Pass the EMC DCA-CIS DEA-2TT4 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

What happens when a link in a link aggregation group is lost?

Options:

A.

All the network traffic is held in the queue until the link is repaired.


B.

All network traffic on that link is redistributed to another link aggregation group.


C.

All the network traffic is resent by the sender after the link is repaired.


D.

All network traffic on that link is redistributed across the remaining links in that group.


Expert Solution
Questions # 22:

What benefit is provided in subscription by peak usage chargeback model?

Options:

A.

Can start small with minimal cost


B.

Easy to implement - track user authentication


C.

Clear cost justification


D.

Easier to manage financially with a predetermined, reoccurring billing cycle


Expert Solution
Questions # 23:

Which are core attributes to a modern infrastructure?

Options:

A.

Adaptable, software-defined, and scale-out


B.

Resilient, scale-out, and cloud-enabled


C.

Flash, software-defined, and cloud-enabled


D.

Consolidation, flash, and scale-out


Expert Solution
Questions # 24:

Which programmatically integrates and sequences various system functions into automated workflows for executing higher-level service provisioning and management functions?

Options:

A.

Self-service portal


B.

Application Programming Interface


C.

Orchestrator


D.

Service Catalog


Expert Solution
Questions # 25:

A customer has expressed an interest in using AI or ML to obtain improved data analytics from their PowerEdge servers and PowerMax storage.

Which product can identify deviations and performance impacts?

Options:

A.

CloudIQ


B.

eLAB Navigator


C.

SyncIQ


D.

Storage Manager


Expert Solution
Questions # 26:

What condition can result in the development of a "shadow IT" organization?

Options:

A.

Lack of cloud extensibility inside an organization


B.

Increasing number of end user devices and different access points


C.

Bypassing of internal IT and looking elsewhere for IT services


D.

Aging facilities, and outdated policies and technology


Expert Solution
Questions # 27:

Which risk management step deploys various security mechanisms that minimize risks impacts?

Options:

A.

Identification


B.

Mitigation


C.

Assessment


D.

Monitoring


Expert Solution
Questions # 28:

Which condition triggers a warning level alert?

Options:

A.

Service has failed.


B.

Service has been created.


C.

Service instance is ready to use.


D.

Service is approaching resource usage limit.


Expert Solution
Questions # 29:

Which cloud service management option defines the suite of service offerings and aligns it to the service provider's strategic business goals?

Options:

A.

Portfolio


B.

Capacity


C.

Demand


D.

Operation


Expert Solution
Questions # 30:

Which cloud security control mechanism monitors activity using video surveillance cameras and detects unusual activities using sensors and alarms?

Options:

A.

Administrative control


B.

Technical control


C.

Corrective control


D.

Physical control


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions