An organization wants to deploy a block storage in the cloud using a storage array that is accessible through the iSCSI protocol. The hosts support iSCSI.
Why would network segmentation be included in the design to support this requirement?
A. Secure all traffic between the storage array and the hosts
B. Enable CHAP between the array and hosts
C. iSCSI traffic is not supported on networks with other types of traffic
D. Enable LUN masking capabilities of the array
What needs to be considered when designing a distributed storage solution?
A. Multiple management tools
B. Fault domain detection and isolation to ensure data availability
C. RAID configuration to ensure a drive failure is avoided
D. Automated storage tiering to enable efficient use of drive
What describes the storage categories represented by OpenStack Swift and EMC XtremIO requirements?
A. Swift = Distributed Object StorageXtremIO = Central Storage
B. Swift = Central Storage XtremIO = Distributed File Storage
C. Swift = Distributed Block StorageXtremIO = Distributed Object Storage
D. Swift = Distributed File StorageXtremIO = Distributed Block Storage
When implementing QoS across a cloud network, how is storage traffic usually prioritized?
A. Most important
B. More important than tenant traffic but less important than management traffic
C. More important than management traffic but less important than tenant traffic
D. Least improtant
Which aspect of the project definition does the cloud design scope provide?
A. Broad directions for the project
B. Boundaries of what the project should and should not include
C. Sales figures that must be met when designing the project
D. Specific features or functions that must be included in the project
Which cloud services are typically responsible for automatically scaling applications?
A. Orchestration and monitoring
B. Metering and service catalog
C. Monitoring and metering
D. Service catalog and orchestration
Which type of storage is optimal for high performance and low latency applications?
A. File
B. Object
C. Block
D. Cluster
A cloud architect has included a monitoring application in a cloud design to ensure infrastructure performance meets agreed-upon service levels. The application resides on a virtual appliance. The application vendor provides guidance for sizing the appliance.
What will be part of the sizing calculations for the virtual appliance storage?
A. Number of targetsMessage bus subscribers Data deduplication policies
B. Number of segments Number of metrics Data deduplicaiton policies
C. Number of targetsNumber of metrics Data retention policies
D. Message bus subscribers Number of users Data retention policies
An organization wants to provide its developers with the ability to deploy virtual machines. These virtual machines have software and libraries installed that are used to develop applications. Each virtual machine will be configured with the same IP address and will be able to download application code from a central server. Which will be included in the design to support these requirements?
A. VSANs and virtual firewall appliances
B. VLANs and virtual firewall appliances
C. VLANs and virtual IDS appliances
D. VXLANs and an OS firewall
A cloud architect is evaluating an organization's need for encryption. Which type of encryption eliminates the requirement for key management?
A. Embedded
B. File-based
C. File system-based
D. Virtual disk