Exam4Training

DELL EMC DEA-2TT4 Associate – Cloud Infrastructure and Services v4 Online Training

Question #1

What type of cloud security control is log auditing?

  • A . Detective control
  • B . Corrective control
  • C . Preventive control
  • D . Technical control

Reveal Solution Hide Solution

Correct Answer: A
Question #2

Which risk management step deploys various security mechanisms that minimize risks impacts?

  • A . Identification
  • B . Mitigation
  • C . Assessment
  • D . Monitoring

Reveal Solution Hide Solution

Correct Answer: B
Question #3

Which cloud security design principle prevents an individual from improper access or system misuse?

  • A . Least privilege
  • B . Data privacy and ownership
  • C . Separation of duties
  • D . Secure multitenancy

Reveal Solution Hide Solution

Correct Answer: C
Question #4

Which function collects information about competing service offerings?

  • A . Service performance management
  • B . Service portfolio management
  • C . Service operations management
  • D . Service demand management

Reveal Solution Hide Solution

Correct Answer: B
Question #5

Which compute system component contains boot firmware?

  • A . Operating System
  • B . Hard Disk Drive
  • C . Read Only Memory
  • D . Random Access Memory

Reveal Solution Hide Solution

Correct Answer: C
Question #6

What is the primary goal of a business continuity solution?

  • A . Reduce the amount of investment in protecting an organization’s business-related data
  • B . Decreases likelihood of a disaster in a data protection environment to control the loss of data
  • C . Ensure data availability that is required to conduct vital business operations
  • D . Eliminate security threats in a data protection environment for continuous access to data

Reveal Solution Hide Solution

Correct Answer: C
Question #7

An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient.

Which cloud characteristic enables the consumer to handle such variations in workloads and IT resource requirements?

  • A . Resource pooling
  • B . On-demand self-service
  • C . Rapid elasticity

Reveal Solution Hide Solution

Correct Answer: C
Question #8

Which is true about a type 2 hypervisor?

  • A . Installed as an application on an operating system
  • B . Installed on bare-metal hardware
  • C . Hypervisor vendor must certify the hardware

Reveal Solution Hide Solution

Correct Answer: A
Question #9

What is a benefit of link aggregation?

  • A . Saves bandwidth by restricting traffic to a specific potentially congested ISL
  • B . Improves performance by combining two or more parallel ISLs into a single physical ISL
  • C . Optimizes fabric performance by distributing network traffic across ISL
  • D . Improves ISL utilization by increasing the network traffic on a specific ISL

Reveal Solution Hide Solution

Correct Answer: C
Question #10

What enables resource pooling and multi-tenancy in a cloud environment?

  • A . Rapid elasticity
  • B . On-demand provisioning
  • C . Scalability
  • D . Virtualization

Reveal Solution Hide Solution

Correct Answer: D

Question #11

Which tool should be recommended to customers for Infrastructure automation?

  • A . GitHub
  • B . Docker
  • C . Chef
  • D . JARVIS

Reveal Solution Hide Solution

Correct Answer: C
Question #12

An organization must deploy remote replication between two sites that are 1200 km (745 miles) apart, without impacting application response time.

Which solution should be recommended?

  • A . Hypervisor-based synchronous replication
  • B . Synchronous replication
  • C . Asynchronous replication

Reveal Solution Hide Solution

Correct Answer: C
Question #13

DRAG DROP

What is the correct sequence of steps in the service catalog design and implementation process?

Reveal Solution Hide Solution

Correct Answer:

Explanation:


Question #13

DRAG DROP

What is the correct sequence of steps in the service catalog design and implementation process?

Reveal Solution Hide Solution

Correct Answer:

Explanation:


Question #13

DRAG DROP

What is the correct sequence of steps in the service catalog design and implementation process?

Reveal Solution Hide Solution

Correct Answer:

Explanation:


Question #13

DRAG DROP

What is the correct sequence of steps in the service catalog design and implementation process?

Reveal Solution Hide Solution

Correct Answer:

Explanation:


Question #13

DRAG DROP

What is the correct sequence of steps in the service catalog design and implementation process?

Reveal Solution Hide Solution

Correct Answer:

Explanation:


Question #18

Why do organizations take advantage of virtual infrastructure?

  • A . Require more data center space –
    Resource underprovisioning –
    Organizations have overutilized resources
  • B . Organizations have underutilized resources
    Ability to overprovision resources
    Require more data center space
  • C . Require no data center space –
    Organizations have underutilized resources
    Ability to overprovision resources
  • D . Resource underprovisioning –
    Organizations have overutilized resources
    Require no data center space

Reveal Solution Hide Solution

Correct Answer: B
Question #19

What helps to recover the cost of providing the service, ensuring profitability, and meeting the provider’s return on investment and reinvestment goals?

  • A . Service negotiation
  • B . Service level objective
  • C . Service valuation
  • D . Service level agreement

Reveal Solution Hide Solution

Correct Answer: C
Question #20

Which type of cloud tool controls resources such as compute, storage, and network?

  • A . Management and operation
  • B . Automation and orchestration
  • C . Collaboration and communication
  • D . Monitoring and alerting

Reveal Solution Hide Solution

Correct Answer: B

Question #21

What provides workflows for performing automated tasks to accomplish a desired outcome?

  • A . Cloud services
  • B . Orchestration
  • C . Software defined infrastructure
  • D . Virtual infrastructure

Reveal Solution Hide Solution

Correct Answer: B
Question #22

An administrator must design a fault-tolerant IT environment for applications.

Which techniques meet this requirement?

  • A . Active/Passive for Compute –
    NIC Teaming for Network –
    Dual disks for storage
  • B . Active/Active for Compute –
    Link Aggregation for Network –
    Erasure Coding for storage
  • C . Active/Passive for Compute –
    Spanning for Network –
    Dynamic Disk Sparing for storage
  • D . Active/Standby for Compute –
    Multipathing for Network –
    RAID for storage

Reveal Solution Hide Solution

Correct Answer: B
Question #23

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?

  • A . Integrity
  • B . Authorization
  • C . Authentication
  • D . Confidentiality

Reveal Solution Hide Solution

Correct Answer: D
Question #24

What activity is performed during the service creation phase of the cloud service lifecycle?

  • A . Defining Service Template
  • B . Developing Service Enablement Roadmap
  • C . Assessing Service Requirements
  • D . Establishing Billing Policy

Reveal Solution Hide Solution

Correct Answer: C
Question #25

Which two are key requirements for fault tolerance?

  • A . Document SPOF and Fault Elimination
  • B . Fault Isolation and Eliminate SPOF
  • C . Network Isolation and Eliminate SPOF
  • D . RAID Storage and Fault Isolation

Reveal Solution Hide Solution

Correct Answer: B
Question #26

What is a benefit of synchronous remote replication?

  • A . Saves network bandwidth by replicating only deduplicated data
  • B . Replicates data across any geographic location without impacting response time
  • C . Ensures that source and replica always have identical data
  • D . Supports repeated write I/O to the same location to improve replication performance

Reveal Solution Hide Solution

Correct Answer: C
Question #27

Which key service management function modifies and aligns services according to consumer needs in the cloud environment?

  • A . Service operation management
  • B . Service demand management
  • C . Service capacity management
  • D . Service portfolio management

Reveal Solution Hide Solution

Correct Answer: D
Question #28

What is a benefit of application virtualization?

  • A . Allows inclusion of standard applications into an end-point image
  • B . Eliminates the need for OS modifications
  • C . Enables online data migrations between storage systems

Reveal Solution Hide Solution

Correct Answer: B
Question #29

Which cloud role has the responsibility to perform independent cloud service assessments?

  • A . Architect
  • B . Broker
  • C . Consumer
  • D . Auditor

Reveal Solution Hide Solution

Correct Answer: D
Question #30

What refers to an agreement between provider and consumer that states the terms of service usage?

  • A . Service contract
  • B . Service template
  • C . Chargeback
  • D . Showback

Reveal Solution Hide Solution

Correct Answer: A

Question #31

What is a benefit of cloud automation?

  • A . Reduced service provisioning time
  • B . Improved physical infrastructure deployment time
  • C . Decreased capital expense

Reveal Solution Hide Solution

Correct Answer: A
Question #32

What is a key responsibility of a security governance board?

  • A . Defining the cloud service catalog
  • B . Assessing assets with realistic valuations
  • C . Assessing the cloud provider’s capability to provide logs
  • D . Defining access rights for users

Reveal Solution Hide Solution

Correct Answer: D
Question #33

A development group is using an iterative and incremental software development method.

Which standard is being utilized?

  • A . Agile
  • B . ITIL
  • C . DevOps
  • D . Orchestration

Reveal Solution Hide Solution

Correct Answer: A
Question #34

Which storage data protection technique provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

  • A . Erasure coding
  • B . Cache protection
  • C . RAID
  • D . Dynamic disk sparing

Reveal Solution Hide Solution

Correct Answer: A
Question #35

Which is a characteristic of the chargeback model?

  • A . Financial systems require agent plug-in.
  • B . Service costs reporting to the business.
  • C . Customers are billed for services that are consumed.

Reveal Solution Hide Solution

Correct Answer: C
Question #36

What is the objective of Confidentiality in information security?

  • A . Prevents an unauthorized user from changing data
  • B . Non-repudiation and authenticity of information
  • C . Ensures that identify credentials are used to verify cloud assets
  • D . Restricts user access to data held within the cloud

Reveal Solution Hide Solution

Correct Answer: D
Question #37

An organization has deployed a cloud infrastructure. They frequently experience power outages that result in their service offerings being periodically unavailable.

What type of unavailability are they experiencing?

  • A . Ephemeral
  • B . Permanent
  • C . Intermittent

Reveal Solution Hide Solution

Correct Answer: C
Question #38

A cloud service provider must improve the utilization of resources by sharing them with multiple customers.

What mechanism should the cloud provider deploy to prevent one consumer from accessing the virtual machines of another consumer?

  • A . Distributed switching
  • B . Secure multitenancy
  • C . Pooling of resources
  • D . Raw disk mapping

Reveal Solution Hide Solution

Correct Answer: B
Question #39

Which platform provides a converged infrastructure solution?

  • A . VxRail
  • B . PowerStore
  • C . VxBlock
  • D . PowerFlex

Reveal Solution Hide Solution

Correct Answer: C
Question #40

What is a characteristic of a converged infrastructure?

  • A . Eliminates CAPEX
  • B . Eliminates OPEX
  • C . Does not require a separate storage array
  • D . Enables rapid scalability

Reveal Solution Hide Solution

Correct Answer: D

Question #41

What does a service attribute specify?

  • A . Relationships between services
  • B . Configurations of service components
  • C . Structure of a service

Reveal Solution Hide Solution

Correct Answer: B
Question #42

DRAG DROP

What is the correct order of the business continuity plan principles?

Reveal Solution Hide Solution

Correct Answer:


Question #43

What are the key functions of a control plane?

  • A . User and role access –
    Configuration baselines –
    Services execution
  • B . Configuration messaging –
    Statistics –
    Status
  • C . Asset discovery –
    Resource abstraction and pooling
    Resource provisioning
  • D . Data processing –
    Asset discovery –
    Resource abstraction and pooling

Reveal Solution Hide Solution

Correct Answer: B
Question #44

Which is a benefit of implementing target-based deduplication?

  • A . Offloads the backup client from the deduplication process
  • B . Reduces storage capacity and network bandwidth requirements
  • C . Backup client sends only new and unique segments across the network
  • D . Optimizes ROBO environments for centralized backup

Reveal Solution Hide Solution

Correct Answer: A
Question #45

Which condition triggers a warning level alert?

  • A . Service has failed.
  • B . Service has been created.
  • C . Service instance is ready to use.
  • D . Service is approaching resource usage limit.

Reveal Solution Hide Solution

Correct Answer: D
Question #46

What is a function of a cloud portal?

  • A . Updates IT resources database
  • B . Replicates container resources in a web portal
  • C . Interacts with the orchestration layer
  • D . Creates workflows for automated scheduling

Reveal Solution Hide Solution

Correct Answer: C
Question #47

What is a responsibility of the Service Manager role?

  • A . Understanding consumers’ needs and industry trends to drive an effective product strategy
  • B . Coordinating with the architecture team to define technology road maps
  • C . Provide architectural oversight over individual domains
  • D . Designing, planning, managing, maintaining, and supporting the cloud infrastructure

Reveal Solution Hide Solution

Correct Answer: D
Question #48

A customer has expressed an interest in using AI or ML to obtain improved data analytics from their PowerEdge servers and PowerMax storage.

Which product can identify deviations and performance impacts?

  • A . CloudIQ
  • B . eLAB Navigator
  • C . SyncIQ
  • D . Storage Manager

Reveal Solution Hide Solution

Correct Answer: A
Question #49

Which data storage type uses a non-hierarchical address space to store data?

  • A . Block
  • B . Object
  • C . File

Reveal Solution Hide Solution

Correct Answer: B
Question #50

What are the benefits of modern applications compared to traditional applications?

  • A . Designed to run independently and use a linear, continuous approach in development, build, test, and deploy
  • B . Distributed system architecture, designed to run independently, and use multiple programming languages
  • C . Single programming language and framework and scale by growing vertically
  • D . Monolithic, built with interdependent modules, and use distributed system architecture

Reveal Solution Hide Solution

Correct Answer: B

Question #51

Which are core attributes to a modern infrastructure?

  • A . Adaptable, software-defined, and scale-out
  • B . Resilient, scale-out, and cloud-enabled
  • C . Flash, software-defined, and cloud-enabled
  • D . Consolidation, flash, and scale-out

Reveal Solution Hide Solution

Correct Answer: B
Question #52

What is true about the Infrastructure as a code function?

  • A . Develops and deploys applications using CI/CD tools
  • B . Develops and deploys applications using script files
  • C . Manually manages and provisions IT resources
  • D . Manages and provisions IT resources using script files

Reveal Solution Hide Solution

Correct Answer: D
Question #53

An organization wants to deliver applications quickly and effectively. They believe that it is the only way to stay competitive in this ever-changing digital world. The organization wants to adopt practices that promote collaboration across teams during various phases of the software development lifecycle.

Which practice will meet the organization’s requirements?

  • A . Continuous Integration
  • B . Waterfall model
  • C . DevOps
  • D . Continuous Delivery

Reveal Solution Hide Solution

Correct Answer: C
Question #54

Which cloud security control mechanism monitors activity using video surveillance cameras and detects unusual activities using sensors and alarms?

  • A . Administrative control
  • B . Technical control
  • C . Corrective control
  • D . Physical control

Reveal Solution Hide Solution

Correct Answer: D
Question #55

What is true about application virtualization?

  • A . Resolves application conflicts and compatibility issues
  • B . Allows for OS modifications on host machines
  • C . Prevents the use of conflicting applications on the same end-point device
  • D . Increases the complexity of application deployment

Reveal Solution Hide Solution

Correct Answer: A
Question #56

What term refers to the entry points from which an attack can be launched?

  • A . Attack surface
  • B . Attack factor
  • C . Attack vector

Reveal Solution Hide Solution

Correct Answer: A
Question #57

What term refers to businesses that cautiously and gradually embrace digital transformation?

  • A . Digital Evaluators
  • B . Digital Laggards
  • C . Digital Leaders
  • D . Digital Adopters

Reveal Solution Hide Solution

Correct Answer: A
Question #58

Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?

  • A . VMware vCenter Manager
  • B . VMware vRealize Operations Management Suite
  • C . VMware vRealize Automation Suite
  • D . VMware vSphere with Operations Management

Reveal Solution Hide Solution

Correct Answer: B
Question #59

What is a benefit of data archiving?

  • A . Increases deduplication ratio and reduces storage costs
  • B . Avoids performing data backups frequently
  • C . Preserves data for future reference and adherence to regulatory compliance
  • D . Moves frequently accessed data to lower-cost archive storage

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version