E10-002 Cloud Infrastructure and Services
A service is offered to a consumer from 9 A.M. to 6 P.M. Monday through Saturday. The service experiences four hours of downtime during one week. What is the availability of the service for that week? A. 92.59% B. 95.26% C. 90.52% D. 97.28%
A. 92.59%
Which statement describes cloud service arbitrage? A. A cloud broker combines a variable number of cloud services into one or more services. B. A cloud broker enhances a given service by improving some specific capability. C. A cloud broker combines a fixed number of cloud services into one or more services. D. A cloud broker provides value-added services to cloud consumers.
A. A cloud broker combines a variable number of cloud services into one or more services.
What is a virtual appliance? A. A master copy of a virtual machine with a standardized virtual hardware and software configuration that is used to create new virtual machines B. An interface to view and manage the virtual machines on a physical compute system or a compute cluster C. A preconfigured virtual machine, preinstalled with a guest OS and an application, dedicated to a specific function D. Software installed on a computer system that enables multiple virtual machines to share the resources of the computer system
A. A master copy of a virtual machine with a standardized virtual hardware and software configuration that is used to create new virtual machines
What does CHAP use to enable initiators and targets to authenticate each other? A. A secret code B. OpenID C. OAuth D. Permissions
A. A secret code
Which statement is true about virtual machine (VM) snapshots? A. A snapshot holds only changed blocks. B. A parent virtual disk is not required for recovery from a snapshot. C. A single delta disk file is used for all the snapshots of a VM. D. A snapshot provides a zero recovery point objective.
A. A snapshot holds only changed blocks.
What is a characteristic of cloud service management? A. Adopting automation and workflow orchestration B. Enabling IT asset-specific management C. Separating management processes from service design D. Abstracting cloud service requirements and SLA
A. Adopting automation and workflow orchestration
What is graceful degradation of an application? A. Application maintains limited functionality even when some of the modules are not available. B. Application can accept all requests from users but responds to only high priority requests. C. Application retries the service that is temporarily down and makes it available to users. D. Application automatically restarts on another virtual machine and provides full functionality.
A. Application maintains limited functionality even when some of the modules are not available.
Which process ensures that users are who they claim to be? A. Authentication B. Authorization C. Auditing D. Phishing
A. Authentication
In which step of the service enablement roadmap is the existing IT infrastructure transformed to deliver the required cloud services? A. Build B. Plan C. Understand D. Enable
A. Build
A cloud service provider is concerned about the security risks due to velocity-of-attack. What can the cloud service provider deploy to mitigate the impact of this attack? A. Containment mechanisms B. Role-based access control C. Multi-factor authentication D. Shredding data-at-rest
A. Containment mechanisms
What describes the operation of the write-through cache in a block-based storage system? A. Data is placed in the cache. Data is written to the disk. An acknowledgement for the write is sent. B. Data is placed in the cache. An acknowledgement for the write is sent immediately. Data is later written to the disk. C. Data is written directly to the disk without being placed in the cache. Anacknowledgement for the write is sent. D. Data is written directly to the disk. An acknowledgement for the write is sent immediately. Data is later placed in the cache.
A. Data is placed in the cache. Data is written to the disk. An acknowledgement for the write is sent.
★An administrator has configured storage pool rebalancing on a storage system. What is the effect of adding new disk drives to the pool? A. Data is restriped across all the disk drives in the storage pool. B. Data on the old drives is completely copied to the new drives. C. Data is restriped, but only across the old drives in the storage pool. D. Data is rebalanced across the old drives in the storage pool.
A. Data is restriped across all the disk drives in the storage pool.
☆Which activity is carried out during the service termination phase of the cloud service lifecycle? A. De-provisioning the service instance B. Asking for the service contract C. Establishing the billing policy D. Providing the final service assessment report
A. De-provisioning the service instance
Which statement describes the service portfolio management function? A. Defining the suite of service offerings that aligns to the provider's strategic business goals B. Maintaining deployed services to ensure that service levels are delivered as committed C. Creating an inventory of service assets that provides information about asset configurations D. Meeting the required capacity demands for all services in a cost effective and timely manner
A. Defining the suite of service offerings that aligns to the provider's strategic business goals
Which activity is carried out during the service operation phase of the cloud service lifecycle? A. Discovering the service assets B. Assessing service requirements C. Establishing the billing policy D. De-provisioning the service instance
A. Discovering the service assets
What is a function of the management interface of cloud services? A. Enables consumers to control their use of rented services B. Presents functional content of a service for computing C. Provides a standard to develop a service enablement roadmap D. Sequences system functions programmatically
A. Enables consumers to control their use of rented services
What is a benefit of stretching a compute cluster across service availability zones in a cloud environment? A. Enables dynamic workload balancing across zones B. Provides high security for compute systems across zones C. Reduces bandwidth requirements for replication across zones D. Reduces the possibility of disasters occurring in one of the zones
A. Enables dynamic workload balancing across zones
What is a benefit of standardizing the cloud interface? A. Enhances portability and interoperability across clouds B. Reduces service provisioning time and operating expenditures C. Provides flexibility and scalability to configure resources D. Personalizes the functional and management interfaces of a cloud
A. Enhances portability and interoperability across clouds
Network traffic shaping is enabled. What is the effect of the traffic rate exceeding a pre-configured limit? A. Excess packets are queued for later transmission. B. Excess packets in the transmission are dropped. C. Network bandwidth increases to accommodate the traffic. D. All the packets in the transmission are dropped.
A. Excess packets are queued for later transmission.
What needs to be considered before performing the discovery activity in a cloud? A. Frequency of information collection B. Terms of service contract C. Impact on service catalog D. Impact on workflow structure
A. Frequency of information collection
What is a capability of an object-based storage system? A. It automatically detects and repairs corrupted objects. B. It uses multiple object IDs for each object for high security. C. It consolidates block and file access in one storage platform. D. It has a single file system spanning all object-based storage device nodes.
A. It automatically detects and repairs corrupted objects.
An organization is using a shared file system to manage virtual machine (VM) files. Which statement is true about the file system? A. It enables VM files to be stored on remote file servers. B. It is installed on the local storage of the computer system. C. It enables multiple hypervisors to write to a VM file concurrently. D. It is installed on the guest operating system of each VM.
A. It enables VM files to be stored on remote file servers.
A compute system is configured to access data from a block-based storage system over a network. What must be true about the file system? A. It is managed by the computer system. B. It is managed by the object-based storage device node. C. It is managed by the storage system. D. It is part of the storage area network.
A. It is managed by the computer system.
What is an accurate statement about an active/active service availability zone configuration? A. It provides a lower recovery time objective (RTO). B. The zones must be connected over a FC network. C. The zones must be located more than 200 km apart. D. It has reduced bandwidth requirements for replication across zones.
A. It provides a lower recovery time objective (RTO).
What is an accurate statement about reporting? A. It provides current status and historical trends. B. It displays a personalized functional interface. C. It presents service instances to consumers in real-time. D. It organizes potential performance problems.
A. It provides current status and historical trends.
What is a benefit of personalizing a cloud portal? A. Meets the security and compliance needs to order and manage services B. Optimizes the utilization and deployment time of cloud services C. Enhances the portability and interoperability across clouds D. Eliminates the possibility of manual errors during portal configuration
A. Meets the security and compliance needs to order and manage services
What is a function of financial management? A. Provide necessary business cases for investment B. Evaluate quality and cost of supplied products against the SLA C. Procure capacity in the most cost-effective manner D. Meet availability needs with a justifiable return on investment
A. Provide necessary business cases for investment
☆What is an advantage of synchronous remote replication? A. Provides near zero recovery point objective B. Replicates data across any geographic location without impacting response time C. Supports locality of reference to improve replication performance D. Saves network bandwidth by replicating only deduplicated data
A. Provides near zero recovery point objective
What is a benefit of server-flash cache technology? A. Provides performance acceleration for read-intensive workloads B. Eliminates the need to have cache in storage systems C. Improves data migration from one storage system to another D. Eliminates the need for hyper-threading-enabled processors
A. Provides performance acceleration for read-intensive workloads
What is a benefit of the discovery operation in a cloud? A. Provides visibility into service assets B. Organizes the service portfolio in an inventory C. Detects and corrects security attacks D. Identifies existing vulnerabilities in a cloud
A. Provides visibility into service assets
What is a benefit of service orchestration? A. Reduced service provisioning time B. Enhanced service portability across clouds C. Improved conformity to service contract D. Automated service portfolio management
A. Reduced service provisioning time
☆Which encapsulation function is performed by an iSCSI Host Bus Adapter? A. SCSI data into IP packets B. SCSI data into FC frames C. SCSI data into FCIP frames D. Both SCSI data and FC frames into IP packets
A. SCSI data into IP packets
☆Which solution would improve the performance of an application with a high number of read requests to SAN storage systems? A. Server-flash cache technology B. Virtual storage provisioning C. Dynamic memory allocation D. Hyper-threading
A. Server-flash cache technology
Which role in a cloud provider organization is responsible for understanding consumer needs and industry trends to drive an effective product strategy? A. Service manager B. Account manager C. Cloud architect D. Service operations manager
A. Service manager
What is included in service templates? A. Service structure and service attributes B. Service assets and service level agreement C. Service offerings and service contract D. Service components and service catalog
A. Service structure and service attributes
A cloud service provider plans to implement data deduplication in their backup environment. The service provider has a network bandwidth and storage space constraint. Which deduplication method should be deployed by the service provider? A. Source-based B. Target-based C. Post-process D. In-line
A. Source-based
☆What is the Cloud Application Management for Platforms (CAMP) standard? A. Standard for the PaaS management interface B. Standard for the functional interface of a storage service C. Standard for the SaaS functional interface D. Specification for both the management and functional interfaces
A. Standard for the PaaS management interface
★What is the correct sequence of steps in synchronous remote replication? A. Step 1: Compute system writes data to source. Step 2: Data from source is replicated to replica (target). Step 3: Target acknowledges back to source. Step 4: Source acknowledges write complete to the compute system. B. Step 1: Compute system writes data to source. Step 2: Write is immediately acknowledged to compute system. Step 3: Target acknowledges back to source. Step 4: Data is transmitted to the replica (target). C. Step 1: Compute system writes data to source. Step 2: Data is transmitted to the replica (target). Step 3: Source acknowledges write complete to the compute system. Step 4: Target acknowledges back to source. D. Step 1: Compute system writes data to source. Step 2: Write is immediately acknowledged to compute system. Step 3: Data is transmitted to the replica (target). Step 4: Target acknowledges back to source.
A. Step 1: Compute system writes data to source. Step 2: Data from source is replicated to replica (target). Step 3: Target acknowledges back to source. Step 4: Source acknowledges write complete to the compute system.
☆Which network virtualization technique enables nodes at two different sites to be part of the same virtual LAN (VLAN)? A. Stretched VLAN B. Virtual Extensible LAN C. Private VLAN D. Community VLAN
A. Stretched VLAN
What could be a reason for a consumer-initiated service termination? A. The service performance is not acceptable. B. The contract agreement terminates naturally. C. The consumer violates terms of the contract. D. The service provider exits from the cloud business.
A. The service performance is not acceptable.
Which EMC product provides a solution for software-defined storage? A. ViPR B. Vblock C. VMAX D. VSPEX
A. ViPR
☆Which layer of a cloud infrastructure includes tools that optimize resource utilization? A. Virtual layer B. Physical layer C. Orchestration layer D. Service layer
A. Virtual layer
What provides an on-demand self-service capability to consumers, allowing them to unilaterally provision cloud resources? A. Web-based cloud portal B. Specialized connectors C. SOAP and REST web services D. Service orchestration
A. Web-based cloud portal
Which Fibre Channel switch mechanism logically segments node ports within a fabric into groups and enables communication with each other within the group? A. Zoning B. LUN masking C. Fabric binding D. Port binding
A. Zoning
A storage system is configured with erasure coding. The data is divided into 10 data fragments and three coding fragments. Each fragment is stored on a different disk drive in the storage system. What is the maximum number of disk drive failures the storage system can tolerate without data loss in this implementation? A. 13 B. 3 C. 7 D. 10
B. 3
What is an OpenID mechanism? A. A mechanism that examines data packets traversing a network and compares them to a set of filtering rules B. An open standard for authentication in which a service provider uses authentication services from an identity provider C. An open authorization mechanism that allows a client to access protected resources from a resource server on behalf of a resource owner D. A network authentication protocol that provides strong authentication for client/server applications by using secret-key cryptography
B. An open standard for authentication in which a service provider uses authentication services from an identity provider
☆Which activity is carried out during the 'Plan' step of the service enablement roadmap? A. Transforming the existing IT infrastructure to deliver services as planned B. Analyzing the gap between existing IT capability and expected IT capability C. Understanding the business value that the services can bring D. Optimizing the cloud infrastructure and services to an evolving business strategy
B. Analyzing the gap between existing IT capability and expected IT capability
☆What is a benefit of hyper-threading? A. Pool processors across compute systems B. Improved processor utilization C. Reduced processor cost D. Concurrent execution of multiple threads
B. Improved processor utilization
Which statement is true about the native file system of a hypervisor? A. It is installed on the guest operating systems of the virtual machines. B. It enables multiple hypervisors to write to shared storage concurrently. C. It supports built-in NFS and CIFS clients installed on NAS devices. D. It enables virtual machine files to be stored on multiple file systems.
B. It enables multiple hypervisors to write to shared storage concurrently.
★Which resource management technique identifies and eliminates redundant copies of memory pages? A. Static memory page allocation B. Memory page sharing C. Dynamic memory page allocation D. Memory page ballooning
B. Memory page sharing
When virtual machines (VMs) are running on a compute cluster, what functionality is provided by a hypervisor's native file system? A. Automated locking of VM files B. Pool of running VMs to be shared among hypervisors C. Pool of virtual disks to be shared among running VMs D. VM namespace resolution
B. Pool of running VMs to be shared among hypervisors
☆What operation is supported by Representational State Transfer (REST)? A. Service provider stores the application state to keep track of all resource manipulations. B. Service requestor performs actions on a resource by using the resource representation. C. Service provider programmatically integrates and sequences HTTP methods used to manipulate resources. D. Service requestor encapsulates the body of a REST message in an XML file and transfers the file over IP.
B. Service requestor performs actions on a resource by using the resource representation.
Which product can automatically restart virtual machines on another hypervisor in a cluster when a physical compute system in the cluster fails? A. VMware FT B. VMware HA C. VMware Storage vMotion D. VMware vMotion
B. VMware HA
★When using a memory page sharing technique, what happens when a virtual machine tries to update the shared memory page? A. The page is partially updated. B. The page is overwritten. C. A private copy of the page is created. D. A new shared memory page is created.
C. A private copy of the page is created.
Which statement characterizes the software-defined approach for managing resources? A. Provides the automated arrangement, coordination, and management of various system functions in a cloud infrastructure to manage cloud services B. Specifies a set of component functions that can be called from a software component to interact with other software components C. Abstracts the underlying infrastructure components and separates the management functions from the infrastructure components D. Provides a framework to list services, attributes of services, service-level commitments, terms and conditions for service provisioning, and prices of services
C. Abstracts the underlying infrastructure components and separates the management functions from the infrastructure components
What is a service contract? A. An agreement between provider and supplier that describes the service template specifics B. An agreement between provider and consumer that lists the conditions for greenfield service deployment C. An agreement between provider and consumer that states the terms of service usage D. An agreement between provider and supplier that states the terms and conditions of a balanced scorecard
C. An agreement between provider and consumer that states the terms of service usage
What could be a possible cause for the degradation in the performance of virtual machines (VMs) during a guest-level backup operation? A. VMs move into sleep mode during backup operations. B. VMs move into read only mode during backup operations. C. Backup agent running inside VMs consumes additional resources. D. VM snapshot created for the backup consumes additional resources.
C. Backup agent running inside VMs consumes additional resources.
What is the effect of network broadcast traffic reaching the configured network storm control threshold on a switch port? A. Switch port bandwidth increases automatically to accommodate the traffic. B. Broadcast traffic is allowed partially, maintaining the traffic rate below the threshold level. C. Broadcast traffic is blocked. Subsequent broadcast frames are dropped for a specific interval. D. The switch port is disabled. Administrator intervention is required to enable it.
C. Broadcast traffic is blocked. Subsequent broadcast frames are dropped for a specific interval.
★An organization wants to leverage the infrastructure resources in their existing data center and transform it to a cloud infrastructure. Which type of deployment is suitable for this transformation? A. Private cloud B. Public cloud C. Brownfield D. Greenfield
C. Brownfield
☆What is a function of the control layer of a cloud infrastructure? A. Pooling resources B. Communicating across computer systems C. Configuring resource pools D. Providing workflows for executing tasks
C. Configuring resource pools
What is provided by an uplink NIC used in a virtual machine network on a physical compute system running a hypervisor? A. Connectivity between a virtual switch and virtual NICs B. Inter-switch links (ISLs) between virtual switches C. Connectivity between a virtual switch and a physical Ethernet switch D. Connectivity between a virtual switch and physical NICs
C. Connectivity between a virtual switch and a physical Ethernet switch
☆In a FC SAN, which FC port type does an N_Port connect to? A. N_Port B. E_Port C. F_Port D. G_Port
C. F_Port
In which chargeback model do consumers commit up-front on their required cloud resources for the committed period? A. Pay-as-you-go B. Subscription by peak usage C. Fixed cost D. User-based
C. Fixed cost
Dynamic virtual machine (VM) load balancing across storage volumes is enabled. Which parameter is used to intelligently place newly created VMs on a storage volume? A. Type of the storage volume B. Location of the storage volume C. I/O load on the storage volume D. Size of the storage volume
C. I/O load on the storage volume
Who maintains the credential information of consumers when an OpenID mechanism is deployed? A. Service provider only B. Consumer and service provider C. Identity provider only D. Service provider and identity provider
C. Identity provider only
When configuring an authentication mechanism using Challenge-Handshake Authentication Protocol (CHAP), where should the CHAP secret be configured? A. Target only B. Initiator only C. Initiator and target D. Application server
C. Initiator and target
What helps in analyzing the utilization and the consumption of resources by service instance? A. Personalizing B. Service catalog management C. Monitoring D. Availability management
C. Monitoring
What is the role of a proxy server in an image-based backup solution? A. Stores backup media for a virtual machine backup B. Creates the snapshot for the virtual machine to be backed up C. Performs backup operations by using the virtual machine snapshot D. Transfers data directly from the guest OS to the backup device
C. Performs backup operations by using the virtual machine snapshot
Which type of zoning reduces the risk of WWPN spoofing on a Fibre Channel network? A. WWPN-based B. Mixed C. Port-based D. eui-based
C. Port-based
Which EMC product enables the backing up of data directly from VMAX storage to a Data Domain system? A. SRDF B. RecoverPoint C. ProtectPoint D. ViPR
C. ProtectPoint
What is a benefit of defining a service template? A. Helps consumers understand service policies, pricing, and SLAs B. Provides control and visibility into the service enablement roadmap C. Provides guidelines to create workflows for service orchestration D. Translates an organization's service strategy into a balanced scorecard
C. Provides guidelines to create workflows for service orchestration
What is used to prioritize the latency-sensitive network traffic in order to provide better network service in comparison to less critical network traffic? A. Traffic shaping B. Network storm control C. Quality of Service D. Multipathing
C. Quality of Service
☆What is an advantage of asynchronous remote replication? A. Provides near zero recovery point objective B. Saves network bandwidth by replicating only deduplicated data C. Replicates data across any geographic location without impacting response time D. Ensures source LUN and replica have identical data at all times
C. Replicates data across any geographic location without impacting response time
★What information is included in the service request issued by a cloud portal to the orchestration layer? A. Subscription ID, erasure code, iqn B. User's choices, iqn, service template C. Request ID, subscription ID, user's choices D. Request ID, erasure code, World Wide Name
C. Request ID, subscription ID, user's choices
What principle is supported by Representational State Transfer (REST)? A. Stateful interaction between service requestor and service provider B. Resource identification using XML C. Resource manipulation using resource representation D. Encapsulation of XML files in the HTTP header
C. Resource manipulation using resource representation
☆Which encapsulation function is performed by a Fibre Channel Host Bus Adapter? A. FC frames into IP packets B. Ethernet frames into FC frames C. SCSI data into FC frames D. FC frames into Ethernet frames
C. SCSI data into FC frames
In which phase of the cloud service lifecycle are service instances de-provisioned? A. Service creation B. Service operation C. Service termination D. Service planning
C. Service termination
Which technique of an intrusion detection and prevention system relies on a database that contains known attack patterns, and scans events against it? A. Anomaly-based detection B. Device-based detection C. Signature-based detection D. Plug-in-based detection
C. Signature-based detection
An organization has a private cloud infrastructure. They want to leverage the capabilities of a public cloud by using the hybrid cloud model. Which virtual private network (VPN) connection method will enable them to establish a secure connection to the public cloud? A. User access VPN connection B. Global access VPN connection C. Site-to-site VPN connection D. Remote access VPN connection
C. Site-to-site VPN connection
★Which EMC product discovers infrastructure components and detects changes in component status? A. VSPEX B. RecoverPoint C. Smarts D. Mozy
C. Smarts
☆What is the Open Cloud Computing Interface (OCCI) standard? A. Standard for the functional interface of a storage service B. Standard for the PaaS functional interface C. Specification for the IaaS management interface D. Specification for both the management and functional interfaces
C. Specification for the IaaS management interface
★What is the correct sequence of steps in asynchronous remote replication? A. Step 1: Compute system writes data to source. Step 2: Data is transmitted to the replica (target). Step 3: Target acknowledges back to source. Step 4: Write is immediately acknowledged to compute system. B. Step 1: Compute system writes data to source. Step 2: Write is immediately acknowledged to compute system. Step 3: Target acknowledges back to source. Step 4: Data is transmitted to the replica (target). C. Step 1: Compute system writes data to source. Step 2: Write is immediately acknowledged to compute system. Step 3: Data is transmitted to the replica (target). Step 4: Target acknowledges back to source. D. Step 1: Compute system writes data to source. Step 2: Data from source is replicated to replica (target). Step 3: Target acknowledges back to source. Step 4: Source acknowledges write complete to the compute system.
C. Step 1: Compute system writes data to source. Step 2: Write is immediately acknowledged to compute system. Step 3: Data is transmitted to the replica (target). Step 4: Target acknowledges back to source.
Consider a virtual machine (VM) with 2 GB memory capacity and 1200 MHz processing power as its lower bounds, and 4 GB memory capacity and 2400 MHz processing power as its upper bounds. What is the effect on the VM if the memory capacity or processing power available to the VM is less than 2 GB and 1200 MHz respectively? A. The VM will run with degraded performance. B. The VM will allow only a few applications to run. C. The VM will not power on using this configuration. D. The VM will allow only one operating system to be installed.
C. The VM will not power on using this configuration.
★What is enabled by cache tiering? A. Creation of a large capacity secondary cache using hard disk drives B. Creation of a large capacity secondary cache only using DRAM cache C. Tiering between DRAM cache and solid state drives D. Tiering between hard disk drives and DRAM cache
C. Tiering between DRAM cache and solid state drives
An administrator plans to perform scheduled maintenance of a computer system in a cluster. There are multiple virtual machines (VMs) running a cloud service on the computer system. Which solution enables the administrator to perform maintenance without service interruption? A. VM backup B. VM hardening C. VM live migration D. VM template
C. VM live migration
☆An organization plans to deploy a community cloud on their premises. Computer systems of the other organizations in the community must have LAN connectivity with those in the cloud infrastructure. Which network virtualization technique do they require? A. Private Virtual LAN B. Community Virtual LAN C. Virtual Extensible LAN D. Isolated Virtual LAN
C. Virtual Extensible LAN
★A storage system is configured with erasure coding. The data is divided into eight data fragments and four coding fragments. Each fragment is stored on a different disk drive in the storage system. What is the maximum number of disk drive failures the storage system can tolerate without data loss in this implementation? A. 12 B. 8 C. 2 D. 4
D. 4
A provider offers a 24×7 online service to consumers. The service experiences three hours of downtime during one week. What is the availability of the service for that week? A. 90.50% B. 92.50% C. 95.20% D. 98.20%
D. 98.20%
Which management process involves approving requests for expanding resource pools in a cloud? A. Capacity management B. Configuration management C. Incident management D. Change management
D. Change management
☆An organization plans to migrate an application that has loosely coupled components. Which migration strategy is suitable for such an application? A. Forklift B. Functional C. Compatible D. Hybrid
D. Hybrid
☆Which cloud service model enables an organization to deploy a proprietary operating system and applications on a cloud provider's resources? A. Platform as a Service B. Software as a Service C. Desktop as a Service D. Infrastructure as a Service
D. Infrastructure as a Service
What is an accurate statement about resource pooling in cloud computing? A. It enables consumers to maintain required performance levels and adapt to variation in workload. B. It enables consumers to access cloud services from heterogeneous client platforms. C. It enables cloud resources to be monitored and controlled by the consumer. D. It enables cloud resources to be assigned and reassigned according to consumer demand.
D. It enables cloud resources to be assigned and reassigned according to consumer demand.
What is a function of service asset and configuration management? A. Monitor non-compliance with configuration policies B. Store configuration errors in a known-error database C. Review and approve configuration changes D. Maintain information on configuration items
D. Maintain information on configuration items
What is a function of the service layer of a cloud infrastructure? A. Discovers cloud services B. Detects service-related problems C. Creates resource pools D. Presents cloud interfaces
D. Presents cloud interfaces
Which factors should be considered when establishing a billing policy for cloud services? A. Provider's chargeback requirement and personalization policy B. Service level objectives and service termination policy C. Service enablement roadmap and de-provisioning strategy D. Provider's business goals and service-specific pricing strategy
D. Provider's business goals and service-specific pricing strategy
What is a function of supplier management? A. Map consumers to service assets B. Correct problems in supplied products C. Plan for investments and IT budget D. Reassess contract prior to renewal
D. Reassess contract prior to renewal
What is a function of the physical layer of a cloud infrastructure? A. Creating resource pools B. Invoking provisioning tasks C. Dynamically allocating resources D. Storing data on storage devices
D. Storing data on storage devices
What is a characteristic of Simple Object Access Protocol (SOAP)? A. Specifies binding of FC and Ethernet frames B. Identifies resources based on URIs C. Provides 64-bit World Wide Node Name D. Uses XML for formatting messages
D. Uses XML for formatting messages
☆Which EMC product offers customers a choice of hypervisor, compute system, and network technology? A. VPLEX B. VNX C. Vblock D. VSPEX
D. VSPEX
Which VMware product automates performance, capacity, and configuration management? A. vCloud Hybrid Service B. vCenter Site Recovery Manager C. IT Business Management Suite D. vCenter Operations Management Suite
D. vCenter Operations Management Suite