An architect has received the requirements to deploy a legacy application to the Cloud. The
requirements indicate storage must have hierarchical structure, data encryption, and a large amount
of storage. Which option meets these requirements?
D
IBM Cloud Hyper Protect Crypto Services provide a dedicated key management service and
Hardware Security Module (HSM) that provides the Keep Your Own Key capability. What is a
hardware security module (HSM)?
B
What is a characteristic of a SQL database?
C
What can be used to establish a private and secure connection between a client environment and
IBM Cloud services?
C
What are two supported provisioning tiers for Block Storage - Classic on IBM Cloud? (Choose two.)
C, D
Explanation:
Reference:
https://cloud.ibm.com/docs/services/BlockStorage?topic=blockstorage-about-
blockstorage#about-blockstorage-terms-definitions
What is the protocol used for enabling communication with IBM Cloud File Storage?
C
Explanation:
Reference:
https://www.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_ca/0/897/ENUS220-310/index.html&request_locale=en#:~:text=Back%20to%20top-
,Overview,on%20IBM%20Cloud%20Object%20Storage
An oil and gas exploration company is concerned with encrypting their dat
a. What encryption methods are supported when the customer uses IBM Cloud Block Storage for
Virtual Private Cloud (VPC)?
C
By default, what is true about all resources within the same Virtual Private Cloud (VPC)?
C
Explanation:
Reference:
https://www.ibm.com/cloud/learn/vpc
Which IBM Cloud service can monitor risk models for performance, bias and explainability to limit
risk exposure from regulations and create more fair and explainable outcomes for customers?
A
Explanation:
Reference:
https://www.ibm.com/downloads/cas/RYXBG8OZ#:~:text=and%20Explain%20Decisions-
,Watson%20OpenScale,exposure%20and%20produce%20better%20outcomes
Virtual servers on LinuxONE are available through which IBM Cloud compute option?
A
Explanation:
Reference:
https://cloud.ibm.com/docs/vpc?topic=vpc-about-
se#:~:text=A%20virtual%20server%20instance%20that,Protect%20as%20the%20operating%20syste
m