An architect must design a Virtual Private Cloud (VPC) to only allow private connectivity to the corporate data center. Which IBM Cloud service accomplishes this requirement?
AA Cloud Internet Services global load balancer
BA Virtual Private Cloud (VPC) transit gateway
CA Virtual Private Cloud (VPC) DNS service
DDirect Link 2.0
IBM Cloud Hyper Protect Crypto Services provide a dedicated key management service and Hardware Security Module (HSM) that provides the Keep Your Own Key capability. What is a hardware security module (HSM)?
AA bare metal server configured with anti-virus software and firewall rules to prevent a security breach
BA physical USB key used to manage digital keys and provides crypto-processing
CA software application that generates digital keys for strong authentication and distributes key information
DA dedicated cryptographic processing system for key generation, encryption, decryption, and key storage
What are two supported provisioning tiers for Block Storage - Classic on IBM Cloud? (Choose two.)
AAutoscale
BHigh Volume
CEndurance
DSecure
EPerformance
What is the primary purpose of VLAN spanning?
AIt enables all devices on an account to communicate with each other using the private network
BIt enables all required private network devices to be blocked from public access
CIt enables all devices of all the customer accounts to communicate with customer provided applications
DIt enables public access to all required public network devices
Question 6
Administration
0
Question 7
Components and Architecture
Question 8
Administration
Question 9
Components and Architecture
Question 10
Components and Architecture
Question 11
Administration
Question 12
Administration
Question 13
Components and Architecture
Question 14
Development and Integration
Question 15
Components and Architecture
Question 16
Components and Architecture
Question 17
Administration
Question 18
Administration
Question 19
Components and Architecture
Question 20
Administration
Question 21
Administration
Question 22
Components and Architecture
Question 23
Administration
Question 24
Administration
Question 25
Components and Architecture
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
IBM Cloud offers which two container orchestration platforms as managed services? (Choose two.)
AApache Mesos
BRed Hat OpenShift
CTanzu
DKubernetes
EDocker Swarm
Which component of a Virtual Private Cloud (VPC) filters traffic based on IP address?
ASecurity group
BZone
CHardware firewall
DPublic gateway
What was the earliest implementation of cloud computing?
AProviding compute resources for complex problems such as asteroid tracking
BLAN parties and cyber cafes
CIndexing large data sets across universities
DSelling unused time slices of computing
Which two types of endpoints are utilized by IBM Cloud Satellite? (Choose two.)
ACloud
BSatellite
CRegion
DServer
ELocation
Which rung of the IBM AI Ladder is described as scale business insight with artificial intelligence everywhere?
AAnalyze
BCollect
CInfuse
DOrganize
What is a benefit for a company that modernizes legacy applications?
AIt is crucial that today’s companies stay ahead of the evolution of computing technologies
BTakes the compute solution from a nice-to-have, cost-cutting technology today, to one that drives transformation across and within industries
CAccelerates digital transformation, improve developer productivity, improve operational efficiency and standardization
DApplications and services can be rapidly provisioned and released with minimal management effort or service provider interaction
Which default ports are used by Satellite Link to correctly route requests for multiple destination resources?
A443 (HTTP) and 80 (HTTPS)
B8080 (HTTP) and 443 (HTTPS)
C80 (HTTP) and 8443 (HTTPS)
D80 (HTTP) and 443 (HTTPS)
An architect has received the requirements to deploy a legacy application to the Cloud. The requirements indicate storage must have hierarchical structure, data encryption, and a large amount of storage. Which option meets these requirements?
AStore on block storage then create multiple namespaces with one bucket each
BStore data on the boot volume and access it by connecting to the compute instance
CStore on file storage then create a file system and a mount target
DStore on object storage then create a single namespace and multiple buckets to create the hierarchical directory structure
What is the protocol used for enabling communication with IBM Cloud File Storage?
ANFS
BCIFS
CSMB
DFTP
Which storage for IBM Kubernetes Service (IKS) provides a highly available software-defined storage solution that can be used to manage local persistent storage for containerized databases and other stateful applications, or to share data between pods across multiple zones?
ACloud Object Storage
BPortworx
CBlock Storage
DFile Storage
Which feature does the Red Hat OpenShift web console include?
AGit
BDocker Hub
CQuay
DOperatorHub
Which applications are consistent with optimal application development, deployment, management, and performance across public, private, and multi-cloud environments?
ACloud-native
BMonolith
CResponsive Web Application
DMobile Application
Which product would be appropriate for a client that uses IBM Power iSeries and needs to be able to replicate data to another IBM Power Virtual Server?
AMIMIX
BVeeam
CSpectrum Protect
DZerto
What is a characteristic of a SQL database?
AEventual consistency
BUnstructured data
CACID transactions
DFast access to key-value data
What can be used to establish a private and secure connection between a client environment and IBM Cloud services?
ATransient Endpoints
BIBM Cloud Services Endpoints
CVPN Endpoints
DVirtual Public Endpoints
An oil and gas exploration company is concerned with encrypting their data. What encryption methods are supported when the customer uses IBM Cloud Block Storage for Virtual Private Cloud (VPC)?
ABYOK, MYOK
BKYOK, MYOK
CKYOK, BYOK
DMYOK, CYOK
By default, what is true about all resources within the same Virtual Private Cloud (VPC)?
AExternal connectivity is established between each subnet and a public gateway
BAll end-to-end communication is encrypted
CThey can communicate via private network across all subnets
DEach instance is protected by a unique security group
Which IBM Cloud service can monitor risk models for performance, bias and explainability to limit risk exposure from regulations and create more fair and explainable outcomes for customers?
AWatson OpenScale
BWatson Studio
CWatson AI 360
DWatson Trust & Compliance
Virtual servers on LinuxONE are available through which IBM Cloud compute option?
AHyper Protect Virtual Server
BBare Metal Server
CVMware Server
DVirtual Server
A developer wants to deploy multiple private applications on Red Hat OpenShift on IBM Cloud in a Virtual Private Cloud (VPC). What would be required to implement custom routing rules and SSL termination for those multiple applications?