Which cloud security objective provides the required secrecy of information to ensure that only authorized users have access to data held within the cloud?
What are the key functions of a control plane?
What activity is performed during the service creation phase of the cloud service lifecycle?
Which defines the maximum amount of data loss that can be tolerated by a business following a disaster?
Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment?
Which compute system component contains boot firmware?
Which cloud role has the responsibility to perform independent cloud service assessments?
Which solution can be used for automation of a customer environment?
What is the goal of lean practices in a software development methodology?
A consumer is interested in a service that provides multiple operating systems and programming frameworks for application development and deployment.
Which cloud service model meets these requirements?
What is the correct order of the business continuity plan principles?
What is a characteristic of a converged infrastructure?
What term refers to businesses that cautiously and gradually embrace digital transformation?
What is an advantage of asynchronous remote replication?
Which product enables IT organizations to ensure optimum resource usage and configuration compliance in virtualized and cloud environments?
What describes network-attached storage (NAS)?
When implementing an initial IT service center using ITILframework. In service strategy state which process needs to be considered for automation?
What is a benefit of source-based data deduplication?
Which plane in a software-defined storage environment manages and provisions storage?
Which data protection solution enables organizations to protect, manage, and recover data at scale across diverse environments?
Which attribute of software-defined infrastructure is responsible for providing abstracted view of the IT infrastructure?
Which fault-tolerant mechanism, in a highly available application design is implemented within a code to handle service that is temporarily down?
What type of cloud security control is log auditing?
What steps appear in the service enablement roadmap?
An organization has deployed a cloud infrastructure. They frequently experience power outages that result in their service offerings being periodically unavailable.
What type of unavailability are they experiencing?
What enables resource pooling and multi-tenancy in a cloud environment?
What refers to an agreement between provider and consumer that states the terms of service usage?
What benefit is provided in subscription by peak usage chargeback model?
An organization deployed a storage system that is configured with erasure coding. The erasure coding technique divides data into nine data segments and three coding segments.
What is the maximum number of drive failures supported in the storage system?
Identify the bare-metal hypervisors?
Which archiving method is most suitable and cost effective for a large organization having both sensitive data and non-sensitive data?
What term refers to businesses that do not have a digital plan, and have limited initiatives or investments related to digital transformation?
What does the management interface in a cloud portal enable consumers to do?
What is a benefit of link aggregation?
Which component presents service catalog and cloud interfaces, enabling consumers to order and manager cloud services?
Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?