The primary benefit of a bare metal server is best described by which of the following?
They are easy to scale
The access end users have to hardware resources
They are less costly
Server upgrades are easy
What can users implement for workloads that are running on virtual servers, in order to prevent failovers with multiple virtual servers and will automatically cover for each other during failure?
Security groups
Access groups
Resource groups
Placement groups
Which of the following can be used to set up policies for time-based usage spikes, like over weekends or holidays, and can be used when a company is expecting traffic to spike?
Time related scaling
Expanded scaling
Schedule based scaling
Resource based scaling
Which IBM Cloud service is the only public cloud service that supports traditional x86 and IBM AIX, IBM System i and Linux on IBM Power apps running together in the same environment?
Skytap
Direct Link
Satellite
Bluemix
Which type of gateway connects VPCs and on-premises networks through a central hub?
Network
Private
Public
Transit
IBM Code Engine is a fully managed, serverless platform that runs _____ workloads, including web apps, micro-services, event-driven functions, or batch jobs
Containerized
Application
Dynamic
Packaged
The infrastructure's design enables which virtual servers to maintain key enterprise software certification such as AIX and IBM i. What is it?
HyperV
Power systems
Hypervisor
Power VC
KVM (kernel based virtual machine) is considered which of the following?
Port
Gateway
What type of endpoint allows resources in on-premises Satellite locations to access a resource that runs anywhere outside of the Satellite location?
Direct
Location
Cloud
Regulated
What is the number (in multiples) that hosts can be assigned in IBM Cloud Satellite to increase the compute capacity?
Two
Three
Four
Five
Which of the following is an automated solution built on IBM Cloud bare metal server infrastructure that lets users easily enhance their current on-premises virtual desktop infrastructure (VDI) implementation by extending or migrating their deployment to the public cloud?
Digital Desktop
Dizzion Managed Desktop
Citrix Virtual Apps and Desktops
ProV Managed Desktop
Endurance tiers and performance tiers are considered provisioning options for which of the following?
Data storage
Software defined storage
Block storage - classic
Object storage
File storage shares can be connected to up to ______ authorized devices over routed TCP/IP connections for resiliency.
8
16
32
64
Due to its stateless protocol and resiliency when network events occur, what is the preferred version of NFS that is used in file storage - classic?
NFS v2
NFS v3
NFS v3.1
NFS v4
Which storage service can be geographically replicated across multiple regions?
Block
Data
Object
File
Which of the following is a storage design that separates storage software from hardware?
Software defined
Hardware defined
Hardware storage
Software storage
Which of the following refers to the plan and processes for quickly reestablishing access to apps, data, and IT resources after an outage?
Step action
Back up
Disaster recovery
Replication
Which practice is considered the most flexible type of backup method?
Tape
Server
Hard disk
Which of the following services provides replication and disaster recovery capabilities and it can be integrated into deployment offerings to protect and recover data in a VMware virtual environment on IBM Cloud?
TravisCI
Zerto
TeamX
Tek Protect Plus
This backup and restore service integrates directly with VMware hypervisors to help an enterprise achieve high availability. What is it?
Veeam
Spectrum Protect Plus
Which of the following services offers real-time replication to a secondary server that is continuously audited for synchronization and gives customer confidence their business operations can switch to a waiting standby server at a moment's notice?
MIMIX
What is a true statement about Access Control Lists (ACLs)?
Typically requires a key fob for access
It has rules that are organized, prioritized, and considered in sequence
The unique identifiers are in descending order and are deleted every 365 days
It has rules that are written in binary as a form encryption
Which of the following is a benefit of VLAN Spanning?
It has many different purposes, but device communication is not one of them
It enables all devices on an account to communicate with each other using the private network
It serves business needs that require the local communication of routed traffic across the public network
It only enables communications across the public network
What VPC component makes it possible for an application, that is hosted on a VPC, to connect with an external database that is hosted on IBM Cloud classic bare metal servers
VPN Gateway
DMS Gateway
Travel Gateway
Transit Gateway
Which of the following is a type of Load Balancer available from IBM?
Primary Load Balancer
Network Load Balancer
Application Load Balancer
Cloud Pak Load Balancer
What can be deployed to a single region AND span multiple zones?
VLAN Spanner Node
Dynamic Name Server
Virtual Private Cloud
Which of the following is abenefit of VRF? Virtual Routing and Forwarding
A dedicated logical network per tenant that allows many types of interactions between other tenants' logical networks
Providing and assigning IP addresses via an access control list
Handling a capacity 20x more than the average VPC storage limit
Industry proven and widely accepted multiple isolation separation technologies
This component can be used to connect a subnet to the public internet on a VPC component
A public gateway
A floating gateway
A VPN gateway
A transit gateway
If a client has a requirement that includes a non-IBM appliance in the IBM cloud, what appliance should be used?
IBM Data Power Gateway Appliance
IBM Jupiter vSRX Appliance
IBM Virtual Router Appliance
Bring Your Own Appliance (BYOA)
Which of the following are benefits of deploying a solution across multiple regions?
Improvement of user experience by deploying resources closer to their point of origin
The ability to recover quickly in the event a region fails
The ability to store user data in their region
Enhanced physical isolation which offers security and regulatory benefits
What can be used to design customized network topologies?
BYOIP
BYOA
TCP/IP
DNS
Which IBM integration solution is highly scalable messaging platform that can use technologies such as JMS to integrate applications?
API Connect
APP Connect
IBM Event Streams
MQ
Which IBM integration solution assists with accessing, transforming, and combining data assests and exposing them as APIs?
IBM App Connect Enterprise
If a developer wants to build a smart app that can respond to events in real time, he or she should use ____ ?
App Connect
Which statements are true concerning Edge funcitons?
Edge functions run in the user's browser
Edge functions require a bare metal server as the execution environment
Edge functions allow the creation or modification of existing appliactions using a serverless environment
Edge functions run on CIS Edge servers
Which rung of the AI Ladder involves operationalizing AI?
Analyze
Collect
Organize
Infuse
Which statement correctly describes the features and capabilities of Watson Assistant?
Allows you to build a branded chatbot
Allows you to embed machine learning into a business
Provide access to open source tools such as RStudio
Implements explainable AI
If you need to track and measure outcomes from AI, you should use ______ ?
Watson Studio
Watson OpenScale
Watson Assistant
Watson Knowledge Catalog
Which database would have limited horizontal scaling abilities?
Cloudant
Db2
MongoDB
Redis
Which of the following are true about using IBM Cloud Databases and Database-as-a-service?
There are predictable, periodic charges, based on consumed services
They are managed by IBM, unless customers specifically request to manage some aspects themselves
They feature enterprise grade security, including encryption of data at rest and in transit
Users must purchase and set up their own hardware
Which of the following are true statements about IBM Hyper Protect Crypto Services?
IBM Hyper Protect Crypto Services stores keys in a hardware security module
IBM Hyper Protect Crypto Services provides Keep Your Own Key capabilities
IBM Hyper Protect Crypto Services uses a different key provider API than does Key Protect
IBM Hyper Protect Crypto Services integrates with Cloud Identify and Access Management
When it comes to protecting user data from internal security threats, which of the following is considered the most popular and effective control?
Encryption
Backup
Incremental
Which of the following is considered a list of rules that limit who can access a particular subnet within a VPC?
Security Group
Certificate
Logical
Access Control
Security groups and ACLs provide ways to control the traffic across the _____ and instances in a company's IBM Cloud Virtual Private Cloud, using rules that they specify.
Internet
Subnet
Which ID is considered a second type of identity that is used in an account?
Service
IBM
App
User
Which IBM service enables users to run containerized application in a secure enclave on an IBM IKS host, providing data-in-use protection?
Analytics Engine
Continuous Delivery
Data Shield
Secrets Manager
In an IBM Cloud platform management role who would be permitted to modify the state of the resources such as create, delete, and edit, as well as create and delete sub-resources in a VPC
Administrator
Editor
Operator
Viewer
Users need to install and register which type of worker so that IBM Cloud continuous delivery development teams can use them in their toolchain configuration?
Personal
Secret
When using IBM COS what types of data are encrypted?
Data at rest
Data in transit
Data in motion
Data in use
Which IBM Cloud storage services are provisioned with either an endurance or performance option, is secured with provider-managed encryption, and where the customer incurs no extra cost and no impact to performance?
Database
Which of the following IBM services is used to manage SSL/TSL certificates?
Certificate manager
Authentication manager
License manager
Validation manager