Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

EMC DEA-2TT4 - Associate - Cloud Infrastructure and Services v4 Exam

Page: 3 / 4
Total 122 questions

Which risk management step deploys various security mechanisms that minimize risks impacts?

A.

Identification

B.

Mitigation

C.

Assessment

D.

Monitoring

What is true of a cloud service design best practice?

A.

Services should be readily available and dependent on one another.

B.

Services are inherently more complex and reduce administrative costs.

C.

Services should operate dependently.

D.

Services must be loosely coupled.

What steps appear in the service enablement roadmap?

A.

Define, Create, Plan, Enable, Terminate

B.

Understand, Plan, Build, Enable, Optimize

C.

Define, Observe, Understand, Enable, Act

D.

Plan, Action, Condition, Enable, End

What is an advantage of asynchronous remote replication?

A.

Ensures source LUN and replica have identical data at all times

B.

Supports replication across any geographic location without impacting response time

C.

Provides a near zero recovery point objective without impacting response time

D.

Requires less storage space for the replica than the source LUN

What refers to an agreement between provider and consumer that states the terms of service usage?

A.

Service contract

B.

Service template

C.

Chargeback

D.

Showback

What activity is included in a compliance checklist when moving data to the cloud?

A.

Determine if appropriate governance processes are available to meet consumers' requirements

B.

Ensure that IT infrastructure and data adhere to specific rules and regulations

C.

Review the financial stability of the provider to ensure its longevity

D.

Review and evaluate the usage of encryption to protect consumers' data

What describes network-attached storage (NAS)?

A.

File storage that stores data in the form of objects based on the content and other attributes of the data

B.

Dedicated file server that maintains the mapping between the object IDs and the file system namespace

C.

Storage system used for creation and assignment of block storage volumes to compute systems

D.

High-performance file server that either has integrated storage or is connected to external storage

An administrator must design a fault-tolerant IT environment for applications.

Which techniques meet this requirement?

A.

Active/Passive for Compute -

NIC Teaming for Network -

Dual disks for storage

B.

Active/Active for Compute -

Link Aggregation for Network -

Erasure Coding for storage

C.

Active/Passive for Compute -

Spanning for Network -

Dynamic Disk Sparing for storage

D.

Active/Standby for Compute -

Multipathing for Network -

RAID for storage

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth

Which two are key requirements for fault tolerance?

A.

Document SPOF and Fault Elimination

B.

Fault Isolation and Eliminate SPOF

C.

Network Isolation and Eliminate SPOF

D.

RAID Storage and Fault Isolation