Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

EMC DEA-2TT3 Dell EMC Cloud Infrastructure and Services v3 (DEA-2TT3) Exam Practice Test

Page: 1 / 8
Total 84 questions

Dell EMC Cloud Infrastructure and Services v3 (DEA-2TT3) Questions and Answers

Question 1

What is specified by a service attribute?

Options:

A.

Relationships between services

B.

Configurations of service components

C.

Management operations

D.

Structure of a service

Question 2

Question # 2

Refer to the exhibit, which represents a consumer environment consisting of multiple VMs running Windows operating systems (OSs).

For compliance reasons, the cloud service provider maintains version control over the OS provided to the consumer. The service provider also ensures that the configurations of the VMs comply with the configuration policy for the OS version. The configuration policy includes the two conditions shown in the exhibit. A monitoring tool verifies VM configurations against the configuration policy and provides the compliance results shown.

What is the percentage of compliance non-adherence?

Options:

A.

30.12%

B.

33.34%

C.

58.33%

D.

66.67%

Question 3

Match each information security concept with its description.

Question # 3

Options:

Question 4

What is a function of the discovery operation during the service operation phase of the cloud service lifecycle?

Options:

A.

Collects information about people involved in the service operations

B.

Collects information about services available in the catalog

C.

Provides visibility into each Cloud service asset employed

D.

Restores service levels while continuously optimizing operations

Question 5

A compute system is configured to access files from a network-attached storage system. What is a characteristic of the file system?

Options:

A.

Managed by the object-based storage device node

B.

Managed by the compute system

C.

Managed by the storage system

D.

Part of the storage area network

Question 6

Which activity is a part of people transformation?

Options:

A.

Automation of IT tasks that reduces manpower needs

B.

Adoption of a modern IT infrastructure

C.

Communication between IT staff and business leaders

D.

Adoption of a standard framework such as ITL

Question 7

What is a possible cause for incurring high capital expenditures for IT, even though resources may remain underutilized for a majority of the time in a traditional data center?

Options:

A.

Resources

B.

IT resources are provisioned as self-service

C.

IT resources are rented as services

D.

IT resources are configured for peak usage

Question 8

What is a responsibility of Service manager

Options:

A.

Creating detailed designs for the cloud infrastructure.

B.

Streamline service delivery and execution.

C.

Understand what consumers needs and industry trends to drive an effective product strategy

D.

Design and implementation of cloud provisioning processes for delivering cloud services.

Question 9

What is an advantage of adopting a microservices strategy in an application development environment?

Options:

A.

All microservices of an application are always updated at the same time for maintaining consistency in the application

B.

Every microservice can be deployed, upgraded, scaled, and restarted independent of other services in the application

C.

Microservices are tightly coupled so it is easy to scale all the services at once to meet business demands

D.

Microservices provide the application platform to implement DevOps in the organization easily and at low cost

Question 10

What is a characteristic of storage resource pools?

Options:

A.

Resource pools should always be created by different types of storage devices

B.

Resources are reserved by the application after being released by the consumer

C.

Resources are dynamically released to the pool when the consumer exceeds their quota

D.

Resources are dynamically allocated based on consumer demand

Question 11

What is a function of service portfolio management?

Options:

A.

Ensure compliance to industry standards

B.

Enable capacity and availability management

C.

Perform market research and collect information about competitors

D.

Collect information about cloud services and their constituent elements

Question 12

What term refers step or a series of steps necessary to complete an attack.

Options:

A.

Attack Surface

B.

Attack Vector

C.

Work factor

D.

Velocity of attacker

Page: 1 / 8
Total 84 questions