Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What term describes the ability of a system to continue functioning, even when a few of its components fail?

A.

Checkpointing

B.

Disaster recovery

C.

Fault tolerance

D.

Replication

What activity is performed during the service planning phase of the cloud service lifecycle?

A.

Defining Orchestration Workflow

B.

Discovering Service Assets

C.

Developing Service Proposal

D.

Defining Service Offering

Which is a benefit of implementing target-based deduplication?

A.

Offloads the backup client from the deduplication process

B.

Reduces storage capacity and network bandwidth requirements

C.

Backup client sends only new and unique segments across the network

D.

Optimizes ROBO environments for centralized backup

What does the management interface in a cloud portal enable consumers to do?

A.

Interact with the business application using a graphical user interface.

B.

Code, compile, and run their applications on the cloud platform.

C.

Modify, start, and stop rented service instances without manual interaction with the service provider.

D.

Perform computing activities by presenting the functional content of a service instance.

What type of infrastructure is defined as, "All the sources are bundled together and virtualized?

A.

Software-Defined

B.

Hyper-Converged

C.

Converged

What is a key function of service operation management?

A.

Analyze customer feedback.

B.

Perform market research.

C.

Enable problem resolution.

D.

Establish pricing and budgeting

Which service operation management activity expedites and restores cloud services to normal operations when unplanned events cause an interruption to services?

A.

Change Management

B.

Capacity Management

C.

Configuration Management

D.

Incident Management

Which cloud role has the responsibility to perform independent cloud service assessments?

A.

Architect

B.

Broker

C.

Consumer

D.

Auditor

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth

Which type of attack can be controlled by imposing restrictions and limiting on-network resource consumption?

A.

Advanced persistent threat

B.

Phishing

C.

Side-channel

D.

Distributed denial of service