aiotestking uk

E20-020 Exam Questions - Online Test


E20-020 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. What needs to be considered when designing a distributed storage solution?

A. Multiple management tools

B. Fault domain detection and isolation to ensure data availability

C. RAID configuration to ensure a drive failure is avoided

D. Automated storage tiering to enable efficient use of drive

Answer: B

Explanation: A distributed data store is a computer network where information is stored on more than one node, often in a replicated fashion. Distributed data stores typically use an error detection and correction technique. Some distributed data stores (such as Parchive over NNTP) use forward error correction techniques to recover the original file when parts of that file are damaged or unavailable. Others try again to download that file from a different mirror. Explanation:

References: https://en.wikipedia.org/wiki/Distributed_data_store

Q2. An organization plans to deploy many cloud-native applications that will generate a considerable amount of east-west traffic. The cloud-native applications will be deployed on hosts running hyppervisors. Why would distributed routers be considered in this design?

A. Enable network segment

B. Improve network performance between hosts

C. Minimize Internet traffic

D. Protect against a physical router failure

Answer: B

Explanation: Distributed Virtual Router (DVR) aims to isolate the failure domain of the traditional network node and to optimize network traffic by eliminating the centralized L3 agent. It does that by moving most of the routing previously performed on the network node to the compute nodes.

* East/west traffic (Traffic between different networks in the same tenant, for example between different tiers of your app) previously all went through one of your network nodes whereas with DVR it will bypass the network node, going directly between the compute nodes hosting the VMs. Etc. Explanation:

References:

http://assafmuller.com/2015/04/15/distributed-virtual-routing-overview-and-eastwest-routing/

Q3. An organization wants to deploy SaaS applications in their cloud. The SaaS applications will be using application HA to maintain up-time levels of 99.9%.

What should the cloud architect include in the design to support this up-time requirement?

A. Sufficient host capacity

B. Quorum disks

C. Replication licenses for hypervisors

D. HA licenses for hypervisors

Answer:

Q4. What is a benefit of a service catalog?

A. Handles every IT request simultaneously

B. Allows users to customize tenant roles

C. Services do not have to meet the standards set by the business

D. Enables the application of quotas on resources to control cost

Answer: D

Q5. An organization plans to deploy a spine/leaf network topology to support a cloud design. Leaf switches will use layer- 3 protocols to communicate with the spine switches. Hosts will each connect to two leaf switches using layer-2 protocols.

Which technology must be enabled between the host and leaf switches to provide the maximum throughput for a single data stream?

A. Generic Network Virtualization Encapsulation

B. Spanning Tree Protocol

C. Equal-Cost Multi-Path Routing

D. Multi-Chassis Aggregation

Answer: A

Explanation: Generic Network Virtualization Encapsulation (Geneve) is the peacemaking protocol drafted to unify VXLAN, NVGRE, and whatever other tunneling protocols emerge for network virtualization. Geneve doesn't exactly replace VXLAN and other protocols. Rather, it provides a common superset among them, so that outside software can provide hooks to Geneve rather than having to accommodate multiple encapsulation standards.

Note: NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization technology that attempts to alleviate the scalability problems associated with large cloud computing deployments. It uses Generic Routing Encapsulation (GRE) to tunnel layer 2 packets over layer 3 networks. Its principal backer is Microsoft. Explanation:

References:

https://www.sdxcentral.com/articles/news/intel-supports-geneve-unify-vxlan-nvgre/2014/09/

Q6. In addition to the operating system, what other components does the consumer manage in an IaaS cloud service model?

A. Application, data, storage, and physical networking

B. Data, middleware, application, and runtime

C. Runtime, physical servers, application, and middleware

D. Middleware, runtime, hypervisor, and application

Answer: B

Explanation: In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure.

IaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles. Figure: Cloud-computing layers accessible within a stack

Incorrect:

Not A: not Physical networking not C: Not physical servers. Not D: Not Hypervisors. Explanation:

References: http://www.interoute.com/what-iaas

Q7. After developing prototype applications in the public cloud, developers determined that they want softwaredefined network functionality. Which ability will this requirement provide for the developers?

A. Programmatically provision an IPsec VPN tunnel between the public and private clouds

B. Programmatically migrate layer-3 access from aggregate to access switches

C. Programmatically control physical core network topologies

D. Programmatically provision physical network segments and services

Answer: D

Explanation: Software-defined networking (SDN) is an approach to computer networking that allows network administrators to manage network services through abstraction of higher-level functionality. This is done by decoupling the system that makes decisions about where traffic is sent (the control plane) from the underlying systems that forward traffic to the selected destination (the data plane).

Reference: https://en.wikipedia.org/wiki/Software-defined_networking

Q8. A cloud architect is evaluating an organization's need to support thousands of virtual machine instances and some form of encryption. Which encryption type should be selected and why?

A. Storage array encryption to provide centralized management

B. Full file systems encryption to simplify key management

C. Network-based encryption to increase security at the cost of server overhead

D. Self-encrypting storage devices to increase security at the cost of increased overhead

Answer:

Q9. An organization wants to provide its developers with the ability to deploy virtual machines. These virtual machines have software and libraries installed that are used to develop applications. Each virtual machine will be configured with the same IP address and will be able to download application code from a central server. Which will be included in the design to support these requirements?

A. VSANs and virtual firewall appliances

B. VLANs and virtual firewall appliances

C. VLANs and virtual IDS appliances

D. VXLANs and an OS firewall

Answer: D

Explanation: Virtual Extensible LAN (VXLAN) is a proposed encapsulation protocol for running an overlay network on existing Layer 3 infrastructure. An overlay network is a virtual network that is built on top of existing network Layer 2 and Layer 3 technologies to support elastic compute architectures. VXLAN will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.

Explanation: References:

http://whatis.techtarget.com/definition/VXLAN

Q10. An organization is considering the use of a cloud gateway to backup services to a public cloud. They will use their existing backup application. What is a design consideration?

A. Ensuring the cloud storage provider is using the same compression algorithm as the backup software

B. Ensuring data is encrypted and key management is defined

C. Ensuring the cloud storage provider is using the same PKI solution as the organization

D. Ensuring the backup application supports the same authentication mechanism as the public cloud provider

Answer: