IT-as-a-Service Expert Exam for Cloud Architects: E20-918 Exam
E20-918 Questions & Answers
Exam Code: E20-918
Exam Name: IT-as-a-Service Expert Exam for Cloud Architects
Q & A: 103 Q&As
QUESTION 1
A large enterprise has several applications deployed in a hybrid cloud. Ever since the hybrid cloud
was deployed, the enterprise network operations center has never been able to fully reconcile
network and audit logs. What should be investigated first as the possible source of the issue?
A. Confirm time is synchronized between locations
B. Filtering false positives
C. Exposing management APIs
D. Tenant in-control versus provider in-control differences
Answer: A
QUESTION 2
A company is deploying a major new business application. The company has difficulty managing
the software development lifecycle. As a result, the time from generating requirements to
operational delivery is significant. Which best addresses the company’s need for shorter release
cycles and better code quality?
A. Implement common collaboration tools
B. Utilize configuration management methodologies
C. Use of common automation and orchestration processes
D. Transition to a DevOps culture
Answer: D
QUESTION 3
The first phase of new ITaaS service introduces the offering to 10% of the engineering
organization. The IT organization leverages the management tools used in their traditional data
center processes to provide visibility into silos and control of the infrastructure. They also have
adapted some ITSM concepts as a framework for their management practices. During the initial
phase of the service deployment, a problem was encountered in one of the VMs. The IT
organization is concerned about the extensive amount of time and resources spent determining
the cause of the issue. What is the most likely reason it takes more time than expected to resolve
the problem?
A. The legacy management tools do not have the capability to provide a holistic view of the
service instance
B. The expertise of the service desk personnel is inadequate to properly handle service related
issues.
C. The complex nature of orchestration and automation makes problem identification and root
cause analysis unlikely.
D. The cultural hurdles that span organizational silos have not been addressed and resolved.
Answer: A
QUESTION 4
A manufacturing company hired you to help them in their journey to a hybrid cloud. You conduct
an assessment and recommend migrating several existing Tier 2 applications to a public cloud
provider. You must work within the following constraints: ?Migration can be performed only during
weekends ?Only limited downtime is acceptable ?The configuration of the host and applications
cannot be changed ?The company needs to keep the costs as low as possible ?Although there are no specific performance requirements, they are concerned about the quality of the user
experience Which solution best addresses these needs?
A. Layer 2 extension with VPN connection over Internet with WAN optimization
B. Layer 3 connection over Internet with QoS
C. Layer 3 connection over Internet with WAN optimization
D. Layer 2 extension with dedicated link and WAN optimization
Answer: A
QUESTION 5
The marketing line of business of an enterprise has deployed web services within a private cloud.
They wish to provide additional web services elastically and distribute them around the globe
using a public cloud provider. The web services have a loosely coupled design and have no
content dependencies on any resources in the private cloud. They are created from a standard
PaaS template, which includes an intrusion prevention system that periodically polls a central
management server for security updates. The IPS management server is located within the private
cloud. No layer 2 connectivity exists between the private and public clouds. The consumers of
these web services are distributed across the globe. Which solution would you recommend to best
support the web service elasticity and to minimize service network latency for the consumer?
A. Implement an encrypted VPN tunnel between the private and public clouds.
B. Implement a global load balancing service as a front-end for the web services.
C. Increase bandwidth between the private cloud and the Internet.
D. Deploy a central database server to consolidate web service content.
Answer: B
QUESTION 6
An enterprise decided to place some sensitive data in the public cloud and implemented security
mechanisms to protect this data. Recently the public cloud provider’s systems had a security
breach. The enterprise was not concerned because they felt their data had been completely
protected. All of the services housing the data are protected by an IPS application and no alerts
were generated by the system. How did the enterprise protect its data?
A. All data in the public cloud environment was encrypted at-rest and in-transit. The encryption
keys were under complete control of the enterprise and were not available to the public
provider. The cloud provider’s logs showed that the enterprise’s services were copied.
B. All data in the public cloud environment was encrypted at-rest and in-transit. Copies of the
encryption keys were secured by the public cloud provider in case they were lost. The cloud
provider’s logs showed that the enterprise’s services were neither accessed nor copied.
C. All data in the public cloud environment was encrypted in-transit only. The encryption keys
were under complete control of the enterprise and were not available to the public provider.
The cloud provider’s logs showed that the enterprise’s services were copied.
D. All data in the public cloud environment was encrypted at-rest only. The encryption keys were
under complete control of the enterprise and were not available to the public provider.
The cloud provider’s logs showed that the enterprise’s services were copied.
Answer: A
…you can go to http://www.lead2pass.com/e20-918.html to download the full version.