Questions for the DEA-2TT3 were updated on : Nov 16 ,2024
What refers to an agreement between provider and consumer that states the terms of service
usage?
A
What is an advantage of adopting a microservices strategy in an application development
environment?
B
Which role in service portfolio management determines and delivers the services that provide value
and strategic advantage to the provider?
C
Explanation:
Cloud administrators responsible for service portfolio management decide and deliver the services
that provide value and strategic advantage to the provider.
Refer to the exhibit, which represents a consumer environment consisting of multiple VMs running
Windows operating systems (OSs).
For compliance reasons, the cloud service provider maintains version control over the OS provided to
the consumer. The service provider also ensures that the configurations of the VMs comply with the
configuration policy for the OS version. The configuration policy includes the two conditions shown in
the exhibit. A monitoring tool verifies VM configurations against the configuration policy and
provides the compliance results shown.
What is the percentage of compliance non-adherence?
D
Which management process ensures business continuity by eliminating single points of failure in a
data center?
A
Which Dell EMC product is used for a disk-based backup and recovery solution that provides inherent
source-based data deduplication?
D
Which phase of the cloud service lifecycle involves making business use case decisions for the cloud
service offering portfolio?
B
Which software-defined storage controller function gathers data about the components and brings
them under its control and management?
B
Explanation:
The SDS controller discovers various types of physical storage systems available in a data center. It is
to gather data about the components and bring them under its control and management. Data
collected during the discovery includes information on the storage pools and the storage ports for
each storage system.
The incident management team is unable to determine the root cause of an incident. To which team
should the error-correction activity be transferred?
D
Explanation:
consumers can report incidents through a service desk. If the service desk is unsuccessful in
providing solutions against the incidents, they are escalated to other incident management support
groups or to problem management.
What capability is provided by the Open and extensible attribute of software-defined infrastructure
(SDI)?
A
Explanation:
An extensible architecture enables integrating multivendor resources, and external management
interfaces and applications into the SDI environment by using APIs
What mechanism does RSA SecurID use?
C
Explanation:
RSA SecurID is a 2-factor authentication mechanism used to protect the network resources.
What is the function of a monitoring and alerting tool?
A
DRAG DROP
Match each information security concept with its description.
None
Explanation:
Availability Ensures that authorized users have reliable and timely access to cloud resources
Integrity Ensures that unauthorized changes to information are not allowed
Accountability Ensures users are answerable for the actions executed on the system
Confidentiality Ensures the required secrecy of information
What capability does an orchestration workflow provide?
A
Explanation:
The orchestration workflows are not only meant for fulfilling requests from consumers. It also helps
for administering cloud infrastructure, such as adding resources to a resource pool, billing, and
reporting and so on.
What can an IT department do to better meet IT challenges and support digital businesses?
C