IBM Cloud v2.docx PDF
Document Details
Uploaded by ConsummateLongBeach1089
Tags
Summary
This document appears to be a collection of multiple choice questions and answers related to IBM Cloud. Questions cover various topics in cloud computing, including storage services and resources.
Full Transcript
1. A. B. C. D. 2. E. F. G. H. 3. I. J. K. L. 4. M. N. O. P. 5. Q. R. S. T. 6. U. V. W. X. 7. Y. Z. A. B. 8. A. B. C. D. 9. B. C. D. 10. A. B. C. D. 11. E. F. G. H. 12...
1. A. B. C. D. 2. E. F. G. H. 3. I. J. K. L. 4. M. N. O. P. 5. Q. R. S. T. 6. U. V. W. X. 7. Y. Z. A. B. 8. A. B. C. D. 9. B. C. D. 10. A. B. C. D. 11. E. F. G. H. 12. I. J. K. L. 13. M. N. O. P. 14. Q. R. S. 15. T. U. V. W. 16. X. Y. Z. A. 17. B. C. D. E. 18. B. C. D. 19. B. C. D. 20. F. G. H. I. 21. J. K. L. M. 22. N. O. P. Q. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. a. b. c. d. 38. B. C. D. 39. A. B. C. D. 40. B. C. D. 41. E. F. G. H. 42. B. C. D. 43. I. J. K. L. 44. M. N. O. 45. P. Q. R. 46. S. T. U. 47. V. W. X. 48. Y. Z. A. B. 49. C. D. E. F. 50. B. C. D. 51. G. H. I. J. 52. K. L. M. N. 53. O. P. Q. R. 54. S. T. U. V. 55. 56. 57. 58. 59. 60. 61. A. B. C. D. 62. A. B. C. D. 63. B. C. D. 64. E. F. G. H. 65. B. C. D. 66. I. J. K. L. 67. M. N. O. P. 68. Q. R. S. 69. T. U. V. W. 70. X. Y. Z. A. 71. B. C. D. E. 72. F. G. H. 73. I. J. K. L. 74. B. C. 75. B. C. D. 76. B. C. D. 77. M. N. O. P. 78. Q. R. S. T. 79. U. V. W. X. 80. Y. Z. A. B. 81. C. D. E. F. 82. B. C. D. 83. G. H. I. J. 84. K. L. M. N. 85. 86. O. P. Q. R. 87. S. T. U. V. 88. W. X. Y. Z. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. 101. 102. A. B. C. D. 103. E. F. G. H. 104. B. C. D. 105. B. C. D. 106. I. J. K. L. 107. M. N. O. P. 108. Q. R. S. T. 109. U. V. W. X. 110. Y. Z. A. B. 111. B. C. D. 112. B. C. D. 113. C. D. E. F. 114. G. H. I. J. 115. K. L. M. N. 116. O. P. Q. R. 117. S. T. U. V. 118. A. B. C. D. 119. A. B. C. D. 120. A. B. C. D. 121. A. B. C. D. 122. A. B. C. D. 123. 124. 125. 126. 127. 128. 129. 130. A. B. C. D. A. Manages user credentials B. Monitors network traffic C. Controls traffic to and from a network subnet D. Maintains user operating system A. Allows clients to group storage for sensitive data to meet compliance requirements B. Allows for the creation of groups of resources to monitor and filter an instance\'s incoming and outgoing traffic in a VPC instance C. Monitors inbound traffic for suspicious network activity D. Monitors the security and compliance of clients\' environments A. Does not utilize encrypted storage B. Hosts an infrastructure dedicated to the client C. Security for client VPC applications is managed by the cloud service provider D. Allows an enterprise to define and control a virtual network that is logically isolated from other public cloud tenants A. Virtual Private Cloud B. Private Cloud C. Managed Virtual Cloud D. Dedicated Cloud A. Visual Service Instance B. Virtual Server Incident C. Virtual Service Incident D. Virtual Server Instance A. Internet router B. VPN C. Public gateway D. Transit gateway A. Virtual Private Network B. Virtual Public Network C. Virtual Private Notification D. Virtual Public Netscape A. Reserved virtual server B. Dedicated virtual server C. Public virtual server D. Transient virtual server A. Reserved virtual server B. Dedicated virtual server C. Public virtual server D. Transient virtual server A. Dedicated B. Bare Metal C. Reserved D. Transient A. Physical isolation B. Complete control C. Rapid provisioning D. Disk I/O performance A. An optional service to help manage disaster recovery B. An optional load balancer C. An optional hosted private cloud D. An optional service that allows for easy backup and replication A. An optional service to help manage disaster recovery B. An optional load balancer C. An optional hosted private cloud D. An optional service that allows for easy backup and replication B. VMware Shared C. VMware Regulated D. VMware vSphere A. vCenter Server B. VMware Shared C. VMware Regulated D. VMware vSphere A. vCenter Server B. VMware Shared C. VMware Regulated D. VMware vSphere A. Identity and access management software B. Monitoring and alerting software C. Open-source container orchestration software D. Disaster recovery software A. Notifications B. Dependencies C. Rules D. Proprietary workloads A. Runs containerized workloads on a fully managed, serverless platform B. Delivers complete virtual desktop environments to users C. Allows an Enterprise to establish its own private cloud like Computing environment D. Expands the reaches of IBM Cloud infrastructures outside of IBM\'s cloud data centers A. A virtual desktop environment for users B. A software platform for building containers C. A portable, extensible, proprietary platform for managing containerized workloads and services D. An Enterprise-grade container management platform A. File, Block, SSD B. Object, File, Block C. Object, SSD, SATA D. Shared, Dedicated, Private A. File B. SAN C. Block D. Object A. File B. SAN C. Block D. Object A. Cross region, regional, and single data center B. Regional, dual-region, and single data center C. One zone, two zone, and three zone D. Cross continent, regional, and single data center A. Cold tier, cool tier, warm tier, and hot tier B. Standard, glacier, deep glacier, and deep glacier archive C. Frequent access, very frequent access, infrequent access, and very infrequent access D. Smart tier, standard, vault, and cold vault A. Object storage B. File storage C. Local storage D. Block storage A. Object storage B. File storage C. Local storage D. Block storage ----------------------------------- -- purchase and setting up their own ----------------------------------- -- C. A cloud computing service that offers a platform on which a developer can design and deploy an application D. A cloud computing infrastructure to perform generalized or specialized tasks A. A dedicated key management and cloud hardware security module (HSM) B. A document database that is available as a managed service on IBM Cloud C. A free and open-source relational database management system D. A fully managed DBaaS built on open-source Apache CouchDB A. A dedicated key management and cloud hardware security module (HSM) B. A document database that is available as a managed service on IBM Cloud C. A free and open-source relational database management system D. A fully managed DBaaS built on open-source Apache CouchDB A. A dedicated key management and cloud hardware security module (HSM) B. A document database that is available as a managed service on IBM Cloud C. A free and open-source relational database management system D. A fully managed DBaaS built on open-source Apache CouchDB A. NoSQL B. Cloud C. Object-oriented D. Relationa A. A dedicated key management and cloud hardware security module (HSM) B. A document database that is available as a managed service on IBM Cloud C. A free and open-source relational database management system D. A fully managed DBaaS built on open-source Apache CouchDB A. A database engine that optimizes the features of PostgreSQL B. A database engine based on Apache EnterpriseDB C. A managed database server running on Bare Metal D. A database as a service solution designed to optimize Java EE enterprise applications A. Watson Conversation B. Watson Dialog C. Watson Assistant D. Watson Virtual Agent A. Suite of AI lifecycle management tools and a collaborative environment for data scientists, ------------------------------------------------------------------------------------------------ -- developers, and domain experts B. Uses AI that understands customers in context to provide fast and accurate answers across applications, devices, or channels C. AI-powered intelligent search and text-analytics platform that eliminates data silos D. Enables fast and accurate speech transcription in multiple languages for a variety of use cases A. Extract metadata from text B. Discover, curate, categorize, and share data assets and models with asset control C. Deploy machine learning models across any cloud D. Measure and manage AI models in production to promote trust and confidence A. MQ B. API Connect C. Event Streams D. Jenkins B. API Connect C. Event Streams D. App Connect A. Event Streams B. MQ C. API Connect D. Jenkins A. MQ B. App Connect C. Event Streams D. Jenkins A. Jenkins B. App Connect C. Event Streams D. MQ A. Developer toolkit B. API Manager C. API Gateways D. Application binaries A. Application binaries B. Developer toolkit C. Interface component D. API Gateways A. Management of operational costs B. Operational visibility into the health and performance of applications, platforms, and services C. Security management D. Log collection and analysis for compliance A. Access key B. API key C. Encryption key D. Public key A. Encryption methods B. Environment C. Configurations D. Applications A. Posture Management, Server Governance, and Security Insights B. Host Management, Configuration Governance, and Security Insights C. Posture Management, Configuration Governance, and Server Insights D. Posture Management, Configuration Governance, and Security Insights A. A monitoring agent for each host that you want to monitor B. A server agent for each host that you want to monitor C. A latency agent for each host that you want to monitor D. A hosting agent for each host that you want to monitor A. Access keys B. API keys C. Encryption keys D. Public keys