Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

DEA-2TT4 Sample Questions Answers

Questions 4

When implementing an initial IT service center using ITILframework. In service strategy state which process needs to be considered for automation?

Options:

A.

Business relationship management

B.

Information security management

C.

Knowledge management

D.

Problem Management

Buy Now
Questions 5

Which phase of the cloud service lifecycle involves ongoing management activities to maintain cloud infrastructure and deployed services?

Options:

A.

Service Creation

B.

Service Operation

C.

Service Termination

D.

Service Planning

Buy Now
Questions 6

Which is true about a type 2 hypervisor?

Options:

A.

Installed as an application on an operating system

B.

Installed on bare-metal hardware

C.

Hypervisor vendor must certify the hardware

Buy Now
Questions 7

What helps to recover the cost of providing the service, ensuring profitability, and meeting the provider’s return on investment and reinvestment goals?

Options:

A.

Service negotiation

B.

Service level objective

C.

Service valuation

D.

Service level agreement

Buy Now
Questions 8

What are the key functions of a control plane?

Options:

A.

User and role access -

Configuration baselines -

Services execution

B.

Configuration messaging -

Statistics -

Status

C.

Asset discovery -

Resource abstraction and pooling

Resource provisioning

D.

Data processing -

Asset discovery -

Resource abstraction and pooling

Buy Now
Questions 9

Which defines the maximum amount of data loss that can be tolerated by a business following a disaster?

Options:

A.

MTBF

B.

RPO

C.

RTO

D.

MTTR

Buy Now
Questions 10

What is a benefit of secure multitenancy?

Options:

A.

Reduces unauthorized access to resources

B.

Blocks unauthorized access to resources

C.

Eliminates data breach risks

D.

Protects cloud infrastructure

Buy Now
Questions 11

What is a benefit of link aggregation?

Options:

A.

Saves bandwidth by restricting traffic to a specific potentially congested ISL

B.

Improves performance by combining two or more parallel ISLs into a single physical ISL

C.

Optimizes fabric performance by distributing network traffic across ISL

D.

Improves ISL utilization by increasing the network traffic on a specific ISL

Buy Now
Questions 12

Which is a benefit of implementing target-based deduplication?

Options:

A.

Offloads the backup client from the deduplication process

B.

Reduces storage capacity and network bandwidth requirements

C.

Backup client sends only new and unique segments across the network

D.

Optimizes ROBO environments for centralized backup

Buy Now
Questions 13

Which concept ensures accountability for security breaches or misuse of resources?

Options:

A.

Compliance

B.

Governance

C.

Risk management

Buy Now
Questions 14

Which cloud service lifecycle phase involves discovering services assets

Options:

A.

Service Planning

B.

Service Termination

C.

Service Operation

D.

Service Creation

Buy Now
Questions 15

Which tool should be recommended to customers for Infrastructure automation?

Options:

A.

GitHub

B.

Docker

C.

Chef

D.

JARVIS

Buy Now
Questions 16

An organization wants to deliver applications quickly and effectively. They believe that it is the only way to stay competitive in this ever-changing digital world. The organization wants to adopt practices that promote collaboration across teams during various phases of the software development lifecycle.

Which practice will meet the organization’s requirements?

Options:

A.

Continuous Integration

B.

Waterfall model

C.

DevOps

D.

Continuous Delivery

Buy Now
Questions 17

What condition can result in the development of a "shadow IT" organization?

Options:

A.

Lack of cloud extensibility inside an organization

B.

Increasing number of end user devices and different access points

C.

Bypassing of internal IT and looking elsewhere for IT services

D.

Aging facilities, and outdated policies and technology

Buy Now
Questions 18

What activity is performed during the service creation phase of the cloud service lifecycle?

Options:

A.

Defining Service Template

B.

Developing Service Enablement Roadmap

C.

Assessing Service Requirements

D.

Establishing Billing Policy

Buy Now
Questions 19

Which platform provides a converged infrastructure solution?

Options:

A.

VxRail

B.

PowerStore

C.

VxBlock

D.

PowerFlex

Buy Now
Questions 20

Why do organizations take advantage of virtual infrastructure?

Options:

A.

Require more data center space -

Resource underprovisioning -

Organizations have overutilized resources

B.

Organizations have underutilized resources

Ability to overprovision resources

Require more data center space

C.

Require no data center space -

Organizations have underutilized resources

Ability to overprovision resources

D.

Resource underprovisioning -

Organizations have overutilized resources

Require no data center space

Buy Now
Questions 21

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?

Options:

A.

Integrity

B.

Authorization

C.

Authentication

D.

Confidentiality

Buy Now
Questions 22

What steps appear in the service enablement roadmap?

Options:

A.

Define, Create, Plan, Enable, Terminate

B.

Understand, Plan, Build, Enable, Optimize

C.

Define, Observe, Understand, Enable, Act

D.

Plan, Action, Condition, Enable, End

Buy Now
Questions 23

What is a characteristic of an object-based storage system?

Options:

A.

Extends a single file system across all storage nodes

B.

Consolidates block and file access in one storage platform

C.

Capable of dynamically creating multiple object IDs for each object

D.

Uses a flat, non-hierarchical address space

Buy Now
Questions 24

What activity is included in a compliance checklist when moving data to the cloud?

Options:

A.

Determine if appropriate governance processes are available to meet consumers' requirements

B.

Ensure that IT infrastructure and data adhere to specific rules and regulations

C.

Review the financial stability of the provider to ensure its longevity

D.

Review and evaluate the usage of encryption to protect consumers' data

Buy Now
Questions 25

What term describes the ability of a system to continue functioning, even when a few of its components fail?

Options:

A.

Checkpointing

B.

Disaster recovery

C.

Fault tolerance

D.

Replication

Buy Now
Questions 26

Refer to the exhibit.

Which associates labels A, B, C, and D with planes within the software-defined infrastructure.

What set of labels is correct?

Options:

A.

A = Data plane B = Service plane C = Management plane D = Control plane

B.

A = Control plane B = Management plane C = Service plane D = Data plane

C.

A = Management plane B = Service plane C = Data plane D = Control plane

D.

A = Data plane B = Control plane C = Management plane D= Service plane

Buy Now
Questions 27

Which cloud security control mechanism monitors activity using video surveillance cameras and detects unusual activities using sensors and alarms?

Options:

A.

Administrative control

B.

Technical control

C.

Corrective control

D.

Physical control

Buy Now
Questions 28

Which solution can be used for automation of a customer environment?

Options:

A.

Ansible

B.

CloudWatch

C.

GitHub

D.

OpenStack

Buy Now
Questions 29

Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?

Options:

A.

Virtual machine hardening

B.

Application hardening

C.

Operating system hardening

D.

Hypervisor hardening

Buy Now
Questions 30

What type of infrastructure is defined as, "All the sources are bundled together and virtualized?

Options:

A.

Software-Defined

B.

Hyper-Converged

C.

Converged

Buy Now
Questions 31

What refers to an agreement between provider and consumer that states the terms of service usage?

Options:

A.

Service contract

B.

Service template

C.

Chargeback

D.

Showback

Buy Now
Questions 32

What type of cloud security control is log auditing?

Options:

A.

Detective control

B.

Corrective control

C.

Preventive control

D.

Technical control

Buy Now
Questions 33

Which storage data protection technique provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

Options:

A.

Erasure coding

B.

Cache protection

C.

RAID

D.

Dynamic disk sparing

Buy Now
Questions 34

Which key service management function modifies and aligns services according to consumer needs in the cloud environment?

Options:

A.

Service operation management

B.

Service demand management

C.

Service capacity management

D.

Service portfolio management

Buy Now
Questions 35

Which data protection solution enables organizations to protect, manage, and recover data at scale across diverse environments?

Options:

A.

Dell PowerProtect DD Series Appliances

B.

Dell Avamar

C.

Dell PowerProtect DP Series Appliances

D.

Dell Data Domain

Buy Now
Questions 36

What is a benefit of source-based data deduplication?

Options:

A.

Reduces recovery times

B.

Increase the frequency of backups

C.

Reduces network bandwidth requirements

D.

Reduces compute CPU cycles

Buy Now
Exam Code: DEA-2TT4
Exam Name: Associate - Cloud Infrastructure and Services v4 Exam
Last Update: May 5, 2024
Questions: 122
$64  $159.99
$48  $119.99
$40  $99.99
buy now DEA-2TT4