Practice Free D-CI-DS-23 Exam Online Questions
What is the minimum number of nodes required for high availability in a HCI cluster?
- A . 2
- B . 3
- C . 4
- D . 5
Which tool is commonly used for collecting performance metrics in a cloud infrastructure?
- A . Microsoft Word
- B . Prometheus
- C . Google Docs
- D . Notepad++
A company wants to build an IaaS cloud to host cloud-native applications. On which areas should a cloud architect focus when gathering requirements for this cloud design?
- A . Automation, multi-tenancy, and hardware availability
- B . Automation, hardware availability, and policy compliance
- C . Hardware availability, policy compliance, and multi-tenancy
- D . Policy compliance, automation, and multi-tenancy
What are key focus areas of requirements gathering for a cloud design?
- A . Availability and security
- B . Data growth and consolidation
- C . Consolidation and availability
- D . Security and data growth
Which characteristics of open source cloud management components might lead a cloud architect to select open source over proprietary software?
- A . Lower software costs, integration with open cloud platforms, and availability of in-house development expertise
- B . Compatibility testing to ensure functionality, availability of an API, and advanced out-of-the-box capabilities
- C . Availability of in-house development expertise, interoperability with proprietary software, and compatibility testing to ensure functionality
- D . Availability of an API, integration with open cloud platforms, and full IaaS support
Ensures optimal end-user service and utilization
A) Availability
B) Scalability
C) Microservice Support
D) Security
- A . 1 – B
2 – D
3 – A
4 – C - B . 1 – D
2 – B
3 – A
4 – C - C . 1 – C
2 – A
3 – B
4 – D - D . 1 – A
2 – D
3 – C
4 – B
You are designing consumer compute resources in an onsite private cloud. During an assessment, you discover that the organization’s IT staff wants secure access to the underlying host OS.
What should be included in the design to support this requirement?
- A . Host IDS configuration
Secure key infrastructure
Bridged management network - B . Perimeter firewall configuration
VPN encryption
Separate management network - C . Host OS firewall configuration
Central logging
Physically isolated management network - D . Host OS firewall configuration
Secure key infrastructure
Separate management network
You are creating a cloud infrastructure design for an organization. The cloud design includes physical servers with hypervisors which will be used to host consumer services. The hosts are managed through a hypervisor element manager.
Which step should be taken to secure the hypervisor environment?
- A . Place the element manager administrative interfaces on a consumer-facing network and hypervisor administrative interfaces on an isolated network
- B . Place the element manager administrative interfaces on a consumer-facing network and hypervisor administrative interfaces on a secure network
- C . Place the element manager and hypervisor administrative interfaces on a secure network
- D . Place the element manager and hypervisor administrative interfaces on a consumer- facing network
A cloud architect has included a monitoring application in a cloud design to ensure infrastructure performance meets agreed-upon service levels. The application resides on a virtual appliance.
The application vendor provides guidance for sizing the appliance.
What will be part of the sizing calculations for the virtual appliance storage?
- A . Number of targets
Message bus subscribers
Data deduplication policies - B . Number of segments
Number of metrics
Data deduplicaiton policies - C . Number of targets
Number of metrics
Data retention policies - D . Message bus subscribers
Number of users
Data retention policies
During an assessment, you determine that an organization wants to view available services, billing information, performance information, and usage information all from one portal.
Which component may be required in the cloud management platform to enable this capability and have minimal impact on the user experience?
- A . SSL
- B . AD
- C . LDAP
- D . SSO
