Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

DEA-2TT3 Questions and Answers

Question # 6

What term refers to the entry points from which an attack can be launched?

A.

Work factor

B.

Velocity of attack

C.

Attack vector

D.

Attack surface

Full Access
Question # 7

What is the goal of lean practices in a software development methodology?

A.

Create quality software in the shortest time period at the lowest cost

B.

Develop software using 12-Factor modern application practices

C.

Create quality software with the minimum number of team members

D.

Develop and deploy software using third platform technologies

Full Access
Question # 8

Match each service management phase with its process.

Full Access
Question # 9

Which compliance standard provides policies and procedures to optimize the security of credit card transactions?

A.

HIPAA

B.

ENISA

C.

CSA CCM

D.

PCI DSS

Full Access
Question # 10

Which process involves determining the optimal resources required to meet seasonal spikes in resource demand?

A.

Configuration management

B.

Change management

C.

Capacity management

D.

Incident management

Full Access
Question # 11

What capability does an orchestration workflow provide?

A.

Helps administer the cloud infrastructure, such as adding resources to a resource pool, billing, and reporting

B.

Helps to consolidate all the IT resources in the cloud environment

C.

Enables the administrator to control the underlying physical infrastructure using a single unified management console

D.

Creates an automated set of tasks to update the service catalog by cloud consumers without requiring manual intervention

Full Access
Question # 12

Which cloud service model is represented in the exhibit?

A.

Software as a Service

B.

Infrastructure as a Service

C.

Platform as a Service

D.

Database as a Service

Full Access