Database for PostgreSQL is an example of which type of database?
A. Key-value
B. Object-relational
C. Document
D. Graph
What is a key requirement of a resilient architecture?
A. High rate of resource utilization
B. Low rate of resource utilization
C. High tolerance level for interruption
D. Low tolerance level for interruption
In the context of the Key Protect service, which of the following statements is correct?
A. Key Protect allows you to manage keys as well as SSL/TLS Digital Certificates
B. Key Protect allows you to import keys for other Clouds
C. Key Protect allows you to manage service accounts
D. Key Protect allows you to create a new key or import your own key (BYOK)
Which statement describes a key-value database?
A. Each item in the database is encrypted with public-key cryptography
B. Each item in the database is stored in a column named key with values in each row
C. Each item in the database is a document with lists of key-value pairs
D. Each item in the database is stored as an attribute name (referred to as a key) with its corresponding value
What is the minimum number of servers an Event Stream cluster in IBM Cloud must be composed of?
A. Four servers in load balance
B. One
C. Two servers
D. Three servers
Which are two benefits of IBM Cloud Functions? (Choose two.)
A. Visual debugging
B. Scale up or down automatically
C. Based on Kubernetes
D. Focus on code, not infrastructure
E. Out-of-the-box connectors to several databases
A VPC has been created with a single subnet. Virtual server instances have been deployed on the subnet that have different functions which support a production application. The security team has now said that they want to ensure that network traffic between the different server types can be controlled. How can this be achieved?
A. Use a Hardware Security Module to create advanced network routing tables that ensure traffic does not route between server types, as per the security team's wishes
B. Create security groups for the different server types with inbound and outbound rules that satisfy the security team, into which the VSIs can be placed
C. Create a VPC load balancer and place each server type into its own back-end pool, then create Layer7 routing policies that restrict network traffic flowing between the different pools
D. Create multiple access control lists with rules that satisfy the security team's requirements and associate each VSI to the respective ACL
A Financial Institution is interested in using IBM Blockchain Platform on IBM Cloud with the requirement that any application meet FIPS 140-2 Level 3 compliance. What option should an architect use for the nodes?
A. Financial Cloud Connector
B. Spectrum Protect Module
C. Hardware Security Module
D. Cloud Internet Connector
A web application has been deployed in an IBM Virtual Private Cloud. In testing, it's discovered that the web server is not responding to requests over the Internet. What could be the problem?
A. The web server is in a Security Group which is missing a rule that allows inbound traffic on port 80
B. The VPC's Vyatta Gateway does not have a NAT configuration for the web server group
C. The VPC load balancer hasn't been configured with the SSH key for the web server
D. The subnet ACL has an ALLOW ALL inbound rule set at Priority 1 but a BLOCK ALL inbound rule set at Priority 2
Which IBM Cloud service makes it possible to troubleshoot logs in real time to diagnose issues?
A. IBM Log Analysis with LogDNA
B. IBM Cloud Monitoring with Sysdig
C. API Gateway
D. Portworx Enterprise