Q1. An organization is currently using a private cloud to host gaming applications. The private cloud is located in the organization's data center. These applications have very little static data and no requirements for securing data. Authentication is handled through an external resource.
During holiday and vacation seasons, application usage increases significantly and more resources are required. However, the increase only occurs about 10% of the year and the organization wants to maintain performance.
What can be done to meet this requirement?
A. Deploy global load balances
B. Create QoS policies during peak usage
C. Move to a hybrid cloud model
D. Implement a CDN solution
Answer: C
Explanation: Hybrid cloud is a cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. By allowing workloads to move between private and public clouds as computing needs and costs change, hybrid cloud gives businesses greater flexibility and more data deployment options.
Incorrect:
Not D: A content delivery network (CDN) is a system of distributed servers (network) that deliver webpages and other Web content to a user based on the geographic locations of the user, the origin of the webpage and a content delivery server.
References:
http://searchcloudcomputing.techtarget.com/definition/hybrid-cloud
Q2. Which additional considerations must a cloud monitoring system address compared to a traditional monitoring system?
A. Tenant isolation, orchestration, and elastic workloads
B. Orchestration, elastic workloads, and Data at Rest security
C. Elastic workloads, Data at Rest security, and tenant isolation
D. Data at Rest security, tenant isolation, and orchestration
Answer: C
Explanation: * Encrypt data-at-rest
Encryption is your front-line defense for defending data-at-rest. It limits access to those with the right keys - locking out anyone who doesn't have them.
Q3. Which additional considerations must a cloud monitoring system address compared to a traditional monitoring system?
A. Tenant isolation, orchestration, and elastic workloads
B. Orchestration, elastic workloads, and Data at Rest security
C. Elastic workloads, Data at Rest security, and tenant isolation
D. Data at Rest security, tenant isolation, and orchestration
Answer: C
Explanation: * Encrypt data-at-rest
Encryption is your front-line defense for defending data-at-rest. It limits access to those with the right keys - locking out anyone who doesn't have them.
Q4. A company wants to build an IaaS cloud to host cloud-native applications. On which areas should a cloud architect focus when gathering requirements for this cloud design?
A. Automation, multi-tenancy, and hardware availability
B. Automation, hardware availability, and policy compliance
C. Hardware availability, policy compliance, and multi-tenancy
D. Policy compliance, automation, and multi-tenancy
Answer: C
Explanation: * Multi-tenancy
Infrastructure as a Service is very similar to what we've known as hosting or collocation services, just painted with bright cloudy colors. Multi-tenant services are any services that you offer to multiple customers, or "tenants." In most cases, IaaS and multi-tenant services mean the same thing, although you could also implement storage- or database- related multi-tenant service.
* Hardware
In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure.
Note: Infrastructure as a Service (IaaS) is a form of cloud computing that provides virtualized computing resources over the Internet.
Explanation: References:
http://www.interoute.com/what-iaas
http://searchtelecom.techtarget.com/answer/How-do-Infrastructure-as-a-Service-and-multi-tenant-servicesdiffer
Q5. A cloud architect is evaluating an organization's need to support thousands of virtual machine instances and some form of encryption. Which encryption type should be selected and why?
A. Storage array encryption to provide centralized management
B. Full file systems encryption to simplify key management
C. Network-based encryption to increase security at the cost of server overhead
D. Self-encrypting storage devices to increase security at the cost of increased overhead
Answer: B
Q6. A cloud architect has determined that the cloud management infrastructure requires an authentication and PKI environment. In addition, each tenant will require its own authentication and PKI environment. What describes these separate environments in a cloud design document?
A. Availability zones
B. Fault domains
C. Multi-tenancy
D. Trust zones
Answer: C
Explanation: The term "software multitenancy" refers to a software architecture in which a single instance of software runs on a server and serves multiple tenants. A tenant is a group of users who share a common access with specific privileges to the software instance.
Incorrect:
Not A: Availability zones (AZs) are isolated locations within data center regions from which public cloud services originate and operate.
Not B: A fault domain is a set of hardware components - computers, switches, and more - that share a single point of failure.
Not D: Zones of trust are a defined area of the system where by by necessity, by the presence of key information assets and by the wider environmental context the connections within the zone are treated as at the same level of trust. This effectively couples the components within that subsystem for security purposes.
References:
https://en.wikipedia.org/wiki/Multitenancy
Q7. What describes the storage categories represented by OpenStack Swift and EMC XtremIO requirements?
A. Swift = Distributed Object StorageXtremIO = Central Storage
B. Swift = Central Storage XtremIO = Distributed File Storage
C. Swift = Distributed Block StorageXtremIO = Distributed Object Storage
D. Swift = Distributed File StorageXtremIO = Distributed Block Storage
Answer: A
Explanation: OpenStack Swift is a globally-distributed object storage with a single namespace that's durable enough for the most demanding private clouds and now brought to you in an easy-to-deploy/scale/manage system.
XtremIO is a flash-based Storage Array. Explanation:
References:
https://www.swiftstack.com/#testimonial/2 http://www.emc.com/collateral/white-papers/h11752-intro-to-XtremIO- array-wp.pdf
Q8. An organization wants to include performance monitoring in their cloud environment. However, they want to minimize the number of accounts and passwords that must be created on target devices and sent across the network. Which monitoring solution should a cloud architect recommend to meet this requirement?
A. Proxy
B. Agent-based
C. Agentless
D. Central
Answer: D
Q9. An organization plans to build a cloud using some of the existing data center infrastructure. Specifically, they want to use the existing FC storage infrastructure to support cloud hosts. However, they want to logically separate the cloud storage traffic from the existing data center storage traffic within this infrastructure. Which mechanism can be used to meet this requirement?
A. MPIO
B. VLAN
C. VSAN
D. Masking
Answer: D
Explanation: The use of VSANs allows the isolation of traffic within specific portions of the network. If a problem occurs in one VSAN, that problem can be handled with a minimum of disruption to the rest of the network. VSANs can also be configured separately and independently.
Note: Virtual storage area network (VSAN) is a collection of ports from a set of connected Fibre Channel switches, that form a virtual fabric. Ports within a single switch can be partitioned into multiple VSANs, despite sharing hardware resources. Conversely, multiple switches can join a number of ports to form a single VSAN.
Incorrect:
Not A: Microsoft Multipath I/O (MPIO) is a Microsoft-provided framework that allows storage providers to develop multipath solutions that contain the hardware-specific information needed to optimize connectivity with their storage arrays.
MPIO is protocol-independent and can be used with Fibre Channel, Internet SCSI (iSCSI), and Serial Attached SCSI (SAS) interfaces in Windows Server® 2008, Windows Server 2008 R2 and Windows Server 2012.
Not D: Logical Unit Number Masking or LUN masking is an authorization process that makes a Logical Unit Number available to some hosts and unavailable to other hosts. LUN masking operates at Layer 4 of the Fibre Channel protocol.
Reference: https://en.wikipedia.org/wiki/VSAN
Q10. Which aspect of the project definition does the cloud design scope provide?
A. Broad directions for the project
B. Boundaries of what the project should and should not include
C. Sales figures that must be met when designing the project
D. Specific features or functions that must be included in the project
Answer: D