Which benefits might be realized by designing a separate infrastructure pool to host network functions?
A. Reduced public IP address consumption, reduced troubleshooting time, and reduced consumerinfrastructure load
B. Reduced troubleshooting time, reduced consumer infrastructure load, and enhanced security
C. Reduced troubleshooting time, enhanced security, and reduced public IP address consumption
D. Reduced consumer infrastructure load, enhanced security, and reduced public IP address consumption
A cloud architect has determined that the cloud management infrastructure requires an authentication and PKI environment. In addition, each tenant will require its own authentication and PKI environment. What describes these separate environments in a cloud design document?
A. Availability zones
B. Fault domains
C. Multi-tenancy
D. Trust zones
Which infrastructure does VCE Vblock represent?
A. Brownfield
B. Traditional
C. Hyper-converged
D. Converged
An organization plans to deploy a spine/leaf network topology to support a cloud design. Leaf switches will use layer-3 protocols to communicate with the spine switches. Hosts will each connect to two leaf switches using layer-2 protocols.
Which technology must be enabled between the host and leaf switches to provide the maximum throughput for a single data stream?
A. Generic Network Virtualization Encapsulation
B. Spanning Tree Protocol
C. Equal-Cost Multi-Path Routing
D. Multi-Chassis Aggregation
After developing prototype applications in the public cloud, developers determined that they want softwaredefined network functionality. Which ability will this requirement provide for the developers?
A. Programmatically provision an IPsec VPN tunnel between the public and private clouds
B. Programmatically migrate layer-3 access from aggregate to access switches
C. Programmatically control physical core network topologies
D. Programmatically provision physical network segments and services
A cloud architect has included an SDS controller in a cloud design. Which requirement(s) will support the addition of this component to the design?
A. Monitor storage performance and manually provision storage resources
B. Provide the ability to programmatically deploy virtual storage resources
C. Switch array functionality from active/passive to active/active
D. Provide a redundant front-end for object storage
An organization wants to deploy cloud applications using block storage. The architect has included a hyperscale storage solution in the cloud design.
Which requirements led to including this solution in the design?
A. Organization wants to purchase a storage array Organization will use a full mesh topology to combine storage and application processing
B. Organization wants to purchase a storage array Organization will use a spine/leaf topology to combine storage and application processing
C. Organization wants to purchase a storage array Organization wants to keep storage processing separate from the application processing
D. Organization does not want to purchase a storage array Organization wants to use a full mesh topology to combine storage and application processing
Which additional considerations must a cloud monitoring system address compared to a traditional monitoring system?
A. Tenant isolation, orchestration, and elastic workloads
B. Orchestration, elastic workloads, and Data at Rest security
C. Elastic workloads, Data at Rest security, and tenant isolation
D. Data at Rest security, tenant isolation, and orchestration
An organization is implementing a backup solution for their private cloud. They are concerned that having the backup data stored onsite will expose them to lose in the event of a site-wide disaster. They are considering replicating the backup storage to an external site.
What are the design considerations involved with this replication solution?
A. Ensuring proper hypervisor support and the availability of a federated single sign-on solution
B. Ensuring network traffic encryption is considered and ensuring proper hypervisor support
C. Ensuring sufficient network bandwidth is available and network traffic encryption is considered
D. Ensuring proper hypervisor support and sufficient network bandwidth is available
An organization is developing a cloud-native social-media website. The website will be written using elastic principles. When the website scales, it can add additional web, application and database instances to meet dynamic workload demand.
Which additional resources will be consumed by replication as the database layer expands.
A. Public IP addresses, CPU, and memory
B. CPU, memory, and network traffic
C. Network traffic, public IP addresses, and CPU
D. Memory, network traffic, and public IP addresses