An enterprise is beginning its journey to ITaaS. An assessment of their current environment has already been completed. It has been determined that a change made -- even to a small part of the infrastructure -- requires the entire monolith to be rebuilt and deployed . As a cloud architect, what would you use to redesign the monolith to resolve this issue?
A. Highly modular, component based suite of services
B. Tightly coupled, services architectural style
C. Tightly integrated, open architectural style
D. Highly modular, monolithic architectural style
A company plans to offer CRM, CDN, and ERP services. According to NIST, which services categories correspond to these offerings?
A. CRM: PaaS; CDN: PaaS; ERP: IaaS
B. CRM: IaaS; CDN: IaaS; ERP: SaaS
C. CRM: IaaS; CDN: SaaS; ERP: PaaS
D. CRM: SaaS; CDN: IaaS; ERP: SaaS
A line of business (LOB) has been using a public cloud and is seeking services from the internal IT department. The LOB has requested an SLA for each service. Why would the LOB make this request?
A. Need for a clear description of services, capabilities, key performance indicators, support responsibilities and warranties
B. Need to understand what template is included with the service, the catalog entry for the service, and the associated dependencies and policies
C. Need to understand the availability, throughput, frequency, and response time capabilities for the underlying infrastructure components
D. Need for a clear description of terms and conditions for using the services of the IT cloud before actually using the services
The principles of Autonomy, Abstraction, Discoverability, Composability, and Reusability are all principles of what?
A. Application profiling
B. Service characteristics
C. Delivery models
D. Service inventory
You have been hired by a large, global manufacturing company to help them plan for cloud services.
During discussions with the local employees, you document which applications are most important to the business. You also gather and document key performance metrics. You find:
-Some applications are rarely used -Mission critical applications require 99.99% uptime to meet the SLAs -Corporate email is proprietary and confidential information -Certain applications must comply with country specific regulations
What should you use to determine proper application placement?
A. Application level gap analysis
B. Cloud security alliance controls matrix
C. Cloud services assessment
D. Workload analysis for right-sourcing
An organization is categorizing their existing services against service characteristics to determine how ready each one might be for the catalog. Part of this effort involves looking at the following three attributes for each service characteristic: considerations, benefits, and tradeoffs.
What attributes correspond to the following characteristics: Reusable and Composable?
A. Consideration: service usually has to be agnostic to context Tradeoff: complexity grows as number of services increases
B. Consideration: late or dynamic binding of services Benefit: requires collaborative service design
C. Benefit: can be human readable metadata Tradeoff: improved recovery from failure
D. Benefit: improves reliability and scale TradeOff: high degree of cooperation and agreement of design standards and conventions
An IT organization is very traditionally structured. The lines of business (Lobs) have been facing difficulties with the representativeness of IT. The IT organization wishes to move to an ITaaS implementation.
What would be a benefit to the LOBs?
A. Improve the skill sets required for personnel in the LOBs.
B. Increase the visibility of products and services across the IT organization.
C. Get more budgets to run their business applications to meet SLAs.
D. Respond quickly to the marketplace with new products.
An IT organization wishes to adopt ITaaS to offer services to customers. What should the organization consider when designing services?
A. Manage the entire service lifecycle with the goal of zero-touch orchestration and service installation
B. Use different service template for different business units to design all the services to be offered
C. Ensure services are tightly coupled so that each service operates effectively
D. Ensure that each service has dedicated resources available all the time in the resource pool
You have been hired by an organization to help them transition to cloud services. While performing discovery of their application environment you realize that some applications have unique risk considerations.
How should the organization manage application security requirements?
A. Address security on an application-by-application basis
B. Implement an intrusion protection system for the entire environment
C. Adopt the public cloud provider's most stringent security standards
D. Create a CVE database to handle security controls
An organization is deploying services in an existing private cloud. The lines of business have concerns about service performance in planned services. How should IT address these performance concerns?
A. Cloud architect defines appropriate performance in the cloud design.
B. Service manager defines appropriate performance in the SLA.
C. Cloud administrator defines appropriate performance in the SLA.
D. Cloud administrator defines appropriate performance in the cloud design.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EMC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your E20-920 exam preparations and EMC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.