The Cloud Service Provider Adoption Pattern provides two solutions which may be delivered together or independently. What are the two solutions? (Choose two.)
A. Storefront/aggregation solution
B. Core infrastructure management solution
C. Core enterprise network solution
D. On demand solution
E. Big data solution
正解:A,B
質問 2:
What is the objective of the Building Software as a Service (SaaS) Adoption Pattern of the IBM Cloud Computing Reference Architecture V3?
A. To describe how to build a private cloud that use SaaS services
B. To describe how to build applications so that they can be exposed as services
C. To describe how to build an infrastructure to deliver SaaS services
D. To describe how to prepare a data center to deliver Infrastructure as a Service and Platform as a Service cloud services to consumer users
正解:C
質問 3:
What type of cloud computing environment provides and manages some capabilities inhouse and has others provided externally?
A. Private cloud
B. Public cloud
C. Community cloud
D. Hybrid cloud
正解:D
質問 4:
Who is responsible for the hardware and application costs in an Infrastructure as a Service public cloud?
A. The hardware vendor supplying the hosting infrastructure
B. The consumer ordering the service
C. The hardware costs are paid for by the public cloud provider and the application costs are paid for by the consumer
D. The public cloud provider
正解:C
質問 5:
What is a valid integration strategy to an existing IBM endpoint security solution when IBM Tivoli Service Automation Manager (TSAM) is used to createan Infrastructure as a Servicecloud?
A. TSAM interacts with the hypervisor to trigger the installation of end point management capabilities in the cloud.
B. TSAM will provision an instance of the existing endpoint security solution so that the newly provisioned virtual machines can be related to the endpoint management domain.
C. Install an agent using its software stack installation capability. The endpoint solution will handle the rest of the interaction.
D. Define virtual machine templates that have the required software already installed. Then TSAM will orchestrate the interaction between the virtual machines and the corresponding endpoint security solution.
正解:C