An IT organization adopted the ITaaS model to offer services to their business units. They want to assess their readiness for creating and operating cloud services. What would be an appropriate assessment for them to perform related to governance?
A. Assess the readiness of the current service catalog
B. Determine the cost information needed for charging any service
C. Assess the skills of the IT staff to determine training needs
D. Assess the compliance needs and requirements for any service
Your company is an application service provider that hosts customer applications and data in your data center. The entire infrastructure is client-server based and you have begun to assess the risk of moving your web applications to a cloud-
based infrastructure. During this phase you are required to provide the value of corporate assets involved.
How should you assess these corporate assets?
A. Use realistic valuations
B. Create a valuation that is information-asset centric
C. Use original purchase values
D. Create values based on accelerated depreciation
You are architecting a new cloud application for your company. You have been tasked to determine the impact of the company's required governance directives across the full lifecycle. What governance element should you apply during the build of the service?
A. Using approved development methods and policies
B. Following all requirements for putting together a service proposal
C. Determining how customer satisfaction will be measured
D. Utilizing existing IT capabilities if policies allow
The CFO is discussing with you a chargeback model for critical qualities of service. The model must allow for:
Control of service usage over a short period of time (hours) Granular control of system load such as latency of applications
Which chargeback model should you recommend?
A. Subscription by Peak Usage
B. Electronic Ticket
C. Pay-as-you-use
D. Bid/Spot Instance
In a hypothetical future scenario, a small toy company wants to create a few small gifts for employees who have performed well throughout the year. The gifts will be different every year and will change color depending on the stock price and social media sentiment of the company. The company wants to manufacture these gifts in-house.
What emerging 3rd Platform technologies enable the desired capabilities?
A. Big data analytics, Internet of Things, and sensor networks
B. Sensor networks, big data analytics, and augmented humans
C. Internet Of Things, sensor networks, and maker machines
D. Internet of Things, maker machines, and big data analytics
An organization wants to provide IaaS capabilities in a private cloud. They have the following requirements: Each line of business must have access to its own services and templates Service templates should be as generic as possible Data encryption should be provided for only services that require it Each instance should use Microsoft Active Directory for authentication Each instance should have the latest OS patches applied
How can these requirements be addressed in a cloud design?
A. Add one template to the service catalog Provide orchestration workflows to create a tenant and then instantiate and customize instances Provide orchestration workflows to enable data encryption and authentication Enable a configuration manager policy for OS updates
B. Add one template to the service catalog Provide orchestration workflows to instantiate and customize instances Provide orchestration workflows to enable data encryption and authentication Enable a configuration manager policy for OS updates and tenant configuration
C. Configure multiple tenants in the service catalog Add a template to the service catalog for each tenant Provide orchestration workflows to instantiate and customize instances Provide orchestration workflows to enable data encryption and authentication Enable a configuration manager policy for OS updates
D. Configure multiple tenants in the service catalog Add a single template to the service catalog Provide orchestration workflows to instantiate and customize instances and then assign it to a tenant Provide orchestration workflows to enable data encryption and authentication Enable a configuration manager policy for OS updates
A company is considering transitioning to ITaaS. During an exploratory discussion, a potential stakeholder asks for clarification on the key difference(s) between traditional IT services and a cloud services.
What is the correct response?
A. A traditional IT service is often provided without accounting for direct cost or business value to the lines of business; a cloud service is packaged to provide business value to the lines of business and support direct costing through showbacks.
B. A traditional IT service views the physical network architecture as a manually-scaled system; a cloud service relies on an underlying layer of scalable network architecture.
C. A cloud service is any service that uses one of the five tenets of cloud computing; a traditional IT service uses guidelines from a more traditional computing model.
D. Both traditional IT services and cloud services are capable of driving value for the lines of business through service catalogs and degrees of automation; cloud services make use of cloud tenets and are designed to scale vertically.
An organization falls under the compliance regulations for PCI. The organization will deploy applications in the public cloud and wants to use a public cloud provider that is PCI compliant.
How does the organization confirm compliance?
A. Provide third party audit documentation to the provider for review
B. Review the provider's compliance controls and third party audit documentation
C. Review the provider's infrastructure logs and access logs
D. Provide application logs to the provider for review
You are designing a cloud services architecture for a company. You have determined that running some of the customer facing applications the company uses in a public cloud would save a significant amount of money but the security
department wants to retain control of customer data at rest. The application infrastructure consists of two database servers and eight web servers.
How can you architect the application to minimize the risk involved with data exposure?
A. Host the application servers in the public cloud and host the databases in the private cloud.
B. Scale the application horizontally by utilizing a hybrid cloud where the application and database are mirrored a public cloud.
C. Cluster four of the application servers and one database server in the public cloud and the remaining servers in the private cloud.
D. Host the application servers and database servers in the public cloud and set up RBAC to restrict access to the applications
What is the most important goal of an IT transformation to the cloud?
A. IT operates more efficiently and at less cost
B. IT should be more responsive and agile
C. IT is aligned to business outcomes and demonstrates value
D. IT should be a broker for external services
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EMC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your E20-920 exam preparations and EMC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.