Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The migration of data from Cloud Pak for Business Automation versions that do not support an upgrade require an Administrator to follow which process?

A.

All Cloud Pak for Business Automation versions currently support a direct upgrade with the standard applicable procedures.

B.

Uninstall the current deployment and follow the migration instructions for each component to point to the existing persistent stores.

C.

Upgrade the core capabilities first, then the Cloud Pak for Business Automation Operator, followed by the Foundation Operator.

D.

Mirror the existing persistent stores allowing the Operator to upgrade accordingly.

Full Access
Question # 5

What is the benefit of using the Rsyslog Sidecar?

A.

Offers easy adoption of audit logging and shifts the burden of transmitting the messages to the sidecar.

B.

Multiple deployments of audit logging controller policies.

C.

Ability to run a service and the rsyslog sidecar in the separate namespace as the fluentd instance.

D.

More flexibility as to the format structure of the audit logs which can support JSON, XML, and YAML.

Full Access
Question # 6

Once a starter deployment of the Cloud Pak for Business Automation is installed, where can access to the different capability services and applications be found?

A.

By opening a terminal to the ibm-cp4a-operator pod and open the /opt/ibm/cp4ba-access.txt file.

B.

By opening a config map which contains the route URL to access the components and a secret which contains the credentials to use with the different URLs.

C.

By opening a config map which contains the route URL to access the components as well as the username and password to use with the URL in clear text.

D.

By opening the cpd-access route, which leads to a page that lists the components URLs, usernames and passwords to use.

Full Access
Question # 7

Which statement is true concerning secrets on Kubernetes master (API server)?

A.

Secrets are by default encrypted at rest.

B.

Extra steps are needed to encrypt secrets at rest.

C.

Secrets only transit through Kubernetes master; encryption at rest is out of its responsibilities.

D.

Secrets are self-secured needing no encryption at rest.

Full Access
Question # 8

Which two steps are required to install Operational Decision Manager Standalone CNCF for production?

A.

Prune existing deployment snapshots from the database.

B.

Download the container images.

C.

Delete the container registry image pull secret.

D.

Add the resAdmin user to the IBM Entitled registry.

E.

Download the archive from IBM Passport Advantage (PPA) to get the Helm chart.

Full Access
Question # 9

Where do the images reside for an air-gapped Cloud Pak for Business Automation upgrade?

A.

IBM registry

B.

RedHat quay.io registry

C.

Local registry

D.

Docker Hub

Full Access