Cloud Services Expert Exam for Cloud Architects v1.0 (E20-920)

Page:    1 / 8   
Total 116 questions

A company is assessing the cloud maturity of their existing capabilities. Which components should be analyzed to establish the baseline maturity?

  • A. Self-service, broad network access, resource pooling, rapid elasticity, measured service
  • B. Service catalog, plenty of bandwidth, virtualization, software defined networks, software defined storage
  • C. SLA, SaaS, PaaS, IaaS
  • D. Self-service, broad network access, measured service, SLA


Answer : A

An organization will be deploying services in a new private cloud infrastructure. The organization has a strong enterprise and IT governance framework in place.
How will this framework likely be enhanced in the new cloud environment?

  • A. Policies will be added that support each component of the service lifecycle
  • B. Policies will be added that support the addition of availability zones
  • C. The enterprise governance board will be expanded to include cloud architects
  • D. IT silos will be replaced with a business oriented framework


Answer : A

What is characteristic of the IT-as-a-Service phase of IT transformation?

  • A. Automation
  • B. Chargeback
  • C. Service level management
  • D. Shared resource pools


Answer : A

Reference -
https://www.emc.com/collateral/software/white-papers/h10801-stepstoitaas-wp.pdf

A European company has been providing web services within their private cloud. They now wish to make these web services available globally by using a public cloud provider. You are hired as a cloud architect to help them with this transition. In your analysis, you find that a different hypervisor is being used by the public cloud provider.
As the enterprise elastically provisions resources, what is a possible solution if the hypervisors are different?

  • A. Modify the access role in the current service template to allow connection to the public cloud
  • B. Recalibrate the current service template and deploy it in the public cloud
  • C. Define a different service template to deploy in the public cloud
  • D. Use a second service catalog to deploy the existing service template in the public cloud


Answer : D

You have been approached by a company to recommend a service model given the following economic drivers:
✑ 65% of developer effort is spent on maintenance
✑ There is a lack of reusable development components
✑ Multiple development environments are being instantiated without standardization
✑ There is a need for software minimum customization
In addition, developers would like independent control to test and provision their own environments.
What is the most appropriate service model to recommend?

  • A. PaaS
  • B. BaaS
  • C. IaaS
  • D. SaaS


Answer : C

A company plans to offer BI, CDN, and backup services. According to NIST, which cloud service models correspond to these offerings?

  • A. BI: IaaS; CDN: IaaS; backup: PaaS
  • B. BI: PaaS; CDN: IaaS; backup: IaaS
  • C. BI: IaaS; CDN: SaaS; backup: PaaS
  • D. BI: PaaS; CDN: SaaS; backup: IaaS


Answer : B

An organization is using a hybrid cloud for services. They wish to mitigate the risk of compromising data confidentiality. How can this be accomplished?

  • A. Include digital signature capabilities in services
  • B. Establish a parent-child relationship of data records
  • C. Include an option in the catalog for service placement
  • D. Include a data-at-rest encryption capability in services


Answer : D

An organization wants to provide IaaS capabilities in a hybrid cloud. They have the following requirements:
- Each line of business must have access to its own services
- Templates will be shared
- Service templates should be as generic as possible
- Data encryption should be provided for only services that require it
- Each instance should use Microsoft Active Directory for authentication
- Each instance should have the latest OS patches applied
How can these requirements be addressed in a cloud design?

  • A. Add a single shared template to the service catalog Provide orchestration workflows to create a tenant and then instantiate and customize instances Provide orchestration workflows to enable data encryption and authentication Enable a configuration manager policy for OS updates
  • B. Configure multiple tenants in the service catalog Add a single template to the service catalog Provide orchestration workflows enabling instance creation, customization and tenant assignment Provide orchestration workflows enabling data encryption and authentication Enable a configuration manager for OS updates
  • C. Add one template to the service catalog with encryption enabled Provide orchestration workflows to instantiate and customize instances Provide orchestration workflows to enable authentication Enable a configuration manager policy for OS updates and tenant configuration
  • D. Configure multiple tenants in the service catalog Add a single shared template to the service catalog Provide orchestration workflows enabling data encryption and authentication in the template Provide orchestration workflows enabling instance creation, customization and tenant assignment Enable a configuration manager policy for OS updates


Answer : B

A mobile company has processes in place for service support. One process facilitates collaboration and is a placeholder for functional requests; another process contains metadata on systems, network, and software. What types of processes are these?

  • A. Configuration Management and Incident Management
  • B. Change Management and Release Management
  • C. Change Management and Incident Management
  • D. Configuration Management and Release Management


Answer : D

A cloud architect is helping a company with a new service design process. The architect is concerned that the company may see delays in problem resolution that can impact customer satisfaction.
What did the architect observe that may have led to this concern?

  • A. Virtual, service-centric IT organizational structure
  • B. Single private cloud deployment for services
  • C. Siloed, domain-centric IT organization structure
  • D. Decreased number of touch points


Answer : C

In the evolution of converged infrastructure, what are Turn-Key Clouds?

  • A. Engineered systems designed to deliver discreet components in a predictable manner with a single personality
  • B. Single-personality infrastructure for customers that lack the expertise in house to deploy and manage Converged Systems
  • C. Factory fabricated systems that offer a complete cloud with multiple personas on top of common hardware
  • D. Multi-persona factory fabricated systems with integrated cloud deployment models that are able to scale storage and compute independently


Answer : C

As a cloud architect you are helping your company plan for cloud services and you are working with a diverse cloud team. You have targeted four key initial services and you have highlighted the following considerations for each service:
- Use overall management that maps dependencies across the service
- Define what metrics need to be collected for chargeback or showback
- Specify providerג€™s responsibility in meeting performance service levels
Your cloud team asks you which service area each of these considerations will most likely map to. What should be your response?

  • A. SLA, Service Visibility, and Service Offering
  • B. Operational Management, Orchestration, and SLA
  • C. Orchestration, Operational Management, and Service Offering
  • D. Service Offering, SLA, and Service Visibility


Answer : B

A healthcare company decides to adopt cloud computing to offer new products and services to their customers. What should be their biggest concern when it comes to storing and handling patient data from a governance perspective?

  • A. Following industry rules and regulations
  • B. Threats are mitigated by risk management
  • C. All policies are followed in decision making
  • D. prevention of unauthorized access and security beaches


Answer : D

In a hypothetical future scenario, a security company has deployed a large fleet of surveillance drones to observe customer facilities. Audio and visual as well as radio spectrum and infrared data are transmitted back to the security company for processing. The data is run through multiple virtual assistances and expert systems to detect and tag anomalies and potential threats in the data streams before passing team along to human security personnel.

What emerging 3 rd Platform technologies would enable the desired capabilities?

  • A. Big data analytics, augmented humans, and robotics
  • B. Robotics, machine learning, and big data analytics
  • C. Augmented humans, robotics, and machine learning
  • D. Machine learning, big data analytics, and augmented humans


Answer : B

Chargeback models are being evaluated by a healthcare provider. Their requirements are:
-Simple to measure
-Operational costs to be amortized over a defined period
-Operational costs to be divided between all service consumers
Which chargeback model satisfies these requirements?

  • A. Subscription-by time
  • B. Pre-Pay
  • C. Fixed-cost
  • D. Pay-as-you-grow


Answer : A

Page:    1 / 8   
Total 116 questions