Database for PostgreSQL is an example of which type of database?
A. Key-value
B. Object-relational
C. Document
D. Graph
Which file extension does the LogDNA agent monitor by default?
A. .logdna
B. .log
C. .varlog
D. .logvar
Which statement describes a key-value database?
A. Each item in the database is encrypted with public-key cryptography
B. Each item in the database is stored in a column named key with values in each row
C. Each item in the database is a document with lists of key-value pairs
D. Each item in the database is stored as an attribute name (referred to as a key) with its corresponding value
What enables faster web performance by locating copies of web data closer to end users?
A. Virtual Private Network
B. Virtual Router Appliance
C. Load Balancer
D. Content Delivery Network
When designing infrastructure for critical business applications, transactional databases, or virtual machines that require low-latency, why might you use Block storage instead of File storage?
A. Block Storage LUNs have data at rest encryption using in-house managed keys
B. Block Storage LUNs can be connected to authorized devices through redundant multi-path I/O (MPIO) connections
C. Block Storage LUNs can be used for file-based NFS shares
D. Block Storage LUNs can connect to authorized devices in another IBM Cloud datacenter
IBM Cloud Activity Tracker with LogDNA service monitors which set of events?
A. Business processes
B. How users, applications, and services interact in an account
C. Payment transactions
D. Realtime performance
Which Watson Language Translator feature protects your privacy so you can own your data?
A. Watson object store for data
B. Ability to opt-out of any data collection
C. Ability to stream data over HTTPS
D. Data privacy plug-in for Watson
How many public IP addresses are standard with IBM VMware Solutions Shared offerings?
A. 5
B. 4
C. 3
D. 2
IBM Cloud Security Advisor Network Insights uses which two KPIs to monitor inbound traffic? (Choose two.)
A. Reconnaissance by suspicious clients
B. Suspicious request header format
C. Abnormally large numbers of failed login attempts
D. Suspicious client IP address from the black list
E. Abnormally large payloads sent by suspicious clients
What is required before an IBM Cloud Toolchain can be executed?
A. Creator role permissions
B. A container repository
C. A Continuous Delivery service
D. A Kubernetes cluster