Dell E20-020 Exam Practice Questions (P. 2)
- Full Access (70 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
Which aspect of the project definition does the cloud design scope provide?
- ABroad directions for the project
- BBoundaries of what the project should and should not include
- CSales figures that must be met when designing the project
- DSpecific features or functions that must be included in the project
Correct Answer:
B
B
send
light_mode
delete
Question #7
A cloud architect is designing a hybrid cloud for an organization. A requirement for this environment is that the private cloud user credential be trusted by both cloud provisioning APIs.
Which type of authentication will meet this requirement?
Which type of authentication will meet this requirement?
- AFederated authentication
- BAsymmetric encryption
- CSymmetric encryption
- DShared-key authentication
Correct Answer:
A
A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
References:
https://en.wikipedia.org/wiki/Federated_identity
A
A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
References:
https://en.wikipedia.org/wiki/Federated_identity
send
light_mode
delete
Question #8
Which categories of network traffic should be isolated from inter-host communication and each other?
- ALogging and messaging
- BCloud services and administration
- CAdministration and storage
- DMessaging and storage
Correct Answer:
B
B
send
light_mode
delete
Question #9
A cloud architect is evaluating an organizations need to support thousands of virtual machine instances and some form of encryption. Which encryption type should be selected and why?
- AStorage array encryption to provide centralized management
- BFull file systems encryption to simplify key management
- CNetwork-based encryption to increase security at the cost of server overhead
- DSelf-encrypting storage devices to increase security at the cost of increased overhead
Correct Answer:
B
B
send
light_mode
delete
Question #10
An organization wants to provide its developers with the ability to deploy virtual machines. These virtual machines have software and libraries installed that are used to develop applications. Each virtual machine will be configured with the same IP address and will be able to download application code from a central server.
Which will be included in the design to support these requirements?
Which will be included in the design to support these requirements?
- AVSANs and virtual firewall appliances
- BVLANs and virtual firewall appliances
- CVLANs and virtual IDS appliances
- DVXLANs and an OS firewall
Correct Answer:
D
Virtual Extensible LAN (VXLAN) is a proposed encapsulation protocol for running an overlay network on existing Layer 3 infrastructure. An overlay network is a virtual network that is built on top of existing network Layer 2 and Layer 3 technologies to support elastic compute architectures. VXLAN will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
References:
http://whatis.techtarget.com/definition/VXLAN
D
Virtual Extensible LAN (VXLAN) is a proposed encapsulation protocol for running an overlay network on existing Layer 3 infrastructure. An overlay network is a virtual network that is built on top of existing network Layer 2 and Layer 3 technologies to support elastic compute architectures. VXLAN will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
References:
http://whatis.techtarget.com/definition/VXLAN
send
light_mode
delete
All Pages