IT認証試験問題集
毎月、GOWUKAKUは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / E20-020 問題集  / E20-020 問題練習

EMC E20-020 問題練習

Cloud Infrastructure Specialist Exam for Cloud Architects 試験

最新更新時間: 2024/03/19,合計64問。

【2024年3月キャンペーン】:E20-020 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、E20-020 問題集を使用してください。

 / 2

Question No : 1
A cloud design contains multiple hosts that are running a hypervisor. Each host has only two physical 10 Gb network adapters that are aggregated for bandwidth and failover. The physical switch ports for each host are configured as access ports. Each host will support numerous virtual machines and network segments. These virtual machines will communicate with other virtual machines on the same network segments.
Why would overlay networks be required for this design?

正解:
Explanation:
An overlay network is a computer network that is built on top of another network. Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network.
Virtual overlay networks use tunneling protocols to extend isolated network segments between servers for multi-tenant data center networks.
References: http://searchsdn.techtarget.com/tip/Virtual-overlay-networks-Tunneling­protocols-enable-multi-tenancy

Question No : 2
An organization is developing a cloud-native social-media website. The website will be written using elastic principles. When the website scales, it can add additional web, application and database instances to meet dynamic workload demand.
Which additional resources will be consumed by replication as the database layer expands.

正解:

Question No : 3
A company wants to build an IaaS cloud to host cloud-native applications.
On which areas should a cloud architect focus when gathering requirements for this cloud design?

正解:
Explanation:
*Multi-tenancy
Infrastructure as a Service is very similar to what we've known as hosting or collocation services, just painted with bright cloudy colors. Multi-tenant services are any services that you offer to multiple customers, or "tenants." In most cases, IaaS and multi-tenant services mean the same thing, although you could also implement storage- or database-related multi-tenant service.
*Hardware
In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure. Note: Infrastructure as a Service (IaaS) is a form of cloud computing that provides virtualized computing resources over the Internet.
References: http://www.interoute.com/what-iaas http://searchtelecom.techtarget.com/answer/How-do­Infrastructure-as-a-Service-and-multi-tenant-servicesdiffer

Question No : 4
Which additional considerations must a cloud monitoring system address compared to a traditional monitoring system?

正解:
Explanation:
* Encrypt data-at-rest
Encryption is your front-line defense for defending data-at-rest. It limits access to those with the right keys C locking out anyone who doesn’t have them.

Question No : 5
An organization wants to provide backup services in the cloud. They have no backup infrastructure in place. The organization has concerns about losing data if a site disaster occurs. They want to maintain control of backup data placement because of data privacy laws. Finally, they want to maintain at least one month’s worth of backups onsite.
Which backup solution will meet these requirements?

正解:
Explanation:
Cloud gateway allows EMC customers to move on-premise data from EMC arrays to public cloud storage providers. Clod gateway facilitate data migration from on-premises to a public cloud storage service to create a true hybrid cloud storage environment. Cloud gateways such as Riverbed’s SteelStore (formally known as Whitewater) can act as a local backup target for funneling data to a storage cloud for offsite storage.
References: http://blogs.forrester.com/henry_baltazar/14-07-09­gateways_will_accelerate_data_migration_to_the_cloud

Question No : 6
A cloud architect is expected to present a final cloud infrastructure design to an organization. The architect will meet with an organization’s executives and discuss the physical design.
Why might this to be the wrong time to present this design?

正解:

Question No : 7
Ian organization wants to protect the cloud management platform (CMP) from loss due to a site disaster. To support this requirement, the completed cloud design deliverables include the processes and procedures for restoring CMP functionality.
What other item should be included in the deliverables to support this requirement?

正解:

Question No : 8
A cloud architect has included a monitoring application in a cloud design to ensure infrastructure performance meets agreed-upon service levels. The application resides on a virtual appliance. The application vendor provides guidance for sizing the appliance.
What will be part of the sizing calculations for the virtual appliance storage?

正解:

Question No : 9
What is a challenge that is unique to hybrid cloud deployments for authentication and authorization systems?

正解:
Explanation:
Single Sign On The advantage of having a single point of control over users’ access to any organizational assets should be clear. Extending centralized authentication policy to cloud resources provides not only continuity of control but also maximizes user convenience so that the user need not provide different credentials based on the location of the resource. This will be particularly important as resources migrate to the cloud over time. References: https://technet.microsoft.com/en-us/magazine/hh389788.aspx

Question No : 10
An organization wants to deploy SaaS applications in their cloud. The SaaS applications will be using application HA to maintain up-time levels of 99.9%.
What should the cloud architect include in the design to support this up-time requirement?

正解:

Question No : 11
A cloud architect is evaluating an organization’s need for encryption.
Which type of encryption eliminates the requirement for key management?

正解:
Explanation:
The most convenient form of encryption is disk/volume encryption. If you have any data on an existing Virtual Machine (VM), you can easily add an encrypted disk or volume. Then, when you unmount the encrypted volume (or power off the server), as long as you don’t store the encryption key on the server, your data is safe. The drawback with this type of encryption however is that if your server gets compromised somehow, there is a possibility that the attacker could capture your passphrase/key (and/or data) the next time you mount the disk image.
Incorrect:
Not C: Filesystem-level encryption, often called file/folder encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself. Each file can be and usually is encrypted with a separate encryption key.
References: https://www.cloudsigma.com/securing-your-data-in-the-cloud-with-encryption/

Question No : 12
A cloud architect is evaluating an organization’s need to support thousands of virtual machine instances and some form of encryption. Which encryption type should be selected and why?

正解:

Question No : 13
You are designing consumer compute resources in an onsite private cloud. During an assessment, you discover that the organization’s IT staff wants secure access to the underlying host OS.
What should be included in the design to support this requirement?

正解:

Question No : 14
A cloud architect discovers that an organization wants to deploy 500 consumer applications initially and grow to over 2000 consumer applications in three years. These applications will use block storage only. How does the information impact the cloud management platform infrastructure sizing?

正解:
Explanation:
Incorrect:
Not B: A content delivery network or content distribution network (CDN) is a globally distributed network of proxy servers deployed in multiple data centers.

Question No : 15
Which networking technology is required for application HA in contrast to host HA or operating system HA?

正解:
Explanation:
Symantec ApplicationHA could perhaps be described as the pairing of Veritas Cluster Server with VMware HA. Vertias Cluster server has been a leading clustering solution for many years with its excellent cross-platform support. Veritas Cluster Server uses a shared storage model to provide high availability
References: http://www.blueshiftblog.com/?p=443

 / 2