It is more faster and easier to pass the EMC E20-020 exam by using Actual EMC Cloud Infrastructure Specialist Exam for Cloud Architects questuins and answers. Immediate access to the Renew E20-020 Exam and find the same core area E20-020 questions with professionally verified answers, then PASS your exam with a high score now.
Q1. An organization wants to deploy SaaS applications in their cloud. The SaaS applications will be using application HA to maintain up-time levels of 99.9%.
What should the cloud architect include in the design to support this up-time requirement?
A. Sufficient host capacity
B. Quorum disks
C. Replication licenses for hypervisors
D. HA licenses for hypervisors
Q2. After developing prototype applications in the public cloud, developers determined that they want softwaredefined network functionality. Which ability will this requirement provide for the developers?
A. Programmatically provision an IPsec VPN tunnel between the public and private clouds
B. Programmatically migrate layer-3 access from aggregate to access switches
C. Programmatically control physical core network topologies
D. Programmatically provision physical network segments and services
Explanation: Software-defined networking (SDN) is an approach to computer networking that allows network administrators to manage network services through abstraction of higher-level functionality. This is done by decoupling the system that makes decisions about where traffic is sent (the control plane) from the underlying systems that forward traffic to the selected destination (the data plane).
Q3. What is a benefit of a service catalog?
A. Handles every IT request simultaneously
B. Allows users to customize tenant roles
C. Services do not have to meet the standards set by the business
D. Enables the application of quotas on resources to control cost
Q4. Which additional considerations must a cloud monitoring system address compared to a traditional monitoring system?
A. Tenant isolation, orchestration, and elastic workloads
B. Orchestration, elastic workloads, and Data at Rest security
C. Elastic workloads, Data at Rest security, and tenant isolation
D. Data at Rest security, tenant isolation, and orchestration
Explanation: * Encrypt data-at-rest
Encryption is your front-line defense for defending data-at-rest. It limits access to those with the right keys - locking out anyone who doesn't have them.
Q5. An organization wants to deploy a service catalog in a private cloud. What requirements are met by using a service catalog?
A. Ability for administrators to manage multi-tenancy
B. Ability for users to measure service performance
C. Ability for users to aggregate service logs
D. Ability for administrators to attach storage pools
Explanation: Benefits of implementing and maintaining a service catalog include allowing an enterprise to track and manage metrics that represent the utilization of services and service-related traits, such as those associated with service supply and demand.
Q6. An organization wants to deploy a block storage in the cloud using a storage array that is accessible through the iSCSI protocol. The hosts support iSCSI.
Why would network segmentation be included in the design to support this requirement?
A. Secure all traffic between the storage array and the hosts
B. Enable CHAP between the array and hosts
C. iSCSI traffic is not supported on networks with other types of traffic
D. Enable LUN masking capabilities of the array
Explanation: LUN masking is a further constraint added to LUN zoning to ensure that only devices authorized to access a specific server can access the corresponding port.
A logical unit number (LUN) is a unique identifier that designates individual hard disk devices or grouped devices for address by a protocol associated with a SCSI, iSCSI, Fibre Channel (FC) or similar interface. LUNs are central to the management of block storage arrays shared over a storage area network (SAN).
Q7. When implementing QoS across a cloud network, how is storage traffic usually prioritized?
A. Most important
B. More important than tenant traffic but less important than management traffic
C. More important than management traffic but less important than tenant traffic
D. Least improtant
Q8. A company wants to build an IaaS cloud to host cloud-native applications. On which areas should a cloud architect focus when gathering requirements for this cloud design?
A. Automation, multi-tenancy, and hardware availability
B. Automation, hardware availability, and policy compliance
C. Hardware availability, policy compliance, and multi-tenancy
D. Policy compliance, automation, and multi-tenancy
Explanation: * Multi-tenancy
Infrastructure as a Service is very similar to what we've known as hosting or collocation services, just painted with bright cloudy colors. Multi-tenant services are any services that you offer to multiple customers, or "tenants." In most cases, IaaS and multi-tenant services mean the same thing, although you could also implement storage- or database- related multi-tenant service.
In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure.
Note: Infrastructure as a Service (IaaS) is a form of cloud computing that provides virtualized computing resources over the Internet.
Q9. In addition to the operating system, what other components does the consumer manage in an IaaS cloud service model?
A. Application, data, storage, and physical networking
B. Data, middleware, application, and runtime
C. Runtime, physical servers, application, and middleware
D. Middleware, runtime, hypervisor, and application
Explanation: In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure.
IaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles. Figure: Cloud-computing layers accessible within a stack
Not A: not Physical networking not C: Not physical servers. Not D: Not Hypervisors. Explanation:
Q10. In a cloud design, an architect has defined a separate trust zone for host management. The hosts will be running open source hypervisors.
What should be included in the design deliverables to support this separate trust zone?
A. Isolated management network and a common super-user account
B. Separate PKI and encrypted CMI portal access
C. Separate authentication source and a preferred zone set
D. Isolated management network and a separate authentication source
To know more about the E20-020, click here.