Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

DEA-2TT4 Exam Dumps - EMC DCA-CIS Questions and Answers

Question # 14

Identify a threat caused, when an attacker sends massive quantities of data to the target with the intention of consuming bandwidth.

Options:

A.

Advanced persistent threat

B.

Denial-of-service

C.

Malicious insider

D.

Account hijacking

Buy Now
Question # 15

What is true about application virtualization?

Options:

A.

Resolves application conflicts and compatibility issues

B.

Allows for OS modifications on host machines

C.

Prevents the use of conflicting applications on the same end-point device

D.

Increases the complexity of application deployment

Buy Now
Question # 16

What is an example of OS hardening?

Options:

A.

Deleting unused programs and installing current updates

B.

Changing OS frequently to run applications

C.

Encrypting application data at rest

D.

Disallowing unauthorized modifications to application settings

Buy Now
Question # 17

Which storage data protection technique provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

Options:

A.

Erasure coding

B.

Cache protection

C.

RAID

D.

Dynamic disk sparing

Buy Now
Question # 18

Which function collects information about competing service offerings?

Options:

A.

Service performance management

B.

Service portfolio management

C.

Service operations management

D.

Service demand management

Buy Now
Question # 19

What is the correct sequence of steps in the service catalog design and implementation process?

Options:

Buy Now
Question # 20

What is the objective of Confidentiality in information security?

Options:

A.

Prevents an unauthorized user from changing data

B.

Non-repudiation and authenticity of information

C.

Ensures that identify credentials are used to verify cloud assets

D.

Restricts user access to data held within the cloud

Buy Now
Question # 21

What term refers to the entry points from which an attack can be launched?

Options:

A.

Attack surface

B.

Attack factor

C.

Attack vector

Buy Now
Question # 22

What is the effect of a denial-of-service attack?

Options:

A.

Privileges are misused to compromise data security.

B.

User credentials are captured and sent to the attacker

C.

Unauthorized access is gained to user accounts and data.

D.

Legitimate users are prevented from accessing services.

Buy Now
Question # 23

Which key service management function modifies and aligns services according to consumer needs in the cloud environment?

Options:

A.

Service operation management

B.

Service demand management

C.

Service capacity management

D.

Service portfolio management

Buy Now
Exam Code: DEA-2TT4
Exam Name: Associate - Cloud Infrastructure and Services v4 Exam
Last Update: Feb 23, 2025
Questions: 122
DEA-2TT4 pdf

DEA-2TT4 PDF

$25.5  $84.99
DEA-2TT4 Engine

DEA-2TT4 Testing Engine

$28.5  $94.99
DEA-2TT4 PDF + Engine

DEA-2TT4 PDF + Testing Engine

$40.5  $134.99