IBM Cloud Solution Architect v4 v1.0 (C1000-100)

Page:    1 / 5   
Total 68 questions

What is the maximum size of an object that can be stored in IBM Cloud Object Storage?

  • A. 5 Terabytes
  • B. 25 Terabytes
  • C. 50 Terabytes
  • D. 10 Terabytes


Answer : D

Reference:
https://www.ibm.com/cloud/object-storage/faq

Why is Continuous Integration a best practice?

  • A. It helps to avoid catastrophic merge conflicts
  • B. Developers can perform Enterprise Application Integration using a low-code/no-code development environment
  • C. It makes it easier to rollback releases that are found to have critical defects
  • D. It facilitates low risk releases by allowing a canary release to be tested by a small group of end users


Answer : A

To view a local version of the OpenShift dashboard and to deploy apps into your Red Hat Openshift cluster on IBM Cloud, which two command line interfaces
(CLIs) could be installed? (Choose two.)

  • A. Kubernetes CLI
  • B. Container Registry CLI
  • C. OpenStack CLI
  • D. Cloud Foundry CLI
  • E. OpenShift CLI


Answer : AE

Reference:
https://cloud.ibm.com/docs/openshift?topic=openshift-openshift-cli

Which IBM Cloud Virtual servers have guaranteed resource for future deployments and cost savings?

  • A. Dedicated
  • B. Transient
  • C. Public
  • D. Reserved


Answer : D

Reference:
https://cloud.ibm.com/docs/virtual-servers?topic=virtual-servers-about-reserved-virtual-servers

An architect needs to select a firewall solution that can provide public and private network protection and VPN termination. Which two services provide this capability? (Choose two.)

  • A. Fortigate Appliance
  • B. Juniper vSRX
  • C. VPC Security Groups
  • D. Dedicated Hardware firewall
  • E. Cloud Internet Services


Answer : CE

Which of the following features of IBM Virtual Private Cloud specifically controls inbound and outbound traffic for one or more subnets?

  • A. SSH Keys
  • B. Security Groups
  • C. Access Control Lists
  • D. Floating IPs


Answer : B

Reference:
https://www.ibm.com/cloud/network-security

How many public IP addresses are standard with IBM VMware Solutions Shared offerings?

  • A. 5
  • B. 4
  • C. 3
  • D. 2


Answer : A

Reference:
https://medium.com/@moreal70/vmware-solutions-shared-on-ibm-cloud-provisioning-and-configuration-for-accessible-in-bound-and-48edd7ee5980

Which statement describes the IBM Cloud Kubernetes Service?

  • A. IBM Cloud Kubernetes Service is subset of Cloud Foundry
  • B. IBM Cloud Kubernetes Service is built on Red Hat OpenShift and can run across any cloud platform including IBM Cloud
  • C. IBM Cloud Kubernetes Service is a managed offering to create and run containerized applications on IBM Cloud
  • D. IBM Cloud Kubernetes Service is a self service solution designed to run Kubernetes clusters only on bare metal


Answer : C

A customer RFP is requesting a solution to run a scalable, elastic, and managed analytics focused database with in-memory capabilities. Which service should be included in the response?

  • A. SQL Query
  • B. Analytics Engine
  • C. Mongo Cluster Service
  • D. DB2 Warehouse on Cloud


Answer : D

Reference:
https://www.ibm.com/cloud/learn/data-warehouse

Vulnerability Advisor is pre-integrated into several toolchain templates. What does the Vulnerability Advisor do?

  • A. Scans container images for potential security issues
  • B. Tests databases for SQL injection vulnerabilities
  • C. Continuously monitors and analyzes network communications
  • D. Scans source code for potential threats and vulnerabilities


Answer : C

After deploying the IBM Cloud Kubernetes service on Public Cloud, how soon are metrics collected by the IBM Cloud Monitoring service?

  • A. After logging into your cluster for the first time
  • B. After 4 hours of cluster provisioning
  • C. Start of the next business day
  • D. As soon as the cluster is provisioned


Answer : A

There is a request to architect a hybrid VMware solution in IBM Cloud to address failures in the on-premise data centers. What additional VMware component would allow for seamless network access for workloads from the VMware Cluster on-premise to the VMware Cluster in IBM Cloud to facilitate resiliency into existing solutions?

  • A. HCX
  • B. NSX-C
  • C. NSX-T
  • D. NCX


Answer : A

Reference:
https://cloud.ibm.com/docs/vmwaresolutions

Select two key features of IBM Cloud DevOps Insights: (Choose two.)

  • A. Analyze risks by using historical data and defined benchmarks
  • B. Provides a dashboard to prioritize DevOps stories using the MoSCoW method
  • C. Collect IBM Transformation Advisor data and generate burndown charts for migration to IBM Cloud
  • D. Connect Rational Team Concert metrics to IBM Cloud to generate code migration insights
  • E. Define benchmarks to create policies based on aggregated data


Answer : AE

Reference:
https://www.ibm.com/garage/method/practices/learn/tool_devops_insights/

A high profile business customer has two security concerns for their new public application workload on IBM Cloud, security of the application at Network Layer 7 and DDoS. Which IBM Cloud solution should be deployed to mitigate these concerns?

  • A. Global Internet Service
  • B. Hyper Protect Service
  • C. Cloud Internet Service
  • D. HyTrust Protect Service


Answer : C

Reference:
https://cloud.ibm.com/docs/cis?topic=cis-distributed-denial-of-service-ddos-attack-concepts

IBM Cloud Security Advisor Network Insights uses which two KPIs to monitor inbound traffic? (Choose two.)

  • A. Reconnaissance by suspicious clients
  • B. Suspicious request header format
  • C. Abnormally large numbers of failed login attempts
  • D. Suspicious client IP address from the black list
  • E. Abnormally large payloads sent by suspicious clients


Answer : AC

Reference:
https://cloud.ibm.com/docs/security-advisor?topic=security-advisor-network

Page:    1 / 5   
Total 68 questions