Cloud Computing Practitioners 2019

IBM Cloud Computing Practitioners 2019 (IBM云计算从业者2019)Exam答案,加粗的为答案。若看不清请将博客切换到日间模式。

Cloud Computing Landscape Practice Exam

Which of the following cloud computing approaches provides sophisticated security and governance designed for a company’s specific requirements.

Select one:

a.Public Cloud

b.Private Cloud

c.Hybrid Cloud

d.Edge Cloud

Use of cloud allowed Netflix to rapidly scale up its business without having to buy, support and operate infrastructure and resources to meet its growth requirements. Which of the six business enablers best depicts this flexibity?

Select one:

a.Ecosystem connectivity

b.Market adaptability

c.Business scalability

d.Cost driven variability

One of the six cloud business enablers as outlined by IBM Institute of Business Value, is context-driven variability. Which of the following best describes this particular business enabler?

Select one:

a.The complexity becomes hidden from end-user

b.Cloud enables a faster time to market and helps in rapid prototyping -

c.With cloud applications there is no longer a need to install software or pay software license fees -

d.Supports user defined preferences

Which of the following workloads, organizations typically delegate to cloud?

Select one:

a.Transactional database

b.Audio/video/Web conferencing

c.Test environment

d.All of the above

Etsy uses cloud based analytics capabilities for its targeted marketing approach by renting hundreds of computers every night to analyze data from a billion views of its website. It has shifted from a fixed cost model to a variable cost model. Which of the following business enabler best depicts this approach?

Select one:

a.Business scalability

b.masked complexity

c.Cost scalability

d.Ecosystem connectivity

One of the advantages of a ____________ include standardization, capital preservation, flexibility, and a shorter time to deploy applications. Fill in the blank.

Select one:

a.public cloud

b.private cloud

c.hybrid cloud

d.edge cloud

We use mobile applications to do personal banking, shop online, navigate the roads and lots more; what is one key unifying technology that makes all of the above feasible?

Select one:

a.Edge computing

b.Cloud computing

c.Analyzing videos

d.Big data

One of the six cloud business enablers as outlined by IBM Institute of Business Value, is defined per which of the following?

Select one:

a.Businesses can scale operations easily based on requirement.

b.Business can select which machine learning approach they would like to deploy

c.Business can move beyond structured data and use unstructured data with one or more of these six cloud enablers -

d.None of the above -

One of the challenges of a multicloud approach is that different cloud solutions run in different software environments. Organizations want to build applications that can easily move across a wide range of these environments without creating integration difficulties. Which of the following helps mitigate such challenges?

Select one:

a.Use private cloud and public cloud in your business

b.Use Vmware services

c.Use Container technologies

d.All of the above

If you had to pick one of the following as the key driver of how we would do business in the years to come, which would be a top consideration?

Select one:

a.Mobile devices

b.virtual reality

c.augmented reality

d.computer-brain Interface

Which of the following is true of a public cloud?

Select one:

a.In many cases, access control mechanisms through registration are required before the user can make use of cloud resources.

b.Although it can be free or inexpensive to use, it may be offered on a pay-per-usage model.

c.The cloud service provider is responsible for setting up the hardware, software, applications, and networking resources.

d.All of the above

Cloud computing is a new consumption and delivery model for information technology (IT) and business services and characterized by:

Select one:

a.On-demand self service

b.Ubiquitous network access

c.Location independent resource pooling

d.All of the above

Cloud Industry Adoption Practice Exam

New platforms and devices are transforming traditional media companies for a connected consumer experience from stand-alone media platforms to ____________. Fill in the blank.

Select one:

a.Always on devices

b.Edge computing

c.Private cloud offerings

d.virtual private networks

United Airlines, a leading US-based airline, introduced a mobile app supporting a ‘street view’ like airport experience. Which of the following best describes this travel-centric innovation?

Select one:

a.The app facilitates collaboration with stakeholders and explores new ways of doing business as information is provided to travelers from both recorded images and vendors

b.The solution optimizes multichannel interaction to enable quick and reliable airplane selection via mobile, improving the customer experience

c.The solution does away with multitude of air traffic controllers for more efficient systems

d.Pilots can use the app to land at any airport without air traffic controllers should emergencies arise

Cloud enabled collaboration, analytics and service delivery help healthcare organizations to achieve better outcomes. Which of the following is an example of such outcomes?

Select one:

a.Reduce response time in the case of emergencies

b.Foster virtual collaboration

c.Integrate data silos and optimize information flow

d.All of the above

Disruption in the banking ecosystem impacts how we do transactions, lending, advisory and so forth. Which of the following is successful response to such disruptions?

Select one:

a.Partner with new entrants on front- and/or back-office services

b.Lobby regulators to level the playing field – regulate new entrants or deregulate industry

c.Build a new stand-alone business with similar business and operating models as new entrants

d.All of the above

API Platform Revolution Practice Exam

As industries prepare for the digital invaders--disruption of the status quo-- which of the following depicts cultural transformation?

Select one:

a.Adopt Design Thinking

b.Hire new graduates

c.Automate business operations

d.flatten organizational hierarchy

What do Uber, Expedia and Twilo have in common with regard to the following technologies?

Select one:

a.The use the API economy to deliver their services

b.They use machine learning technologies to predict user expectations

c.They are businesses without carrying an inventory of assets to sell or rent

d.All of the above

The API economy is bolstered by the proliferation of services that are resident on Platform as a Service (PaaS). Which of the following is an example of a PaaS that offers services using APIs?

Select one:

a.Azure

b.AWS

c.IBM Cloud

d.All of the above

As your firm prepares for the digital invader, the disrupters, what cultural steps can you take to best prepare?

Select one:

a.Design Thinking,

b.Lean Startup,

c.Agile Development

d.All of the above

Which of the following cohorts is most keenly involved with working with APIs?

Select one:

a.Developers

b.Chief Marketing Officer

c.Human Resources

d.Sales team

Which of the following technologies give developers the ability to programmatically control the blockchain network through smart contracts that access internal state storage through state APIs

Select one:

a.hyperledger

b.algorithms

c.APIs

d.machine learning

Data in the Cloud Practice Exam

Compose for JanusGraph is another NoSQL option to extract kowledge from your data. Which of the following statements best describes the unique merits of Compose for JanusGraph?

Select one:

a.Especially useful for modeling social networks

b.Used for log data, product data management, content management

c.Built-in support for map/reduce -

d.Especially useful for leaderboards and document ranking

Which of the following consideration applies when using NoSQL?

Select one:

a.Faster prototyping

b.No need for strict data typing, schema-less

c.No need to throw away non-conforming data

d.All of the above

The CAP Theorem states that:

Select one:

a.When partitioned, either consistency or availability must be sacrificed

b.To maintain availability, most databases are configured to sacrifice consistency

c.When the partitioning is resolved, synchronization reestablishes consistency -

d.Applications must tolerate the possibility that two reads may produce inconsistent results -

Think of these: validating, cleansing, and _________ data as pipes or filters in a data pathway. Either you are moving data from one place to another, or you are changing, converting or augmenting that data. Fill in the blank.

Select one:

a.parsing -

b.converting

c.enriching

d.munging -

If you want to provide an _id and insert by using PUT, then the _id must be in the ______________. Complete the sentence with one of the below

Select one:

a.document

b.URL

c.column heading -

d.index -

If you want to provide an _id and insert by using POST, then the _id must be in the ______________. Complete the sentence with one of the below

Select one:

a.document

b.URL

c.column heading

d.index

When using NoSQL as your non-relational database, which of the following tools is the preferred approach?

Select one:

a.JanusGraph -

b.Redit

c.Redis

d.Cloudant

In the CAP Theorem, which of the following is an example of partition tolerance?

Select one:

a.when two nodes can't talk to each other, but there are clients able to talk to either one or both of those nodes.

b.A read is guaranteed to return the most recent write for a given client.

c.A non-failing node will return a reasonable response within a reasonable amount of time (no error or timeout).

d.All of the above -

To Shape raw data by filtering values and columns from the source data, sort, remove duplicates, and understand the quality of the data through standardized scores is commonly know as:

Select one:

a.Making an API call

b.Performing CRUD operations

c.Data Refinery

d.data retrieval

Which of the following consideration applies when using NoSQL?

Select one:

a.Faster prototyping

b.No need for strict data typing, schema-less

c.No need to throw away non-conforming data

d.All of the above

Cloud and AI Practice Exam

Understanding natural language is one of the most challenging endeavors for a machine to realize. Which of the following NLP technologies tries to address these challenges?

Select one:

a.Keyword extraction

b.One-hot encoding

c.recommendation engine

d.image analysis

Digressions allow for the user to break away from a specific conversation in order to temporarily change the topic before returning to the original dialog flow. How do you set up digressions in Watson Assistant?

Select one:

a.From the Intent tab

b.From the Entity tab

c.From the Dialog tab

d.From Content Catalog tab

The dialog uses the _________ that are identified in the user's input, plus context from the application, to interact with the user and ultimately provide a useful response.

Select one:

a.Intents

b.Entities -

c.Content Catalog

d.System Entities

Which of the following is an example of an Intent used in the Watson Assistant service?

Select one:

a.#turn_on

b.@turn_on -

c.%turn_on

d.$turn_on -

As it becomes harder to reach customers with advertising, companies now look to content marketing to produce unique stories that will drive traffic and increase brand awareness. Also, as more people use ad blockers, the traditional method of monetizing content is rapidly waning. In response, this leads businesses to engage in more compelling ways, primarily through better content and unique storytelling. Which technologies below are best suited for such challenges?

Select one:

a.Recommendation engine

b.virtual agents

c.natural language understanding techniques

d.all of the above

Which of the factors below has been a compelling motivation for machine learning approaches?

Select one:

a.The growth of unstructured data

b.The need to extract insights from images

c.The need to extract sentiment from Tweets

d.All of the above

Cloud for Multi-Channel Practice Exam

Bridget van Kralingen, SVP IBM Industry Platform, speaks of customers high experience expectation. Which of the following best describes her assertion?

Select one:

a.The last best experience that anyone has anywhere becomes the minimum expectation for the experience they want everywhere

b.There is a difference between user experience and personal experience

c.Generation Z expects seamless user experience -

d.Clients can only satisfy their high experience after employing Design Thinking principles

You engage users by providing personalized app experience, which of the following notifications can deliver such personalization?

Select one:

a.Push notification

b.Tag notification

c.Broadcast notification

d.All of the above

App developers spend less time on user design (software interface) by realizing that 70% of value lies in User Experience. Which of the following best describes this dichotomy?

Select one:

a.Maximize efforts on user experience, minimize efforts on back-end user interface

b.Minimize efforts on user experience, maximize efforts on back-end user interface

c.Maximize efforts on user experience, maximize efforts on back-end user interface

d.minimize efforts on user experience, minimize efforts on back-end user interface -

If you were to build a front end for micro-services, which deployment method would you select from the list below?

Select one:

a.deploy to VMware vistual machine

b.deploy to IBM DB2

c.deploy on Kubernetes

d.deploy on Cloud Foundrary platform

What does Personalized pricing using Deep Learning algorithms entail?

Select one:

a.Deep Learning algorithms sets prices on what the AI believes passengers will be willing to pay.

b.The user decides what is the best price for the service

c.The price is vetted and crowd sourced

d.Deep Learning algorithms recommend the best price for the service

Cloud Security Practice Exam

To Monitor and identify application usage patterns pointing to misuse is best described by which of the following cloud security dimensions?

Select one:

a.Data encryption

b.intrusion detection

c.Compliance

d.Access control

If you had to choose the highest malware growth with cloud security concerns, which of the following would come to mind first?

Select one:

a.mobile malware

b.sophisticated attacks

c.reputations being damaged

d.vendor fraud

API Connect with DataPower gateway has two gateway script methods related to JWT. Which of the following is indicative of this gateway script?

Select one:

a.jwt-generate

b.jwt-authenticate -

c.jwt-authorize -

d.jwt-select

Which of the following is an example of regulatory compliance?

Select one:

a.GDPR

b.RESTful services

c.OAuth

d.BasicAuth

Secure authentication and authorization requires that the communication is _________. Fill in the blank.

Select one:

a.private

b.secure -

c.encrypted -

d.authorized -

Certificate is used to ensure that the both parties of the encrypted communication can trust and identify each other; Certificate is an __________ method. Fill in the blank.

Select one:

a.authentication

b.authorization -

c.encryption

d.anonymous

API Connect with DataPower gateway has two gateway script methods related to JWT. Which of the following is indicative of this gateway script?

Select one:

a.jwt-validate

b.jwt-authenticate

c.jwt-authorize

d.jwt-select

Security technologies and controls are most effective to protect data in the cloud include: data encryption, network encryption, access control and intrusion detection. Which tops the list as the most effective way to secure your data?

Select one:

a.data encryption

b.network encryption -

c.access control -

d.intrusion detection

Which of the following best defines encryption?

Select one:

a.the process of converting information or data into a code, especially to prevent unauthorized access

b.That the both parties of the encrypted communication can trust and identify each other -

c.only the server is verifying its identity

d.encryption is an authentication method -

Cloud security attacks happen either on premise, external or Cloud. Which of the following example depicts an attack on premise?

Select one:

a.Unauthorized access via the internal network

b.Traffic between customer and cloud site being read e.g. uncrypted data for a test environment

c.Data being read when exchanged between applications in the cloud

d.Hacked access via phishing

DevOps Framework Practice Exam

DevOps brings forth a certain business agility that is driven by process, __________ and technology. Fill in the blank

Select one:

a.culture

b.agility -

c.teams -

d.code -

When you Test continuously in realistic production-like test labs, what is one essential condition to have before you begin testing?

Select one:

a.That you have large data

b.that you are working in a team

c.that you automate the process as much as possible

d.That you test without confounding variables -

Implementing DevOps is not all about technology, its main focus is ___________. Complete the sentence

Select one:

a.the promotion of an agile culture of innovation using new practices and tools.

b.to ensure business agility is at the core of cloud application development practices -

c.to build a pathway away from traditional cloud delivery methods that did not rely on container technologies

d.to ensure that all practices are continuous in nature

Complete the sentence: deploy to test, deploy to stage, deploy to ________. fill in the blank.

Select one:

a.dev

b.prod

c.cloud

d.service

Implementing DevOps is not all about technology, rather about best practices, which of the following depicts such practices?

Select one:

a.Cloud Garage Method

b.Integrated tool-chains

c.Cloud platforms

d.All of the above

In the DevOps delivery pipeline, what does Shift Left Testing entail?

Select one:

a.involves creating production-like environments where more realistic tests can be done earlier in the delivery lifecycle

b.I means data must first begin from development, move to test and then production

c.It means, place a code stepper and walk through the source code -

d.It entails testing with actual user data and not sample data

Which of the following Cloud delivery services relies on teams and story-development practices?

Select one:

a.Traditional

b.Iterative

c.Agile

d.DevOps

IBM Cloud Computing Practitioners 2019 (IBM云计算从业者2019)Exam答案的更多相关文章

  1. 免费申请使用IBM Cloud Lite(轻量套餐) 详细教程指南

    注册轻量帐户可在 IBM CLOUD控制台中使用所选的显示有轻量标记的免费轻量套餐来构建应用程序和探索服务.轻量帐户不会到期,也无需信用卡. 本文详细的介绍了一下,免费云服务的申请以及使用!这次使用I ...

  2. 使用VSCode连接到IBM Cloud区块链网络

    文章目录 从IBM Cloud控制面板导出连接信息 在VSCode中创建gateway和wallet 在VSCode中提交transaction 上篇文章我们讲到怎么在IBM Cloud搭建区块链环境 ...

  3. 在IBM Cloud中运行Fabric

    文章目录 打包智能合约 创建IBM Cloud services 创建fabric网络 创建org和相应的节点 创建order org和相应节点 创建和加入channel 导入智能合约 上篇文章我们讲 ...

  4. Cloud Computing Chapter3 (云计算第三章)

    本篇文章是对课程大型软件系统设计与体系结构(双语)[又名:云计算]的课堂内容总结,适用于大连交通大学. Cloud Computing Chapter3 Understanding Cloud Com ...

  5. 云计算中心网络资源分配-Faircloud: sharing the network in cloud computing

    网络资源同计算资源以及存储资源一样,是一种可被租户共享使用并提高利用率的资源.但是,不同租户的计算资源以及存储资源之间,有很强的隔离性,可以实现按需按比例分配的使用方式,但是网络资源却不可以. 主要原 ...

  6. How does java technology relate to cloud computing?

    Java Paas shootout   (@IBM developer) Cloud computing is always a hot topic around IT field today.Ho ...

  7. Cloud Computing Causing Digital Business Transformation

    2015-04-13 Cloud Computing Causing Digital Business Transformation We hear all about the cloud, and  ...

  8. Tagging Physical Resources in a Cloud Computing Environment

    A cloud system may create physical resource tags to store relationships between cloud computing offe ...

  9. top 9 Cloud Computing Failures

    top 9 Cloud Computing Failures Outages, hacks, bad weather, human error and other factors have led t ...

  10. what's cloud computing? IaaS

    Cloud computing has changed the ITC industry. Companies like Amazon, Google and Microsoft have built ...

随机推荐

  1. 4组-Alpha冲刺-6/6

    一.基本情况 队名:摸鲨鱼小队 组长博客:https://www.cnblogs.com/smallgrape/p/15574385.html 小组人数:8人 二.冲刺概况汇报 组长:许雅萍 过去两天 ...

  2. 狐漠漠养成日记 Cp.00001 开始养成计划

    开始养成计划 今天是我开始这个"狐漠漠养成计划"的第一天(划掉). 看来是昨天出门前忘记保存了,昨天写的几百字内容全都没有了,今天其实已经是计划开始的第二天了. 因为昨天晚上出去喝 ...

  3. [jmeter的使用]jmeter上传文件接口的写法

    1.类型和参数名称,依据接口/抓的包决定 2.必须选择java否则报错 3.http header也要写

  4. node邮件发送html,简单2步附代码

    node 发送 html 邮件 安装 npm install nodemailer 新建 html 文件 ① 新建 views 目录下面新增 index.html(当然也可以使用其它目录结构,下面的代 ...

  5. canal对接阿里云kafka

    一.前提条件 已经有mysql实例 自建或者云上都可以 已经在阿里云的kakfa创建topic 默认不自动创建topic 二.配置要监控的instance 先修改example的配置文件 conf/e ...

  6. 从XXE漏洞修复引起Not supported: http://javax.xml.XMLConstants/property/accessExternalDTD说到SPI机制

    引子  在使用Fortify扫描时代码报XML External Entity Injection,此漏洞为xml实体注入漏洞,XXE攻击可利用在处理时动态构建文档的 XML 功能.修复方案也包含了增 ...

  7. 不使用setTimeout的延迟执行

    function sleep(ms){ var time = new Date(); time.setTime(time.getTime() + ms); while(new Date().getTi ...

  8. Linux 里面安装多个jdk,进行切换

    alternatives --config java

  9. Zip Slip漏洞审计实战

    前言 最近看到许少的推有说到Zip Slip这个漏洞导致的RCE,其实我在代码审计的时候确实发现有不少功能模块都是使用ZIP来解压,其实还是在真实系统中经常见到的. 于是想着好久没有写过博客了,想借着 ...

  10. Python3程序捕获Ctrl+C终止信号

    技术背景 对于一些连续运行或者长时间运行的Python程序而言,如服务器的后端,或者是长时间运行的科学计算程序.当我们涉及到一些中途退出的操作时,比如使用Ctrl+C来退出正在运行的程序.这种场景的出 ...