What is a key requirement of a resilient architecture?

What is a key requirement of a resilient architecture?A . High rate of resource utilizationB . Low rate of resource utilizationC . High tolerance level for interruptionD . Low tolerance level for interruptionView AnswerAnswer: D

November 11, 2020 No Comments READ MORE +

In the context of the Key Protect service, which of the following statements is correct?

In the context of the Key Protect service, which of the following statements is correct?A . Key Protect allows you to manage keys as well as SSL/TLS Digital CertificatesB . Key Protect allows you to import keys for other CloudsC . Key Protect allows you to manage service accountsD ....

November 11, 2020 No Comments READ MORE +

What’s the correct architectural network topology in IBM Cloud?

What’s the correct architectural network topology in IBM Cloud?A . VPC > Zone > Region > SubnetB . VPC > Region > Zone > SubnetC . Region > VPC > Zone > SubnetD . Region > Zone > VPC > SubnetView AnswerAnswer: D Explanation: Reference: https://cloud.ibm.com/docs/vpc-on-classic?topic=vpc-on-classic-about

November 11, 2020 No Comments READ MORE +

Which of the following IBM Cloud services is integrated with Certificate Manager?

Which of the following IBM Cloud services is integrated with Certificate Manager?A . IBM Bare Metal ServerB . Red Hat OpenStack on IBM CloudC . IBM Cloud for Power SolutionsD . IBM Cloud Kubernetes ServiceView AnswerAnswer: D Explanation: Reference: https://www.ibm.com/cloud/blog/announcements/use-ibm-cloud-certificate-manager-ibm-cloud­container-service-deploy-custom-domain-tls-certificates

November 10, 2020 No Comments READ MORE +

Which two of the following can be managed by IBM Cloud SSL Certificates? (Choose two.)

Which two of the following can be managed by IBM Cloud SSL Certificates? (Choose two.)A . Self-signed SSL certificatesB . SSL certificates ordered in IBM CloudC . SSL certificates not imported into IBM CloudD . SSL certificates imported into IBM CloudE . Certificate Service Requests (CSR)View AnswerAnswer: DE

November 10, 2020 No Comments READ MORE +

Which statement describes a key-value database?

Which statement describes a key-value database?A . Each item in the database is encrypted with public-key cryptographyB . Each item in the database is stored in a column named key with values in each rowC . Each item in the database is a document with lists of key-value pairsD ....

November 10, 2020 No Comments READ MORE +

Which file extension does the LogDNA agent monitor by default?

Which file extension does the LogDNA agent monitor by default?A . .logdnaB . .logC . .varlogD . .logvarView AnswerAnswer: B Explanation: Reference: https://cloud.ibm.com/docs/Log-Analysis-with-LogDNA?topic=Log-Analysis-with-LogDNA­logdna_agent

November 9, 2020 No Comments READ MORE +

In order to provide a highly resilient and highly available network with ECMP and diversity connections to IBM Cloud, how many Direct Link circuits should be recommended?

In order to provide a highly resilient and highly available network with ECMP and diversity connections to IBM Cloud, how many Direct Link circuits should be recommended?A . 4B . 2C . 6D . 3View AnswerAnswer: B Explanation: Reference: https://cloud.ibm.com/docs/direct-link?topic=direct-link-faqs

November 6, 2020 No Comments READ MORE +

Select the unique key features of Hyper Protect Crypto Services on the IBM Cloud?

Select the unique key features of Hyper Protect Crypto Services on the IBM Cloud?A . Built on IBM Red Hat OpenShift technology, on single-tenant key management service with key vaulting provided by dedicated customer-controlled HSMB . Hyper Protect Crypto Services provide state-of-the-art encryption using DM-CRYPTC . IBM Cloud administrators have...

November 5, 2020 No Comments READ MORE +

How is access to the IBM Cloud Container Registry controlled?

How is access to the IBM Cloud Container Registry controlled?A . A platform-built using Docker to run and manage your applicationsB . Watson service credentialsC . An open-source system named Cloud FoundryD . IBM Cloud Identity and Access Management (IAM)View AnswerAnswer: D Explanation: Reference: https://cloud.ibm.com/docs/Registry?topic=Registry-iam

November 5, 2020 No Comments READ MORE +