You are creating a cloud infrastructure design for an organization. You learn that, for compliance reasons, the organization needs to maintain a separate set of infrastructures for certain deployed services. Which part of the design will be impacted by this requirement?
Answer : B
An organization wants to deploy a block storage in the cloud using a storage array that is accessible through the iSCSI protocol. The hosts support iSCSI.
Why would network segmentation be included in the design to support this requirement?
Answer : D
Explanation:
LUN masking is a further constraint added to LUN zoning to ensure that only devices authorized to access a specific server can access the corresponding port.
A logical unit number (LUN) is a unique identifier that designates individual hard disk devices or grouped devices for address by a protocol associated with a SCSI, iSCSI, Fibre
Channel (FC) or similar interface. LUNs are central to the management of block storage arrays shared over a storage area network (SAN).
References: http://searchvirtualstorage.techtarget.com/definition/LUN-masking
What needs to be considered when designing a distributed storage solution?
Answer : B
Explanation:
A distributed data store is a computer network where information is stored on more than one node, often in a replicated fashion. Distributed data stores typically use an error detection and correction technique. Some distributed data stores (such as Parchive over
NNTP) use forward error correction techniques to recover the original file when parts of that file are damaged or unavailable. Others try again to download that file from a different mirror.
References: https://en.wikipedia.org/wiki/Distributed_data_store
Which networking technology is required for application HA in contrast to host HA or operating system HA?
Answer : B
Explanation:
Symantec ApplicationHA could perhaps be described as the pairing of Veritas Cluster
Server with VMware HA. Vertias Cluster server has been a leading clustering solution for many years with its excellent cross-platform support. Veritas Cluster Server uses a shared storage model to provide high availability
References: http://www.blueshiftblog.com/?p=443
When implementing QoS across a cloud network, how is storage traffic usually prioritized?
Answer : C
A cloud architect has determined that the cloud management infrastructure requires an authentication and PKI environment. In addition, each tenant will require its own authentication and PKI environment. What describes these separate environments in a cloud design document?
Answer : C
Explanation:
The term "software multitenancy" refers to a software architecture in which a single instance of software runs on a server and serves multiple tenants. A tenant is a group of users who share a common access with specific privileges to the software instance.
Incorrect:
Not A: Availability zones (AZs) are isolated locations within data center regions from which public cloud services originate and operate.
Not B: A fault domain is a set of hardware components computers, switches, and more that share a single point of failure.
Not D: Zones of trust are a defined area of the system where by by necessity, by the presence of key information assets and by the wider environmental context the connections within the zone are treated as at the same level of trust. This effectively couples the components within that subsystem for security purposes.
References: https://en.wikipedia.org/wiki/Multitenancy
A cloud architect is designing a private cloud for an organization. The organization has no existing backup infrastructure. They want to offer consumers the ability to backup virtual machine instances using image-based backups.
What should the cloud architect look for when selecting a backup application for this environment?
Answer : D
Explanation:
A cloud storage gateway provides basic protocol translation and simple connectivity to allow the incompatible technologies to communicate transparently. The gateway can make cloud storage appear to be a NAS filer, a block storage array, a backup target or even an extension of the application itself.
References: http://searchcloudstorage.techtarget.com/definition/cloud-storage-gateway
A cloud architect has included a monitoring application in a cloud design to ensure infrastructure performance meets agreed-upon service levels. The application resides on a virtual appliance. The application vendor provides guidance for sizing the appliance.
What will be part of the sizing calculations for the virtual appliance storage?
Answer : C
You are designing consumer compute resources in an onsite private cloud. During an assessment, you discover that the organizations IT staff wants secure access to the underlying host OS. What should be included in the design to support this requirement?
Answer : B
An organization wants to build a pilot cloud for developers to learn and practice cloud- native application design.
The organization expects that the cloud will host many tiny instances that will use few resources. What accurately describes the optimal CPU and memory configuration?
Answer : C
In which cloud services are policy compliance typically defined in a hybrid cloud deployment?
Answer : D
An organization wants to deploy a service catalog in a private cloud. What requirements are met by using a service catalog?
Answer : B
Explanation:
Benefits of implementing and maintaining a service catalog include allowing an enterprise to track and manage metrics that represent the utilization of services and service-related traits, such as those associated with service supply and demand.
References: https://en.wikipedia.org/wiki/Service_catalog
A cloud design contains multiple hosts that are running a hypervisor. Each host has only two physical 10 Gb network adapters that are aggregated for bandwidth and failover. The physical switch ports for each host are configured as access ports. Each host will support numerous virtual machines and network segments. These virtual machines will communicate with other virtual machines on the same network segments. Why would overlay networks be required for this design?
Answer : B
Explanation:
An overlay network is a computer network that is built on top of another network. Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network.
Virtual overlay networks use tunneling protocols to extend isolated network segments between servers for multi-tenant data center networks.
References: http://searchsdn.techtarget.com/tip/Virtual-overlay-networks-Tunneling- protocols-enable-multi-tenancy
An organization plans to build a cloud using some of the existing data center infrastructure.
Specifically, they want to use the existing FC storage infrastructure to support cloud hosts.
However, they want to logically separate the cloud storage traffic from the existing data center storage traffic within this infrastructure. Which mechanism can be used to meet this requirement?
Answer : D
Explanation:
The use of VSANs allows the isolation of traffic within specific portions of the network. If a problem occurs in one VSAN, that problem can be handled with a minimum of disruption to the rest of the network. VSANs can also be configured separately and independently.
Note: Virtual storage area network (VSAN) is a collection of ports from a set of connected
Fibre Channel switches, that form a virtual fabric. Ports within a single switch can be partitioned into multiple VSANs, despite sharing hardware resources. Conversely, multiple switches can join a number of ports to form a single VSAN.
Incorrect:
Not A: Microsoft Multipath I/O (MPIO) is a Microsoft-provided framework that allows storage providers to develop multipath solutions that contain the hardware-specific information needed to optimize connectivity with their storage arrays.
MPIO is protocol-independent and can be used with Fibre Channel, Internet SCSI (iSCSI), and Serial Attached SCSI (SAS) interfaces in Windows Server 2008, Windows Server
2008 R2 and Windows Server 2012.
Not D: Logical Unit Number Masking or LUN masking is an authorization process that makes a Logical Unit Number available to some hosts and unavailable to other hosts. LUN masking operates at Layer 4 of the Fibre Channel protocol.
Reference: https://en.wikipedia.org/wiki/VSAN
An architect is designing the compute resource pools for a cloud. As part of the deliverables, the architect has included the standard specifications for the physical servers to be used. The organization has provided estimates for future growth but has concerns about whether these estimates are accurate. What should be included in the design to address these concerns?
Answer : A