Spring Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! DEA-2TT4 has been withdrawn. The new exam code is D-CIS-FN-01

Practice Free DEA-2TT4 Associate - Cloud Infrastructure and Services v4 Exam Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the EMC DEA-2TT4 Exam the most current and reliable questions . To help people study, we've made some of our Associate - Cloud Infrastructure and Services v4 Exam exam materials available for free to everyone. You can take the Free DEA-2TT4 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

An organization requires double the processing capacity for a specific duration to handle increased workload. For the remaining period, the organization might want to release the idle resources to save costs. The workload variations may be seasonal or transient.

Which cloud characteristic enables the consumer to handle such variations in workloads and IT resource requirements?

A.

Resource pooling

B.

On-demand self-service

C.

Rapid elasticity

Question # 7

Which defines the maximum amount of data loss that can be tolerated by a business following a disaster?

A.

MTBF

B.

RPO

C.

RTO

D.

MTTR

Question # 8

What enables resource pooling and multi-tenancy in a cloud environment?

A.

Rapid elasticity

B.

On-demand provisioning

C.

Scalability

D.

Virtualization

Question # 9

Which attribute of software-defined infrastructure is responsible for providing abstracted view of the IT infrastructure?

A.

Abstraction and Polling

B.

Unified Management

C.

Self-Service Portal

D.

Metering

Question # 10

Which cloud security control mechanism monitors activity using video surveillance cameras and detects unusual activities using sensors and alarms?

A.

Administrative control

B.

Technical control

C.

Corrective control

D.

Physical control

Question # 11

Which risk management process is in the correct order

A.

Monitoring, Risk identification, Risk mitigation, Risk assessment.

B.

Risk identification, Risk assessment, Monitoring, Risk mitigation

C.

Monitoring, Risk identification, Risk assessment, Risk mitigation.

D.

Risk Identification, Risk assessment, Risk mitigation, Monitoring

Question # 12

Which compute system component contains boot firmware?

A.

Operating System

B.

Hard Disk Drive

C.

Read Only Memory

D.

Random Access Memory

Question # 13

What is the goal of lean practices in a software development methodology?

A.

Develop software using 12-Factor modern application practices

B.

Create quality software with the minimum number of team members

C.

Develop and deploy software using third platform technologies

D.

Create quality software in the shortest time period at the lowest cost

Question # 14

What term refers to businesses that cautiously and gradually embrace digital transformation?

A.

Digital Evaluators

B.

Digital Laggards

C.

Digital Leaders

D.

Digital Adopters

Question # 15

What is a characteristic of an object-based storage system?

A.

Extends a single file system across all storage nodes

B.

Consolidates block and file access in one storage platform

C.

Capable of dynamically creating multiple object IDs for each object

D.

Uses a flat, non-hierarchical address space

Question # 16

What activity is performed during the service planning phase of the cloud service lifecycle?

A.

Defining Orchestration Workflow

B.

Discovering Service Assets

C.

Developing Service Proposal

D.

Defining Service Offering

Question # 17

Which platform provides a converged infrastructure solution?

A.

VxRail

B.

PowerStore

C.

VxBlock

D.

PowerFlex

Question # 18

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.

Which strategy did the cloud provider use to mitigate the risk of security threats?

A.

Trusted computing base

B.

Information assurance framework

C.

Adaptive security

D.

Defense-in-depth

Question # 19

What are the benefits of modern applications compared to traditional applications?

A.

Designed to run independently and use a linear, continuous approach in development, build, test, and deploy

B.

Distributed system architecture, designed to run independently, and use multiple programming languages

C.

Single programming language and framework and scale by growing vertically

D.

Monolithic, built with interdependent modules, and use distributed system architecture

Question # 20

An organization wants to deliver applications quickly and effectively. They believe that it is the only way to stay competitive in this ever-changing digital world. The organization wants to adopt practices that promote collaboration across teams during various phases of the software development lifecycle.

Which practice will meet the organization’s requirements?

A.

Continuous Integration

B.

Waterfall model

C.

DevOps

D.

Continuous Delivery

Question # 21

What is the correct sequence of steps in the service catalog design and implementation process?

DEA-2TT4 question answer

Question # 22

Which storage data protection technique provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

A.

Erasure coding

B.

Cache protection

C.

RAID

D.

Dynamic disk sparing

Question # 23

Which data storage type uses a non-hierarchical address space to store data?

A.

Block

B.

Object

C.

File

Question # 24

What is a characteristic of a converged infrastructure?

A.

Eliminates CAPEX

B.

Eliminates OPEX

C.

Does not require a separate storage array

D.

Enables rapid scalability

Question # 25

Which programmatically integrates and sequences various system functions into automated workflows for executing higher-level service provisioning and management functions?

A.

Self-service portal

B.

Application Programming Interface

C.

Orchestrator

D.

Service Catalog

Question # 26

Which key service management function takes orders from customers, processes bills, and collects payments in the cloud environment?

A.

Service demand management

B.

Service capacity management

C.

Service portfolio management

D.

Service operation management

Question # 27

What is the correct order of the business continuity plan principles?

DEA-2TT4 question answer

Question # 28

Which data protection solution enables organizations to protect, manage, and recover data at scale across diverse environments?

A.

Dell PowerProtect DD Series Appliances

B.

Dell Avamar

C.

Dell PowerProtect DP Series Appliances

D.

Dell Data Domain

Question # 29

Which type of attack can be controlled by imposing restrictions and limiting on-network resource consumption?

A.

Advanced persistent threat

B.

Phishing

C.

Side-channel

D.

Distributed denial of service

Question # 30

Which concept ensures accountability for security breaches or misuse of resources?

A.

Compliance

B.

Governance

C.

Risk management

Question # 31

Which archiving method is most suitable and cost effective for a large organization having both sensitive data and non-sensitive data?

A.

Public Cloud-Only archiving

B.

Hybrid archiving

C.

IaaS archiving

D.

In-House archiving

Question # 32

What does a service attribute specify?

A.

Relationships between services

B.

Configurations of service components

C.

Structure of a service

Question # 33

Which risk management step deploys various security mechanisms that minimize risks impacts?

A.

Identification

B.

Mitigation

C.

Assessment

D.

Monitoring

Question # 34

What is true about application virtualization?

A.

Resolves application conflicts and compatibility issues

B.

Allows for OS modifications on host machines

C.

Prevents the use of conflicting applications on the same end-point device

D.

Increases the complexity of application deployment

Question # 35

What is true about change management?

A.

Defines SLA compliance

B.

Triggers alerts

C.

Monitors compliance

Question # 36

Which type of cloud tool controls resources such as compute, storage, and network?

A.

Management and operation

B.

Automation and orchestration

C.

Collaboration and communication

D.

Monitoring and alerting