Which two of the following are exposed to leverage IBM DB2 Warehouse on Cloud through REST?
A. Database management API
B. Database Data Access API
C. Database monitoring API
D. Database Programming API
E. Database resource scaling API
What is an option for a developer tasked to create APIs for a business service using the API Gateway on IBM Cloud?
A. Submitting a WAR/JAR file to a static analysis tool to autocreate APIs based on business logic
B. Importing APIs using Swagger/OpenAPI definitions stored on .json. .yml and .yaml files
C. Creating Kubernetes services resources that will automatically create API for each Service resource on API Connect
D. Importing APIs stored in .zip files
What are the core functionalities for IBM Cloud Pak for Automation?
A. API lifecycle Management. Enterprise Messaging, Digital Workers
B. Content Management. Workflow. Decisions
C. Capture. Digital Workers. Enterprise Messaging
D. Workflow. Decisions. API lifecycle Management
Which of the following databases supports both relational and non-relational data types?
A. IBM Cloud Databases for MongoDB
B. IBM Cloud Databases for etcd
C. IBM Cloudant
D. IBM Cloud Databases for PostgreSOL
A DevOps team is provisioning environments in IBM Cloud during the developmentlifecycle. What can be done to optimize the environment provisioning process?
A. Use Schematics service in IBM Cloud to create infrastructure as code templates and use the on DevOps pipeline to create and configure environments
B. Use Chef scripts in the DevOps pipeline to create configuration tasks for application containers
C. Use Virtual Machine templates in IBM Cloud to define environment configuration and start/stop them as needed
D. Use Bare Metal Servers to configure the environments and have full control of them
How can a container image with a known but otherwise mitigated security issue detected by the Vulnerability Advisor be provisioned onto an IBM Cloud Kubernetes Service?
A. Edit the default policies of the Container Image Security Enforcement feature to allow the image to be deployed
B. Edit the Kube-system ImagePolicy in IBM Cloud
C. Create a ClusterlmagePolicy object and apply to the cluster
D. Permit image repositories by using IBM-system policy
A developer has been granted the Viewer role for the IBM Log Analysis with LogDNA Web Ul and view logs. Which of the following actions will the user be able to achieve?
A. Launch the Web Ul and view logs in the Web Ul
B. View the list of service instances in the Observability Logging dashboard
C. View service keys through the Web Ul
D. ReviewIAM permissions granted to other users
A developer has joined HaICo GmbH, working on a container-based project. The project architect has targeted Red Hat OpenShift on IBM Cloud cluster for the project implementation and deployment. HalCo's CISO has independently dictated that the company will use Twistlock for container vulnerability scanning on all projects and that each cluster must provide a results dashboard. What can the developer propose to integrate the two needs most efficiently?
A. Configure the Vulnerability Advisor in the IBM Container Registry service to scan using the Twistlock API
B. Deploy a Twistlock DaemonSet on your cluster to populate a dashboard in Grafana service.
C. Configure an IBM Cognos Dashboard Embedded service in your application to report vulnerability findings from HalCo's central Twistlock repository
D. Use IBM Cloud's Security Advisor and configure a Twistlock configuration URL provided by information security
In an Event Driven Architecture, which two of the following IBM Cloud services could be considered an event source?
A. Cloud HSM
B. App ID
C. IBM Blockchain platform
D. PostgreSQL
E. Portworx Enterprise
What approach should be taken to request a policy limit increase for an account?
A. Submit a support case
B. Request via CLI
C. Request via API
D. Adjust account profile settings