Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

A.

Service Creation

B.

Service Operation

C.

Service Termination

D.

Service Planning

What term refers to the entry points from which an attack can be launched?

A.

Attack surface

B.

Attack factor

C.

Attack vector

What workflow software enables automation of complex IT tasks?

A.

Dell EMC ScalelO

B.

VMware vRealize Orchestrator

C.

VMware HA

D.

Dell EMC XtremlO

An administrator must design a fault-tolerant IT environment for applications.

Which techniques meet this requirement?

A.

Active/Passive for Compute -

NIC Teaming for Network -

Dual disks for storage

B.

Active/Active for Compute -

Link Aggregation for Network -

Erasure Coding for storage

C.

Active/Passive for Compute -

Spanning for Network -

Dynamic Disk Sparing for storage

D.

Active/Standby for Compute -

Multipathing for Network -

RAID for storage

How is application functionality segmented when using a microservices approach in an application development environment?

A.

Dependent and tightly coupled services

B.

Independent and tightly coupled services

C.

Dependent and loosely coupled services

D.

Independent and loosely coupled services

What is a benefit of application virtualization?

A.

Allows inclusion of standard applications into an end-point image

B.

Eliminates the need for OS modifications

C.

Enables online data migrations between storage systems