What describes network-attached storage (NAS)?

A.

File storage that stores data in the form of objects based on the content and other attributes of the data

B.

Dedicated file server that maintains the mapping between the object IDs and the file system namespace

C.

Storage system used for creation and assignment of block storage volumes to compute systems

D.

High-performance file server that either has integrated storage or is connected to external storage

What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Adopters

D.

Digital Leaders

A consumer is interested in a service that provides multiple operating systems and programming frameworks for application development and deployment.

Which cloud service model meets these requirements?

A.

Storage as a Service

B.

Platform as a Service

C.

Software as a Service

D.

Data as a Service

What is the correct sequence of steps in the service catalog design and implementation process?

What is the correct order of the business continuity plan principles?

What is true about change management?

A.

Defines SLA compliance

B.

Triggers alerts

C.

Monitors compliance

Which risk management process is in the correct order

A.

Monitoring, Risk identification, Risk mitigation, Risk assessment.

B.

Risk identification, Risk assessment, Monitoring, Risk mitigation

C.

Monitoring, Risk identification, Risk assessment, Risk mitigation.

D.

Risk Identification, Risk assessment, Risk mitigation, Monitoring

Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?

A.

Virtual machine hardening

B.

Application hardening

C.

Operating system hardening

D.

Hypervisor hardening