Which three cloud reporting-related capabilities are delivered as part of IBM Tivoli Monitoring? (Choose three.)
A. management plans
B. topology models
C. reporting based on historical data
D. custom queries
E. situations for event monitoring
F. workflows
正解:C,D,E
質問 2:
If the cloud management service tools detects storage is constrained for a cloud system, how would the cloud respond?
A. archive and delete data
B. increase the filesystem size within the customer's SLA limits
C. increase the alert threshold for filesystems
D. increase quota
正解:B
質問 3:
What are two optimized workload characteristics supported by the IBM cloud portfolio? (Choose two.)
A. tightly-coupled
B. analytics
C. centralized message bus
D. structured related data model
E. high-performance computing
正解:B,E
質問 4:
What are two considerations before moving data to a public cloud? (Choose two.)
A. A company should encrypt all data so that they do not have to analyze legal and regulatory issues.
B. A company should analyze data structure to see if they can take advantage of public cloud data models.
C. A company must restructure all data to accommodate a public cloud data model.
D. A company should analyze all legal and regulatory issues that pertain to the data.
E. A company can safely assume that cloud services will replicate and backup all of their data.
正解:B,D
質問 5:
A virtual network solution ensures which capability?
A. orchestration of deployment independent of network topology
B. automatic expiration of unused virtual network elements
C. high availability without the need for connectivity redundancy
D. transfer of VLAN configuration with a migrated virtual server as the MAC and IP address is persistent
正解:D
質問 6:
What is a design consideration for loosely coupled systems?
A. bootstrapping
B. inter process communication
C. auto-scaling
D. using queues
正解:D
質問 7:
Security in the network is enhanced by including which two services in the cloud infrastructure? (Choose two.)
A. virtual network isolation to secure multi-tenant domains
B. intrusion prevention services
C. auditing of file and file system ownership and permissions
D. intelligent switch hardware that is self-healing
E. DHCP with short term leases to make tracking IP addresses more difficult
正解:A,B
質問 8:
An enterprise is utilizing a cloud computing environment in which the infrastructure resides off-premise, multiple users share access to the cloud services, and users access the cloud over the Internet. What is the name of this cloud deployment model?
A. community cloud
B. public cloud
C. private cloud
D. hybrid cloud
正解:B