Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

EMC DEA-2TT4 Dumps

Page: 1 / 12
Total 122 questions

Associate - Cloud Infrastructure and Services v4 Exam Questions and Answers

Question 1

Which two are key requirements for fault tolerance?

Options:

A.

Document SPOF and Fault Elimination

B.

Fault Isolation and Eliminate SPOF

C.

Network Isolation and Eliminate SPOF

D.

RAID Storage and Fault Isolation

Question 2

Which defines the maximum amount of data loss that can be tolerated by a business following a disaster?

Options:

A.

MTBF

B.

RPO

C.

RTO

D.

MTTR

Question 3

Which storage data protection technique provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

Options:

A.

Erasure coding

B.

Cache protection

C.

RAID

D.

Dynamic disk sparing

Question 4

Which backup service deployment is utilized when a backup is performed in a consumer location and then the backup data is sent to the cloud for DR purpose?

Options:

A.

Remote Backup Service

B.

Cloud-to-cloud Backup Service

C.

Managed Backup Service

D.

Replication Backup Service

Question 5

What is an advantage of asynchronous remote replication?

Options:

A.

Ensures source LUN and replica have identical data at all times

B.

Supports replication across any geographic location without impacting response time

C.

Provides a near zero recovery point objective without impacting response time

D.

Requires less storage space for the replica than the source LUN

Question 6

What is an example of OS hardening?

Options:

A.

Deleting unused programs and installing current updates

B.

Changing OS frequently to run applications

C.

Encrypting application data at rest

D.

Disallowing unauthorized modifications to application settings

Question 7

Which Dell Technologies product can automate and centralize the collection and analysis of data across physical and virtual environments?

Options:

A.

NetWorker

B.

Data Protection Advisor

C.

SourceOne

D.

Avamar

Question 8

What is true about change management?

Options:

A.

Defines SLA compliance

B.

Triggers alerts

C.

Monitors compliance

Question 9

Which compute system component contains boot firmware?

Options:

A.

Operating System

B.

Hard Disk Drive

C.

Read Only Memory

D.

Random Access Memory

Question 10

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

Options:

A.

Service Planning

B.

Service Creation

C.

Service Operation

D.

Service Termination

Question 11

What helps to recover the cost of providing the service, ensuring profitability, and meeting the provider’s return on investment and reinvestment goals?

Options:

A.

Service negotiation

B.

Service level objective

C.

Service valuation

D.

Service level agreement

Question 12

Which cloud role has the responsibility to perform independent cloud service assessments?

Options:

A.

Architect

B.

Broker

C.

Consumer

D.

Auditor

Question 13

What activity is performed during the service planning phase of the cloud service lifecycle?

Options:

A.

Defining Orchestration Workflow

B.

Discovering Service Assets

C.

Developing Service Proposal

D.

Defining Service Offering

Question 14

Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment?

Options:

A.

Service demand management

B.

Service capacity management

C.

Service portfolio management

D.

Service operation management

Question 15

Which service operation management activity expedites and restores cloud services to normal operations when unplanned events cause an interruption to services?

Options:

A.

Change Management

B.

Capacity Management

C.

Configuration Management

D.

Incident Management

Question 16

What is a benefit of secure multitenancy?

Options:

A.

Reduces unauthorized access to resources

B.

Blocks unauthorized access to resources

C.

Eliminates data breach risks

D.

Protects cloud infrastructure

Question 17

Which is a lightweight, stand-alone, executable package that consists of whole runtime environment to execute the application?

Options:

A.

Container

B.

Orchestrator

C.

Hypervisor

D.

Microservice

Question 18

Which APEX custom solution allows customers to choose their hardware, software, services, capacity, and offers usage-based payments?

Options:

A.

Flex on Demand

B.

Data Center Utility

C.

Backup Services

D.

Private and Hybrid Cloud

Question 19

Which concept ensures accountability for security breaches or misuse of resources?

Options:

A.

Compliance

B.

Governance

C.

Risk management

Question 20

What is true about application virtualization?

Options:

A.

Resolves application conflicts and compatibility issues

B.

Allows for OS modifications on host machines

C.

Prevents the use of conflicting applications on the same end-point device

D.

Increases the complexity of application deployment

Question 21

What is the primary goal of a business continuity solution?

Options:

A.

Reduce the amount of investment in protecting an organization’s business-related data

B.

Decreases likelihood of a disaster in a data protection environment to control the loss of data

C.

Ensure data availability that is required to conduct vital business operations

D.

Eliminate security threats in a data protection environment for continuous access to data

Question 22

Which type of cloud tool controls resources such as compute, storage, and network?

Options:

A.

Management and operation

B.

Automation and orchestration

C.

Collaboration and communication

D.

Monitoring and alerting

Question 23

Why do organizations take advantage of virtual infrastructure?

Options:

A.

Require more data center space -

Resource underprovisioning -

Organizations have overutilized resources

B.

Organizations have underutilized resources

Ability to overprovision resources

Require more data center space

C.

Require no data center space -

Organizations have underutilized resources

Ability to overprovision resources

D.

Resource underprovisioning -

Organizations have overutilized resources

Require no data center space

Question 24

What term refers to the entry points from which an attack can be launched?

Options:

A.

Attack surface

B.

Attack factor

C.

Attack vector

Question 25

Which programmatically integrates and sequences various system functions into automated workflows for executing higher-level service provisioning and management functions?

Options:

A.

Self-service portal

B.

Application Programming Interface

C.

Orchestrator

D.

Service Catalog

Question 26

An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient.

Which cloud characteristic enables the consumer to handle such variations in workloads and IT resource requirements?

Options:

A.

Resource pooling

B.

On-demand self-service

C.

Rapid elasticity

Question 27

What is a benefit of synchronous remote replication?

Options:

A.

Saves network bandwidth by replicating only deduplicated data

B.

Replicates data across any geographic location without impacting response time

C.

Ensures that source and replica always have identical data

D.

Supports repeated write I/O to the same location to improve replication performance

Question 28

Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?

Options:

A.

Virtual machine hardening

B.

Application hardening

C.

Operating system hardening

D.

Hypervisor hardening

Question 29

Which type of attack can be controlled by imposing restrictions and limiting on-network resource consumption?

Options:

A.

Advanced persistent threat

B.

Phishing

C.

Side-channel

D.

Distributed denial of service

Question 30

Which component presents service catalog and cloud interfaces, enabling consumers to order and manager cloud services?

Options:

A.

Cloud Operating System

B.

Orchestor

C.

Cloud Portal

D.

Service automation

Question 31

What type of cloud security control is log auditing?

Options:

A.

Detective control

B.

Corrective control

C.

Preventive control

D.

Technical control

Question 32

An organization must deploy remote replication between two sites that are 1200 km (745 miles) apart, without impacting application response time.

Which solution should be recommended?

Options:

A.

Hypervisor-based synchronous replication

B.

Synchronous replication

C.

Asynchronous replication

Question 33

What is a characteristic of a converged infrastructure?

Options:

A.

Eliminates CAPEX

B.

Eliminates OPEX

C.

Does not require a separate storage array

D.

Enables rapid scalability

Question 34

Which risk management process is in the correct order

Options:

A.

Monitoring, Risk identification, Risk mitigation, Risk assessment.

B.

Risk identification, Risk assessment, Monitoring, Risk mitigation

C.

Monitoring, Risk identification, Risk assessment, Risk mitigation.

D.

Risk Identification, Risk assessment, Risk mitigation, Monitoring

Question 35

Identify the bare-metal hypervisors?

Options:

A.

Solaris Zones and VMware Workstation

B.

ESXI and Hyper-V

C.

ESXI and VMware Fusion

D.

Oracle Virtual Box and Hyper-V

Question 36

What activity is included in a compliance checklist when moving data to the cloud?

Options:

A.

Determine if appropriate governance processes are available to meet consumers' requirements

B.

Ensure that IT infrastructure and data adhere to specific rules and regulations

C.

Review the financial stability of the provider to ensure its longevity

D.

Review and evaluate the usage of encryption to protect consumers' data

Page: 1 / 12
Total 122 questions