Select the unique key features of Hyper Protect Crypto Services on the IBM Cloud?
A. Built on IBM Red Hat OpenShift technology, on single-tenant key management service with key vaulting provided by dedicated customer-controlled HSM
B. Hyper Protect Crypto Services provide state-of-the-art encryption using DM-CRYPT
C. IBM Cloud administrators have no access and it provides FIPS 140-2 Level 4-certified hardware
D. Hyper Protect Crypto Services can integrate with other any other Cloud provider services so as to manage key access, log and monitor security events, and support compliance requirements
In order to provide a highly resilient and highly available network with ECMP and diversity connections to IBM Cloud, how many Direct Link circuits should be recommended?
A. 4
B. 2
C. 6
D. 3
Database for PostgreSQL is an example of which type of database?
A. Key-value
B. Object-relational
C. Document
D. Graph
What is a key requirement of a resilient architecture?
A. High rate of resource utilization
B. Low rate of resource utilization
C. High tolerance level for interruption
D. Low tolerance level for interruption
Which of the following IBM Cloud services is integrated with Certificate Manager?
A. IBM Bare Metal Server
B. Red Hat OpenStack on IBM Cloud
C. IBM Cloud for Power Solutions
D. IBM Cloud Kubernetes Service
What is the function of the IBM Cloud File Storage Capacity Expansion feature?
A. It is used by the IBM Cloud Storage users to regenerate data storage that may have been deleted
B. It is used by IBM Cloud Storage users to manage data flow
C. It is used by IBM Cloud Storage users to expand their file storage immediately
D. It is used by the IBM Cloud Management team to manage file storage capacity
The Chief Data Officer (CDO) wants to build a new data solution for his clients. This application needs access to a Spark cluster on IBM Cloud without the Spark Cluster being accessible over the Internet. If IBM Analytics Engine (IAE) is selected, what must be enabled to allow the application server to securely access IAE?
A. Transit Endpoint
B. Service Endpoint
C. Gateway Endpoint
D. Transverse Endpoint
A Financial Institution is interested in using IBM Blockchain Platform on IBM Cloud with the requirement that any application meet FIPS 140-2 Level 3 compliance. What option should an architect use for the nodes?
A. Financial Cloud Connector
B. Spectrum Protect Module
C. Hardware Security Module
D. Cloud Internet Connector
What industry standard encryption protocol is used for the IBM Cloud Block Storage?
A. Industry-Standard SSL HTTPS 32 encryption
B. Industry-Standard AES-256 encryption
C. Industry-Standard ASE-526 encryption
D. Industry-Standard SSL HTTP 64 encryption
Identify the component marked as B in the Cloud Connection scenario that shows a persistent connection established between the customer's environment and the IBM Cloud.
A. Virtual Router Appliance
B. Cloud Gateway Appliance
C. Secure Gateway Service
D. Secure Gateway Client
With regards to disaster recover, what industry term describes `the maximum amount of time it should take to restore application or system functions following a service disruption'?
A. Restore Point Duration
B. Recovery Point Objective
C. Recovery Time Objective
D. Restore Time Duration
Which IBM Cloud server also offers a Power architecture on Linux?
A. Power Systems Virtual Servers
B. Reserved Virtual Servers
C. Dedicated Virtual Servers
D. Virtual Servers for VPC
What is API Gateway?
A. A service used to create, secure, share and manage APIs
B. A service that provides agility and speed in releasing new APIs functionalities
C. A tool used to write automated tests, ideally before writing code
D. A service used to create, secure, share, and manage code
After deploying the IBM Cloud Kubernetes service on Public Cloud, how soon are metrics collected by the IBM Cloud Monitoring service?
A. After logging into your cluster for the first time
B. After 4 hours of cluster provisioning
C. Start of the next business day
D. As soon as the cluster is provisioned
A high profile business customer has two security concerns for their new public application workload on IBM Cloud, security of the application at Network Layer 7 and DDoS. Which IBM Cloud solution should be deployed to mitigate these concerns?
A. Global Internet Service
B. Hyper Protect Service
C. Cloud Internet Service
D. HyTrust Protect Service