Which task describes adherence to compliance?
A . Ensure security policies are being enforced
B . Define access rights to users
C . Assess the cloud provider’s capability to provide logs
D . Assess assets with realistic valuations
Answer: A
Which task describes adherence to compliance?
A . Ensure security policies are being enforced
B . Define access rights to users
C . Assess the cloud provider’s capability to provide logs
D . Assess assets with realistic valuations
Answer: A
What is an advantage of adopting a microservices strategy in an application development environment?
A . All microservices of an application are always updated at the same time for maintaining consistency in the application
B . Every microservice can be deployed, upgraded, scaled, and restarted independent of other services in the application
C . Microservices are tightly coupled so it is easy to scale all the services at once to meet business demands
D . Microservices provide the application platform to implement DevOps in the organization easily and at low cost
Answer: B
What capability is provided by the “Open and extensible” attribute of software-defined infrastructure (SDI)?
A . Uses APIs to integrate multivendor resources into the SDI environment
B . Optimizes resource usage and generates value reports about the SDI environment
C . Provides a control point for the entire SDI environment
D . Provides multitenancy that enables consumers to share resources in the SDI environment
Answer: A
The incident management team is unable to determine the root cause of an incident. To which team should the error-correction activity be transferred?
A . Performance Management
B . Change Management
C . Availability Management
D . Problem Management
Answer: D
What is a characteristic of thin LUNs?
A . When a thin LUN is destroyed, its allocated capacity is automatically reclaimed to the pool.
B . When a thin LUN is created, physical storage is fully allocated for it
C . Once a thin LUN is created it cannot be destroyed until all data is deleted from it
D . When a thin LUN is destroyed, its allocated capacity is reserved until an administrator reclaims it
Answer: A
Which Dell EMC product is used for a disk-based backup and recovery solution that provides inherent source-based data deduplication?
A . NetWorker
B . ProtectPoint
C . Data Domain
D . Avamar
Answer: D
What is a key benefit of using containers?
A . Eliminates any long-term commitments to a technology stack
B . Helps speed up software release cycles and improve software quality
C . Enables services to be delivered in hour or days, not weeks
D . Provides better probability without requiring code changes
Answer: B
What is the purpose of a bitmap in snapshot creation?
A . Keeps track of blocks that have changed in the filesystem
B . Indicates the exact address from which data has to be read
C . Indicates the exact address to where data has to be written
D . Keeps track of the number of blocks that are highly utilized
Answer: D
What is the function of a monitoring and alerting tool?
A . Focus on examining the usage of resources by customers and service providers and provide notification to optimize and manage workloads
B . Control charges for cloud usage by optimizing cloud resource utilization
C . Automate tasks and IT processes and manage the IT environment
D . Enable people to work closely together on a common project, in real time, by making communication among them easier
Answer: A
An organization needs to deploy remote replication between two sites that are 100 km (62 miles) apart. The organization requires a near zero recovery point objective.
Which solution would you recommend?
A . Hypervisor-based asynchronous replication
B . Synchronous replication
C . Snapshot replication
D . Asynchronous replication
Answer: B