Cloud Infrastructure Specialist Exam for Cloud Architects v7.0 (E20-020)

Page:    1 / 5   
Total 64 questions

You are creating a cloud infrastructure design for an organization. You learn that, for compliance reasons, the organization needs to maintain a separate set of infrastructures for certain deployed services. Which part of the design will be impacted by this requirement?

  • A. Number of service catalogs
  • B. Number of compute pools
  • C. Service catalog sizing
  • D. Over-commitment ratio

Answer : B

An organization wants to deploy a block storage in the cloud using a storage array that is accessible through the iSCSI protocol. The hosts support iSCSI.
Why would network segmentation be included in the design to support this requirement?

  • A. Secure all traffic between the storage array and the hosts
  • B. Enable CHAP between the array and hosts
  • C. iSCSI traffic is not supported on networks with other types of traffic
  • D. Enable LUN masking capabilities of the array

Answer : D

LUN masking is a further constraint added to LUN zoning to ensure that only devices authorized to access a specific server can access the corresponding port.
A logical unit number (LUN) is a unique identifier that designates individual hard disk devices or grouped devices for address by a protocol associated with a SCSI, iSCSI, Fibre
Channel (FC) or similar interface. LUNs are central to the management of block storage arrays shared over a storage area network (SAN).

What needs to be considered when designing a distributed storage solution?

  • A. Multiple management tools
  • B. Fault domain detection and isolation to ensure data availability
  • C. RAID configuration to ensure a drive failure is avoided
  • D. Automated storage tiering to enable efficient use of drive

Answer : B

A distributed data store is a computer network where information is stored on more than one node, often in a replicated fashion. Distributed data stores typically use an error detection and correction technique. Some distributed data stores (such as Parchive over
NNTP) use forward error correction techniques to recover the original file when parts of that file are damaged or unavailable. Others try again to download that file from a different mirror.

Which networking technology is required for application HA in contrast to host HA or operating system HA?

  • A. Multipath routing
  • B. Shared storage
  • C. Load balancing
  • D. VLANs

Answer : B

Symantec ApplicationHA could perhaps be described as the pairing of Veritas Cluster
Server with VMware HA. Vertias Cluster server has been a leading clustering solution for many years with its excellent cross-platform support. Veritas Cluster Server uses a shared storage model to provide high availability

When implementing QoS across a cloud network, how is storage traffic usually prioritized?

  • A. Most important
  • B. More important than tenant traffic but less important than management traffic
  • C. More important than management traffic but less important than tenant traffic
  • D. Least improtant

Answer : C

A cloud architect has determined that the cloud management infrastructure requires an authentication and PKI environment. In addition, each tenant will require its own authentication and PKI environment. What describes these separate environments in a cloud design document?

  • A. Availability zones
  • B. Fault domains
  • C. Multi-tenancy
  • D. Trust zones

Answer : C

The term "software multitenancy" refers to a software architecture in which a single instance of software runs on a server and serves multiple tenants. A tenant is a group of users who share a common access with specific privileges to the software instance.
Not A: Availability zones (AZs) are isolated locations within data center regions from which public cloud services originate and operate.
Not B: A fault domain is a set of hardware components computers, switches, and more that share a single point of failure.
Not D: Zones of trust are a defined area of the system where by by necessity, by the presence of key information assets and by the wider environmental context the connections within the zone are treated as at the same level of trust. This effectively couples the components within that subsystem for security purposes.

A cloud architect is designing a private cloud for an organization. The organization has no existing backup infrastructure. They want to offer consumers the ability to backup virtual machine instances using image-based backups.
What should the cloud architect look for when selecting a backup application for this environment?

  • A. Virtual machine hardware is on the backup application vendor’s compatibility list
  • B. Hypervisor servers’ hardware is on the backup application vendor’s compatibility list
  • C. Backup application can be integrated with the selected CMP components
  • D. Backup application supports a cloud gateway for accessing the cloud-based virtual machines

Answer : D

A cloud storage gateway provides basic protocol translation and simple connectivity to allow the incompatible technologies to communicate transparently. The gateway can make cloud storage appear to be a NAS filer, a block storage array, a backup target or even an extension of the application itself.

A cloud architect has included a monitoring application in a cloud design to ensure infrastructure performance meets agreed-upon service levels. The application resides on a virtual appliance. The application vendor provides guidance for sizing the appliance.
What will be part of the sizing calculations for the virtual appliance storage?

  • A. Number of targetsMessage bus subscribers Data deduplication policies
  • B. Number of segments Number of metrics Data deduplicaiton policies
  • C. Number of targetsNumber of metrics Data retention policies
  • D. Message bus subscribers Number of users Data retention policies

Answer : C

You are designing consumer compute resources in an onsite private cloud. During an assessment, you discover that the organizations IT staff wants secure access to the underlying host OS. What should be included in the design to support this requirement?

  • A. Host IDS configurationSecure key infrastructure Bridged management network
  • B. Perimeter firewall configuration VPN encryption Separate management network
  • C. Host OS firewall configuration Central logging Physically isolated management network
  • D. Host OS firewall configuration Secure key infrastructure Separate management network

Answer : B

An organization wants to build a pilot cloud for developers to learn and practice cloud- native application design.
The organization expects that the cloud will host many tiny instances that will use few resources. What accurately describes the optimal CPU and memory configuration?

  • A. High CPU core count and high memory capacity
  • B. High CPU core count and moderate memory capacity
  • C. Moderate CPU core count and moderate memory capacity
  • D. Moderate CPU core count and high memory capacity

Answer : C

In which cloud services are policy compliance typically defined in a hybrid cloud deployment?

  • A. Portal, catalog, and orchestration
  • B. Virtual networking, portal, and catalog
  • C. Orchestration, virtual networking, and portal
  • D. Catalog, orchestration, and virtual networking

Answer : D

An organization wants to deploy a service catalog in a private cloud. What requirements are met by using a service catalog?

  • A. Ability for administrators to manage multi-tenancy
  • B. Ability for users to measure service performance
  • C. Ability for users to aggregate service logs
  • D. Ability for administrators to attach storage pools

Answer : B

Benefits of implementing and maintaining a service catalog include allowing an enterprise to track and manage metrics that represent the utilization of services and service-related traits, such as those associated with service supply and demand.

A cloud design contains multiple hosts that are running a hypervisor. Each host has only two physical 10 Gb network adapters that are aggregated for bandwidth and failover. The physical switch ports for each host are configured as access ports. Each host will support numerous virtual machines and network segments. These virtual machines will communicate with other virtual machines on the same network segments. Why would overlay networks be required for this design?

  • A. Support for more than two virtual switches
  • B. Support for more than one virtual segment
  • C. Support for more than two virtual machines
  • D. Support for more than one distributed virtual switch

Answer : B

An overlay network is a computer network that is built on top of another network. Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network.
Virtual overlay networks use tunneling protocols to extend isolated network segments between servers for multi-tenant data center networks.
References: protocols-enable-multi-tenancy

An organization plans to build a cloud using some of the existing data center infrastructure.
Specifically, they want to use the existing FC storage infrastructure to support cloud hosts.
However, they want to logically separate the cloud storage traffic from the existing data center storage traffic within this infrastructure. Which mechanism can be used to meet this requirement?

  • A. MPIO
  • B. VLAN
  • C. VSAN
  • D. Masking

Answer : D

The use of VSANs allows the isolation of traffic within specific portions of the network. If a problem occurs in one VSAN, that problem can be handled with a minimum of disruption to the rest of the network. VSANs can also be configured separately and independently.
Note: Virtual storage area network (VSAN) is a collection of ports from a set of connected
Fibre Channel switches, that form a virtual fabric. Ports within a single switch can be partitioned into multiple VSANs, despite sharing hardware resources. Conversely, multiple switches can join a number of ports to form a single VSAN.
Not A: Microsoft Multipath I/O (MPIO) is a Microsoft-provided framework that allows storage providers to develop multipath solutions that contain the hardware-specific information needed to optimize connectivity with their storage arrays.
MPIO is protocol-independent and can be used with Fibre Channel, Internet SCSI (iSCSI), and Serial Attached SCSI (SAS) interfaces in Windows Server 2008, Windows Server
2008 R2 and Windows Server 2012.
Not D: Logical Unit Number Masking or LUN masking is an authorization process that makes a Logical Unit Number available to some hosts and unavailable to other hosts. LUN masking operates at Layer 4 of the Fibre Channel protocol.

An architect is designing the compute resource pools for a cloud. As part of the deliverables, the architect has included the standard specifications for the physical servers to be used. The organization has provided estimates for future growth but has concerns about whether these estimates are accurate. What should be included in the design to address these concerns?

  • A. A monitoring application and procedures for pool expansion
  • B. A chargeback application and orchestration workflows to auto-scale pools
  • C. A metering application and orchestration workflows to auto-scale pools
  • D. A configuration management application and procedures for pool expansion

Answer : A

Page:    1 / 5   
Total 64 questions