Easter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

DEA-2TT4 Sample Questions Answers

Questions 4

Which fault-tolerant mechanism, in a highly available application design is implemented within a code to handle service that is temporarily down?

Options:

A.

Checkpointing

B.

Monitoring Application Availability

C.

Graceful Degradation

D.

Retry Logic

Buy Now
Questions 5

What is an advantage of asynchronous remote replication?

Options:

A.

Ensures source LUN and replica have identical data at all times

B.

Supports replication across any geographic location without impacting response time

C.

Provides a near zero recovery point objective without impacting response time

D.

Requires less storage space for the replica than the source LUN

Buy Now
Questions 6

What is a function of a cloud portal?

Options:

A.

Updates IT resources database

B.

Replicates container resources in a web portal

C.

Interacts with the orchestration layer

D.

Creates workflows for automated scheduling

Buy Now
Questions 7

What condition can result in the development of a "shadow IT" organization?

Options:

A.

Lack of cloud extensibility inside an organization

B.

Increasing number of end user devices and different access points

C.

Bypassing of internal IT and looking elsewhere for IT services

D.

Aging facilities, and outdated policies and technology

Buy Now
Questions 8

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?

Options:

A.

Integrity

B.

Authorization

C.

Authentication

D.

Confidentiality

Buy Now
Questions 9

What is a responsibility of the Service Manager role?

Options:

A.

Understanding consumers’ needs and industry trends to drive an effective product strategy

B.

Coordinating with the architecture team to define technology road maps

C.

Provide architectural oversight over individual domains

D.

Designing, planning, managing, maintaining, and supporting the cloud infrastructure

Buy Now
Questions 10

Which archiving method is most suitable and cost effective for a large organization having both sensitive data and non-sensitive data?

Options:

A.

Public Cloud-Only archiving

B.

Hybrid archiving

C.

IaaS archiving

D.

In-House archiving

Buy Now
Questions 11

Which network feature enables dynamic distribution of applications I/O traffic across VMs?

Options:

A.

NIC Teaming

B.

Erasure Coding

C.

Link Aggregation

D.

Load Balancing

Buy Now
Questions 12

What is a characteristic of reporting?

Options:

A.

Provides tabular or graphical views of monitored information

B.

Provides information about events or impending threats or issues

C.

Displays a personalized functional interface

D.

Presents service instances to consumers in real time

Buy Now
Questions 13

Which are core attributes to a modern infrastructure?

Options:

A.

Adaptable, software-defined, and scale-out

B.

Resilient, scale-out, and cloud-enabled

C.

Flash, software-defined, and cloud-enabled

D.

Consolidation, flash, and scale-out

Buy Now
Questions 14

Which risk management step deploys various security mechanisms that minimize risks impacts?

Options:

A.

Identification

B.

Mitigation

C.

Assessment

D.

Monitoring

Buy Now
Questions 15

What is a benefit of cloud automation?

Options:

A.

Reduced service provisioning time

B.

Improved physical infrastructure deployment time

C.

Decreased capital expense

Buy Now
Questions 16

Which role is responsible for designing, planning, managing, maintaining, and supporting the cloud infrastructure when transforming IT?

Options:

A.

Cloud DevOps Engineer

B.

Cloud Automation Engineer

C.

Cloud Architect

D.

Cloud Engineer

Buy Now
Questions 17

Which risk management process is in the correct order

Options:

A.

Monitoring, Risk identification, Risk mitigation, Risk assessment.

B.

Risk identification, Risk assessment, Monitoring, Risk mitigation

C.

Monitoring, Risk identification, Risk assessment, Risk mitigation.

D.

Risk Identification, Risk assessment, Risk mitigation, Monitoring

Buy Now
Questions 18

What is the objective of Confidentiality in information security?

Options:

A.

Prevents an unauthorized user from changing data

B.

Non-repudiation and authenticity of information

C.

Ensures that identify credentials are used to verify cloud assets

D.

Restricts user access to data held within the cloud

Buy Now
Questions 19

What is a possible cause for incurring high capital expenditures for IT, even though resources may remain underutilized for a majority of the time in a traditional data center?

Options:

A.

IT resources are configured for peak usage

B.

IT resources are provisioned on demand

C.

IT resources are rented as services

D.

IT resources are provisioned as self-service

Buy Now
Questions 20

What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?

Options:

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Adopters

D.

Digital Leaders

Buy Now
Questions 21

A consumer is interested in a service that provides multiple operating systems and programming frameworks for application development and deployment.

Which cloud service model meets these requirements?

Options:

A.

Storage as a Service

B.

Platform as a Service

C.

Software as a Service

D.

Data as a Service

Buy Now
Questions 22

What is true about application virtualization?

Options:

A.

Resolves application conflicts and compatibility issues

B.

Allows for OS modifications on host machines

C.

Prevents the use of conflicting applications on the same end-point device

D.

Increases the complexity of application deployment

Buy Now
Questions 23

What is a benefit of source-based data deduplication?

Options:

A.

Reduces recovery times

B.

Increase the frequency of backups

C.

Reduces network bandwidth requirements

D.

Reduces compute CPU cycles

Buy Now
Questions 24

What is the primary driver of application transformation?

Options:

A.

Drive adoption of a DevOps culture

B.

Integrate legacy applications

C.

Retire legacy applications

D.

Develop innovative IT solutions

Buy Now
Questions 25

Which Dell Technologies product can automate and centralize the collection and analysis of data across physical and virtual environments?

Options:

A.

NetWorker

B.

Data Protection Advisor

C.

SourceOne

D.

Avamar

Buy Now
Questions 26

Two departments of an organization have their own volumes created on the same storage system. What can the organization implement to prevent unauthorized access to the volumes owned by the otherdepartment?

Options:

A.

Thick LUN

B.

LUN shredding

C.

LUN masking

D.

Thin LUN

Buy Now
Questions 27

A development group is using an iterative and incremental software development method.

Which standard is being utilized?

Options:

A.

Agile

B.

ITIL

C.

DevOps

D.

Orchestration

Buy Now
Questions 28

What term refers to the entry points from which an attack can be launched?

Options:

A.

Attack surface

B.

Attack factor

C.

Attack vector

Buy Now
Questions 29

How is a container different from a virtual machine?

Options:

A.

Containers are stateful.

B.

Virtual machines are transportable.

C.

Virtual machines start faster.

D.

Containers share an operating system.

Buy Now
Questions 30

Which component presents service catalog and cloud interfaces, enabling consumers to order and manager cloud services?

Options:

A.

Cloud Operating System

B.

Orchestor

C.

Cloud Portal

D.

Service automation

Buy Now
Questions 31

What activity is performed during the service planning phase of the cloud service lifecycle?

Options:

A.

Defining Orchestration Workflow

B.

Discovering Service Assets

C.

Developing Service Proposal

D.

Defining Service Offering

Buy Now
Questions 32

What are the key focus areas for IT transformation?

Options:

A.

Technology, Infrastructure, and Automation

B.

People, Process, and Technology

C.

Process, Infrastructure, and Technology

D.

People, Technology, and infrastructure

Buy Now
Questions 33

What benefit is provided in subscription by peak usage chargeback model?

Options:

A.

Can start small with minimal cost

B.

Easy to implement - track user authentication

C.

Clear cost justification

D.

Easier to manage financially with a predetermined, reoccurring billing cycle

Buy Now
Questions 34

Which type of cloud tool controls resources such as compute, storage, and network?

Options:

A.

Management and operation

B.

Automation and orchestration

C.

Collaboration and communication

D.

Monitoring and alerting

Buy Now
Questions 35

What is a characteristic of a best-of-breed infrastructure?

Options:

A.

Provides limited flexibility to choose components

B.

Prevents vendor lock-in

C.

Provides single management software to control multi-vendor components

D.

Requires less time to integrate all the components to build as an appliance

Buy Now
Questions 36

What are the benefits of modern applications compared to traditional applications?

Options:

A.

Designed to run independently and use a linear, continuous approach in development, build, test, and deploy

B.

Distributed system architecture, designed to run independently, and use multiple programming languages

C.

Single programming language and framework and scale by growing vertically

D.

Monolithic, built with interdependent modules, and use distributed system architecture

Buy Now
Exam Code: DEA-2TT4
Exam Name: Associate - Cloud Infrastructure and Services v4 Exam
Last Update: May 14, 2024
Questions: 122
$64  $159.99
$48  $119.99
$40  $99.99
buy now DEA-2TT4