Pass the EMC DCA-CIS DEA-2TT4 Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

What is true of a cloud service design best practice?

Options:

A.

Services should be readily available and dependent on one another.


B.

Services are inherently more complex and reduce administrative costs.


C.

Services should operate dependently.


D.

Services must be loosely coupled.


Expert Solution
Questions # 12:

What is a function of a cloud portal?

Options:

A.

Updates IT resources database


B.

Replicates container resources in a web portal


C.

Interacts with the orchestration layer


D.

Creates workflows for automated scheduling


Expert Solution
Questions # 13:

What provides workflows for performing automated tasks to accomplish a desired outcome?

Options:

A.

Cloud services


B.

Orchestration


C.

Software defined infrastructure


D.

Virtual infrastructure


Expert Solution
Questions # 14:

What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?

Options:

A.

Digital Evaluators


B.

Digital Laggards


C.

Digital Adopters


D.

Digital Leaders


Expert Solution
Questions # 15:

What is true about application virtualization?

Options:

A.

Resolves application conflicts and compatibility issues


B.

Allows for OS modifications on host machines


C.

Prevents the use of conflicting applications on the same end-point device


D.

Increases the complexity of application deployment


Expert Solution
Questions # 16:

Which cloud service lifecycle phase involves discovering services assets

Options:

A.

Service Planning


B.

Service Termination


C.

Service Operation


D.

Service Creation


Expert Solution
Questions # 17:

Which compute system component contains boot firmware?

Options:

A.

Operating System


B.

Hard Disk Drive


C.

Read Only Memory


D.

Random Access Memory


Expert Solution
Questions # 18:

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

Options:

A.

Trusted computing base


B.

Information assurance framework


C.

Adaptive security


D.

Defense-in-depth


Expert Solution
Questions # 19:

How is application functionality segmented when using a microservices approach in an application development environment?

Options:

A.

Dependent and tightly coupled services


B.

Independent and tightly coupled services


C.

Dependent and loosely coupled services


D.

Independent and loosely coupled services


Expert Solution
Questions # 20:

Identify a threat caused, when an attacker sends massive quantities of data to the target with the intention of consuming bandwidth.

Options:

A.

Advanced persistent threat


B.

Denial-of-service


C.

Malicious insider


D.

Account hijacking


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions