IBM C1000-100 Exam Practice Questions (P. 5)
- Full Access (64 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
When all objects stored in IBM Cloud Object Storage are encrypted using Server-Side Encryption with Customer Provided Keys (SSE-C), how are read and write object requests sent?
- ASend the required encryption information as part of SSL requests
- BHave their requested UID/PWD verified prior to HTTP request flow
- CSend encryption information as part of UID/PWD verification
- DSend the required encryption information as headers in the HTTP requests only
Correct Answer:
A
A
send
light_mode
delete
Question #22
IBM Log Analysis with LogDNA can be used to manage which of the following?
- AService Mesh in IBM Cloud
- BOnly application logs in the IBM Cloud
- CCloud native applications logs on any Cloud
- DSystem and application logs in the IBM Cloud
Correct Answer:
D
Reference:
https://www.ibm.com/support/knowledgecenter/en/bluemix_stage/services/Log-Analysis-with-LogDNA/overview.html
D
Reference:
https://www.ibm.com/support/knowledgecenter/en/bluemix_stage/services/Log-Analysis-with-LogDNA/overview.html
send
light_mode
delete
Question #23
The Chief Data Officer (CDO) wants to build a new data solution for his clients. This application needs access to a Spark cluster on IBM Cloud without the Spark
Cluster being accessible over the Internet. If IBM Analytics Engine (IAE) is selected, what must be enabled to allow the application server to securely access IAE?
Cluster being accessible over the Internet. If IBM Analytics Engine (IAE) is selected, what must be enabled to allow the application server to securely access IAE?
- ATransit Endpoint
- BService Endpoint
- CGateway Endpoint
- DTransverse Endpoint
Correct Answer:
B
B
send
light_mode
delete
Question #24
What enables faster web performance by locating copies of web data closer to end users?
- AVirtual Private Network
- BVirtual Router Appliance
- CLoad Balancer
- DContent Delivery Network
Correct Answer:
D
Reference:
https://www.ibm.com/cloud/learn/content-delivery-networks
D
Reference:
https://www.ibm.com/cloud/learn/content-delivery-networks
send
light_mode
delete
Question #25
A VPC has been created with a single subnet. Virtual server instances have been deployed on the subnet that have different functions which support a production application. The security team has now said that they want to ensure that network traffic between the different server types can be controlled. How can this be achieved?
- AUse a Hardware Security Module to create advanced network routing tables that ensure traffic does not route between server types, as per the security team's wishes
- BCreate security groups for the different server types with inbound and outbound rules that satisfy the security team, into which the VSIs can be placed
- CCreate a VPC load balancer and place each server type into its own back-end pool, then create Layer-7 routing policies that restrict network traffic flowing between the different pools
- DCreate multiple access control lists with rules that satisfy the security team's requirements and associate each VSI to the respective ACL
Correct Answer:
A
A
send
light_mode
delete
All Pages