PART 1 CP4D ASSESSMENT TEST, version 2.5, accuracy 78%

¡Supera tus tareas y exámenes ahora con Quizwiz!

What would be the result of this command: kubectl exec-ti <pod-name> bash? A. get the list of all containers in the pod B. open the console on the first container inside the pod C. expose a port to a pod D. Restart all the containers in the pod

B

When configuring firewall for max security, allow all inbound traffic to the cluster. A. True B. False

B

When configuring firewall for max security, allow outbound traffic only on the port range that is required for clients to communicate. A. True B. False

B

When configuring firewall for max security, disallow all ssh traffic on port 22 A. True B. False

B

Which AI service is used building conversational interfaces into an app, device, or channel? A. Watson Natural Language Understanding B. Watson Assistant C. Watson Knowledge Studio D. Watson Speech to Text

B

Which governance concept identifies the data to control and specifies the method of control? A. Governance rules B. Data protection rules C. Classifications D. Terms

B

Which of the following is the storage service? A. Lightbend platform B. NetApp ONTAP C. DataStage D. Data Virtualization

B

Which of the following is the true statement about entitlement needed for Cognos Analytics on CP4D? A. included in IBM Business Analytics in CP4D entitlement B. included in IBM Cognos Analytics in CP4D entitlement C. included in base entitlement for CP4D Native edition D. included in base entitlement for CP4D Enterprise edition

B

Which of the following provides 7 days of access to a hosted environment and guided journey to help explore CP4D? A. CP4D Cloud Native Edition B. CP4D Experiences C. CP4D on AWS D. Community Edition

B

Which of the following services supports provisioning multiple instances within a single CP4D installation? A. Data Virtualization B. Streams C. Cognos Dashboards D. Unified Governance and Integration

B

Which statement is true about Data Virtualization? A. The virtual table created in Data Virtualization can be used for Data Tranformation B. A user can join more than two remote tables using a drag and drop approach C. Data Virtualization needs additional storage to move data between data sources D. CP4D users need additional permissions

B

Which user can approve data virtualization publish request? A. Data Virtualization User B. Data Virtualization Steward C. Data Virtualization Mapper D. Data Virtualization Engineer

B

Whichi OpenShift feature can be used for making sure Service instances run upon specific worker nodes? A. Models B. Taints C. Endpoints D. Services

B

Which configuration file allows the load balancer and proxy server to spread incoming requests across multiple endpoint? A. /opt/wdp.conf B. /etc/squid/squid.conf C. /etc/sysctl.d/arp.conf D. /etc/haproxy/haproxy.cfg

D

Which of the following ensures that your data in CP4D is stored securely? A. SSL B. De-identify data C. Use a bearer token D. Encrypt the storage partition

D

Which of the following generally manages data security? A. LDAP B. Administrator C. Remote data sources D. Bearer token

D

Which of the following is needed to run CP4D on AWS, GCP, Azure, or IBM Cloud? A. each service includes the full cost of the service B. a click through license on each vendor's cloud C. buy through IBM Cloud and transfer to the other cloud D. bring your own pre-purchased software license

D

Which of the following is required when connecting to an external Git Repo form CP4D project? A. User name and password B. CA certificate C. SSL connection D. Personal access token

D

Which of the following monitoring solutions can be deployed on OpenShift and has powerful query language, altering and notification functionality? A. Nagios B. Influx C. MariaM D. Prometheus

D

Is following statement regarding Streams building blocks True or False? The operator can process data on a multi tuple basis. A. True B. False

A

Is that statement true about a worker node in Kubernetes cluster: A node that executes workloads for the cluster. A. True B. False

A

What developer tool would be used for doing analytics projects with the Scala programming language? A. Jupyter Notebook B. RStudio C. SPSS D. Cognos Analytics

A

What is the recommended way to configure a ReplicaSet? A. Deployment B. DaemonSet C. ReplicationController D. Job

A

When configuring firewall for max security, allow inbound traffic only on the port range that is required for clients to communicate. A. True B. False

A

Which Developer Tools Service is used for developing and deploying Reactive Microservices, real-time streaming pipelines and ML pipelines? A. Lightbend Platform B. RStudio servier with R C. Jupyter notebook Server with Python D. Zeppelin notebook Server with Anaconda

A

Which Linux utility helps to test the load balancer? A. nslookup B. nmap C. netstat D. ncat

A

Which of the following is a Data governance service? A. Watson Knowledge Catalog B. Deep Learning Reference Stack C. Data Virtualization D. Portworx

A

Which statement describes the Figure Eight Service for CP4D? A. transform text, images, audio, and videos into annotated training data to fuel your machine learning initiatives B. analyze in-flight with analytics project C. simplify the process of preparing large amounts of raw data for analysis D. evaluate millions of possibilities to find the best solution to any given problem

A

Which statement describes the Watson OpenScale for CP4D? A. Infuse AI with trust and transparency. Understand how AI models make decisions to detect and mitigate bias B. unlock reliable sales leads and increase customer acquisition C. understanding of unstructured data to a new level D. find answers and uncover insights in complex business content

A

What are the two types of roles of Role-based Access Contro (RBAC)? A. admin B. user C. cluster D. local E. object

A, C

Which two interfaces can be used by Speech to Text for speech recognition ? (point more than one) A. WebSocket B. SOAP C. Synchronous HTTP D. P2P E. Get Requests

A, C

Which three of the following are principles within the DataOps manifesto? A. Analytics is code B. Permanent environments C. increase heroism D. Quality is paramount E. Prescriptive tooling F. It's a team sport

A, D, F

Which three of the following does a Kubernetes namespace provide? A. delegated management authority to trusted users B. management of Docker images C. storage space allocation D. named resources to avoid basic naming collisions E. performance monitoring of containers F. the ability to limit community resource consumption

A, D, F

Is that statement true about a worker node in Kubernetes cluster:A node that manages the control plane. A. True B. False

B

Which three are the key services in Watson ML? A. Deployment Service B. Repository Service C. Evaluation Service D. Pipeline Service E. Query Service F. Scoring Service

A, B, F

What is the purpose the ReplicaSet? A. create and maintain volumes B. duplicate pods C. monitor environmental latency D. manage service clones

B

Which three statements are true about a Pod? A. contains one or more containers B. has its own internal address C. can be accessed externally without a service D. runs only on the master node E. runs on single node F. is instantiated across multiple nodes

A, B, E

What happens when Jupyter pod is running as part of Analytics project and gets deleted from the OpenShift command line? A. it will be created as its part of a Route B. it will be recreated as its part of Deployment C. the project will need to be re-initialized D. the projecte will need to be pushed to Git

B

Is that statement true about a worker node in Kubernetes cluster: A node that spreads incoming requests across multiple endpoints. A. True B. False

B

An OpenShift project is a Kubernetes namespace with these additional annotations? A. Separate storage, description, and server B. Separate name, displayname, and description C. Separate name, node, and server resources D. Separate server, node, and storage

B

Data Virtualization achieves its performance by avoiding which key characteristics of data? A. Duplication, Cleansing, Transformation and Movement B. Duplication, Storage, Transformation and Movement C. Duplication, Storage, Transformation and Caching D. Duplication, Tranformation, Cleansing and Cashing

B

From Analytics Dashboards Service, where can you publish a dashboard to? A. A data repository so it can be accessed as raw data B. A catalog so it can be added into other projects C. Streams so it can show stream metrics D. Visual Recognition Service so it can be further analyzed

B

How are containers and Pods architecturally layered? A. Containers create pods which call Kubernetes services B. A pod has one or more containers deployed together on the host C. Pods are instanciated with containers. D. Containers create Kuberntes clusters which create pods.

B

How can microservice get access the the streaming information published be Streams for scoring purposes? A. ftp to the published stream B. submit a REST to the published stream C. subscribe to the published stream D. submit a SOAP call to the published stream

B

Is following statement regarding Streams building blocks True or False? A sink adapter is an operator that reads data from external systems. A. True B. False

B

Is following statement regarding Streams building blocks True or False? A stream is an infinite sequence of records to be processed. A. True B. False

B

Is following statement regarding Streams building blocks True or False? A tuple represents individual records of the streaming data. A. True B. False

B

Is that statement true about a worker node in Kubernetes cluster: A node server containing infrastructure services like monitoring, logging, or external routing. A. True B. False

B

Which two of the following are included in the CP4D entitlement? A. IBM Cloud Kubernetes Service B. Red Hat Entrprise Linux C. Red Hat OpenShift Container Platform D. Provisioned Red Hat OpenShift Version managed service on IBM Cloud E. CentOS

B, C

Which three CP4D capabilities can make use of the BigSQL data source? A. Governance B. Data Virtualization C. Watson AI D. Transformation E. Analytics Projects F. Analytics Dashboards

B, E, F

A pod is created using which definition file? A. .xml file B. .cfg file C. .yaml file D. .pod file

C

After a data scientist has published an analytical asset, what is the state of the asset? A. The asset is ungoverned but can be searched for B. The asset is governed and can be associated with relevant business terms C. The asset is governed and can be searched for D. The asset is ungoverned and associated with relevant business terms.

C

What actions are available for analytics project, on the projects page, after the project has been created? A. Leave, Delete, Edit B. Reset, Copy, Leave C. Copy, Delete, Rename D. Reset, Delete, Leave

C

What are the inputs to a Docker build to produce a runnable image? A. .yaml file B. Docker file and .yaml file containing names and required artifacts C. Docker file and all required artifacts D. Docker file only

C

What is the confidence level needed for the automated discovery process to assign a term to an asset? A. 90% B. 79% C. 80% D. 60%

C

What is the function of labels? A. to launch correct functinos B. to assign functions to pods C. to tag containers and link them together D. to allow pod communication

C

Which of the following is a supported service to run CP4D? A. IBM Kubernetes Service B. Amazon EKS C. Red Hat OpenShift 3.11 managed service D. Azure Kubernetes Service

C

the OpenShift Container platform CLI is available using which command? A. bash B. pl-oc C. oc D. oci

C

Which three of the following item are industry accelerators? A. Insurance Claim Analysis B. Financial Crimes Insight C. Credit Card Fraud D. Customer Attrition Prediction E. Intelligent Maintenance F. Anti Money Laundering

C, D, E

A Pod is equivalent to: A. Temporary data pipe B. virtual redundant storage C. container D. an instance of virtual machine

D

What is the minimum recommended size of NFS volume used for installation? A. 100 GB B. 50 GB C. 700 GB D. 1000 GB

D

What permission is needed to map terms within regulatory project? A. Policy access B. Provision add-ons C. Term Reviewer D. Mapper

D

What would be the most appropriate modeling tool to determine the best weekly shift roster for 15 people staff in a busy restaurant? A. Cognos Analytics B. Streams C. Watson Discovery D. Decision Optimization

D

As part of the Hive data source configuration it is necessary to copy Kerberos configuration file from Hive server to which CP4D pod? A. ibm-nginx B. zen-metastoredb-0 C. kafka-0 D. is-en-conductor-0

D

CP4D Cloud Native and EnterpriseEdition use which licensing metrics? A. Authorized Users B. Instance Hour C. Worker Nodes D. Virtual Processor Core

D

CP4D relies on a disrtibuted file system, which is required? A. Gluster File System (glusterFS) B. Moose File System (MooseFS) C. Andrews File System (AFS) D. Network File System (NFS)

D

The integration of IBM StoredIQ with CP4D allows for the classification of which three items? A. CSV files B. Parquet files C. Excel files D. email messages E. Audio files F. Word documents

D, E, F


Conjuntos de estudio relacionados

Chapter 6 Applied Performance Practices

View Set

CISSP Domain 7 Security Operations - 7.10 Managing Disaster Recovery Plan Maintenance Question & Answer

View Set

Old Testament Exam 1 Springer Study Guide

View Set

KNES 315 Care and Prevention for athletic Injuries (Section 1, 2) (Chapters 1, 2, 3, 4, and 6)

View Set

I Drive Smart Quiz Answers (Virginia)

View Set

Principles of Information Security (Sixth Edition): 1601

View Set