Explanation: QUESTIO NO: 126
What activity is performed during the service planning phase of the cloud service lifecycle?
A. Discovering Service Assets
B. Developing Service Enablement Roadmap
C. Defining Orchestration Workflow
D. Defining Service Offering
Answer: B
QUESTIO NO: 127
Why are businesses undergoing digital transformation?
A. To avoid security risks
B. To meet regulatory requirements
C. To increase revenue
D. To innovate more quickly
Answer: C
QUESTIO NO: 128
Identify the strategy that uses layer-based approach to protect the cloud environment
A. Secure multitenancy
B. Trusted computing base
C. Information assurance framework
D. Defense-in-depth
Answer: D
QUESTIO NO: 129
What is the objective of integrity in information security?
A. Ensure secrecy of stored information
B. Ensure timely and reliable access to resources
C. Ensure users are responsible for actions executed
D. Ensure data protection against unauthorized alterations
Answer: D
QUESTIO NO: 130
What is the goal of governance?
A. Adhere to government laws and regulations.
B. Establish the likelihood of threat occurrence.
C. Identify gaps in the ability to stand-up cloud services
D. Identify internal and external vulnerabilities.
Answer: C
QUESTIO NO: 131
Which cloud standard provides organizations with the required structure, detail, and clarity related to information security, personalized to the cloud industry?
A. CCM CSA
B. HITRUST
C. PCI DSS
D. HIPAA
Answer: A
QUESTIO NO: 133
What is a common characteristic of organizations that have adopted modern applications to unlock digital business advantage?
A. They leverage only the public cloud to develop and deploy applications
B. They leverage only their internal IT infrastructure to develop and deploy applications.
C. They help to increase insight, market reach, and customer satisfaction
D. They focus on meeting internal users' demands rather than satisfying their customers.
Answer: C
QUESTIO NO: 134
Which cloud standard guides who should implement which type of security control in the cloud supply chain?
A. HIPAA
B. CCM
C. PCI DSS
D. HITRUST
Answer: B
QUESTIO NO: 135
Which enables consumer to unilaterally provision computing capabilities, such as virtual machines, networks, and storage, as needed automatically without requiring human interaction with each service provide?
A. Broad network access
B. On-demand self-service
C. Resource pooling
D. Rapid elasticity
Answer: B
QUESTIO NO: 136
To implement a new service desk management tool, the capacity of the servers has to be extended. Who is responsible for managing the request for additional capacity
A. Change Manager
B. Capacity Manager
C. Financial Manager
D. Service Level Manager
Answer: A
QUESTIO NO: 138
What brings in people from different business units having expertise in different areas to work together to achieve a common goal
A. Automation
B. Training
C. New roles
D. Cross-Functional team
Answer: D
QUESTIO NO: 139
What is a benefit of the software-defined approach for managing resources?
A. Enables automated arrangement and coordination of system functions to manage cloud services
B. Provides a framework to list services, attributes of services, service-level commitments, terms, and conditions for service provisioning
C. Provides a set of component functions that can be called from a software component to interact with other software components
D. Enables unified and centralized management of IT resources
Answer: D
QUESTIO NO: 140
What is the function of a software-defined network controller?
A. Provides instructions for the data plane to handle network traffic based on external management interactions
B. Provides instructions for the control plane to handle network traffic based on policies
C. Provides instructions for the data plane to handle network traffic based on policies
D. Provides instructions for the control plane to handle network traffic based on external management interactions
Answer: C
QUESTIO NO: 141
Which Dell EMC product provides archiving software that helps organizations to archive aging emails and files to appropriate storage tiers?
A. SourceOne
B. RecoverPoint
C. NetWorker
D. Avamar
Answer: A
QUESTIO NO: 142
Which service operation management activity provides visibility into the cloud infrastructure and deployed cloud services?
A. Change management
B. Incident management
C. Monitoring
D. Reporting
Answer: C
QUESTIO NO: 143
What allows an orchestrator to interact with other software components and devices in a cloud infrastructure?
A. Application programming interface
B. Unified manager
C. Service template
D. Cloud portal
Answer: A
QUESTIO NO: 144
Which cloud service objective determines the privileges that a user has to access a particular service or a resource in a cloud computing environment?
A. Authorization
B. Accounting
C. Confidentiality
D. Authentication
Answer: A
QUESTIO NO: 145
Which is an example of a people transformation activity?
A. Automation of IT tasks that reduces manpower needs
B. Communication between IT staff and business leaders
C. Adoption of a standard framework such as ITL
D. Adoption of a modern IT infrastructure
Answer: B
QUESTIO NO: 147
Which Dell product is a converged infrastructure solution?
A. VxBlock
B. Unity XT
C. PowerEdge
D. PowerMax
Answer: A
QUESTIO NO: 148
What is the function of problem management?
A. Document incident history used as input for change management
B. Detect and record all incidents in the cloud infrastructure
C. Track service degradation periods to check for SLA violations
D. Prevent incidents that share common symptoms from occurring
Answer: D
QUESTIO NO: 149
An organization has a private cloud infrastructure. They want to leverage the capabilities of a public cloud by using the hybrid cloud model.
A. Auth
B. Zoning
C. Sandbox
D. VPN
Answer: D
QUESTIO NO: 150
When does an incident turn into a problem?
A. If the incident is raised by an internal customer
B. If the incident is not addressable by the incident management team
C. If the incident is raised by an external customer
D. If incident is critical and needs immediate attention
Answer: B
QUESTIO NO: 151
What is a characteristic of traditional applications?
A. Support only multi-tier architecture
B. Monolithic architecture
C. Availability is managed only by the application
D. Horizontally scalable
Answer: B
QUESTIO NO: 152
What is the purpose of a configuration management tool?
A. Enable automation and coordination of building multiple components and collectively tested as a system
B. Enable testing of individual components of the service and infrastructure
C. Enable automatic provisioning of infrastructure or services
D. Enable the construction of the individual components of a service or infrastructure based on predefined scripts
Answer: C
QUESTIO NO: 153
Which cloud actor provides connectivity and communication of cloud services between the provider and the consumer?
A. Cloud Auditor
B. Cloud Broker
C. Cloud Dealer
D. Cloud Carrier
Answer: D
QUESTIO NO: 154
Which provides resilience and is preferred when a small or non-impacting amount of service disruption is acceptable?
A. Fault Isolation
B. Fault Recovery
C. High Availability
D. Defense in Depth
Answer: C
QUESTIO NO: 155
Which data protection solution enables direct backup from primary storage?
A. Dell EMC ProtectPoint
B. Dell EMC Data Domain
C. Dell EMC Avamar
D. Dell EMC NetWorker
Answer: A
QUESTIO NO: 156
Which mechanism restricts external users from accessing an organization's internal IT resources while still allowing the organization's application server to access internal IT resources?
A. Demilitarized zones
B. Virtual private network
C. Intrusion detection
D. Digital signatures
Answer: A
QUESTIO NO: 157
Which functionality ensures that cloud services are delivered effectively and efficiently?
A. Service Catalog Management
B. Service Operation Management
C. Service Financial Management
D. Service Portfolio Management
Answer: B
QUESTIO NO: 158
Which attribute of modern infrastructure provide the benefit of automated provisioning and business agility?
A. Software-Defined
B. Flash
C. Scale-Up
D. Scale-Out
Answer: A