Join the discussion
Question 1/136
What is a characteristic of the subscription by time chargeback model?
Correct Answer: A
Add Comments
- Other Question (136q)
- Q1. What is a characteristic of the subscription by time chargeback model?...
- Q2. Which two are key requirements for fault tolerance?...
- Q3. What are the key functions of a control plane?...
- Q4. Which type of attack can be controlled by imposing restrictions and limiting on-network re...
- Q5. What is the personalization of a cloud portal?...
- Q6. A cloud service provider uses a resource pooling approach to improve the utilization of re...
- Q7. Which document specifies the quality and reliability of Cloud services?...
- Q8. Which compute system component contains boot firmware?...
- Q9. An organization is implementing a backup solution for their private cloud. They are concer...
- Q10. What term refers to the entry points from which an attack can be launched?...
- Q11. What characterizes an uplink NIC used in a virtual machine network on a physical compute s...
- Q12. Which process enables a cloud service provider to ensure that external laws and regulation...
- Q13. What type of cloud security control is log auditing?...
- Q14. Which RAID level enables quick data reconstruction if two disks fail?...
- Q15. What displays the service usage report to consumers in real-time?...
- Q16. What is true about the Infrastructure as a code function?...
- Q17. Which product enables IT organizations to ensure optimum resource usage and configuration ...
- Q18. What is a capability of an object-based storage system?...
- Q19. What is a characteristic of a best-of-breed infrastructure?...
- Q20. What is a function of service asset and configuration management?...
- Q21. In which step of the service enablement roadmap does an organization rapidly adopt a deplo...
- Q22. Which activity is related to service portfolio management?...
- Q23. What is the Open Cloud Computing Interface (OCCI) standard?...
- Q24. What describes the operation of the write-through cache in a block-based storage system?...
- Q25. What benefit is provided by the business continuity process in a cloud?...
- Q26. What is a benefit of defining a service template?...
- Q27. Which solution would improve the performance of an application with a high number of read ...
- Q28. What is a key benefit of grading resource pools in a cloud environment?...
- Q29. How is a node added to a virtual storage area network (VSAN) created on a Fibre Channel SA...
- Q30. What is the purpose of a bitmap in snapshot creation?...
- Q31. Refer to the Exhibit. (Exhibit) With which elements can the virtual machines (VMs) connect...
- Q32. Which EMC product offers customers a choice of hypervisor, compute system, and network tec...
- Q33. What is the correct sequence of steps in synchronous remote replication?...
- Q34. What action by the consumer could result in a provider-initiated termination of service?...
- Q35. Which image represents the correct sequence of steps in a Kerberos mechanism? A) (Exhibit)...
- Q36. Which task is executed by an element manager?
- Q37. What is a function of supplier management?
- Q38. Which layer of a cloud infrastructure invokes resource provisioning tasks after a consumer...
- Q39. What is a key function of service operation management?...
- Q40. Which encapsulation function is performed by a Fibre Channel Host Bus Adapter?...
- Q41. What condition can result in the development of a "shadow IT" organization?...
- Q42. An administrator connects the G_Ports of two Fiber Channel switches to each other in a Fib...
- Q43. What is an advantage of the in-service software upgrade technique?...
- Q44. What is an advantage of adopting a microservices strategy in an application development en...
- Q45. Refer to the exhibit, which represents a consumer environment consisting of multiple VMs r...
- Q46. Which phase of the cloud service lifecycle involves ongoing management activities to maint...
- Q47. Which statement describes the OAuth mechanism?...
- Q48. What steps appear in the service enablement roadmap?...
- Q49. Which cloud characteristic enables consumers to access cloud services using heterogeneous ...
- Q50. What is a characteristic of Simple Object Access Protocol (SOAP)?...
- Q51. An administrator must design a fault-tolerant IT environment for applications. Which techn...
- Q52. Which type of zoning reduces the risk of WWPN spoofing on a Fibre Channel network?...
- Q53. What is a function of the physical layer of a cloud infrastructure?...
- Q54. Which role is responsible for designing, planning, managing, maintaining, and supporting t...
- Q55. Which process ensures that users are who they claim to be?...
- Q56. What term describes the ability of a system to continue functioning, even when a few of it...
- Q57. What is a characteristic of cloud service management?...
- Q58. What term refers to businesses that cautiously and gradually embrace digital transformatio...
- Q59. Which activity is carried out during the service termination phase of the cloud service li...
- Q60. Which activity is carried out during the service operation phase of the cloud service life...
- Q61. What is a benefit of application virtualization?...
- Q62. What activity is performed during the service planning phase of the cloud service lifecycl...
- Q63. A healthcare organization has an innovative idea of providing personalized medicine to the...
- Q64. An organization needs to deploy remote replication between two sites that are 100 km (62 m...
- Q65. The incident management team is unable to determine the root cause of an incident. To whic...
- Q66. Which function collects information about competing service offerings?...
- Q67. Two departments of an organization have their own volumes created on the same storage syst...
- Q68. Which type of zoning prevents unauthorized access, even when node ports are re-cabled to a...
- Q69. What is a function of the management interface of cloud services?...
- Q70. What is an advantage of using a distributed virtual switch?...
- Q71. What does the dynamic memory allocation technique do?...
- Q72. What helps to recover the cost of providing the service, ensuring profitability, and meeti...
- Q73. What describes network-attached storage (NAS)?...
- Q74. What capability does an orchestration workflow provide?...
- Q75. Refer to the Exhibit. (Exhibit) Which step in the service catalog design and implementatio...
- Q76. A storage system is configured with erasure coding. The data is divided into 10 data fragm...
- Q77. How is a container different from a virtual machine?...
- Q78. What is a benefit of stretching a compute cluster across service availability zones in a c...
- Q79. What is included in a topology graph defined by Topology and Orchestration Specification f...
- Q80. What is the correct sequence of steps in asynchronous remote replication?...
- Q81. Match each service management phase with its process. (Exhibit)...
- Q82. Which cloud service objective determines the privileges that a user has to access a partic...
- Q83. What is a benefit of standardizing the cloud interface?...
- Q84. What is a benefit of data archiving?
- Q85. Which solution can be used for automation of a customer environment?...
- Q86. What is true about change management?
- Q87. In which technique does an application maintain limited functionality, even when some of t...
- Q88. What allows an orchestrator to interact with other software components and devices in a cl...
- Q89. What is a benefit of link aggregation?
- Q90. What is used to update information in a configuration management database?...
- Q91. What needs to be considered before performing the discovery activity in a cloud?...
- Q92. What is a key function of the cloud service component?...
- Q93. What do consumers use to manage rented service instances?...
- Q94. When using a digital signature, what is the correct sequence of steps to authenticate a us...
- Q95. What are the key approaches to application transformation?...
- Q96. What is included in service templates?
- Q97. Which cloud standard guides who should implement which type of security control in the clo...
- Q98. An organization has deployed a cloud infrastructure. They frequently experience power outa...
- Q99. An administrator plans to perform scheduled maintenance of a computer system in a cluster....
- Q100. Refer to the Exhibit. (Exhibit) Which type of Fibre Channel SAN port is referenced by the ...
- Q101. Which statement is true about the native file system of a hypervisor?...
- Q102. What does a service attribute specify?
- Q103. What is performed by orchestration software?
- Q104. Which statement is true about virtual machine (VM) snapshots?...
- Q105. What is the correct sequence of the steps of risk management that a cloud service provider...
- Q106. What is a benefit of personalizing a cloud portal?...
- Q107. Which data protection solution enables direct backup from primary storage?...
- Q108. Which network virtualization technique enables nodes at two different sites to be part of ...
- Q109. A cloud service provider is concerned about the security risks due to velocity-of-attack. ...
- Q110. What is the correct sequence of steps to determine service pricing?...
- Q111. Which protocol is most commonly used for compute-to-computer communication?...
- Q112. What principle is supported by Representational State Transfer (REST)?...
- Q113. What is the function of a monitoring and alerting tool?...
- Q114. What is a benefit of secure multitenancy?
- Q115. Which resource management technique identifies and eliminates redundant copies of memory p...
- Q116. What is a responsibility of the Service Manager role?...
- Q117. What refers to an agreement between provider and consumer that states the terms of service...
- Q118. What can an IT department do to better meet IT challenges and support digital businesses?...
- Q119. Which statement describes the service portfolio management function?...
- Q120. Which activity is carried out during the service creation phase of the cloud service lifec...
- Q121. An organization deployed a storage system that is configured with erasure coding. The eras...
- Q122. What could be a reason for a consumer-initiated service termination?...
- Q123. What is used to prioritize the latency-sensitive network traffic in order to provide bette...
- Q124. Which storage data protection technique provides space-optimal data redundancy to prevent ...
- Q125. What enables a cloud service provider to determine if a requirement to keep the data of co...
- Q126. Which cloud service model enables an organization to deploy a proprietary operating system...
- Q127. Which platform provides a converged infrastructure solution?...
- Q128. What enables LUNs to be assigned to the world-wide name of a specific host bus adapter?...
- Q129. What is Representational State Transfer (REST)?...
- Q130. What workflow software enables automation of complex IT tasks?...
- Q131. Which method compares observed events with normal activities to identify abnormal patterns...
- Q132. Which cloud security objective provides the required secrecy of information to ensure that...
- Q133. What is a characteristic of reporting?
- Q134. What is the function of problem management?
- Q135. Which statement describes the service operation management function?...
- Q136. What is a benefit of server-flash cache technology?...
