According to NIST, what are the five essential characteristics of the cloud?
A. On-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service
B. Networks, firewalls, storage, applications, and services
C. Platform as a service, bring your own software license, ability to reply applications over the internet, software as a service, and private network
D. On-demand network access, dedicated pool of computing resources, direct attached storage, rapid provisioning, and self service
As part of a VPC, what do Access Control Lists provide?
A. Subnet level firewall capabilities
B. Ability to restrict user access by role
C. Ability to prevent DDoS attacks
D. Governance for privileged access
What makes it possible to run multiple virtual machines on a bare metal server?
A. Disk
B. Cores
C. Virtualization
D. Memory
What is required before creating and using toolchains that contain certain tool integrations?
A. A Continuous Delivery service
B. The Creator role permissions
C. A Kubernetes cluster
D. A container repository
Power Systems Virtual Servers on IBM Cloud offers the choice of which machine types when provisioning?
A. Rockhopper
B. z/15
C. E880 and S922
D. FlashSystem 5200
Where can workloads or applications for classic infrastructure be deployed in IBM Cloud?
A. Dedicated server
B. Both virtual servers and bare metal servers
C. Virtual servers only
D. Bare metal servers only
What are two use cases for Internet of Things devices? (Choose two.)
A. Manufacturing Supply Chain
B. Predictive Maintenance
C. Asset Tracking
D. Financial Services Reconciliation
E. eCommerce Fulfillment
A client wants to get better insights as to how their customers engage with them, enabling the client to adapt their products and services based on what they learn. Which cloud services can be added to a business case to achieve this?
A. IoT
B. Analytics
C. Tririga
D. Blockchain
Which IBM Db2 service provides full administrative access in IBM Cloud?
A. Db2 Managed
B. Db2 Hosted
C. Db2 Warehouse
D. Db2 Service
Which severity level should be assigned to a support case in the event of a business critical function becoming inoperable?
A. 1
B. 4
C. 3
D. 2