Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

DEA-2TT4 Associate - Cloud Infrastructure and Services v4 Exam Questions and Answers

Questions 4

Which backup service deployment is utilized when a backup is performed in a consumer location and then the backup data is sent to the cloud for DR purpose?

Options:

A.

Remote Backup Service

B.

Cloud-to-cloud Backup Service

C.

Managed Backup Service

D.

Replication Backup Service

Buy Now
Questions 5

Which is a characteristic of the chargeback model?

Options:

A.

Financial systems require agent plug-in.

B.

Service costs reporting to the business.

C.

Customers are billed for services that are consumed.

Buy Now
Questions 6

Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?

Options:

A.

Integrity

B.

Authorization

C.

Authentication

D.

Confidentiality

Buy Now
Questions 7

What helps to recover the cost of providing the service, ensuring profitability, and meeting the provider’s return on investment and reinvestment goals?

Options:

A.

Service negotiation

B.

Service level objective

C.

Service valuation

D.

Service level agreement

Buy Now
Questions 8

Which Dell Technologies product can automate and centralize the collection and analysis of data across physical and virtual environments?

Options:

A.

NetWorker

B.

Data Protection Advisor

C.

SourceOne

D.

Avamar

Buy Now
Questions 9

Which plane in a software-defined storage environment manages and provisions storage?

Options:

A.

control

B.

Data

C.

Application

D.

Service

Buy Now
Questions 10

What is used to update information in a configuration management database?

Options:

A.

Discovery tool

B.

Capacity management tool

C.

Configuration manager

D.

Performance management tool

Buy Now
Questions 11

Which attribute of software-defined infrastructure is responsible for providing abstracted view of the IT infrastructure?

Options:

A.

Abstraction and Polling

B.

Unified Management

C.

Self-Service Portal

D.

Metering

Buy Now
Questions 12

Which cloud service lifecycle phase involves discovering services assets

Options:

A.

Service Planning

B.

Service Termination

C.

Service Operation

D.

Service Creation

Buy Now
Questions 13

Which function collects information about competing service offerings?

Options:

A.

Service performance management

B.

Service portfolio management

C.

Service operations management

D.

Service demand management

Buy Now
Questions 14

What are the benefits of modern applications compared to traditional applications?

Options:

A.

Designed to run independently and use a linear, continuous approach in development, build, test, and deploy

B.

Distributed system architecture, designed to run independently, and use multiple programming languages

C.

Single programming language and framework and scale by growing vertically

D.

Monolithic, built with interdependent modules, and use distributed system architecture

Buy Now
Questions 15

What is a benefit of secure multitenancy?

Options:

A.

Reduces unauthorized access to resources

B.

Blocks unauthorized access to resources

C.

Eliminates data breach risks

D.

Protects cloud infrastructure

Buy Now
Questions 16

Which storage data protection technique provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

Options:

A.

Erasure coding

B.

Cache protection

C.

RAID

D.

Dynamic disk sparing

Buy Now
Questions 17

Which fault-tolerant mechanism, in a highly available application design is implemented within a code to handle service that is temporarily down?

Options:

A.

Checkpointing

B.

Monitoring Application Availability

C.

Graceful Degradation

D.

Retry Logic

Buy Now
Questions 18

What is the correct order of the business continuity plan principles?

DEA-2TT4 Question 18

Options:

Buy Now
Questions 19

Which cloud security control mechanism monitors activity using video surveillance cameras and detects unusual activities using sensors and alarms?

Options:

A.

Administrative control

B.

Technical control

C.

Corrective control

D.

Physical control

Buy Now
Questions 20

What is a characteristic of an object-based storage system?

Options:

A.

Extends a single file system across all storage nodes

B.

Consolidates block and file access in one storage platform

C.

Capable of dynamically creating multiple object IDs for each object

D.

Uses a flat, non-hierarchical address space

Buy Now
Questions 21

An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into nine data segments and three coding segments.

What is the maximum number of drive failures supported in the storage system?

Options:

A.

6

B.

3

C.

12

D.

9

Buy Now
Questions 22

Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?

Options:

A.

Virtual machine hardening

B.

Application hardening

C.

Operating system hardening

D.

Hypervisor hardening

Buy Now
Questions 23

What is a benefit of link aggregation?

Options:

A.

Saves bandwidth by restricting traffic to a specific potentially congested ISL

B.

Improves performance by combining two or more parallel ISLs into a single physical ISL

C.

Optimizes fabric performance by distributing network traffic across ISL

D.

Improves ISL utilization by increasing the network traffic on a specific ISL

Buy Now
Questions 24

Which is a benefit of implementing target-based deduplication?

Options:

A.

Offloads the backup client from the deduplication process

B.

Reduces storage capacity and network bandwidth requirements

C.

Backup client sends only new and unique segments across the network

D.

Optimizes ROBO environments for centralized backup

Buy Now
Questions 25

What is a key function of service operation management?

Options:

A.

Analyze customer feedback.

B.

Perform market research.

C.

Enable problem resolution.

D.

Establish pricing and budgeting

Buy Now
Questions 26

An organization has deployed a cloud infrastructure. They frequently experience power outages that result in their service offerings being periodically unavailable.

What type of unavailability are they experiencing?

Options:

A.

Ephemeral

B.

Permanent

C.

Intermittent

Buy Now
Questions 27

Which data storage type uses a non-hierarchical address space to store data?

Options:

A.

Block

B.

Object

C.

File

Buy Now
Questions 28

Which is true about a type 2 hypervisor?

Options:

A.

Installed as an application on an operating system

B.

Installed on bare-metal hardware

C.

Hypervisor vendor must certify the hardware

Buy Now
Questions 29

Which cloud role has the responsibility to perform independent cloud service assessments?

Options:

A.

Architect

B.

Broker

C.

Consumer

D.

Auditor

Buy Now
Questions 30

What describes network-attached storage (NAS)?

Options:

A.

File storage that stores data in the form of objects based on the content and other attributes of the data

B.

Dedicated file server that maintains the mapping between the object IDs and the file system namespace

C.

Storage system used for creation and assignment of block storage volumes to compute systems

D.

High-performance file server that either has integrated storage or is connected to external storage

Buy Now
Questions 31

What term refers to the entry points from which an attack can be launched?

Options:

A.

Attack surface

B.

Attack factor

C.

Attack vector

Buy Now
Questions 32

Which cloud security design principle prevents an individual from improper access or system misuse?

Options:

A.

Least privilege

B.

Data privacy and ownership

C.

Separation of duties

D.

Secure multitenancy

Buy Now
Questions 33

What workflow software enables automation of complex IT tasks?

Options:

A.

Dell EMC ScalelO

B.

VMware vRealize Orchestrator

C.

VMware HA

D.

Dell EMC XtremlO

Buy Now
Questions 34

What is the objective of Confidentiality in information security?

Options:

A.

Prevents an unauthorized user from changing data

B.

Non-repudiation and authenticity of information

C.

Ensures that identify credentials are used to verify cloud assets

D.

Restricts user access to data held within the cloud

Buy Now
Questions 35

Identify the bare-metal hypervisors?

Options:

A.

Solaris Zones and VMware Workstation

B.

ESXI and Hyper-V

C.

ESXI and VMware Fusion

D.

Oracle Virtual Box and Hyper-V

Buy Now
Questions 36

What type of cloud security control is log auditing?

Options:

A.

Detective control

B.

Corrective control

C.

Preventive control

D.

Technical control

Buy Now
Exam Code: DEA-2TT4
Exam Name: Associate - Cloud Infrastructure and Services v4 Exam
Last Update: May 4, 2024
Questions: 122

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now DEA-2TT4 testing engine

PDF (Q&A)

$35  $99.99
buy now DEA-2TT4 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 07 May 2024