IBM Cloud Solutions Architect v3 v1.0 (C1000-017)

Page:    1 / 5   
Total 69 questions

When a certificate and the corresponding private key is imported into Certificate Manager, how does the service protect the private Key?

  • A. Encrypts with AES-256 algorithm
  • B. Uses a DES algorithm to salt the key
  • C. Hashes the key with a SHA-256 algorithm
  • D. Uses a one time pad to put it in the vault


Answer : C

The Vulnerability Advisor that is part of the Kubernetes Service from IBM scans Docker images and live containers. What is one item the scan is identifying?

  • A. Viruses
  • B. Recursion
  • C. Known CVEs
  • D. Zero day exploits


Answer : C

Which two agents can be installed remotely from the resource that they are monitoring? (Choose two.)

  • A. Monitoring Agent for BPM
  • B. Monitoring Agent for Amazon EC2
  • C. Monitoring Agent for Oracle Database
  • D. Monitoring Agent for IBM Cloud Private
  • E. Monitoring Agent for Lotus Domino Server


Answer : BC

Reference:
https://www.ibm.com/support/knowledgecenter/en/SSHLNR_8.1.4/com.ibm.pm.doc/install/install_intro.htm

Which statement describes a dedicated service in IBM Cloud?

  • A. A cloud computing environment, running on IBM Cloud, that provides dedicated support personnel.
  • B. A cloud computing environment, running on IBM Cloud, that provides infrastructure with single-tenant hardware.
  • C. A Bring-Your-Own-Box solution where customers can deploy their hardware in an IBM Data Center and have IBM manage it.
  • D. A cloud computing environment in which access to standardized resources, such as infrastructure, multi-tenant hardware, and services, is available to subscribers on a pay-per-use basis.


Answer : B

Reference:
https://www.ibm.com/cloud/dedicated

What are two benefits of using Cloud Services? (Choose two.)

  • A. Cloud service is always private
  • B. Access to required functions as services
  • C. Complete control over the feature enhancement in service
  • D. Add new functions available in a cloud service
  • E. Reduce the time and cost required for application development


Answer : BE

What are key components of identity and access management?

  • A. Horizon and anti-tailgating measures
  • B. Data classification and data masking
  • C. Video surveillance and password protected consoles
  • D. Multifactor authentication (MFA) and directory services


Answer : D

Reference:
https://www.ibm.com/cloud/garage/architectures/securityArchitecture/security-identity-access-management

Which two capabilities are included in the IoT Connection Service? (Choose two.)

  • A. SMS Messaging
  • B. Remote control
  • C. Appliance claiming
  • D. Registration through SNA protocol
  • E. Solution administration for deployment and device groupings


Answer : CE

Reference:
https://www-01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_ca/2/649/ENUSA17-0852/index.html&request_locale=en

A client deploys an application to the cloud using Platform as a Service (PaaS). Which statement is true?

  • A. The client must provide application and runtime.
  • B. The cloud vendor deals with data on the client"™s behalf.
  • C. There is no single point of failure as data resides in the cloud.
  • D. The cloud vendor manages operating systems, runtimes, and backups.


Answer : D

Which two application styles have Reference Architectures in the IBM Garage Method Architecture Center? (Choose two.)

  • A. Healthcare
  • B. Blockchain
  • C. Public Sector
  • D. Private Cloud
  • E. SDK for Node.js


Answer : BD

Reference:
https://www.ibm.com/cloud/garage/architectures

Which two statements describe two-speed IT? (Choose two.)

  • A. One speed for transformation of cloud enabled applications.
  • B. One speed for support of traditional enterprise applications.
  • C. One speed for quick delivery of new applications and services.
  • D. One speed for all types of software development, digital and non-digital alike.
  • E. One speed to replace enterprise applications.


Answer : BC

What are two factors that contribute to the growth of cloud computing? (Choose two.)

  • A. Developed in Java
  • B. Rapid provisioning
  • C. A long term billing model
  • D. A pay-as-you-go billing model
  • E. A single and simplified standard language


Answer : BD

Which statement describes the immutability of data on Blockchain?

  • A. Data can only be modified through a smart contract.
  • B. No participant can tamper with a transaction after it has been recorded to the ledger.
  • C. It is impossible to modify business data across a network of potentially dozens or hundreds of ledgers.
  • D. All data is encrypted using a one-way hashing algorithm. Therefore, changing stored data is impossible.


Answer : B

Which IBM Cloud offering can be used to transfer large datasets when migrating from on-premise to cloud?

  • A. IBM DMT
  • B. IBM Aspera
  • C. IBM FastPath
  • D. IBM DataStage


Answer : B

Reference:
https://www.ibm.com/cloud/data-migration

How can an IBM Garage Method Reference Architecture help break down the solution to a business problem?

  • A. It identifies the DevOps tooling that is required to ensure the solution runs in production.
  • B. It identifies the low level system modules required to meet the business defined requirements.
  • C. It identifies the different personas that need to take charge of different aspects of the solution.
  • D. It identifies the different IaaS, PaaS and SaaS services that must be used to create different parts of the solution.


Answer : B

Which solution should be implemented for using the full text search engine with indexing?

  • A. Search for MongoDB
  • B. Search for ScyllaDB
  • C. Compose for CloudSearch
  • D. Compose for Elasticsearch


Answer : D

Page:    1 / 5   
Total 69 questions