Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

EMC DES-2T13 - Specialist – Cloud Architect, Cloud Infrastructure Exam

Page: 1 / 3
Total 74 questions

What is the benefit of Hot Spare disks?

A.

Enable efficient use of SSDs and NL SAS drive technologies

B.

Provide space-optimal data redundancy against multiple drive failures

C.

Handle any disk failure by distributing data over multiple drives

D.

Replace failed drives by taking the identity of the failed drive

Which authentication and authorization feature is critical for service providers when supporting multi-tenancy?

A.

Integration with external authentication services

B.

Integration with external directory services

C.

Portal authentication services

D.

Single sign-on capability

A cloud architect is evaluating an organization’s need for encryption. Which type of encryption eliminates the requirement for key management?

A.

File system-based

B.

Virtual disk

C.

Embedded

D.

File-based

SPECIAL INSTRUCTIONS REMINDER

The remaining questions are associated with two cases.

Each case has an introductory, descriptive passage (case text) that describes background information and requirements for a specific cloud based design. And each case has a set of six related, randomized questions. You will need to read the case text in order to answer the related questions correctly.

Given that there are two cases with six scored questions each, the total number of case-based scored questions is 12.

When you display each questions you can easily review the related case text in a pop-up window by clicking on the “Case” icon (shown below)

Case 4

Refer to the exhibit.

Your company is currently using a traditional SAN storage network. The server infrastructure is partially virtualized. There is a public cloud in place that is used to test development and application migration to cloud.

Business requirements:

    Consolidate the network, storage, and compute resources

    Simplify network management and storage provisioning

    Maintain application performance

    Need to share resources to reduce cost and improve efficiency

Other considerations:

    Monitoring of protection SLAs

    All transactions must be logged for auditing review

    Users are validated using internal credentials

Refer to Case 4.

You are designing a private cloud to use VLANs to support compute-to-compute connectivity. The IT team has added a requirement to simplify the configuration management within the infrastructure.

What is a limitation related to VLANs for this requirement?

A.

VLANs require separate infrastructure and management traffic trunks

B.

VLANs can only support up to 4094 virtual networks

C.

Adding a new VLAN requires configuration changes throughput the stack

D.

Converged infrastructure limits which NICs can separate network traffic types

An organization wants to deploy SaaS applications in their cloud. The SaaS applications will be using

application HA to maintain up-time levels of 99,9%.

What should the cloud architect include in the design to support this up-time requirement?

A.

Sufficient host capacity

B.

HA licenses for hypervisors

C.

Quorum disks

D.

Replication licenses for hypervisors

In a cloud design, an architect has defined a separate trust zone for host management. The hosts will be

running open source hypervisors.

What should be included in the design deliverables to support this separate trust zone?

A.

Federated authentication source and preferred QoS network settings

B.

Isolated management network and a federated super-user account

C.

Separate PKI and encrypted CMP portal access

D.

Separate PKI and a separate authentication source

What would you describe is a key characteristic of cloud platform as a Service (PaaS)?

A.

Direct control over the underlying infrastructure

B.

Cloud hosted integrated development environment

C.

Home-grown programming environment

D.

Cloud hosted, in house built tools

As a cloud architect, you are designing a CI solution to ensure that you isolate specific workloads for security.

What should you design for?

A.

High Availability

B.

Fault Tolerance

C.

Multi-tenancy

D.

Redundancy

In which cloud design lifecycle phase is business value analysis performed?

A.

Understand requirements

B.

Plan and design

C.

Implementation

D.

Validation

SPECIAL INSTRUCTIONS REMINDER

The remaining questions are associated with two cases.

Each case has an introductory, descriptive passage (case text) that describes background information and requirements for a specific cloud based design. And each case has a set of six related, randomized questions. You will need to read the case text in order to answer the related questions correctly.

Given that there are two cases with six scored questions each, the total number of case-based scored questions is 12.

When you display each questions you can easily review the related case text in a pop-up window by clicking on the “Case” icon (shown below)

Case 4

Refer to the exhibit.

Your company is currently using a traditional SAN storage network. The server infrastructure is partially virtualized. There is a public cloud in place that is used to test development and application migration to cloud.

Business requirements:

    Consolidate the network, storage, and compute resources

    Simplify network management and storage provisioning

    Maintain application performance

    Need to share resources to reduce cost and improve efficiency

Other considerations:

    Monitoring of protection SLAs

    All transactions must be logged for auditing review

    Users are validated using internal credentials

Refer to Case 4.

You are designing a brownfield cloud. You review the requirements and must determine the best, low-cost solution.

Which components must you include to meet the business requirements?

A.

AD, AppDev platform, and Service Catalog

B.

CI infrastructure, CMP, and AppDev platform

C.

HCI infrastructure, CMP, and AD

D.

CMP, AppDev platform, and Service Catalog