100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cloud Aces 3.0-digital transformation $7.99   Add to cart

Exam (elaborations)

Cloud Aces 3.0-digital transformation

 1 view  0 purchase
  • Course
  • Institution

Cloud Aces 3.0-digital transformation

Preview 4 out of 72  pages

  • June 17, 2024
  • 72
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Cloud Aces 3.0-digital transformation
- correct answer-converged infrastructure system includes five logical sections.
They are network, storage, compute, virtualization, and management. Each section performs
a specific set of functions and has various types of hardware or software components.

1.Network: Itprovides connectivity for communication between all components inside a
converged infrastructure system and between the converged infrastructure system and the
organization's core data center network.The network can be logically divided into two parts:
an Ethernet local area network or LANand a storage area network or SAN. Converged
infrastructure systems may either utilize the Ethernet switches in LAN and FibreChannel. In
few cases it uses theEthernet switches for SAN, or unified switches such as FibreChannel
over the Ethernet switches as an alternative to both Ethernet and FibreChannel switches.

2.Storage: It provides asecure place to store data in converged infrastructure systems. The
core components of the storage layer include storage controllers and storage drives such as
flash drives and disk drives. A storage controller runs a purpose-built operating system that
is responsible for performing several storage-related functions. Thefunctions areprovisioning
block and file storage for application servers, serving I/Osfrom the servers, and replicating
data. Each storage controller consists of one or more processors and a certain amount of
cache memory to process the I/O requests from the servers.

3.Compute:Itruns operating system such as Linux and Windows and business applications
inconverged infrastructure systems. It includes blade servers or rack mount servers, and
interconnecting devices. The interconnecting devices connect the blade or rack mount
servers to the network and storage layers of the converged infrastructure system. They
support both LAN and SAN con

- correct answer-In cloud computing, consumers can unilaterally and automatically scale IT
resources to meet the workload demand. This is significantly more cost-effective than buying
new IT resources that are only used for a short time or only during specific periods.

.DELL AppAssure - correct answer-AppAssureprovidesBackup, Replication and Recovery.
Reduce downtime and cut RTOs from hours to minutes or seconds with AppAssure. It
offers-Flexible recovery: choose local, offsite or disaster recovery. Recover to a virtual or
physical machine. Restore at any level: single file, message or data object, or restore a
complete machine. Fast, small or large-scale recovery:Recover anywhere, to any machine.
Choose local or off-site recoveries to any available machines, even to dissimilar hardware.
Reduce data loss:After a disaster, quickly recover from up to 288 daily incremental backups
for nearly unlimited RPO granularity. Deduplicatefor efficiency:AppAssureintegrated
deduplication and file compression cuts storage requirements by up to 80 percent. Access to
remote installation services:Dell Remote Installation Services include installation and
configuration options for customers that require assistance deploying AppAssuresoftware.

•Stretched VLAN: - correct answer-•Stretched VLAN: A stretched VLAN is a VLAN that
spans across multiple sites over a WAN connection. It extends a VLAN across the sites. It

,enables nodes in the two different sites to communicate over a WAN as if they are
connected to the same network. Stretched VLANs also allowthe movement of VMs between
sites without having to change their network configurations. It enables the creation of
high-availability clusters, VM migration, and application and workload mobility across sites.

2 variants of private cloud - correct answer-There are two variants of private
cloud:on-premise and externally-hosted, as shown in the slide. The on-premise private cloud
is deployed by an organization in its data center within its own premises. In the
externally-hosted private cloud (or off-premise private cloud) model, an organization
outsources the implementation of the private cloud to an external cloud service provider. The
cloud infrastructure is hosted on the premises of the provider and may be shared by multiple
tenants. However, the organization's private cloud resources are securely separated from
other cloud tenants by access policies implemented by the provider.

3 Cloud Security Concepts - correct answer-Authentication is a process to ensure that cloud
'users' or cloud 'assets' are who they claim to be by verifying their identity credentials. The
user has to proveidentity to the cloud provider to access the data stored in the cloud.A user
may be authenticated using a single-factor or multifactor method. Single-factor
authentication involves the use of only one factor, such as a password. Multifactor
authentication uses more than one factor to authenticate a user.

Authorization isa process of determiningthe privileges thata user/device/applicationhas,to
access a particular service or a resource in a cloud computing environment. For example, a
user with administrator's privileges is authorized to access more services or resources
compared to a user with non-administratorprivileges. InWindows, authorization is performed
using Access Control Lists (ACL) to determine the privileges. ACL is a list of access rights or
privileges that a user has for the resources in a cloud environment.For example, the
administrator can have 'read/write' access and a normal user can have 'read only'
access.Authorization should be performed only if the authentication is successful.

Auditing refers to the logging of all transactions in assessing the effectiveness of security
controls in a cloud computing environment. It helps to validate the behavior of the
infrastructure components, and to perform forensics, debugging, and monitoring activities.

4 approaches to application transformation are - correct answer-Refactor

Revise

Retain

Retire

4 Modern IT Infrastructure pieces - correct answer-Flash

Scale out

Software-defined

,Cloud Enabled

5 type of businesses and their digital paths. - correct answer-Digital Leaders: 5% -digital
transformation, in its various forms, is ingrained in the DNA of the business

Digital Adopters: 14% -have a mature digital plan, investments, and innovations in plac
e
Digital Evaluators: 34% -cautiously and gradually embracing digital transformation, planning
and investing for the future

Digital Followers: 32% -few digital investments; tentatively starting to plan for the future

Digital Laggards: 15% -do not have a digital plan, limited initiatives, and investments in place

6 Challenges of IT to meet business demand - correct answer-Data Growth
Aging Technology
Growth
Poor Scale, performance, security
Shadow IT
Financial Pressure.

A computing infrastructure can be classified as cloud only if has these 5 essential
characteristics. - correct answer-Measured Service

Rapid Elasticity

Resource Pooling

On Demand Self Service

Broad Network Access

A hypervisor has two key components, - correct answer-as the kernel of any OS, including
process management, file system management, and memory management. It is designed
and optimized to run multiple VMs concurrently. It receives requests for resources through
the VMM, and presents the requests to the physical hardware. Each virtual machine is
assigned a VMM that gets a share of the processor, memory, I/O devices, and storage from
the physical compute system to successfully run the VM. The VMM abstracts the physical
hardware, and appears as a physical compute system with processor, memory, I/O devices,
and other components that are essential for an OS and applications to run. The VMM
receives resource requests from the VM, which it passes to the kernel, and presents the
virtual hardware to the VM.
There are two types of hypervisors. Theyare bare-metal hypervisor and hosted hypervisor.

•Bare-metal hypervisor: It is also called asType 1 hypervisor. Itis directly installed on topof
the system hardware without any underlying operating system or any other software. It is
designed mainly for enterprise data center. Few examples of bare-metal hypervisor are
Oracle OVM for SPRAC, ESXi, Hyper-V, and KVM

, •Hosted hypervisor:It is also called as Type 2 hypervisor. It is installed as an application or
software on an operating system. In this approach, the hypervisor does not have direct
access to the hardware. All requests must pass through the operating system running on the
physical compute system. Few examplesof hosted hypervisor are VMware Fusion, Oracle
Virtual Box, Solaris Zones, and VMware Workstation.

Account hijacking - correct answer-Account hijacking refers to a scenario in which an
attacker gain access to cloud consumers' accounts using methods such as phishing or
installing keystroke-logging malware on consumers' virtual machinesto conduct malicious or
unauthorized activity. This threat can have a huge impact in cloud environment as the
services are accessed via network and the resources are shared between multiple
consumers. The cloud service instances might be used as base to gain access and modify
the information or redirect the users to illegitimate sites.

Active-Active clustering: - correct answer-Active-Active clustering: In this type of clustering,
the compute systems in a cluster are all active participants and run the same service of their
clients. The active-active cluster balances requests for service among the compute systems.
If one of the compute systems fails, the surviving systems take the load of the failed system.
This method enhances both the performance and the availability of a service.

Active-passive clustering: - correct answer-Active-passive clustering: In this type of
clustering, the service runs on one or more compute systems, and the passive compute
system just waits for a failover. If the active compute systemfails, the service that was
running on the active compute system fails over to the passive compute system.
Active-passive clustering does not provide performance improvement like active-active
clustering.

Administrative mechanisms - correct answer-Administrative mechanisms include security
and personnel policies or standard procedures to direct the safe execution of various
operations.This mechanism includes having regulatorycompliance in place to meet the
requirements of the customers and the government policies,and procedures of how the data
is handled in cloud. It also includescontracts and SLAs, background verification of the
employees, and trainings to create awareness of the security standards and the best
practices to prevent security breaches.

Advanced Persistent Threats (APTs) - correct answer-Advanced Persistent Threats (APTs)
are attacks in which an unauthorized person gains access to a company's network, to steal
data such as intellectual property.

Agent Based Backup - correct answer-In this approach, an agent or client is installed on a
virtual machine (VM) or a physical compute system. The agent streams the backup data to
the backup device as shown in the figure on the slide. This is a popular way to protect virtual
machines due to the same workflow implemented for a physical machine. This means
backup configurations and recovery options follow traditional methods that administrators
are already familiar with. This approach allows to do a file-level backup and restoration.
However, this backup approach doesn't capture virtual machine configuration files. This
approach doesn't provide the ability to backup and restore the VM as a whole. The agent

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Hkane. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75057 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart