Matt  Beranek
Quiz by , created more than 1 year ago

Quiz on ICCT - Cloud Technical Advocate Concepts, created by Matt Beranek on 19/10/2021.

23
0
0
No tags specified
Matt  Beranek
Created by Matt Beranek about 4 years ago
Close

ICCT - Cloud Technical Advocate Concepts

Question 1 of 51

1

The primary benefit of a bare metal server is best described by which of the following?

Select one of the following:

  • They are easy to scale

  • The access end users have to hardware resources

  • They are less costly

  • Server upgrades are easy

Explanation

Question 2 of 51

1

What can users implement for workloads that are running on virtual servers, in order to prevent failovers with multiple virtual servers and will automatically cover for each other during failure?

Select one of the following:

  • Security groups

  • Access groups

  • Resource groups

  • Placement groups

Explanation

Question 3 of 51

1

Which of the following can be used to set up policies for time-based usage spikes, like over weekends or holidays, and can be used when a company is expecting traffic to spike?

Select one of the following:

  • Time related scaling

  • Expanded scaling

  • Schedule based scaling

  • Resource based scaling

Explanation

Question 4 of 51

1

Which IBM Cloud service is the only public cloud service that supports traditional x86 and IBM AIX, IBM System i and Linux on IBM Power apps running together in the same environment?

Select one of the following:

  • Skytap

  • Direct Link

  • Satellite

  • Bluemix

Explanation

Question 5 of 51

1

Which type of gateway connects VPCs and on-premises networks through a central hub?

Select one of the following:

  • Network

  • Private

  • Public

  • Transit

Explanation

Question 6 of 51

1

IBM Code Engine is a fully managed, serverless platform that runs _____ workloads, including web apps, micro-services, event-driven functions, or batch jobs

Select one of the following:

  • Containerized

  • Application

  • Dynamic

  • Packaged

Explanation

Question 7 of 51

1

The infrastructure's design enables which virtual servers to maintain key enterprise software certification such as AIX and IBM i. What is it?

Select one of the following:

  • HyperV

  • Power systems

  • Hypervisor

  • Power VC

Explanation

Question 8 of 51

1

KVM (kernel based virtual machine) is considered which of the following?

Select one of the following:

  • Port

  • Network

  • Hypervisor

  • Gateway

Explanation

Question 9 of 51

1

What type of endpoint allows resources in on-premises Satellite locations to access a resource that runs anywhere outside of the Satellite location?

Select one of the following:

  • Direct

  • Location

  • Cloud

  • Regulated

Explanation

Question 10 of 51

1

What is the number (in multiples) that hosts can be assigned in IBM Cloud Satellite to increase the compute capacity?

Select one of the following:

  • Two

  • Three

  • Four

  • Five

Explanation

Question 11 of 51

1

Which of the following is an automated solution built on IBM Cloud bare metal server infrastructure that lets users easily enhance their current on-premises virtual desktop infrastructure (VDI) implementation by extending or migrating their deployment to the public cloud?

Select one of the following:

  • Digital Desktop

  • Dizzion Managed Desktop

  • Citrix Virtual Apps and Desktops

  • ProV Managed Desktop

Explanation

Question 12 of 51

1

Endurance tiers and performance tiers are considered provisioning options for which of the following?

Select one of the following:

  • Data storage

  • Software defined storage

  • Block storage - classic

  • Object storage

Explanation

Question 13 of 51

1

File storage shares can be connected to up to ______ authorized devices over routed TCP/IP connections for resiliency.

Select one of the following:

  • 8

  • 16

  • 32

  • 64

Explanation

Question 14 of 51

1

Due to its stateless protocol and resiliency when network events occur, what is the preferred version of NFS that is used in file storage - classic?

Select one of the following:

  • NFS v2

  • NFS v3

  • NFS v3.1

  • NFS v4

Explanation

Question 15 of 51

1

Which storage service can be geographically replicated across multiple regions?

Select one of the following:

  • Block

  • Data

  • Object

  • File

Explanation

Question 16 of 51

1

Which of the following is a storage design that separates storage software from hardware?

Select one of the following:

  • Software defined

  • Hardware defined

  • Hardware storage

  • Software storage

Explanation

Question 17 of 51

1

Which of the following refers to the plan and processes for quickly reestablishing access to apps, data, and IT resources after an outage?

Select one of the following:

  • Step action

  • Back up

  • Disaster recovery

  • Replication

Explanation

Question 18 of 51

1

Which practice is considered the most flexible type of backup method?

Select one of the following:

  • Cloud

  • Tape

  • Server

  • Hard disk

Explanation

Question 19 of 51

1

Which of the following services provides replication and disaster recovery capabilities and it can be integrated into deployment offerings to protect and recover data in a VMware virtual environment on IBM Cloud?

Select one of the following:

  • TravisCI

  • Zerto

  • TeamX

  • Tek Protect Plus

Explanation

Question 20 of 51

1

This backup and restore service integrates directly with VMware hypervisors to help an enterprise achieve high availability. What is it?

Select one of the following:

  • Zerto

  • Power systems

  • Veeam

  • Spectrum Protect Plus

Explanation

Question 21 of 51

1

Which of the following services offers real-time replication to a secondary server that is continuously audited for synchronization and gives customer confidence their business operations can switch to a waiting standby server at a moment's notice?

Select one of the following:

  • MIMIX

  • Veeam

  • Zerto

  • Spectrum Protect Plus

Explanation

Question 22 of 51

1

What is a true statement about Access Control Lists (ACLs)?

Select one of the following:

  • Typically requires a key fob for access

  • It has rules that are organized, prioritized, and considered in sequence

  • The unique identifiers are in descending order and are deleted every 365 days

  • It has rules that are written in binary as a form encryption

Explanation

Question 23 of 51

1

Which of the following is a benefit of VLAN Spanning?

Select one of the following:

  • It has many different purposes, but device communication is not one of them

  • It enables all devices on an account to communicate with each other using the private network

  • It serves business needs that require the local communication of routed traffic across the public network

  • It only enables communications across the public network

Explanation

Question 24 of 51

1

What VPC component makes it possible for an application, that is hosted on a VPC, to connect with an external database that is hosted on IBM Cloud classic bare metal servers

Select one of the following:

  • VPN Gateway

  • DMS Gateway

  • Travel Gateway

  • Transit Gateway

Explanation

Question 25 of 51

1

Which of the following is a type of Load Balancer available from IBM?

Select one or more of the following:

  • Primary Load Balancer

  • Network Load Balancer

  • Application Load Balancer

  • Cloud Pak Load Balancer

Explanation

Question 26 of 51

1

What can be deployed to a single region AND span multiple zones?

Select one of the following:

  • VPN Gateway

  • VLAN Spanner Node

  • Dynamic Name Server

  • Virtual Private Cloud

Explanation

Question 27 of 51

1

Which of the following is abenefit of VRF? Virtual Routing and Forwarding

Select one of the following:

  • A dedicated logical network per tenant that allows many types of interactions between other tenants' logical networks

  • Providing and assigning IP addresses via an access control list

  • Handling a capacity 20x more than the average VPC storage limit

  • Industry proven and widely accepted multiple isolation separation technologies

Explanation

Question 28 of 51

1

This component can be used to connect a subnet to the public internet on a VPC component

Select one of the following:

  • A public gateway

  • A floating gateway

  • A VPN gateway

  • A transit gateway

Explanation

Question 29 of 51

1

If a client has a requirement that includes a non-IBM appliance in the IBM cloud, what appliance should be used?

Select one of the following:

  • IBM Data Power Gateway Appliance

  • IBM Jupiter vSRX Appliance

  • IBM Virtual Router Appliance

  • Bring Your Own Appliance (BYOA)

Explanation

Question 30 of 51

1

Which of the following are benefits of deploying a solution across multiple regions?

Select one or more of the following:

  • Improvement of user experience by deploying resources closer to their point of origin

  • The ability to recover quickly in the event a region fails

  • The ability to store user data in their region

  • Enhanced physical isolation which offers security and regulatory benefits

Explanation

Question 31 of 51

1

What can be used to design customized network topologies?

Select one of the following:

  • BYOIP

  • BYOA

  • TCP/IP

  • DNS

Explanation

Question 32 of 51

1

Which IBM integration solution is highly scalable messaging platform that can use technologies such as JMS to integrate applications?

Select one of the following:

  • API Connect

  • APP Connect

  • IBM Event Streams

  • MQ

Explanation

Question 33 of 51

1

Which IBM integration solution assists with accessing, transforming, and combining data assests and exposing them as APIs?

Select one of the following:

  • API Connect

  • APP Connect

  • IBM App Connect Enterprise

  • IBM Event Streams

Explanation

Question 34 of 51

1

If a developer wants to build a smart app that can respond to events in real time, he or she should use ____ ?

Select one of the following:

  • API Connect

  • App Connect

  • IBM App Connect Enterprise

  • IBM Event Streams

Explanation

Question 35 of 51

1

Which statements are true concerning Edge funcitons?

Select one or more of the following:

  • Edge functions run in the user's browser

  • Edge functions require a bare metal server as the execution environment

  • Edge functions allow the creation or modification of existing appliactions using a serverless environment

  • Edge functions run on CIS Edge servers

Explanation

Question 36 of 51

1

Which rung of the AI Ladder involves operationalizing AI?

Select one of the following:

  • Analyze

  • Collect

  • Organize

  • Infuse

Explanation

Question 37 of 51

1

Which statement correctly describes the features and capabilities of Watson Assistant?

Select one of the following:

  • Allows you to build a branded chatbot

  • Allows you to embed machine learning into a business

  • Provide access to open source tools such as RStudio

  • Implements explainable AI

Explanation

Question 38 of 51

1

If you need to track and measure outcomes from AI, you should use ______ ?

Select one of the following:

  • Watson Studio

  • Watson OpenScale

  • Watson Assistant

  • Watson Knowledge Catalog

Explanation

Question 39 of 51

1

Which database would have limited horizontal scaling abilities?

Select one of the following:

  • Cloudant

  • Db2

  • MongoDB

  • Redis

Explanation

Question 40 of 51

1

Which of the following are true about using IBM Cloud Databases and Database-as-a-service?

Select one or more of the following:

  • There are predictable, periodic charges, based on consumed services

  • They are managed by IBM, unless customers specifically request to manage some aspects themselves

  • They feature enterprise grade security, including encryption of data at rest and in transit

  • Users must purchase and set up their own hardware

Explanation

Question 41 of 51

1

Which of the following are true statements about IBM Hyper Protect Crypto Services?

Select one or more of the following:

  • IBM Hyper Protect Crypto Services stores keys in a hardware security module

  • IBM Hyper Protect Crypto Services provides Keep Your Own Key capabilities

  • IBM Hyper Protect Crypto Services uses a different key provider API than does Key Protect

  • IBM Hyper Protect Crypto Services integrates with Cloud Identify and Access Management

Explanation

Question 42 of 51

1

When it comes to protecting user data from internal security threats, which of the following is considered the most popular and effective control?

Select one of the following:

  • Replication

  • Encryption

  • Backup

  • Incremental

Explanation

Question 43 of 51

1

Which of the following is considered a list of rules that limit who can access a particular subnet within a VPC?

Select one of the following:

  • Security Group

  • Certificate

  • Logical

  • Access Control

Explanation

Question 44 of 51

1

Security groups and ACLs provide ways to control the traffic across the _____ and instances in a company's IBM Cloud Virtual Private Cloud, using rules that they specify.

Select one of the following:

  • Network

  • Internet

  • Subnet

  • Gateway

Explanation

Question 45 of 51

1

Which ID is considered a second type of identity that is used in an account?

Select one of the following:

  • Service

  • IBM

  • App

  • User

Explanation

Question 46 of 51

1

Which IBM service enables users to run containerized application in a secure enclave on an IBM IKS host, providing data-in-use protection?

Select one of the following:

  • Analytics Engine

  • Continuous Delivery

  • Data Shield

  • Secrets Manager

Explanation

Question 47 of 51

1

In an IBM Cloud platform management role who would be permitted to modify the state of the resources such as create, delete, and edit, as well as create and delete sub-resources in a VPC

Select one of the following:

  • Administrator

  • Editor

  • Operator

  • Viewer

Explanation

Question 48 of 51

1

Users need to install and register which type of worker so that IBM Cloud continuous delivery development teams can use them in their toolchain configuration?

Select one of the following:

  • Personal

  • Secret

  • Public

  • Private

Explanation

Question 49 of 51

1

When using IBM COS what types of data are encrypted?

Select one of the following:

  • Data at rest

  • Data in transit

  • Data in motion

  • Data in use

Explanation

Question 50 of 51

1

Which IBM Cloud storage services are provisioned with either an endurance or performance option, is secured with provider-managed encryption, and where the customer incurs no extra cost and no impact to performance?

Select one or more of the following:

  • Object

  • Block

  • Database

  • File

Explanation

Question 51 of 51

1

Which of the following IBM services is used to manage SSL/TSL certificates?

Select one of the following:

  • Certificate manager

  • Authentication manager

  • License manager

  • Validation manager

Explanation