New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium EMC DEA-2TT4 Dumps Questions Answers

Page: 1 / 9
Total 122 questions

Associate - Cloud Infrastructure and Services v4 Exam Questions and Answers

Question 1

What is a benefit of data archiving?

Options:

A.

Increases deduplication ratio and reduces storage costs

B.

Avoids performing data backups frequently

C.

Preserves data for future reference and adherence to regulatory compliance

D.

Moves frequently accessed data to lower-cost archive storage

Buy Now
Question 2

What is the effect of a denial-of-service attack?

Options:

A.

Privileges are misused to compromise data security.

B.

User credentials are captured and sent to the attacker

C.

Unauthorized access is gained to user accounts and data.

D.

Legitimate users are prevented from accessing services.

Question 3

What is a key function of service operation management?

Options:

A.

Analyze customer feedback.

B.

Perform market research.

C.

Enable problem resolution.

D.

Establish pricing and budgeting

Question 4

An organization wants to deliver applications quickly and effectively. They believe that it is the only way to stay competitive in this ever-changing digital world. The organization wants to adopt practices that promote collaboration across teams during various phases of the software development lifecycle.

Which practice will meet the organization’s requirements?

Options:

A.

Continuous Integration

B.

Waterfall model

C.

DevOps

D.

Continuous Delivery

Question 5

What is the primary goal of a business continuity solution?

Options:

A.

Reduce the amount of investment in protecting an organization’s business-related data

B.

Decreases likelihood of a disaster in a data protection environment to control the loss of data

C.

Ensure data availability that is required to conduct vital business operations

D.

Eliminate security threats in a data protection environment for continuous access to data

Question 6

Which is true about a type 2 hypervisor?

Options:

A.

Installed as an application on an operating system

B.

Installed on bare-metal hardware

C.

Hypervisor vendor must certify the hardware

Question 7

An organization must deploy remote replication between two sites that are 1200 km (745 miles) apart, without impacting application response time.

Which solution should be recommended?

Options:

A.

Hypervisor-based synchronous replication

B.

Synchronous replication

C.

Asynchronous replication

Question 8

What refers to an agreement between provider and consumer that states the terms of service usage?

Options:

A.

Service contract

B.

Service template

C.

Chargeback

D.

Showback

Question 9

How is a container different from a virtual machine?

Options:

A.

Containers are stateful.

B.

Virtual machines are transportable.

C.

Virtual machines start faster.

D.

Containers share an operating system.

Question 10

What term describes the ability of a system to continue functioning, even when a few of its components fail?

Options:

A.

Checkpointing

B.

Disaster recovery

C.

Fault tolerance

D.

Replication

Question 11

Which key service management function modifies and aligns services according to consumer needs in the cloud environment?

Options:

A.

Service operation management

B.

Service demand management

C.

Service capacity management

D.

Service portfolio management

Question 12

Which plane in a software-defined storage environment manages and provisions storage?

Options:

A.

control

B.

Data

C.

Application

D.

Service

Question 13

What type of infrastructure is defined as, "All the sources are bundled together and virtualized?

Options:

A.

Software-Defined

B.

Hyper-Converged

C.

Converged

Question 14

Which backup service deployment is utilized when a backup is performed in a consumer location and then the backup data is sent to the cloud for DR purpose?

Options:

A.

Remote Backup Service

B.

Cloud-to-cloud Backup Service

C.

Managed Backup Service

D.

Replication Backup Service

Question 15

What term refers to businesses that cautiously and gradually embrace digital transformation?

Options:

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Leaders

D.

Digital Adopters

Question 16

An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into nine data segments and three coding segments.

What is the maximum number of drive failures supported in the storage system?

Options:

A.

6

B.

3

C.

12

D.

9

Question 17

Which component presents service catalog and cloud interfaces, enabling consumers to order and manager cloud services?

Options:

A.

Cloud Operating System

B.

Orchestor

C.

Cloud Portal

D.

Service automation

Question 18

What is a benefit of application virtualization?

Options:

A.

Allows inclusion of standard applications into an end-point image

B.

Eliminates the need for OS modifications

C.

Enables online data migrations between storage systems

Question 19

Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?

Options:

A.

Virtual machine hardening

B.

Application hardening

C.

Operating system hardening

D.

Hypervisor hardening

Question 20

Which solution can be used for automation of a customer environment?

Options:

A.

Ansible

B.

CloudWatch

C.

GitHub

D.

OpenStack

Question 21

Which programmatically integrates and sequences various system functions into automated workflows for executing higher-level service provisioning and management functions?

Options:

A.

Self-service portal

B.

Application Programming Interface

C.

Orchestrator

D.

Service Catalog

Question 22

Which role is responsible for designing, planning, managing, maintaining, and supporting the cloud infrastructure when transforming IT?

Options:

A.

Cloud DevOps Engineer

B.

Cloud Automation Engineer

C.

Cloud Architect

D.

Cloud Engineer

Question 23

Which type of attack can be controlled by imposing restrictions and limiting on-network resource consumption?

Options:

A.

Advanced persistent threat

B.

Phishing

C.

Side-channel

D.

Distributed denial of service

Question 24

What involves the automated arrangement, coordination, and management of various systems components that enable a user to make a service request using the self-service portal?

Options:

A.

Orchestrated service catalog updates

B.

Automated service catalog management

C.

Automated portfolio management

D.

Orchestrated service delivery

Question 25

Which cloud service lifecycle phase involves discovering services assets

Options:

A.

Service Planning

B.

Service Termination

C.

Service Operation

D.

Service Creation

Question 26

What is a characteristic of a best-of-breed infrastructure?

Options:

A.

Provides limited flexibility to choose components

B.

Prevents vendor lock-in

C.

Provides single management software to control multi-vendor components

D.

Requires less time to integrate all the components to build as an appliance

Question 27

Which defines the maximum amount of data loss that can be tolerated by a business following a disaster?

Options:

A.

MTBF

B.

RPO

C.

RTO

D.

MTTR

Question 28

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

Options:

A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth

Question 29

Which service operation management activity expedites and restores cloud services to normal operations when unplanned events cause an interruption to services?

Options:

A.

Change Management

B.

Capacity Management

C.

Configuration Management

D.

Incident Management

Question 30

What is a benefit of synchronous remote replication?

Options:

A.

Saves network bandwidth by replicating only deduplicated data

B.

Replicates data across any geographic location without impacting response time

C.

Ensures that source and replica always have identical data

D.

Supports repeated write I/O to the same location to improve replication performance

Question 31

What is true of a cloud service design best practice?

Options:

A.

Services should be readily available and dependent on one another.

B.

Services are inherently more complex and reduce administrative costs.

C.

Services should operate dependently.

D.

Services must be loosely coupled.

Question 32

What provides workflows for performing automated tasks to accomplish a desired outcome?

Options:

A.

Cloud services

B.

Orchestration

C.

Software defined infrastructure

D.

Virtual infrastructure

Question 33

What is a characteristic of reporting?

Options:

A.

Provides tabular or graphical views of monitored information

B.

Provides information about events or impending threats or issues

C.

Displays a personalized functional interface

D.

Presents service instances to consumers in real time

Question 34

What term refers to the entry points from which an attack can be launched?

Options:

A.

Attack surface

B.

Attack factor

C.

Attack vector

Question 35

What is a characteristic of a converged infrastructure?

Options:

A.

Eliminates CAPEX

B.

Eliminates OPEX

C.

Does not require a separate storage array

D.

Enables rapid scalability

Question 36

What steps appear in the service enablement roadmap?

Options:

A.

Define, Create, Plan, Enable, Terminate

B.

Understand, Plan, Build, Enable, Optimize

C.

Define, Observe, Understand, Enable, Act

D.

Plan, Action, Condition, Enable, End

Page: 1 / 9
Total 122 questions